Semantic Filter
show all semantic filters
Found 112 articles
  • Are Information Security Practices Driven by the Likelihood and potential Impact of Security Events?

    2023 | Americas Conference on Information Systems | Citations: 0

    Authors: Batra, Gunjan; Saeed, Khawaja; Zafar, Humayun

    Abstract: Organizations have opened up various digital interfaces through which customers ... Expand

    Semantic filters: information security risk

    Topics: electronic authentication cybersecurity behavior password online banking information security practice

    Methods: cluster analysis survey exploratory factor analysis data transformation descriptive statistic

  • A Maturity Model for Assessing the Digitalization of Public Health Agencies

    PDF

    2023 | Business & Information Systems Engineering | Citations: 0

    Authors: Doctor, Eileen; Eymann, Torsten; Fürstenau, Daniel; Gersch, Martin; Hall, Kristina; Kauffmann, Anna Lina; Schulte-Althoff, Matthias; Schlieter, Hannes; Stark, Jeannette; Wyrtki, Katrin

    Abstract: Requests for a coordinated response during the COVID-19 pandemic revealed the li ... Expand

    Semantic filters: information security risk

    Topics: government system IS maturity resource allocation health information system usability

    Methods: qualitative interview survey design science literature study maturity model

  • Workarounds from an Information Security Perspective: Literature Review

    2023 | Americas Conference on Information Systems | Citations: 0

    Authors: Essi, Steve; Baker, Elizabeth White

    Abstract: The security of every organization is critical and should be proactively planne ... Expand

    Semantic filters: information security risk

    Topics: data security information security risk IT security database system IT security threat

    Methods: literature sample literature study action research

    Theories: work systems theory

  • A DEVOPS PERSPECTIVE: THE IMPACT OF ROLE TRANSITIONS ON SOFTWARE SECURITY CONTINUITY

    2023 | European Conference On Information Systems | Citations: 0

    Authors: Kam, Hwee-Joo; D’Arcy, John

    Abstract: Prior studies have claimed that, with evolving technologies, continuity process ... Expand

    Semantic filters: information security risk

    Topics: devops software developer IT security information security practice systems development

    Methods: theory development literature study

    Theories: cognitive load theory

  • How Sociotechnical Realignment and Sentiments Concerning Remote Work are Related – Insights from the COVID-19 Pandemic

    PDF

    2023 | Business & Information Systems Engineering | Citations: 0

    Authors: Kohn, Vanessa; Frank, Muriel; Holten, Roland

    Abstract: The COVID-19 pandemic forced sociotechnical systems (STS) to highly integrate re ... Expand

    Semantic filters: information security risk

    Topics: remote work IT supported collaboration pandemic productivity privacy

    Methods: sentiment analysis Q methodology qualitative interview linear regression analysis Mann Whitney U test

    Theories: sociotechnical systems theory socio technical theory

  • Where is IT in Information Security? The Interrelationship among IT Investment, Security Awareness, and Data Breaches

    2023 | Management Information Systems Quarterly | Citations: 1

    Authors: Li, Wilson Weixun; Leung, Alvin; Yue, Wei

    Abstract: Data breaches can severely damage a firm's reputation and its customers' confid ... Expand

    Semantic filters: information security risk

    Topics: IT investment data breach IT security defense data security IT security threat

    Methods: longitudinal research robustness check autocorrelation analysis survey literature study

    Theories: institutional theory protection motivation theory

  • Detecting Cybersecurity Threats: The Role of the Recency and Risk Compensating Effects

    PDF

    2023 | Information Systems Frontiers | Citations: 0

    Authors: Safi, Roozmehr; Browne, Glenn J.

    Abstract: Detecting and responding to information security threats quickly and effectively ... Expand

    Semantic filters: information security risk

    Topics: data security IT security defense information security risk decision making

    Methods: experimental group experiment Wilcoxon signed-rank test nonparametric test statistical hypothesis test

    Theories: behavioral economics

  • Capturing the Dynamic Nature of Cyber Risk: Evidence from an Explorative Case Study

    2023 | HICSS | Citations: 0

    Authors: Zeijlemaker, Sander; Siegel, Michael

    Abstract: In this research, we developed a novel approach to enable a dynamic cyber risk m ... Expand

    Semantic filters: information security risk

    Topics: risk management strategic management decision support system decision making systems development

    Methods: case study simulation system dynamics experiment reference modelling

  • Technological Entitlement: It’s My Technology and I’ll (Ab)Use It How I Want To

    2022 | Management Information Systems Quarterly | Citations: 0

    Authors: Amo, Laura; Grijalva, Emily; Herath, Tejaswini; Lemoine, G. James; Rao, H. Raghav

    Abstract: Entitlement has been identified as a potentially valuable employee characteristi ... Expand

    Semantic filters: information security risk

    Topics: IT security threat information system use IT policy personality IT supported collaboration

    Methods: theory development survey survey design experiment data transformation

  • Assessing Patient Experience and Orientation in the Emergency Department with Virtual Windows

    PDF

    2022 | HICSS | Citations: 0

    Authors: Keschner, Yonatan G.; Hasdianda, Mohammad Adrian; Miyawaki, Steven; Baugh, Christopher W.; Chen, Paul C.; Zhang, Haipeng (Mark); Landman, Adam B.; Chai, Peter R.

    Abstract: Patients have benefitted from increasingly sophisticated diagnostic and therapeu ... Expand

    Semantic filters: information security risk

    Topics: electronic health record information security risk

    Methods: survey descriptive statistic longitudinal research