Semantic Filter
show all semantic filters
Found 89 articles
  • Cybersecurity Awareness and Adaptive Behavior: Does Prior Exposure Lead to Adaptive Behavior?

    2023 | Americas Conference on Information Systems | Citations: 0

    Authors: Bhagat, Sarbottam; Pravin, Dipakkumar

    Abstract: We adopt and use technology almost as fast as it comes into existence, however, ... Expand

    Semantic filters: cybersecurity awareness

    Topics: IT security cybersecurity awareness information system use

  • Decide wisely: Interactive videos as appealing educational element to attract students to information security

    2023 | International Conference on Business Informatics | Citations: 0

    Authors: Brehmer, Martin

    Abstract: Educational videos play an important role in university education. However, the ... Expand

    Semantic filters: cybersecurity awareness

    Topics: IT security training data security anonymity cybersecurity awareness user experience

    Methods: parametric test Student's t-test survey design science descriptive statistic

  • Using stakes consciousness to better understand information security awareness

    2023 | Americas Conference on Information Systems | Citations: 0

    Authors: Kouyo, Guy Alain Sylvanus; Nishant, Rohit; Khechine, Hager

    Abstract: ... Expand

    Semantic filters: cybersecurity awareness

    Topics: cybersecurity awareness IT security data security human resource management technology adoption

    Theories: big five model

  • Analysis of Security Threats in the Supply Chain of ICT Products Based on Evolutionary Game Theory

    PDF

    2023 | Group Decision and Negotiation | Citations: 0

    Authors: Li, Qing; Li, Yan; Yuan, Tianlongyi; Chen, Dawei

    Abstract: The network information security regulation of information and communication tec ... Expand

    Semantic filters: cybersecurity awareness

    Topics: data security supply chain management IT security decision making IT investment

    Methods: simulation

  • Introduction to the Minitrack on Security and Privacy Aspects of Human-Computer-Interactions

    2023 | HICSS | Citations: 0

    Authors: Rosenthal, Paul; Müller, Nicholas; Weber, Kristin

    Abstract: Special-Track IntroductionWith increasing digitization, the security and privac ... Expand

    Semantic filters: cybersecurity awareness

    Topics: privacy data security cybersecurity awareness

    Methods: design artifact

  • Sustainable Information Security Sensitization in SMEs: Designing Measures with Long-Term Effect

    2023 | HICSS | Citations: 0

    Authors: Scholl, Margit

    Abstract: This paper outlines an overall scenario for ongoing personnel development measur ... Expand

    Semantic filters: cybersecurity awareness

    Topics: cybersecurity awareness anonymity

    Methods: qualitative interview survey

  • Cultivating security culture for information security success: A mixed-methods study based on anthropological perspective

    PDF

    2023 | Information & Management | Citations: 0

    Authors: Tejay, Gurvirender P.S.; Mohammed, Zareef A.

    Abstract: The continuous information security failures in organizations have led focus tow ... Expand

    Semantic filters: cybersecurity awareness

    Topics: data security cybersecurity awareness IT security organizational culture anonymity

    Methods: survey mixed method qualitative interview statistical hypothesis test partial least squares regression

  • Security is Local: The Influence of the Immediate Workgroup on Information Security

    PDF

    2023 | Journal of the Association for Information Systems | Citations: 0

    Authors: Wang, Dawei; Durcikova, Alexandra; Dennis, Alan

    Abstract: Information security is a multilevel phenomenon with employee security decision ... Expand

    Semantic filters: cybersecurity awareness

    Topics: data security IT security threat IT security password self efficacy

    Methods: survey theory development descriptive statistic data transformation factor analysis

    Theories: big five model social learning theory leader–member exchange theory

  • Gamifying a Learning Management System: Narrative and Team Leaderboard in the Context of Effective Information Security Education

    2023 | HICSS | Citations: 0

    Authors: Brehmer, M.; Reinelt, R.

    Abstract: Gamified learning management systems (LMS) can be effective in case game-design ... Expand

    Semantic filters: cybersecurity awareness

    Topics: gamification user experience data security knowledge base privacy

    Methods: survey correlation analysis design science design principle descriptive statistic

  • Introduction to the Minitrack on Organizational Cybersecurity: Advanced Cyber Defense, Cyber Analytics, and Security Operations

    2023 | HICSS | Citations: 0

    Authors: Steiner, Stuart; Plachkinova, Miloslava; Conte De Leon, Daniel; Shepherd, Morgan

    Abstract: Cybersecurity touches all aspects of organizational management, with organizati ... Expand

    Semantic filters: cybersecurity awareness

    Topics: IT security decision making IT manager information technology capability IT security training

    Methods: natural language processing personal interview case study qualitative content analysis