Semantic Filter
show all semantic filters
Found 1156 articles
  • A taxonomy of data governance decision domains in data marketplaces

    PDF

    2023 | Electronic Markets | Citations: 0

    Authors: Abraham, Rene; Schneider, Johannes; vom Brocke, Jan

    Abstract: Commercializing data and data-related services has gained in importance in recen ... Expand

    Semantic filters: data security

    Topics: data governance price management system development method computer data storage website

    Methods: design artifact data modeling design methodology design science company material

  • Shaping the attitude towards information security- a social influence approach

    2023 | Americas Conference on Information Systems | Citations: 0

    Authors: Agrawal, Deepti; Davis, Joshua; Singh, Kulraj

    Abstract: Employees play a vital role in organizational information security posture. Mos ... Expand

    Semantic filters: data security

    Topics: social influence data security organizational value

    Methods: survey conceptual modelling partial least squares path modeling PLS tool

    Theories: social influence theory

  • Blockchain Use Case in Ballistics and Crime Gun Tracing and Intelligence: Toward Overcoming Gun Violence

    PDF

    2023 | ACM Transactions on Management Information Systems | Citations: 0

    Authors: Akello, Patricia; Vemprala, Naga; Lang Beebe, Nicole; Raymond Choo, Kim-Kwang

    Abstract: In the United States and around the world, gun violence has become a long-standi ... Expand

    Semantic filters: data security

    Topics: blockchain criminality smart contract Ethereum access control

    Methods: design artifact design science design process case study simulation

  • Managing compliance with privacy regulations through translation guardrails: A health information exchange case study

    PDF

    2023 | Information and Organization | Citations: 0

    Authors: Anderson, Chad; Baskerville, Richard; Kaul, Mala

    Abstract: Information privacy is increasingly important in our digitally connected world, ... Expand

    Semantic filters: data security

    Topics: privacy information privacy law data security information exchange legal context

    Methods: qualitative interview longitudinal research case study longitudinal case study literature study

    Theories: organizational behavior theory

  • ICT-Based Country-Level Determinants of Social Media Diffusion

    PDF

    2023 | Information Systems Frontiers | Citations: 0

    Authors: Arayankalam, Jithesh; Krishnan, Satish

    Abstract: There is a broad consensus that social media platforms have become critical tool ... Expand

    Semantic filters: data security

    Topics: social media IT investment internet technology IT skill technology diffusion

    Methods: longitudinal research regression analysis method post-hoc analysis cross sectional research archival research

    Theories: theory of everything

  • The Interplay of InfoSec Mindfulness and Sanctions on Extra Role Security Behaviors: A Trait Activation Perspective

    2023 | Americas Conference on Information Systems | Citations: 0

    Authors: Austin, Rebekah

    Abstract: Organizational information security performance is inextricably tied to the sec ... Expand

    Semantic filters: data security

    Topics: mindfulness ergonomics data security

    Methods: survey

  • An Adversarial Dance: Toward an Understanding of Insiders’ Responses to Organizational Information Security Measures

    PDF

    2023 | Journal of the Association for Information Systems | Citations: 0

    Authors: Balozian, Puzant; Burns, A.; Leidner, Dorothy

    Abstract: Despite the increased focus on organizational security policies and programs, s ... Expand

    Semantic filters: data security

    Topics: IT security IT security defense productivity IT security threat anonymity

    Methods: case study qualitative interview personal interview theory development survey

    Theories: information systems theory neutralization theory behavioral theory

  • Internalization of Gender Roles: Challenges for Female CIOs in Ensuring IT Security Compliance

    2023 | Americas Conference on Information Systems | Citations: 0

    Authors: Bansal, Gaurav; Axelton, Zhuoli

    Abstract: IT security compliance is critical to the organization's success, and such comp ... Expand

    Semantic filters: data security

    Topics: Chief Information Officer security policy information security policy compliance IT leadership data security

    Methods: Student's t-test experiment parametric test survey

  • The Interplay of Information Processing, Mindfulness, and Affective State in Phishing Detection

    2023 | International Conference on Information Systems | Citations: 0

    Authors: Bera, Debalina; Kim, Dan

    Abstract: This study investigates the effect of individuals' information processing modes ... Expand

    Semantic filters: data security

    Topics: phishing mindfulness electronic mail email phishing data security

    Methods: experiment survey partial least squares regression machine learning laboratory experiment

    Theories: protection motivation theory

  • Introduction to the Minitrack on The Digital Supply Chain of the Future: Applications, Implications, Business Models

    2023 | HICSS | Citations: 0

    Authors: Bodendorf, Freimut; Chen, Haozhe; Pflaum, Alexander; Prockl, Günter

    Abstract: The following text sections provide an overview to the minitrack on the digital ... Expand

    Semantic filters: data security

    Topics: supply chain management artificial intelligence digital transformation smart device internet of things

    Methods: case study