2023 | Communications of the Association for Information Systems | Citations: 0
Authors: Pigola, Angélica; Costa, Priscila da
Abstract: ... Expand
Topics: IT security data security database system innovation management IT security threat
Methods: case study synthesis design science maturity model capability maturity model integration
Theories: dynamic capabilities theory resource based view of the firm
2023 | International Journal of Information Management | Citations: 0
Authors: Ojha, Divesh; Patel, Pankaj C.; Parida, Vinit
Abstract: Though digital technology adoption among SMEs is widely studied, a manifestation ... Expand
Topics: business continuity planning financial performance strategic management virtualization technology supply chain management
Methods: SEM tool theory development structural equation modeling survey statistical hypothesis test
Theories: dynamic capabilities theory knowledge based theory of the firm information theory
2023 | Information Systems Frontiers | Citations: 0
Authors: Okeke, Romanus Izuchukwu; Eiza, Max Hashem
Abstract: This paper aims to examine the challenges of preventing internal identity theft ... Expand
Topics: criminality data security IT security outsourcing IT security threat
Methods: case study qualitative interview personal interview survey qualitative content analysis
Theories: organizational role theory
2023 | HICSS | Citations: 0
Authors: Olszak, C.; Pałys, M.
Abstract: There is a lot of evidence in the research literature that Information Technolo ... Expand
Topics: organizational success organizational culture business intelligence big data mobile system
Methods: survey self reported survey literature study
2023 | HICSS | Citations: 0
Authors: Otudi, H.; Mohamed, T.; Kezunovic, M.; Hu, Y.; Obradovic, Z.
Abstract: Utilizing data analytics and machine learning (ML) on phasor measurement units ... Expand
Topics: Apache Spark analytical information system computer hardware
Methods: simulation machine learning support vector machine experiment event log
2023 | Americas Conference on Information Systems | Citations: 0
Authors: Padalkar, Nakul; Lima, Victor De
Abstract: Recommender systems have become integral to modern society, facilitating person ... Expand
Topics: recommender system collaborative filtering
Methods: computational algorithm optimization model experiment PyTorch literature study
2023 | Information & Management | Citations: 0
Authors: Pai, Peiyu
Abstract: Transitioning into motherhood can be stressful and resource-intensive, filled wi ... Expand
Topics: online community electronic mail personality problem solving
Methods: survey chi squared test statistical hypothesis test SEM tool structural equation modeling
Theories: role theory conservation of resources theory
2023 | Americas Conference on Information Systems | Citations: 0
Authors: Pal, Ranjan; Madnick, Stuart; Siegel, Michael
Abstract: The interdependent and correlated nature of cyber-risk is a cause of failed low ... Expand
Topics: risk management IT security mobile system internet of things supply chain management
Theories: lemon market theory
2023 | International Journal of Information Management | Citations: 0
Authors: Pan, Shan L.; Nishant, Rohit
Abstract: Recent research call for action on digital sustainability research could potenti ... Expand
Topics: artificial intelligence green IS sensemaking supply chain management Sustainable Development Goal
Methods: literature study literature sample artificial neural network deep learning computational algorithm
2023 | Information and Organization | Citations: 0
Authors: Parker, Craig; Bingley, Scott; Burgess, Stephen
Abstract: Small business revenues worldwide were drastically affected by lockdowns during ... Expand
Topics: pandemic electronic commerce website innovation management technology adoption
Methods: Google news case study theoretical contribution literature sample archival research
Theories: diffusion of innovations theory