2023 | HICSS | Citations: 0
Authors: Aggarwal, A.; Vogel, D.; Murayama, Y.
Abstract: This mini track addresses emerging issues, such as diversity, culture, adaptabi ... Expand
Semantic filters: IT security
Topics: IT security
2023 | International Conference on Information Systems | Citations: 0
Authors: Ahangama, Supunmali
Abstract: ... Expand
Semantic filters: IT security
Topics: Twitter social influence social media social identity robotic
Methods: chatGPT sentiment analysis multiple linear regression term frequency–inverse document frequency NLTK
2023 | Information Systems Frontiers | Citations: 0
Authors: Ahangama, Supunmali
Abstract: Virtual Social Networks (VSN) act as a catalyst for the success of the active pa ... Expand
Semantic filters: IT security
Topics: IT security decision making human resource management social network government system
Methods: survey partial least squares path modeling cross sectional research mediation analysis archival research
Theories: protection motivation theory structuration theory
2023 | Americas Conference on Information Systems | Citations: 0
Authors: Ampel, Benjamin; Gao, Yang; Hu, James; Samtani, Sagar; Chen, Hsinchun
Abstract: Social engineering attacks are currently the most cited cybersecurity threat to ... Expand
Semantic filters: IT security
Topics: artificial intelligence electronic mail email phishing phishing IT security
Methods: word2vec random forest classification naïve bayes literature study pre-trained language model
2023 | ACM Transactions on Management Information Systems | Citations: 0
Authors: Ameri, Kimia; Hempel, Michael; Sharif, Hamid; Lopez, Juan; Perumalla, Kalyan
Abstract: There is an urgent need in many critical infrastructure sectors, including the e ... Expand
Semantic filters: IT security
Topics: IT security database system website Python electronic authentication
Methods: computational algorithm sentiment analysis natural language processing BERT language model
2023 | Americas Conference on Information Systems | Citations: 0
Authors: Anwar, Raja Hasnain; Zou, Yi (Zoe); Raza, Muhammad Taqi
Abstract: Privacy leakage has become prevalent and severe with the increasing adoption of ... Expand
Semantic filters: IT security
Topics: privacy IT security data breach information system use
Methods: design framework machine learning design science time series analysis longitudinal research
2023 | HICSS | Citations: 0
Authors: Ariyachandra, Thilini; Marjanovic, Olivera; Dinter, Barbara
Abstract: ... Expand
Semantic filters: IT security
Topics: IT security organizational value big data
Methods: action design research personal interview structured literature research
2023 | HICSS | Citations: 0
Authors: Asprion, Petra; Grieder, Hermann; Grimmberg, Frank; Moriggl, Pascal
Abstract: Organizations today need internal reporting channels to report illegal/unethical ... Expand
Semantic filters: IT security
Topics: blockchain electronic health privacy IT security usability
Methods: design artifact qualitative interview design process design science expert panel
2023 | Journal of the Association for Information Systems | Citations: 0
Authors: Balozian, Puzant; Burns, A.; Leidner, Dorothy
Abstract: Despite the increased focus on organizational security policies and programs, s ... Expand
Semantic filters: IT security
Topics: IT security IT security defense productivity IT security threat anonymity
Methods: case study qualitative interview personal interview theory development survey
Theories: information systems theory neutralization theory behavioral theory
2023 | International Conference on Information Systems | Citations: 0
Authors: Bartsch, Sebastian; Schmidt, Jan-Hendrik
Abstract: Accountability is crucial to make stakeholders of Artificial Intelligence (AI)- ... Expand
Semantic filters: IT security
Topics: artificial intelligence explainable artificial intelligence legal context database system IT security
Methods: word embedding word2vec bibliometric analysis machine learning supervised learning