Semantic Filter
show all semantic filters
Found 130 articles
  • Continuous improvement of information security management: an organisational learning perspective

    PDF

    2023 | European Journal of Information Systems | Citations: 0

    Authors: Ghahramani, Fereshteh; Yazdanmehr, Adel; Chen, Daniel; Wang, Jingguo

    Abstract: This study explores ways to empower organisations to continuously improve their ... Expand

    Semantic filters: information security management

    Topics: data security information security management absorptive capacity IT security anonymity

    Methods: survey statistical hypothesis test structural equation modeling conceptual modelling ordinary least square

    Theories: dynamic capabilities theory

  • An Information Security Performance Measurement Tool for Senior Managers: Balanced Scorecard Integration for Security Governance and Control Frameworks

    PDF

    2023 | Information Systems Frontiers | Citations: 0

    Authors: Herath, Tejaswini C.; Herath, Hemantha S. B.; Cullum, David

    Abstract: As organizations have become increasingly reliant on information systems, senior ... Expand

    Semantic filters: information security management

    Topics: data security COBIT IT security ITIL information security management

    Methods: qualitative interview case study personal interview survey delphi study

    Theories: theory of everything

  • Market Valuation of Artificial Intelligence Implementation Announcements

    PDF

    2023 | ACM SIGMIS Database | Citations: 0

    Authors: Huang, Cheng-Kui (Tony); Lee, Yu-Tsung

    Abstract: With the advent of artificial intelligence (AI), more and more enterprises have ... Expand

    Semantic filters: information security management

    Topics: artificial intelligence organizational value robotic information management Java

    Methods: regression analysis method event study longitudinal research qualitative content analysis descriptive statistic

    Theories: signaling theory

  • Examining the Differential Effectiveness of Fear Appeals in Information Security Management Using Two-Stage Meta-Analysis

    PDF

    2023 | Journal of Management Information Systems | Citations: 0

    Authors: Lowry, Paul Benjamin; Moody, Gregory D.; Parameswaran, Srikanth; Brown, Nicholas James

    Abstract: Most of the information security management research involving fear appeals is g ... Expand

    Semantic filters: information security management

    Topics: H1N1 flu self efficacy Python data quality information security management

    Methods: structural equation modeling meta analysis statistical hypothesis test hierarchical linear modeling statistical power analysis

    Theories: fear appeal theory extended parallel process model protection motivation theory

  • Information System Articulation Development - Managing Veracity Attributes and Quantifying Relationship with Readability of Textual Data

    2023 | International Conference on Information Systems | Citations: 0

    Authors: Naik, Neelam; Nimmagadda, Shastri; Purohit, Seema; Reiners, Torsten; Mani, Dr Neel

    Abstract: Often the textual data are either disorganized or misinterpreted because of uns ... Expand

    Semantic filters: information security management

    Topics: Python big data website Twitter decision making

    Methods: experiment machine learning data modeling design artifact product review

  • The Application of Role-Based Framework in Preventing Internal Identity Theft Related Crimes: A Qualitative Case Study of UK Retail Companies

    PDF

    2023 | Information Systems Frontiers | Citations: 0

    Authors: Okeke, Romanus Izuchukwu; Eiza, Max Hashem

    Abstract: This paper aims to examine the challenges of preventing internal identity theft ... Expand

    Semantic filters: information security management

    Topics: criminality data security IT security outsourcing IT security threat

    Methods: case study qualitative interview personal interview survey qualitative content analysis

    Theories: organizational role theory

  • Designing Extended Zero Trust Maturity Model – From Technical to Socio-Technical

    2023 | International Conference on Information Systems | Citations: 0

    Authors: Tokerud, Simen; Jansen, Jarand; Niemimaa, Marko; Järveläinen, Jonna

    Abstract: Recent successful cybersecurity attacks have exploited trust to compromise orga ... Expand

    Semantic filters: information security management

    Topics: data security information security management IT security spreadsheet phishing

    Methods: maturity model design science qualitative interview literature study case study

  • Addressing Organisational, Individual and Technological Aspects and Challenges in Information Security Management: Applying a framework for a case study

    2023 | HICSS | Citations: 0

    Authors: Topa, I.; Karyda, M.

    Abstract: This study investigates information security management challenges in a large o ... Expand

    Semantic filters: information security management

    Topics: pandemic IT security information security management security policy IT supported collaboration

    Methods: qualitative interview

  • Information Technology Innovativeness and Data-Breach Risk: A Longitudinal Study

    PDF

    2023 | Journal of Management Information Systems | Citations: 0

    Authors: Wang, Qian; Ngai, Eric W. T.; Pienta, Daniel; Thatcher, Jason Bennett

    Abstract: The adoption of new Information Technology (IT) innovations has led to increased ... Expand

    Semantic filters: information security management

    Topics: data breach digital innovation IT security data security organization learning

    Methods: robustness check descriptive statistic propensity score method cluster analysis two sample t-test with equal variance

    Theories: organizational learning theory

  • How Do Paternalistic Leaders Motivate Employees’ Information Security Compliance? Building a Climate and Applying Sanctions

    PDF

    2023 | Journal of the Association for Information Systems | Citations: 0

    Authors: Zhu, Jiawen; Feng, Gengzhong; Liang, Huigang; Tsui, Kwok-Leung

    Abstract: This paper examines the underlying mechanisms through which paternalistic leade ... Expand

    Semantic filters: information security management

    Topics: data security organizational context information security management organizational value IT policy

    Methods: survey digital trace data self reported survey post-hoc analysis factor analysis

    Theories: general deterrence theory