Semantic Filter
show all semantic filters
Found 3 articles
  • Iterating the Cybernetic Loops in Anti-Phishing Behavior: A Theoretical Integration

    2018 | Americas Conference on Information Systems | Citations: 0

    Authors: Nehme, Alaa; George, Joey F

    Abstract: As phishing emails represent continuous attack vectors, users’ continuance in an ... Expand

    Semantic filters: perceptual control theory

    Topics: phishing data security deception detection user acceptance cybersecurity behavior

    Theories: protection motivation theory perceptual control theory expectancy–value theory

  • VISUALIZING SOCIAL ROLES - DESIGN AND EVALUATION OF A BIRD'S-EYE VIEW OF SOCIAL NETWORK PRIVACY SETTINGS

    2014 | European Conference On Information Systems | Citations: 0

    Authors: Netter, Michael; Weber, Michael; Diener, Michael

    Abstract: The rising usage of Social Network Sites for interacting with contacts from mult ... Expand

    Semantic filters: perceptual control theory

    Topics: Facebook privacy data visualization usability word of mouth

    Methods: experiment laboratory experiment machine learning parametric test Student's t-test

    Theories: perceptual control theory identity theory

  • Decision Making in Software Projects: A Control Theory Perspective

    2003 | Americas Conference on Information Systems | Citations: 0

    Authors: Jani, Arpan

    Abstract: Software projects are difficult to control given their complexity, intangibility ... Expand

    Semantic filters: perceptual control theory

    Topics: IT project decision making IT project management project management

    Theories: control theory perceptual control theory