Semantic Filter
show all semantic filters
Found 161 articles
  • Deploying Artificial Intelligence to Combat Covid-19 Misinformation on Social Media: Technological and Ethical Considerations

    2023 | HICSS | Citations: 0

    Authors: Cartwright, B.; Frank, R.; Weir, G.; Padda, K.; Strange, S.

    Abstract: This paper reports on AI research into online misinformation pertaining to the ... Expand

    Semantic filters: computer crime

    Topics: misinformation Twitter Reddit social media pandemic

    Methods: machine learning computational algorithm support vector machine decision tree classification random forest classification

  • Navigating an Interdisciplinary Approach to Cybercrime Research

    2023 | HICSS | Citations: 0

    Authors: Giddens, Laurie; Petter, Stacie; Bichler, Gisela; Rivas, Pablo; Fullilove, Michael H.; Cerny, Tomas

    Abstract: The internet has created new markets and enabled alternative business models for ... Expand

    Semantic filters: computer crime

    Topics: computer crime internet technology criminality database system open access

    Methods: machine learning natural language processing

  • Introduction to the Minitrack on Cybercrime

    2023 | HICSS | Citations: 0

    Authors: Hamari, Juho; Harviainen, J. Tuomas; Siuda, Piotr; Gehl, Robert

    Abstract: Research on cybercrime is on the rise in many areas of internet studies, often ... Expand

    Semantic filters: computer crime

    Topics: computer crime mobile application wireless LAN electronic mail covid 19

  • Examining the Relationship between National Cybersecurity Commitment, Culture, and Digital Payment Usage: An Institutional Trust Theory Perspective

    PDF

    2023 | Information Systems Frontiers | Citations: 1

    Authors: Krishna, Ben; Krishnan, Satish; Sebastian, M. P.

    Abstract: Cyberattacks can be considered one of the fundamental challenges that paralyze t ... Expand

    Semantic filters: computer crime

    Topics: IT security internet technology national culture electronic finance information system use

    Methods: longitudinal research hierarchical linear modeling cross sectional research archival research time series analysis

    Theories: trust theory cultural dimensions theory contingency theory theory of economic growth

  • Where is IT in Information Security? The Interrelationship among IT Investment, Security Awareness, and Data Breaches

    2023 | Management Information Systems Quarterly | Citations: 1

    Authors: Li, Wilson Weixun; Leung, Alvin; Yue, Wei

    Abstract: Data breaches can severely damage a firm's reputation and its customers' confid ... Expand

    Semantic filters: computer crime

    Topics: IT investment data breach IT security defense data security IT security threat

    Methods: longitudinal research robustness check autocorrelation analysis survey literature study

    Theories: institutional theory protection motivation theory

  • Deepfake Valence: A Double-edged Sword

    2023 | Americas Conference on Information Systems | Citations: 0

    Authors: Liang, Huigang; Chew, Shao

    Abstract: Deepfakes have garnered widespread attention for their malicious use. Despite i ... Expand

    Semantic filters: computer crime

    Topics: deepfake social norm technology adoption computer crime

    Methods: SEM tool survey statistical hypothesis test scale reliability field study

    Theories: rational choice theory big five model

  • Drugs for Sale! An Analysis and Estimation of Drug Products on the Cryptomarket Ecosystem

    2023 | HICSS | Citations: 0

    Authors: Liu, Shu; Frank, Richard; Warkentin, Noelle

    Abstract: Cryptomarkets are marketplaces on the dark web that facilitate the sale of mostl ... Expand

    Semantic filters: computer crime

    Topics: missing data spreadsheet computer crime criminality

    Methods: logistic regression machine learning Student's t-test qualitative coding product review

  • Dynamic Capabilities in Cybersecurity Intelligence: A Meta-Synthesis to Enhance Protection Against Cyber Threats

    PDF

    2023 | Communications of the Association for Information Systems | Citations: 0

    Authors: Pigola, Angélica; Costa, Priscila da

    Abstract: ... Expand

    Semantic filters: computer crime

    Topics: IT security data security database system innovation management IT security threat

    Methods: case study synthesis design science maturity model capability maturity model integration

    Theories: dynamic capabilities theory resource based view of the firm

  • A Taxonomy for Risk Assessment of Cyberattacks on Critical Infrastructure (TRACI)

    PDF

    2023 | Communications of the Association for Information Systems | Citations: 0

    Authors: Plachkinova, Miloslava; Vо, Ace

    Abstract: Cybercrime against critical infrastructures such as nuclear reactors, power pla ... Expand

    Semantic filters: computer crime

    Topics: IT security risk management usability data security strategic management

    Methods: qualitative interview survey design science personal interview design artifact

    Theories: rational choice theory activity theory information systems theory utility theory

  • Understanding the Role of Leadership Competencies in Cyber Crisis Management: A Case Study

    2023 | HICSS | Citations: 0

    Authors: Salviotti, Gianluca; Abbatemarco, Nico; De Rossi, Leonardo Maria; Bjoernland, Kaia

    Abstract: The amount and severity of cyber-attacks has been constantly increasing in recen ... Expand

    Semantic filters: computer crime

    Topics: emergency management ransomware organization learning decision making computer crime

    Methods: narrative analysis qualitative interview case study cluster analysis qualitative coding