Semantic Filter
show all semantic filters
Found 157 articles
  • Relating Social Media Diffusion, Education Level and Cybersecurity Protection Mechanisms to E-Participation Initiatives: Insights from a Cross-Country Analysis

    PDF

    2023 | Information Systems Frontiers | Citations: 0

    Authors: Ahangama, Supunmali

    Abstract: Virtual Social Networks (VSN) act as a catalyst for the success of the active pa ... Expand

    Semantic filters: protection motivation theory

    Topics: IT security decision making human resource management social network government system

    Methods: survey partial least squares path modeling cross sectional research mediation analysis archival research

    Theories: protection motivation theory structuration theory

  • The Interplay of Information Processing, Mindfulness, and Affective State in Phishing Detection

    2023 | International Conference on Information Systems | Citations: 0

    Authors: Bera, Debalina; Kim, Dan

    Abstract: This study investigates the effect of individuals' information processing modes ... Expand

    Semantic filters: protection motivation theory

    Topics: phishing mindfulness electronic mail email phishing data security

    Methods: experiment survey partial least squares regression machine learning laboratory experiment

    Theories: protection motivation theory

  • HARKing and P-Hacking: A Call for More Transparent Reporting of Studies in the Information Systems Field

    PDF

    2023 | Communications of the Association for Information Systems | Citations: 0

    Authors: Hu, Han-fen; Moody, Gregory; Galletta, Dennis

    Abstract: While researchers are expected to look for significant results to confirm their ... Expand

    Semantic filters: protection motivation theory

    Topics: website web page

    Methods: p hacking descriptive statistic survey parametric test statistical hypothesis test

    Theories: protection motivation theory

  • Vulnerability-based Cyber-Risk Management: A Text-mining Approach

    2023 | Americas Conference on Information Systems | Citations: 0

    Authors: Jain, Swati; Mukhopadhyay, Arunabha

    Abstract: Vulnerable information systems inside an organization make it prone to cyber-at ... Expand

    Semantic filters: protection motivation theory

    Topics: IT security threat risk management IT security Microsoft Windows Chief Information Officer

    Methods: topic model decision tree classification naïve bayes machine learning experiment

    Theories: rational choice theory protection motivation theory

  • IT Security and Espoused Cultural Values: A Comparative Analysis of Pakistan and the United States

    2023 | Americas Conference on Information Systems | Citations: 0

    Authors: John, Asher; Polites, Greta

    Abstract: Information technology (IT) security research has investigated how users percei ... Expand

    Semantic filters: protection motivation theory

    Topics: self efficacy IT security cross cultural research information system use national culture

    Methods: structural equation modeling descriptive statistic survey

    Theories: protection motivation theory

  • Assessing and Controlling the Social Desirability Bias in the Context of Victims, Perpetrators, and Bystanders of Cyberbullying

    2023 | Americas Conference on Information Systems | Citations: 0

    Authors: KIM, DONGYEON; Jang, Kyungmyung; Kang, Martin; Kwak, Dong-Heon; Knaff, Deborah

    Abstract: Cyberbullying refers to intentional and repeated aggressive acts using electron ... Expand

    Semantic filters: protection motivation theory

    Topics: cyberbullying self efficacy behavioral intention crowdsourcing

    Methods: survey

    Theories: protection motivation theory

  • EXPLORING THREAT-SPECIFIC PRIVACY ASSURANCES IN THE CONTEXT OF CONNECTED VEHICLE APPLICATIONS

    2023 | European Conference On Information Systems | Citations: 0

    Authors: Lechte, Henrik; Menck, Jannes; Stocker, Alexander; Lembcke, Tim-Benjamin; Kolbe, Lutz

    Abstract: Connected vehicles enable a wide range of use cases, often facilitated by smart ... Expand

    Semantic filters: protection motivation theory

    Topics: privacy mobile application information privacy concern digital distribution mobile application market

    Methods: survey experiment parametric test nonparametric test one-way ANOVA

    Theories: protection motivation theory privacy calculus theory

  • Where is IT in Information Security? The Interrelationship among IT Investment, Security Awareness, and Data Breaches

    2023 | Management Information Systems Quarterly | Citations: 1

    Authors: Li, Wilson Weixun; Leung, Alvin; Yue, Wei

    Abstract: Data breaches can severely damage a firm's reputation and its customers' confid ... Expand

    Semantic filters: protection motivation theory

    Topics: IT investment data breach IT security defense data security IT security threat

    Methods: longitudinal research robustness check autocorrelation analysis survey literature study

    Theories: institutional theory protection motivation theory

  • Examining the Differential Effectiveness of Fear Appeals in Information Security Management Using Two-Stage Meta-Analysis

    PDF

    2023 | Journal of Management Information Systems | Citations: 0

    Authors: Lowry, Paul Benjamin; Moody, Gregory D.; Parameswaran, Srikanth; Brown, Nicholas James

    Abstract: Most of the information security management research involving fear appeals is g ... Expand

    Semantic filters: protection motivation theory

    Topics: H1N1 flu self efficacy Python data quality information security management

    Methods: structural equation modeling meta analysis statistical hypothesis test hierarchical linear modeling statistical power analysis

    Theories: fear appeal theory extended parallel process model protection motivation theory

  • Threatened by AI: Analyzing Users’ Responses to the Introduction of AI in a Crowd-Sourcing Platform

    PDF

    2023 | Information Systems Research | Citations: 0

    Authors: Lysyakov, Mikhail; Viswanathan, Siva

    Abstract: As artificial intelligence (AI) solutions are being rapidly deployed, they incre ... Expand

    Semantic filters: protection motivation theory

    Topics: artificial intelligence crowdsourcing marketing management price management IS impact

    Methods: experimental group survey propensity score matching robustness check longitudinal research

    Theories: protection motivation theory