Semantic Filter
show all semantic filters
Found 225 articles
  • Decoding Digital Risk from Corporate Disclosure: A Neural Network Approach

    2023 | Americas Conference on Information Systems | Citations: 0

    Authors: Long, Yuan; Rai, Arun

    Abstract: Digital risk-or the likelihood of losses from organizational context, digital i ... Expand

    Semantic filters: IT risk management

    Topics: IT risk management Python database system accounting IT security

    Methods: artificial neural network BERT regression analysis method descriptive statistic SEC EDGAR

  • PUBLIC MANAGEMENT CHALLENGES IN THE DIGITAL RISK SOCIETY: A Critical Analysis of the Public Debate on Implementation of the Danish NemID

    PDF

    2023 | European Journal of Information Systems | Citations: 0

    Authors: Ngwenyama, Ojelanki; Henriksen, Helle Zinner; Hardt, Daniel

    Abstract: The rise of the digital society is accompanied by incalculable social risks, but ... Expand

    Semantic filters: IT risk management

    Topics: IT risk management data breach identity theft denial of service attack internet technology

    Methods: theory development case study qualitative content analysis cluster analysis design artifact

    Theories: theory of information warfare theory of communicative action

  • TOWARDS A MODEL OF TECHNOLOGY USAGE AND DIGITAL MATURITY IN CHILDREN: A GROUNDED-THEORY APPROACH

    2022 | European Conference On Information Systems | Citations: 0

    Authors: Arenas, Alvaro; Yazdi, Pouye

    Abstract: Increased use of digital technologies by children has raised some concerns abou ... Expand

    Semantic filters: IT risk management

    Topics: information system use IS maturity mobile phone social network Instagram

    Methods: qualitative interview focus group qualitative coding grounded theory survey

  • When and why technology leadership enters the C-suite: An antecedents perspective on CIO presence

    PDF

    2022 | Journal of Strategic Information Systems | Citations: 0

    Authors: Bendig, David; Wagner, Robin; Jung, Christopher; Nüesch, Stephan

    Abstract: Building on the concept of dynamic managerial capabilities, we set out to advanc ... Expand

    Semantic filters: IT risk management

    Topics: Chief Information Officer IT leadership research and development information system use digital transformation

    Methods: theory development longitudinal research regression analysis method descriptive statistic statistical hypothesis test

    Theories: dynamic capabilities theory organizational behavior theory

  • More Security, less Harm? Exploring the Link between Security Measures and Direct Costs of Cyber Incidents within Firms using PLS-PM

    2022 | International Conference on Business Informatics | Citations: 0

    Authors: Dreissigacker, Arne; Teuteberg, Frank

    Abstract: As one of the first articles to empirically explore the direct costs of cyber in ... Expand

    Semantic filters: IT risk management

    Topics: IT security defense ransomware database system IT security threat pandemic

    Methods: partial least squares path modeling qualitative interview survey partial least squares regression statistical power analysis

  • Knowledge Systems and Risk Management: Threat Lessons Learned from COVID-19 in 2020-21

    PDF

    2022 | HICSS | Citations: 0

    Authors: Jennex, Murray; Durcikova, Alexandra; Ilvonen, Ilona

    Abstract: The year 2020-21 has shown us that the likelihood of extreme events is greater t ... Expand

    Semantic filters: IT risk management

    Topics: pandemic natural hazard IT risk management ransomware IT security threat

    Methods: survey

  • Improving Phishing Reporting Using Security Gamification

    PDF

    2022 | Journal of Management Information Systems | Citations: 2

    Authors: Jensen, Matthew L.; Wright, Ryan T.; Durcikova, Alexandra; Karumbaiah, Shamya

    Abstract: Phishing is an increasing threat that causes billions in losses and damage to pr ... Expand

    Semantic filters: IT risk management

    Topics: phishing gamification productivity self efficacy electronic mail

    Methods: experiment factorial experiment multivariate analysis of covariance survey design artifact

    Theories: cognitive evaluation theory

  • Does IT Matter to Acquisitions? The Impacts of IT Distance on Post-Acquisition Performance

    2022 | Management Information Systems Quarterly | Citations: 0

    Authors: Lee, Kyunghee; Han, Kunsoo; Animesh, Animesh; Pinsonneault, Alain

    Abstract: Although researchers have examined the role of dyadic dynamics (i.e., interactio ... Expand

    Semantic filters: IT risk management

    Topics: system integration Oracle database enterprise information system value creation IT decentralization

    Methods: survey word2vec descriptive statistic word embedding theory development

  • Understanding dark side of artificial intelligence (AI) integrated business analytics: assessing firm’s operational inefficiency and competitiveness

    PDF

    2022 | European Journal of Information Systems | Citations: 0

    Authors: Rana, Nripendra P.; Chatterjee, Sheshadri; Dwivedi, Yogesh K.; Akter, Shahriar

    Abstract: The data-centric revolution generally celebrates the proliferation of business a ... Expand

    Semantic filters: IT risk management

    Topics: artificial intelligence data quality analytical information system competitive advantage explainable artificial intelligence

    Methods: partial least squares path modeling survey partial least squares regression conceptual modelling theoretical contribution

    Theories: contingency theory dynamic capabilities theory resource based view of the firm

  • A meta-analysis of the factors influencing the impact of security breach announcements on stock returns of firms

    PDF

    2022 | Electronic Markets | Citations: 0

    Authors: Ebrahimi, Sepideh; Eshghi, Kamran

    Abstract: Concurrent with the increase in organizations’ reliance on IT systems for conduc ... Expand

    Semantic filters: IT risk management

    Topics: IT security threat IT security IS failure IT risk management database system

    Methods: meta analysis event study longitudinal research regression analysis method correlation analysis