2023 | Electronic Markets | Citations: 0
Authors: Abraham, Rene; Schneider, Johannes; vom Brocke, Jan
Abstract: Commercializing data and data-related services has gained in importance in recen ... Expand
Semantic filters: data security
Topics: data governance price management system development method computer data storage website
Methods: design artifact data modeling design methodology design science company material
2023 | Americas Conference on Information Systems | Citations: 0
Authors: Agrawal, Deepti; Davis, Joshua; Singh, Kulraj
Abstract: Employees play a vital role in organizational information security posture. Mos ... Expand
Semantic filters: data security
Topics: social influence data security organizational value
Methods: survey conceptual modelling partial least squares path modeling PLS tool
Theories: social influence theory
2023 | ACM Transactions on Management Information Systems | Citations: 0
Authors: Akello, Patricia; Vemprala, Naga; Lang Beebe, Nicole; Raymond Choo, Kim-Kwang
Abstract: In the United States and around the world, gun violence has become a long-standi ... Expand
Semantic filters: data security
Topics: blockchain criminality smart contract Ethereum access control
Methods: design artifact design science design process case study simulation
2023 | Information and Organization | Citations: 0
Authors: Anderson, Chad; Baskerville, Richard; Kaul, Mala
Abstract: Information privacy is increasingly important in our digitally connected world, ... Expand
Semantic filters: data security
Topics: privacy information privacy law data security information exchange legal context
Methods: qualitative interview longitudinal research case study longitudinal case study literature study
Theories: organizational behavior theory
2023 | Information Systems Frontiers | Citations: 0
Authors: Arayankalam, Jithesh; Krishnan, Satish
Abstract: There is a broad consensus that social media platforms have become critical tool ... Expand
Semantic filters: data security
Topics: social media IT investment internet technology IT skill technology diffusion
Methods: longitudinal research regression analysis method post-hoc analysis cross sectional research archival research
Theories: theory of everything
2023 | Americas Conference on Information Systems | Citations: 0
Authors: Austin, Rebekah
Abstract: Organizational information security performance is inextricably tied to the sec ... Expand
Semantic filters: data security
Topics: mindfulness ergonomics data security
Methods: survey
2023 | Journal of the Association for Information Systems | Citations: 0
Authors: Balozian, Puzant; Burns, A.; Leidner, Dorothy
Abstract: Despite the increased focus on organizational security policies and programs, s ... Expand
Semantic filters: data security
Topics: IT security IT security defense productivity IT security threat anonymity
Methods: case study qualitative interview personal interview theory development survey
Theories: information systems theory neutralization theory behavioral theory
2023 | Americas Conference on Information Systems | Citations: 0
Authors: Bansal, Gaurav; Axelton, Zhuoli
Abstract: IT security compliance is critical to the organization's success, and such comp ... Expand
Semantic filters: data security
Topics: Chief Information Officer security policy information security policy compliance IT leadership data security
Methods: Student's t-test experiment parametric test survey
2023 | International Conference on Information Systems | Citations: 0
Authors: Bera, Debalina; Kim, Dan
Abstract: This study investigates the effect of individuals' information processing modes ... Expand
Semantic filters: data security
Topics: phishing mindfulness electronic mail email phishing data security
Methods: experiment survey partial least squares regression machine learning laboratory experiment
Theories: protection motivation theory
2023 | HICSS | Citations: 0
Authors: Bodendorf, Freimut; Chen, Haozhe; Pflaum, Alexander; Prockl, Günter
Abstract: The following text sections provide an overview to the minitrack on the digital ... Expand
Semantic filters: data security
Topics: supply chain management artificial intelligence digital transformation smart device internet of things
Methods: case study