Semantic Filter
show all semantic filters
Found 62 articles
  • Managing Organizational Cyber Security – The Distinct Role of Internalized Responsibility

    2023 | HICSS | Citations: 0

    Authors: Faltermaier, Stefan; Strunk, Kim; Obermeier, Michaela; Fiedler, Marina

    Abstract: Desirable user behavior is key to cyber security in organizations. However, a co ... Expand

    Semantic filters: computer virus protection

    Topics: IT security user behavior information technology capability IT security defense password

    Methods: qualitative interview personal interview qualitative coding grounded theory case study

  • A Qualitative Study on Acceptance Factors of Economic Approaches on IT Security Investment Decisions

    2023 | Americas Conference on Information Systems | Citations: 0

    Authors: Niedzela, Laura; Kuehnel, Stephan; Nastjuk, Ilja; Matschak, Tizian; Sackmann, Stefan; Trang, Simon

    Abstract: Cyber-attacks can cause severe economic damages to businesses today. Therefore, ... Expand

    Semantic filters: computer virus protection

    Topics: IT security IT security defense decision making real option computer virus protection

    Methods: qualitative interview personal interview literature study focus group cluster analysis

    Theories: real options theory

  • Employee responses to information security related stress: Coping and violation intention

    PDF

    2023 | Information Systems Journal | Citations: 1

    Authors: Yazdanmehr, Adel; Li, Yuan; Wang, Jingguo

    Abstract: Studies on employee responses to the information security policy (ISP) demands t ... Expand

    Semantic filters: computer virus protection

    Topics: self efficacy security policy data security problem solving internet technology

    Methods: survey descriptive statistic partial least squares regression survey design factor analysis

    Theories: technology threat avoidance theory

  • A critical assessment of consumer reviews: A hybrid NLP-based methodology

    PDF

    2022 | Decision Support Systems | Citations: 0

    Authors: Biswas, Baidyanath; Sengupta, Pooja; Kumar, Ajay; Delen, Dursun; Gupta, Shivam

    Abstract: Online reviews are integral to consumer decision-making while purchasing product ... Expand

    Semantic filters: computer virus protection

    Topics: online review electronic commerce computer virus protection information retrieval digital media

    Methods: natural language processing robustness check term frequency–inverse document frequency topic model moderation analysis

    Theories: dual-system theory chaos theory mathematical theory of communication elaboration likelihood model

  • US Census Block Groups and Location Sharing Behavior: Case of IoT Adoption

    2021 | Americas Conference on Information Systems | Citations: 0

    Authors: Koohikamali, Mehrdad; Kim, Dan

    Abstract: This study seeks to investigate the location sharing behavior in the context of ... Expand

    Semantic filters: computer virus protection

    Topics: internet technology computer virus protection

  • Demystifying analytical information processing capability: The case of cybersecurity incident response

    PDF

    2021 | Decision Support Systems | Citations: 7

    Authors: Naseer, Humza; Maynard, Sean B.; Desouza, Kevin C.

    Abstract: Little is known about how organizations leverage business analytics (BA) to deve ... Expand

    Semantic filters: computer virus protection

    Topics: IT security IT security threat analytical information system decision making malware

    Methods: case study qualitative interview theory development multiple case study anomaly detection

    Theories: information processing theory

  • Robust Android Malware Detection System Against Adversarial Attacks Using Q-Learning

    PDF

    2021 | Information Systems Frontiers | Citations: 0

    Authors: Rathore, Hemant; Sahay, Sanjay K.; Nikam, Piyush; Sewak, Mohit

    Abstract: Since the inception of Andoroid OS, smartphones sales have been growing exponent ... Expand

    Semantic filters: computer virus protection

    Topics: malware Android mobile application computer virus protection database system

    Methods: classification method computational algorithm experiment reinforcement learning support vector machine

  • Breaking Bad in Cyberspace: Understanding why and how Black Hat Hackers Manage their Nerves to Commit their Virtual Crimes

    PDF

    2021 | Information Systems Frontiers | Citations: 0

    Authors: Silic, Mario; Lowry, Paul Benjamin

    Abstract: What is happening in hacker’s minds when they are committing criminal activities ... Expand

    Semantic filters: computer virus protection

    Topics: criminality decision making computer crime IT policy anonymity

    Methods: qualitative interview grounded theory theory development qualitative coding cluster analysis

    Theories: general strain theory activity theory

  • The Effect of Electronic Word of Mouth Communications on Intention to Buy: A Meta-Analysis

    PDF

    2020 | Information Systems Frontiers | Citations: 0

    Authors: Ismagilova, Elvira; Slade, Emma L.; Rana, Nripendra P.; Dwivedi, Yogesh K.

    Abstract: The aim of this research is to synthesise findings from previous studies by empl ... Expand

    Semantic filters: computer virus protection

    Topics: online word of mouth word of mouth website perceived ease of use electronic commerce

    Methods: meta analysis descriptive statistic experiment survey design survey

  • A Data-driven Characterization of Modern Android Spyware

    PDF

    2020 | ACM Transactions on Management Information Systems | Citations: 0

    Authors: Pierazzi, Fabio; Mezzour, Ghita; Han, Qian; Colajanni, Michele; Subrahmanian, V. S.

    Abstract: According to Nokia’s 2017 Threat Intelligence Report, 68.5% of malware targets t ... Expand

    Semantic filters: computer virus protection

    Topics: spyware malware Android mobile application data breach

    Methods: machine learning deep learning computational algorithm decision tree classification experiment