2023 | European Journal of Information Systems | Citations: 0
Authors: Ghahramani, Fereshteh; Yazdanmehr, Adel; Chen, Daniel; Wang, Jingguo
Abstract: This study explores ways to empower organisations to continuously improve their ... Expand
Semantic filters: information security management
Topics: data security information security management absorptive capacity IT security anonymity
Methods: survey statistical hypothesis test structural equation modeling conceptual modelling ordinary least square
Theories: dynamic capabilities theory
2023 | Information Systems Frontiers | Citations: 0
Authors: Herath, Tejaswini C.; Herath, Hemantha S. B.; Cullum, David
Abstract: As organizations have become increasingly reliant on information systems, senior ... Expand
Semantic filters: information security management
Topics: data security COBIT IT security ITIL information security management
Methods: qualitative interview case study personal interview survey delphi study
Theories: theory of everything
2023 | ACM SIGMIS Database | Citations: 0
Authors: Huang, Cheng-Kui (Tony); Lee, Yu-Tsung
Abstract: With the advent of artificial intelligence (AI), more and more enterprises have ... Expand
Semantic filters: information security management
Topics: artificial intelligence organizational value robotic information management Java
Methods: regression analysis method event study longitudinal research qualitative content analysis descriptive statistic
Theories: signaling theory
2023 | Journal of Management Information Systems | Citations: 0
Authors: Lowry, Paul Benjamin; Moody, Gregory D.; Parameswaran, Srikanth; Brown, Nicholas James
Abstract: Most of the information security management research involving fear appeals is g ... Expand
Semantic filters: information security management
Topics: H1N1 flu self efficacy Python data quality information security management
Methods: structural equation modeling meta analysis statistical hypothesis test hierarchical linear modeling statistical power analysis
Theories: fear appeal theory extended parallel process model protection motivation theory
2023 | International Conference on Information Systems | Citations: 0
Authors: Naik, Neelam; Nimmagadda, Shastri; Purohit, Seema; Reiners, Torsten; Mani, Dr Neel
Abstract: Often the textual data are either disorganized or misinterpreted because of uns ... Expand
Semantic filters: information security management
Topics: Python big data website Twitter decision making
Methods: experiment machine learning data modeling design artifact product review
2023 | Information Systems Frontiers | Citations: 0
Authors: Okeke, Romanus Izuchukwu; Eiza, Max Hashem
Abstract: This paper aims to examine the challenges of preventing internal identity theft ... Expand
Semantic filters: information security management
Topics: criminality data security IT security outsourcing IT security threat
Methods: case study qualitative interview personal interview survey qualitative content analysis
Theories: organizational role theory
2023 | International Conference on Information Systems | Citations: 0
Authors: Tokerud, Simen; Jansen, Jarand; Niemimaa, Marko; Järveläinen, Jonna
Abstract: Recent successful cybersecurity attacks have exploited trust to compromise orga ... Expand
Semantic filters: information security management
Topics: data security information security management IT security spreadsheet phishing
Methods: maturity model design science qualitative interview literature study case study
2023 | HICSS | Citations: 0
Authors: Topa, I.; Karyda, M.
Abstract: This study investigates information security management challenges in a large o ... Expand
Semantic filters: information security management
Topics: pandemic IT security information security management security policy IT supported collaboration
Methods: qualitative interview
2023 | Journal of Management Information Systems | Citations: 0
Authors: Wang, Qian; Ngai, Eric W. T.; Pienta, Daniel; Thatcher, Jason Bennett
Abstract: The adoption of new Information Technology (IT) innovations has led to increased ... Expand
Semantic filters: information security management
Topics: data breach digital innovation IT security data security organization learning
Methods: robustness check descriptive statistic propensity score method cluster analysis two sample t-test with equal variance
Theories: organizational learning theory
2023 | Journal of the Association for Information Systems | Citations: 0
Authors: Zhu, Jiawen; Feng, Gengzhong; Liang, Huigang; Tsui, Kwok-Leung
Abstract: This paper examines the underlying mechanisms through which paternalistic leade ... Expand
Semantic filters: information security management
Topics: data security organizational context information security management organizational value IT policy
Methods: survey digital trace data self reported survey post-hoc analysis factor analysis
Theories: general deterrence theory