Semantic Filter
show all semantic filters
Found 46 articles
  • A temporal graph framework for intelligence extraction in social media networks

    PDF

    2023 | Information & Management | Citations: 0

    Authors: Chung, Wingyan; Lai, Vincent S.

    Abstract: Social media networks (SMNs) are increasingly used in professional management of ... Expand

    Semantic filters: ransomware

    Topics: cryptocurrency social network systems development situation awareness user behavior

    Methods: experiment machine learning longitudinal research computational algorithm time series analysis

    Theories: psychological theory social contagion theory social interactionist theory social impact theory social sciences theory

  • The effects of knowledge mechanisms on employees' information security threat construal

    PDF

    2023 | Information Systems Journal | Citations: 1

    Authors: Mady, Ashraf; Gupta, Saurabh; Warkentin, Merrill

    Abstract: Organisations implement a variety of knowledge mechanisms such as information se ... Expand

    Semantic filters: ransomware

    Topics: data security email phishing security policy IT security task complexity

    Methods: survey experiment Student's t-test parametric test survey design

    Theories: construal level theory security compliance theory

  • Triad or Error? Introducing Three Basic Dimensions of Competence as a Driving Force for Information Security Performance

    2023 | International Conference on Information Systems | Citations: 0

    Authors: Rampold, Florian; Masuch, Kristin; Warwas, Julia; Trang, Simon

    Abstract: As security incidents such as data breaches have dramatically increased in rece ... Expand

    Semantic filters: ransomware

    Topics: data security phishing IT security individual productivity information system use

    Methods: data transformation structural equation modeling partial least squares regression cross sectional research cross sectional survey

  • Understanding the Role of Leadership Competencies in Cyber Crisis Management: A Case Study

    2023 | HICSS | Citations: 0

    Authors: Salviotti, Gianluca; Abbatemarco, Nico; De Rossi, Leonardo Maria; Bjoernland, Kaia

    Abstract: The amount and severity of cyber-attacks has been constantly increasing in recen ... Expand

    Semantic filters: ransomware

    Topics: emergency management ransomware organization learning decision making computer crime

    Methods: narrative analysis qualitative interview case study cluster analysis qualitative coding

  • Deep Learning for Information Systems Research

    PDF

    2023 | Journal of Management Information Systems | Citations: 1

    Authors: Samtani, Sagar; Zhu, Hongyi; Padmanabhan, Balaji; Chai, Yidong; Chen, Hsinchun; Nunamaker Jr., Jay F.

    Abstract: Modern artificial intelligence (AI) is heavily reliant on deep learning (DL), an ... Expand

    Semantic filters: ransomware

    Topics: knowledge base IT security artificial intelligence darknet IT security threat

    Methods: Cross-Industry Standard Process for Data Mining data transformation autoencoder computational algorithm econometric modeling

  • Understanding Behavioral Drivers in Twitter Social Media Networks

    2023 | International Conference on Information Systems | Citations: 0

    Authors: Chung, Wingyan

    Abstract: As social media platforms facilitate user interactions, organizations increasin ... Expand

    Semantic filters: ransomware

    Topics: Twitter user behavior systems development YouTube decision making

    Methods: simulation machine learning support vector machine design artifact mixed method

    Theories: social network theory

  • Introduction to the Minitrack on Organizational Cybersecurity: Advanced Cyber Defense, Cyber Analytics, and Security Operations

    2023 | HICSS | Citations: 0

    Authors: Steiner, Stuart; Plachkinova, Miloslava; Conte De Leon, Daniel; Shepherd, Morgan

    Abstract: Cybersecurity touches all aspects of organizational management, with organizati ... Expand

    Semantic filters: ransomware

    Topics: IT security decision making IT manager information technology capability IT security training

    Methods: natural language processing personal interview case study qualitative content analysis

  • Security-Induced Lock-In in the Cloud

    PDF

    2022 | Business & Information Systems Engineering | Citations: 0

    Authors: Arce, Daniel

    Abstract: Cloud services providers practice security-induced lock-in when employing crypto ... Expand

    Semantic filters: ransomware

    Topics: digital platform cloud computing user requirement ransomware value creation

  • More Security, less Harm? Exploring the Link between Security Measures and Direct Costs of Cyber Incidents within Firms using PLS-PM

    2022 | International Conference on Business Informatics | Citations: 0

    Authors: Dreissigacker, Arne; Teuteberg, Frank

    Abstract: As one of the first articles to empirically explore the direct costs of cyber in ... Expand

    Semantic filters: ransomware

    Topics: IT security defense ransomware database system IT security threat pandemic

    Methods: partial least squares path modeling qualitative interview survey partial least squares regression statistical power analysis

  • Why Do Employees Report Cyber Threats? Comparing Utilitarian and Hedonic Motivations to Use Incident Reporting Tools

    2022 | International Conference on Information Systems | Citations: 0

    Authors: Franz, Anjuli

    Abstract: Organizational cybersecurity is threatened by increasingly sophisticated cybera ... Expand

    Semantic filters: ransomware

    Topics: usage intention perceived usefulness electronic mail phishing IT security

    Methods: experiment mediation analysis regression analysis method survey experimental group

    Theories: theory of affordance