2023 | Journal of Information Technology | Citations: 0
Authors: Baskerville, Richard L; Myers, Michael D
Abstract: The concept of the user has persisted in information systems research and practi ... Expand
Semantic filters: computer system
Topics: IS discipline mobile application societal evaluation criteria IT workforce organizational context
Methods: usage data
Theories: sociotechnical systems theory socio technical theory
2023 | Information & Management | Citations: 0
Authors: Frauenstein, Edwin Donald; Flowerday, Stephen; Mishi, Syden; Warkentin, Merrill
Abstract: Frequent and habitual engagement with social media can reinforce certain activit ... Expand
Semantic filters: computer system
Topics: phishing Facebook personality social media electronic mail
Methods: survey structural equation modeling survey design theory development self reported survey
Theories: big five model Maslow motivation theory uses and gratifications theory technology acceptance model theory of planned behavior
2023 | Americas Conference on Information Systems | Citations: 0
Authors: Hassan, Nik Rushdi
Abstract: This article raises the level of discourse about the role of concepts in the in ... Expand
Semantic filters: computer system
Topics: cloud computing distributed computing Wikipedia cloud storage computer system
2023 | HICSS | Citations: 0
Authors: Kaisler, S.; Armour, F.; Espinosa, J.
Abstract: This minitrack features six papers describing and assessing several aspects of ... Expand
Semantic filters: computer system
Topics: big data computer system armed conflict cloud computing explainable artificial intelligence
Methods: experiment cluster analysis machine learning computational algorithm convolutional neural network
2023 | Management Information Systems Quarterly | Citations: 0
Authors: Wright, Ryan; Johnson, Steven; Kitchens, Brent
Abstract: Despite widespread awareness of risks, significant investments in cybersecurity ... Expand
Semantic filters: computer system
Topics: phishing electronic mail system support IT security email phishing
Methods: theory development literature study simulation logistic regression survey
2023 | Journal of Information Technology | Citations: 0
Authors: Liang, Nan (Peter); Hirschheim, Rudy; Luo, Xin (Robert); Hollingsworth, Hayden
Abstract: Information security (InfoSec)–related behaviors have been defined in many diffe ... Expand
Semantic filters: computer system
Topics: security policy organizational context decision making IT security bring your own device
Methods: theory development literature sample post-hoc analysis qualitative content analysis structured literature research
Theories: agency theory
2022 | Management Information Systems Quarterly | Citations: 0
Authors: Amo, Laura; Grijalva, Emily; Herath, Tejaswini; Lemoine, G. James; Rao, H. Raghav
Abstract: Entitlement has been identified as a potentially valuable employee characteristi ... Expand
Semantic filters: computer system
Topics: IT security threat information system use IT policy personality IT supported collaboration
Methods: theory development survey survey design experiment data transformation
2022 | HICSS | Citations: 0
Authors: Bawack, Ransome; Desveaud, Kathleen
Abstract: Recently, people are increasingly adopting technologies powered by artificial in ... Expand
Semantic filters: computer system
Topics: artificial intelligence user acceptance social influence technology adoption database system
Methods: literature study chatbot
Theories: technology acceptance theory unified theory of acceptance and use of technology
2022 | European Conference On Information Systems | Citations: 0
Authors: Braun, Marvin; Greve, Maike; Riquel, Johannes; Brendel, Alfred Benedikt; Kolbe, Lutz
Abstract: Artificial Intelligence (AI) has an increasing impact on industries, establishi ... Expand
Semantic filters: computer system
Topics: artificial intelligence human AI collaboration decision support system human computer interaction human resource management
Methods: experiment ANOVA parametric test information extraction theoretical contribution
Theories: signal detection theory
2022 | Management Information Systems Quarterly | Citations: 1
Authors: Engelen, Andreas; Rieger, Verena; Wehner, Marius; Heidemann, Fabian
Abstract: While research on the consequences of organizational commitment to IT has focuse ... Expand
Semantic filters: computer system
Topics: organizational commitment job satisfaction cloud computing computer supported cooperative work remote work
Methods: Compustat robustness check survey regression analysis method Anderson-Darling test
Theories: stakeholder theory theory of job satisfaction resource based view of the firm