2023 | HICSS | Citations: 0
Authors: Cartwright, B.; Frank, R.; Weir, G.; Padda, K.; Strange, S.
Abstract: This paper reports on AI research into online misinformation pertaining to the ... Expand
Semantic filters: computer crime
Topics: misinformation Twitter Reddit social media pandemic
Methods: machine learning computational algorithm support vector machine decision tree classification random forest classification
2023 | HICSS | Citations: 0
Authors: Giddens, Laurie; Petter, Stacie; Bichler, Gisela; Rivas, Pablo; Fullilove, Michael H.; Cerny, Tomas
Abstract: The internet has created new markets and enabled alternative business models for ... Expand
Semantic filters: computer crime
Topics: computer crime internet technology criminality database system open access
Methods: machine learning natural language processing
2023 | HICSS | Citations: 0
Authors: Hamari, Juho; Harviainen, J. Tuomas; Siuda, Piotr; Gehl, Robert
Abstract: Research on cybercrime is on the rise in many areas of internet studies, often ... Expand
Semantic filters: computer crime
Topics: computer crime mobile application wireless LAN electronic mail covid 19
2023 | Information Systems Frontiers | Citations: 1
Authors: Krishna, Ben; Krishnan, Satish; Sebastian, M. P.
Abstract: Cyberattacks can be considered one of the fundamental challenges that paralyze t ... Expand
Semantic filters: computer crime
Topics: IT security internet technology national culture electronic finance information system use
Methods: longitudinal research hierarchical linear modeling cross sectional research archival research time series analysis
Theories: trust theory cultural dimensions theory contingency theory theory of economic growth
2023 | Management Information Systems Quarterly | Citations: 1
Authors: Li, Wilson Weixun; Leung, Alvin; Yue, Wei
Abstract: Data breaches can severely damage a firm's reputation and its customers' confid ... Expand
Semantic filters: computer crime
Topics: IT investment data breach IT security defense data security IT security threat
Methods: longitudinal research robustness check autocorrelation analysis survey literature study
Theories: institutional theory protection motivation theory
2023 | Americas Conference on Information Systems | Citations: 0
Authors: Liang, Huigang; Chew, Shao
Abstract: Deepfakes have garnered widespread attention for their malicious use. Despite i ... Expand
Semantic filters: computer crime
Topics: deepfake social norm technology adoption computer crime
Methods: SEM tool survey statistical hypothesis test scale reliability field study
Theories: rational choice theory big five model
2023 | HICSS | Citations: 0
Authors: Liu, Shu; Frank, Richard; Warkentin, Noelle
Abstract: Cryptomarkets are marketplaces on the dark web that facilitate the sale of mostl ... Expand
Semantic filters: computer crime
Topics: missing data spreadsheet computer crime criminality
Methods: logistic regression machine learning Student's t-test qualitative coding product review
2023 | Communications of the Association for Information Systems | Citations: 0
Authors: Pigola, Angélica; Costa, Priscila da
Abstract: ... Expand
Semantic filters: computer crime
Topics: IT security data security database system innovation management IT security threat
Methods: case study synthesis design science maturity model capability maturity model integration
Theories: dynamic capabilities theory resource based view of the firm
2023 | Communications of the Association for Information Systems | Citations: 0
Authors: Plachkinova, Miloslava; Vо, Ace
Abstract: Cybercrime against critical infrastructures such as nuclear reactors, power pla ... Expand
Semantic filters: computer crime
Topics: IT security risk management usability data security strategic management
Methods: qualitative interview survey design science personal interview design artifact
Theories: rational choice theory activity theory information systems theory utility theory
2023 | HICSS | Citations: 0
Authors: Salviotti, Gianluca; Abbatemarco, Nico; De Rossi, Leonardo Maria; Bjoernland, Kaia
Abstract: The amount and severity of cyber-attacks has been constantly increasing in recen ... Expand
Semantic filters: computer crime
Topics: emergency management ransomware organization learning decision making computer crime
Methods: narrative analysis qualitative interview case study cluster analysis qualitative coding