2023 | Information & Management | Citations: 0
Authors: Chung, Wingyan; Lai, Vincent S.
Abstract: Social media networks (SMNs) are increasingly used in professional management of ... Expand
Semantic filters: ransomware
Topics: cryptocurrency social network systems development situation awareness user behavior
Methods: experiment machine learning longitudinal research computational algorithm time series analysis
Theories: psychological theory social contagion theory social interactionist theory social impact theory social sciences theory
2023 | Information Systems Journal | Citations: 1
Authors: Mady, Ashraf; Gupta, Saurabh; Warkentin, Merrill
Abstract: Organisations implement a variety of knowledge mechanisms such as information se ... Expand
Semantic filters: ransomware
Topics: data security email phishing security policy IT security task complexity
Methods: survey experiment Student's t-test parametric test survey design
Theories: construal level theory security compliance theory
2023 | International Conference on Information Systems | Citations: 0
Authors: Rampold, Florian; Masuch, Kristin; Warwas, Julia; Trang, Simon
Abstract: As security incidents such as data breaches have dramatically increased in rece ... Expand
Semantic filters: ransomware
Topics: data security phishing IT security individual productivity information system use
Methods: data transformation structural equation modeling partial least squares regression cross sectional research cross sectional survey
2023 | HICSS | Citations: 0
Authors: Salviotti, Gianluca; Abbatemarco, Nico; De Rossi, Leonardo Maria; Bjoernland, Kaia
Abstract: The amount and severity of cyber-attacks has been constantly increasing in recen ... Expand
Semantic filters: ransomware
Topics: emergency management ransomware organization learning decision making computer crime
Methods: narrative analysis qualitative interview case study cluster analysis qualitative coding
2023 | Journal of Management Information Systems | Citations: 1
Authors: Samtani, Sagar; Zhu, Hongyi; Padmanabhan, Balaji; Chai, Yidong; Chen, Hsinchun; Nunamaker Jr., Jay F.
Abstract: Modern artificial intelligence (AI) is heavily reliant on deep learning (DL), an ... Expand
Semantic filters: ransomware
Topics: knowledge base IT security artificial intelligence darknet IT security threat
Methods: Cross-Industry Standard Process for Data Mining data transformation autoencoder computational algorithm econometric modeling
2023 | International Conference on Information Systems | Citations: 0
Authors: Chung, Wingyan
Abstract: As social media platforms facilitate user interactions, organizations increasin ... Expand
Semantic filters: ransomware
Topics: Twitter user behavior systems development YouTube decision making
Methods: simulation machine learning support vector machine design artifact mixed method
Theories: social network theory
2023 | HICSS | Citations: 0
Authors: Steiner, Stuart; Plachkinova, Miloslava; Conte De Leon, Daniel; Shepherd, Morgan
Abstract: Cybersecurity touches all aspects of organizational management, with organizati ... Expand
Semantic filters: ransomware
Topics: IT security decision making IT manager information technology capability IT security training
Methods: natural language processing personal interview case study qualitative content analysis
2022 | Business & Information Systems Engineering | Citations: 0
Authors: Arce, Daniel
Abstract: Cloud services providers practice security-induced lock-in when employing crypto ... Expand
Semantic filters: ransomware
Topics: digital platform cloud computing user requirement ransomware value creation
2022 | International Conference on Business Informatics | Citations: 0
Authors: Dreissigacker, Arne; Teuteberg, Frank
Abstract: As one of the first articles to empirically explore the direct costs of cyber in ... Expand
Semantic filters: ransomware
Topics: IT security defense ransomware database system IT security threat pandemic
Methods: partial least squares path modeling qualitative interview survey partial least squares regression statistical power analysis
2022 | International Conference on Information Systems | Citations: 0
Authors: Franz, Anjuli
Abstract: Organizational cybersecurity is threatened by increasingly sophisticated cybera ... Expand
Semantic filters: ransomware
Topics: usage intention perceived usefulness electronic mail phishing IT security
Methods: experiment mediation analysis regression analysis method survey experimental group
Theories: theory of affordance