2023 | Americas Conference on Information Systems | Citations: 0
Authors: Batra, Gunjan; Saeed, Khawaja; Zafar, Humayun
Abstract: Organizations have opened up various digital interfaces through which customers ... Expand
Semantic filters: information security risk
Topics: electronic authentication cybersecurity behavior password online banking information security practice
Methods: cluster analysis survey exploratory factor analysis data transformation descriptive statistic
2023 | Business & Information Systems Engineering | Citations: 0
Authors: Doctor, Eileen; Eymann, Torsten; Fürstenau, Daniel; Gersch, Martin; Hall, Kristina; Kauffmann, Anna Lina; Schulte-Althoff, Matthias; Schlieter, Hannes; Stark, Jeannette; Wyrtki, Katrin
Abstract: Requests for a coordinated response during the COVID-19 pandemic revealed the li ... Expand
Semantic filters: information security risk
Topics: government system IS maturity resource allocation health information system usability
Methods: qualitative interview survey design science literature study maturity model
2023 | Americas Conference on Information Systems | Citations: 0
Authors: Essi, Steve; Baker, Elizabeth White
Abstract: The security of every organization is critical and should be proactively planne ... Expand
Semantic filters: information security risk
Topics: data security information security risk IT security database system IT security threat
Methods: literature sample literature study action research
Theories: work systems theory
2023 | European Conference On Information Systems | Citations: 0
Authors: Kam, Hwee-Joo; D’Arcy, John
Abstract: Prior studies have claimed that, with evolving technologies, continuity process ... Expand
Semantic filters: information security risk
Topics: devops software developer IT security information security practice systems development
Methods: theory development literature study
Theories: cognitive load theory
2023 | Business & Information Systems Engineering | Citations: 0
Authors: Kohn, Vanessa; Frank, Muriel; Holten, Roland
Abstract: The COVID-19 pandemic forced sociotechnical systems (STS) to highly integrate re ... Expand
Semantic filters: information security risk
Topics: remote work IT supported collaboration pandemic productivity privacy
Methods: sentiment analysis Q methodology qualitative interview linear regression analysis Mann Whitney U test
Theories: sociotechnical systems theory socio technical theory
2023 | Management Information Systems Quarterly | Citations: 1
Authors: Li, Wilson Weixun; Leung, Alvin; Yue, Wei
Abstract: Data breaches can severely damage a firm's reputation and its customers' confid ... Expand
Semantic filters: information security risk
Topics: IT investment data breach IT security defense data security IT security threat
Methods: longitudinal research robustness check autocorrelation analysis survey literature study
Theories: institutional theory protection motivation theory
2023 | Information Systems Frontiers | Citations: 0
Authors: Safi, Roozmehr; Browne, Glenn J.
Abstract: Detecting and responding to information security threats quickly and effectively ... Expand
Semantic filters: information security risk
Topics: data security IT security defense information security risk decision making
Methods: experimental group experiment Wilcoxon signed-rank test nonparametric test statistical hypothesis test
Theories: behavioral economics
2023 | HICSS | Citations: 0
Authors: Zeijlemaker, Sander; Siegel, Michael
Abstract: In this research, we developed a novel approach to enable a dynamic cyber risk m ... Expand
Semantic filters: information security risk
Topics: risk management strategic management decision support system decision making systems development
Methods: case study simulation system dynamics experiment reference modelling
2022 | Management Information Systems Quarterly | Citations: 0
Authors: Amo, Laura; Grijalva, Emily; Herath, Tejaswini; Lemoine, G. James; Rao, H. Raghav
Abstract: Entitlement has been identified as a potentially valuable employee characteristi ... Expand
Semantic filters: information security risk
Topics: IT security threat information system use IT policy personality IT supported collaboration
Methods: theory development survey survey design experiment data transformation
2022 | HICSS | Citations: 0
Authors: Keschner, Yonatan G.; Hasdianda, Mohammad Adrian; Miyawaki, Steven; Baugh, Christopher W.; Chen, Paul C.; Zhang, Haipeng (Mark); Landman, Adam B.; Chai, Peter R.
Abstract: Patients have benefitted from increasingly sophisticated diagnostic and therapeu ... Expand
Semantic filters: information security risk
Topics: electronic health record information security risk
Methods: survey descriptive statistic longitudinal research