Semantic Filter
show all semantic filters
Found 289 articles
  • A Feminist Ethics of Power Perspective on Gender Inequalities in Information Systems Development

    2023 | International Conference on Information Systems | Citations: 0

    Authors: Durani, Khalid; Hoppe, Fiona; Eckhardt, Andreas

    Abstract: With the rise of socio-political movements seeking to improve women's circumsta ... Expand

    Semantic filters: contingency table

    Topics: cloud computing social norm IT skill soft skill IT career

    Methods: qualitative interview cross sectional research qualitative content analysis descriptive statistic personal interview

  • Seeking Information Using Search Engines: The Impact of Negation on Judgments

    PDF

    2023 | Communications of the Association for Information Systems | Citations: 0

    Authors: Kayhan, Varol; Warkentin, Merrill

    Abstract: We examine how online searches lead to judgment formation in two contexts where ... Expand

    Semantic filters: contingency table

    Topics: search engine Google+ web page decision making accounting

    Methods: experiment blood pressure experimental task statistical hypothesis test analysis of covariance

  • Reidentification Risk in Panel Data: Protecting for k-Anonymity

    PDF

    2023 | Information Systems Research | Citations: 0

    Authors: Li, Shaobo; Schneider, Matthew J.; Yu, Yan; Gupta, Sachin

    Abstract: We consider the risk of reidentification of panelists in marketing research data ... Expand

    Semantic filters: contingency table

    Topics: privacy marketing management differential privacy data protection record linkage

    Methods: longitudinal research optimization model descriptive statistic simulation cluster analysis

  • STRATEGIC DATA PRIVACY POSITIONS: AN EXPLORATORY ANALYSIS OF FORBES GLOBAL 2000 COMPANIES

    2023 | European Conference On Information Systems | Citations: 0

    Authors: Schäfer, Fabian; Patrikis, Eleftherios; Wortmann, Felix

    Abstract: Data privacy has become a strategic issue. Companies increasingly rely on perso ... Expand

    Semantic filters: contingency table

    Topics: privacy website financial performance business model General Data Protection Regulation

    Methods: cluster analysis computational algorithm chi squared test descriptive statistic qualitative coding

  • The Influence of Temporal Focus on Employee Preferences in Cybersecurity Training

    2023 | International Conference on Information Systems | Citations: 0

    Authors: Shaikh, Faheem Ahmed

    Abstract: ... Expand

    Semantic filters: contingency table

    Topics: IT security security policy electronic mail password IS education

    Methods: descriptive statistic survey experimental group chi squared test theory development

    Theories: construal level theory

  • AI-based Technologies for Conversational Agent Design – Development Tools and Architectures for Intelligent Interactions

    2023 | Americas Conference on Information Systems | Citations: 0

    Authors: Strohmann, Timo; Khosrawi-Rad, Bijan; Schmidt, Lukas; Hiske, Patrick

    Abstract: Conversational agents are becoming increasingly intelligent due to artificial i ... Expand

    Semantic filters: contingency table

    Topics: artificial intelligence usability user interface database system Google+

    Methods: cluster analysis sentiment analysis chatbot language model design artifact

  • A Taxonomy and Archetypes of Business Analytics in Smart Manufacturing

    PDF

    2023 | ACM SIGMIS Database | Citations: 0

    Authors: Wanner, Jonas; Wissuchek, Christopher; Welsch, Giacomo; Janiesch, Christian

    Abstract: Fueled by increasing data availability and the rise of technological advances fo ... Expand

    Semantic filters: contingency table

    Topics: production management smart manufacturing analytical information system industry 4.0 database system

    Methods: cluster analysis literature study survey literature sample machine learning

    Theories: fuzzy set theory

  • One for all, all for one: Social considerations in user acceptance of contact tracing apps using longitudinal evidence from Germany and Switzerland

    PDF

    2022 | International Journal of Information Management | Citations: 5

    Authors: Abramova, Olga; Wagner, Amina; Olt, Christian M.; Buxmann, Peter

    Abstract: We propose a conceptual model of acceptance of contact tracing apps based on the ... Expand

    Semantic filters: contingency table

    Topics: privacy mobile application usage intention pandemic technology adoption

    Methods: survey longitudinal research mixed method conceptual modelling statistical hypothesis test

    Theories: privacy calculus theory

  • Behavioral economics in information systems research: Critical analysis and research strategies

    PDF

    2022 | Journal of Information Technology | Citations: 6

    Authors: Arnott, David; Gao, Shijia

    Abstract: Theories of decision-making have long been important foundations for information ... Expand

    Semantic filters: contingency table

    Topics: electronic commerce decision making decision support system marketing management IS discipline

    Methods: literature sample literature study qualitative content analysis experiment survey

    Theories: prospect theory behavioral economics theory of bounded rationality dual-system theory behavioral theory

  • The Use of Cross-Platform Frameworks for Google Play Store Apps

    PDF

    2022 | HICSS | Citations: 0

    Authors: Biørn-Hansen, Andreas; Grønli, Tor-Morten; Majchrzak, Tim A.; Kaindl, Hermann; Ghinea, Gheorghita

    Abstract: In this paper, we describe the harnessing and analyses of a large sample (n = 66 ... Expand

    Semantic filters: contingency table

    Topics: mobile application mobile application market digital distribution Google+ Android

    Methods: computational algorithm survey descriptive statistic ANOVA parametric test