2023 | HICSS | Citations: 0
Authors: Cordella, A.; Gualdi, F.; Bannister, F.; Park, K.
Abstract: ... Expand
Topics: value creation information system use government system open innovation perceived ease of use
Methods: design methodology
2023 | HICSS | Citations: 0
Authors: Cornelius, Samia; Leidner, Dorothy; Benbya, Hind
Abstract: Virtual Influencers (VIs) are digital influencers that can look and behave like ... Expand
Topics: robotic social media Instagram social network digital platform
Methods: experiment laboratory experiment experimental design mediation analysis repeated measures ANOVA
2023 | HICSS | Citations: 0
Authors: Cornelius, Samia; Leidner, Dorothy; Bina, Saman
Abstract: Though human-like design can increase favorable social behaviors like familiarit ... Expand
Topics: Instagram social media digital media logistics management word of mouth
Methods: experiment Wald test parametric test logistic regression binomial logistic regression
Theories: uncanny valley theory
2023 | International Journal of Information Management | Citations: 0
Authors: Costa-Climent, Ricardo; Haftor, Darek M.; Staniewski, Marcin W.
Abstract: Start-ups have revolutionised many economic ecosystems, becoming innovation pion ... Expand
Topics: value creation Twitter social media database system website
Methods: descriptive statistic theory development regression analysis method general multivariate regression model linear regression analysis
2023 | HICSS | Citations: 0
Authors: Costello, F.; Kim, M.; Lee, K.
Abstract: The goal of the current study was to explore the potential of neuroscience mini ... Expand
Topics: user interface big data usability tablet artificial intelligence
Methods: electroencephalography NeuroIS computational algorithm sensitivity analysis machine learning
2023 | Communications of the Association for Information Systems | Citations: 0
Authors: Coulon, Thibaut; Paré, Guy; Barki, Henri
Abstract: When unexpected events occur, IT project teams need to react appropriately in o ... Expand
Topics: IT project project management IT project team database system sensemaking
Methods: literature sample literature study synthesis literature filtering
2023 | HICSS | Citations: 0
Authors: Cram, W. Alec; D'Arcy, John
Abstract: A rich body of research examines the cybersecurity behavior of employees, with a ... Expand
Topics: IT security data breach computer data storage cybersecurity behavior top management support
Methods: survey linguistic analysis company material
2023 | Information Systems Journal | Citations: 0
Authors: Cram, W. Alec; D'Arcy, John
Abstract: Managers who oversee cybersecurity policies commonly rely on managerial encourag ... Expand
Topics: IT security top management support cybersecurity behavior pandemic privacy
Methods: survey SEM tool structural equation modeling survey design confirmatory factor analysis
Theories: fairness theory organizational behavior theory
2023 | HICSS | Citations: 0
Authors: Cranford, E.; Ou, H.; Gonzalez, C.; Tambe, M.; Lebiere, C.
Abstract: Deceptive signaling has proven an effective method that can aid security analys ... Expand
Topics: IT security decision making accounting physical security
Methods: computational algorithm experiment simulation machine learning survey
2023 | HICSS | Citations: 0
Authors: Croasdell, Dave; Lathrop, Logan; Elste, James
Abstract: This project explores disparities in the cybersecurity practices of small to mid ... Expand
Topics: IT security IT security threat business continuity planning
Methods: survey