2023 | Information & Management | Citations: 0
Authors: Abdalla Mikhaeil, Christine; James, Tabitha L.
Abstract: Identity-as-a-service (IDaaS) is a cloud security service to which companies can ... Expand
Semantic filters: privacy
Topics: cloud computing information privacy concern marketing management privacy internet of things
Methods: qualitative interview case study company material single case study personal interview
Theories: privacy calculus theory
2023 | HICSS | Citations: 0
Authors: Afota, Marie-Colombe; Cañibano, Almudena; Ollier-Malaterre, Ariane; Provost Savard, Yanick; Léon, Emmanuelle
Abstract: During the Covid-19 pandemic, the shift to high-intensity remote work—three days ... Expand
Semantic filters: privacy
Topics: information privacy concern organizational commitment remote work IT supported collaboration privacy
Methods: statistical hypothesis test chi squared test longitudinal research SEM tool structural equation modeling
Theories: social information processing theory
2023 | European Conference On Information Systems | Citations: 0
Authors: Agerskov, Signe; Pedersen, Asger; Beck, Roman
Abstract: Enterprise architects and IT systems developers must often decide ad hoc how to ... Expand
Semantic filters: privacy
Topics: blockchain smart contract data encryption privacy supply chain management
Methods: literature sample literature study case study computational algorithm triangulation
2023 | HICSS | Citations: 0
Authors: Aguilar, N.; Landau, A.; Mathiyazhagan, S.; Auyeung, A.; Dillard, S.; Patton, D.
Abstract: Despite advances in artificial intelligence (AI), ethical principles have been ... Expand
Semantic filters: privacy
Topics: artificial intelligence privacy unintended consequence
Methods: natural language processing image processing case study
2023 | HICSS | Citations: 0
Authors: Ahmad, Rizwan; Gal, Uri; Liu, Na
Abstract: Researchers from numerous management, social sciences and psychological discipli ... Expand
Semantic filters: privacy
Topics: privacy information privacy concern smartphone biometric mobile application
Methods: literature sample qualitative interview grounded theory mixed method survey
2023 | ACM Transactions on Management Information Systems | Citations: 0
Authors: Akello, Patricia; Vemprala, Naga; Lang Beebe, Nicole; Raymond Choo, Kim-Kwang
Abstract: In the United States and around the world, gun violence has become a long-standi ... Expand
Semantic filters: privacy
Topics: blockchain criminality smart contract Ethereum access control
Methods: design artifact design science design process case study simulation
2023 | European Conference On Information Systems | Citations: 0
Authors: Al Helaly, Yasser; Dhillon, Gurpreet; Oliviera, Tiago
Abstract: This study identifies the different individual defensive responses that are tri ... Expand
Semantic filters: privacy
Topics: personalization usability Facebook social media privacy
Methods: experiment survey Student's t-test statistical hypothesis test parametric test
2023 | Information Systems Research | Citations: 0
Authors: Alashoor, Tawfiq; Keil, Mark; Smith, H. Jeff; McConnell, Allen R.
Abstract: The confluence of digital transactions, growing cybersecurity threats, and the i ... Expand
Semantic filters: privacy
Topics: information privacy concern privacy decision making mobile application task productivity
Methods: experiment descriptive statistic statistical hypothesis test theory development Student's t-test
Theories: elaboration likelihood model
2023 | Americas Conference on Information Systems | Citations: 0
Authors: Aldossari, Marran; Zhang, Dongsong
Abstract: Despite the increasing attention and research effort, how to protect sensitive ... Expand
Semantic filters: privacy
Topics: electronic mail laptop computer usability privacy perceived ease of use
Methods: survey parametric test experiment Tukey HSD for post poc analysis ANOVA
2023 | Americas Conference on Information Systems | Citations: 0
Authors: Alotaibi, Awatif; Barros, Alistair; Degirmenci, Kenan
Abstract: Integrating a mid-range theory and service-dominant (S-D) logic as a metaperspe ... Expand
Semantic filters: privacy
Topics: information privacy concern privacy database system online community participatory design
Methods: structured literature research literature sample literature study design methodology co-citation analysis
Theories: service-dominant logic privacy calculus theory