Semantic Filter
show all semantic filters
Found 1165 articles
  • Introduction to the Minitrack on Emerging Issues in Distributed Group Decision-Making: Opportunities and Challenges (CC BY-NC-ND 4.0)

    2023 | HICSS | Citations: 0

    Authors: Aggarwal, A.; Vogel, D.; Murayama, Y.

    Abstract: This mini track addresses emerging issues, such as diversity, culture, adaptabi ... Expand

    Semantic filters: IT security

    Topics: IT security

  • An Investigation of Domain-based Social Influence on ChatGPT-Related Twitter Data

    2023 | International Conference on Information Systems | Citations: 0

    Authors: Ahangama, Supunmali

    Abstract: ... Expand

    Semantic filters: IT security

    Topics: Twitter social influence social media social identity robotic

    Methods: chatGPT sentiment analysis multiple linear regression term frequency–inverse document frequency NLTK

  • Relating Social Media Diffusion, Education Level and Cybersecurity Protection Mechanisms to E-Participation Initiatives: Insights from a Cross-Country Analysis

    PDF

    2023 | Information Systems Frontiers | Citations: 0

    Authors: Ahangama, Supunmali

    Abstract: Virtual Social Networks (VSN) act as a catalyst for the success of the active pa ... Expand

    Semantic filters: IT security

    Topics: IT security decision making human resource management social network government system

    Methods: survey partial least squares path modeling cross sectional research mediation analysis archival research

    Theories: protection motivation theory structuration theory

  • Benchmarking the Robustness of Phishing Email Detection Systems

    2023 | Americas Conference on Information Systems | Citations: 0

    Authors: Ampel, Benjamin; Gao, Yang; Hu, James; Samtani, Sagar; Chen, Hsinchun

    Abstract: Social engineering attacks are currently the most cited cybersecurity threat to ... Expand

    Semantic filters: IT security

    Topics: artificial intelligence electronic mail email phishing phishing IT security

    Methods: word2vec random forest classification naïve bayes literature study pre-trained language model

  • Design of a Novel Information System for Semi-automated Management of Cybersecurity in Industrial Control Systems

    PDF

    2023 | ACM Transactions on Management Information Systems | Citations: 0

    Authors: Ameri, Kimia; Hempel, Michael; Sharif, Hamid; Lopez, Juan; Perumalla, Kalyan

    Abstract: There is an urgent need in many critical infrastructure sectors, including the e ... Expand

    Semantic filters: IT security

    Topics: IT security database system website Python electronic authentication

    Methods: computational algorithm sentiment analysis natural language processing BERT language model

  • Detecting Privacy Threats with Machine Learning: A Design Framework for Identifying Side-Channel Risks of Illegitimate User Profiling

    2023 | Americas Conference on Information Systems | Citations: 0

    Authors: Anwar, Raja Hasnain; Zou, Yi (Zoe); Raza, Muhammad Taqi

    Abstract: Privacy leakage has become prevalent and severe with the increasing adoption of ... Expand

    Semantic filters: IT security

    Topics: privacy IT security data breach information system use

    Methods: design framework machine learning design science time series analysis longitudinal research

  • Introduction to the Minitrack on Business Intelligence, Business Analytics, and Big Data: Innovation, Deployment, and Management

    2023 | HICSS | Citations: 0

    Authors: Ariyachandra, Thilini; Marjanovic, Olivera; Dinter, Barbara

    Abstract: ... Expand

    Semantic filters: IT security

    Topics: IT security organizational value big data

    Methods: action design research personal interview structured literature research

  • Building Digital Trust to Protect Whistleblowers - A blockchain-based Reporting Channel

    2023 | HICSS | Citations: 0

    Authors: Asprion, Petra; Grieder, Hermann; Grimmberg, Frank; Moriggl, Pascal

    Abstract: Organizations today need internal reporting channels to report illegal/unethical ... Expand

    Semantic filters: IT security

    Topics: blockchain electronic health privacy IT security usability

    Methods: design artifact qualitative interview design process design science expert panel

  • An Adversarial Dance: Toward an Understanding of Insiders’ Responses to Organizational Information Security Measures

    PDF

    2023 | Journal of the Association for Information Systems | Citations: 0

    Authors: Balozian, Puzant; Burns, A.; Leidner, Dorothy

    Abstract: Despite the increased focus on organizational security policies and programs, s ... Expand

    Semantic filters: IT security

    Topics: IT security IT security defense productivity IT security threat anonymity

    Methods: case study qualitative interview personal interview theory development survey

    Theories: information systems theory neutralization theory behavioral theory

  • Give me 3W1H: A Bibliometric View on Accountable AI

    2023 | International Conference on Information Systems | Citations: 0

    Authors: Bartsch, Sebastian; Schmidt, Jan-Hendrik

    Abstract: Accountability is crucial to make stakeholders of Artificial Intelligence (AI)- ... Expand

    Semantic filters: IT security

    Topics: artificial intelligence explainable artificial intelligence legal context database system IT security

    Methods: word embedding word2vec bibliometric analysis machine learning supervised learning