Semantic Filter
show all semantic filters
Found 57399 articles
  • Dynamic Capabilities in Cybersecurity Intelligence: A Meta-Synthesis to Enhance Protection Against Cyber Threats

    PDF

    2023 | Communications of the Association for Information Systems | Citations: 0

    Authors: Pigola, Angélica; Costa, Priscila da

    Abstract: ... Expand

    Topics: IT security data security database system innovation management IT security threat

    Methods: case study synthesis design science maturity model capability maturity model integration

    Theories: dynamic capabilities theory resource based view of the firm

  • Virtual integration in SMEs: The digitalization circuitry of dynamic strategic planning for SMEs

    PDF

    2023 | International Journal of Information Management | Citations: 0

    Authors: Ojha, Divesh; Patel, Pankaj C.; Parida, Vinit

    Abstract: Though digital technology adoption among SMEs is widely studied, a manifestation ... Expand

    Topics: business continuity planning financial performance strategic management virtualization technology supply chain management

    Methods: SEM tool theory development structural equation modeling survey statistical hypothesis test

    Theories: dynamic capabilities theory knowledge based theory of the firm information theory

  • The Application of Role-Based Framework in Preventing Internal Identity Theft Related Crimes: A Qualitative Case Study of UK Retail Companies

    PDF

    2023 | Information Systems Frontiers | Citations: 0

    Authors: Okeke, Romanus Izuchukwu; Eiza, Max Hashem

    Abstract: This paper aims to examine the challenges of preventing internal identity theft ... Expand

    Topics: criminality data security IT security outsourcing IT security threat

    Methods: case study qualitative interview personal interview survey qualitative content analysis

    Theories: organizational role theory

  • Disruptive Technologies as a Driver to Organizational Success. Organizational Culture Perspective

    2023 | HICSS | Citations: 0

    Authors: Olszak, C.; Pałys, M.

    Abstract: There is a lot of evidence in the research literature that Information Technolo ... Expand

    Topics: organizational success organizational culture business intelligence big data mobile system

    Methods: survey self reported survey literature study

  • Training Machine Learning Models with Simulated Data for Improved Line Fault Events Classification From 3-Phase PMU Field Recordings

    2023 | HICSS | Citations: 0

    Authors: Otudi, H.; Mohamed, T.; Kezunovic, M.; Hu, Y.; Obradovic, Z.

    Abstract: Utilizing data analytics and machine learning (ML) on phasor measurement units ... Expand

    Topics: Apache Spark analytical information system computer hardware

    Methods: simulation machine learning support vector machine experiment event log

  • Recommendation Systems with Causal Inference-based Regularization

    2023 | Americas Conference on Information Systems | Citations: 0

    Authors: Padalkar, Nakul; Lima, Victor De

    Abstract: Recommender systems have become integral to modern society, facilitating person ... Expand

    Topics: recommender system collaborative filtering

    Methods: computational algorithm optimization model experiment PyTorch literature study

  • Becoming a mother: A role learning perspective on the use of online community resources to facilitate a life-role transition

    PDF

    2023 | Information & Management | Citations: 0

    Authors: Pai, Peiyu

    Abstract: Transitioning into motherhood can be stressful and resource-intensive, filled wi ... Expand

    Topics: online community electronic mail personality problem solving

    Methods: survey chi squared test statistical hypothesis test SEM tool structural equation modeling

    Theories: role theory conservation of resources theory

  • Catastrophe Bond Trading Can Boost Security Improving Cyber (Re-)Insurance Markets

    2023 | Americas Conference on Information Systems | Citations: 0

    Authors: Pal, Ranjan; Madnick, Stuart; Siegel, Michael

    Abstract: The interdependent and correlated nature of cyber-risk is a cause of failed low ... Expand

    Topics: risk management IT security mobile system internet of things supply chain management

    Theories: lemon market theory

  • Artificial intelligence for digital sustainability: An insight into domain-specific research and future directions

    PDF

    2023 | International Journal of Information Management | Citations: 0

    Authors: Pan, Shan L.; Nishant, Rohit

    Abstract: Recent research call for action on digital sustainability research could potenti ... Expand

    Topics: artificial intelligence green IS sensemaking supply chain management Sustainable Development Goal

    Methods: literature study literature sample artificial neural network deep learning computational algorithm

  • The nature of small business digital responses during crises

    PDF

    2023 | Information and Organization | Citations: 0

    Authors: Parker, Craig; Bingley, Scott; Burgess, Stephen

    Abstract: Small business revenues worldwide were drastically affected by lockdowns during ... Expand

    Topics: pandemic electronic commerce website innovation management technology adoption

    Methods: Google news case study theoretical contribution literature sample archival research

    Theories: diffusion of innovations theory