2023 | Information Systems Frontiers | Citations: 0
Authors: Ahangama, Supunmali
Abstract: Virtual Social Networks (VSN) act as a catalyst for the success of the active pa ... Expand
Semantic filters: protection motivation theory
Topics: IT security decision making human resource management social network government system
Methods: survey partial least squares path modeling cross sectional research mediation analysis archival research
Theories: protection motivation theory structuration theory
2023 | International Conference on Information Systems | Citations: 0
Authors: Bera, Debalina; Kim, Dan
Abstract: This study investigates the effect of individuals' information processing modes ... Expand
Semantic filters: protection motivation theory
Topics: phishing mindfulness electronic mail email phishing data security
Methods: experiment survey partial least squares regression machine learning laboratory experiment
Theories: protection motivation theory
2023 | Communications of the Association for Information Systems | Citations: 0
Authors: Hu, Han-fen; Moody, Gregory; Galletta, Dennis
Abstract: While researchers are expected to look for significant results to confirm their ... Expand
Semantic filters: protection motivation theory
Topics: website web page
Methods: p hacking descriptive statistic survey parametric test statistical hypothesis test
Theories: protection motivation theory
2023 | Americas Conference on Information Systems | Citations: 0
Authors: Jain, Swati; Mukhopadhyay, Arunabha
Abstract: Vulnerable information systems inside an organization make it prone to cyber-at ... Expand
Semantic filters: protection motivation theory
Topics: IT security threat risk management IT security Microsoft Windows Chief Information Officer
Methods: topic model decision tree classification naïve bayes machine learning experiment
Theories: rational choice theory protection motivation theory
2023 | Americas Conference on Information Systems | Citations: 0
Authors: John, Asher; Polites, Greta
Abstract: Information technology (IT) security research has investigated how users percei ... Expand
Semantic filters: protection motivation theory
Topics: self efficacy IT security cross cultural research information system use national culture
Methods: structural equation modeling descriptive statistic survey
Theories: protection motivation theory
2023 | Americas Conference on Information Systems | Citations: 0
Authors: KIM, DONGYEON; Jang, Kyungmyung; Kang, Martin; Kwak, Dong-Heon; Knaff, Deborah
Abstract: Cyberbullying refers to intentional and repeated aggressive acts using electron ... Expand
Semantic filters: protection motivation theory
Topics: cyberbullying self efficacy behavioral intention crowdsourcing
Methods: survey
Theories: protection motivation theory
2023 | European Conference On Information Systems | Citations: 0
Authors: Lechte, Henrik; Menck, Jannes; Stocker, Alexander; Lembcke, Tim-Benjamin; Kolbe, Lutz
Abstract: Connected vehicles enable a wide range of use cases, often facilitated by smart ... Expand
Semantic filters: protection motivation theory
Topics: privacy mobile application information privacy concern digital distribution mobile application market
Methods: survey experiment parametric test nonparametric test one-way ANOVA
Theories: protection motivation theory privacy calculus theory
2023 | Management Information Systems Quarterly | Citations: 1
Authors: Li, Wilson Weixun; Leung, Alvin; Yue, Wei
Abstract: Data breaches can severely damage a firm's reputation and its customers' confid ... Expand
Semantic filters: protection motivation theory
Topics: IT investment data breach IT security defense data security IT security threat
Methods: longitudinal research robustness check autocorrelation analysis survey literature study
Theories: institutional theory protection motivation theory
2023 | Journal of Management Information Systems | Citations: 0
Authors: Lowry, Paul Benjamin; Moody, Gregory D.; Parameswaran, Srikanth; Brown, Nicholas James
Abstract: Most of the information security management research involving fear appeals is g ... Expand
Semantic filters: protection motivation theory
Topics: H1N1 flu self efficacy Python data quality information security management
Methods: structural equation modeling meta analysis statistical hypothesis test hierarchical linear modeling statistical power analysis
Theories: fear appeal theory extended parallel process model protection motivation theory
2023 | Information Systems Research | Citations: 0
Authors: Lysyakov, Mikhail; Viswanathan, Siva
Abstract: As artificial intelligence (AI) solutions are being rapidly deployed, they incre ... Expand
Semantic filters: protection motivation theory
Topics: artificial intelligence crowdsourcing marketing management price management IS impact
Methods: experimental group survey propensity score matching robustness check longitudinal research
Theories: protection motivation theory