Information security concerns in IT outsourcing: Identifying (in) congruence between clients and vendors G Dhillon, R Syed, F de Sá-Soares Information & Management 54 (4), 452-464, 2017 | 105 | 2017 |
Interpreting information security culture: An organizational transformation case study G Dhillon, R Syed, C Pedron Computers & Security 56, 63-69, 2016 | 102 | 2016 |
Cybersecurity vulnerability management: A conceptual ontology and cyber intelligence alert system R Syed Information & Management 57 (6), 103334, 2020 | 94 | 2020 |
Enterprise reputation threats on social media: A case of data breach framing R Syed The Journal of Strategic Information Systems 28 (3), 257-274, 2019 | 90 | 2019 |
Ontology based integration of XBRL filings for financial decision making R Syed, VY Yoon, RT Redmond, UO Etudo Decision Support Systems 68, 64-76, 2014 | 39 | 2014 |
What it takes to get retweeted: An analysis of software vulnerability messages R Syed, M Rahafrooz, JM Keisler Computers in Human Behavior 80, 207-215, 2018 | 33 | 2018 |
Value-based information privacy objectives for Internet Commerce G Dhillon, T Oliveira, R Syed Computers in Human Behavior 87, 292-307, 2018 | 26 | 2018 |
The identity management value model: A design science approach to assess value gaps on social media R Syed, G Dhillon, J Merrick Decision Sciences 50 (3), 498-536, 2019 | 20 | 2019 |
Dynamics of Data Breaches in Online Social Networks: Understanding Threats to Organizational Information Security Reputation R Syed, G Dhillon Proceedings of International Conference on Information Systems (ICIS) 2015, 2015 | 18 | 2015 |
Individual values for protecting identity in social networks G Dhillon, R Chowdhuri Proceedings of International Conference on Information Systems (ICIS) 2013, 2013 | 17 | 2013 |
Social movement sustainability on social media: An analysis of the women’s March Movement on Twitter R Syed, L Silva Journal of the Association for Information Systems 24 (1), 249-293, 2023 | 16 | 2023 |
Cybersecurity Vulnerability Management: An Ontology-Based Conceptual Model R Syed, H Zhong Proceedings of the American Conference on Information Systems (AMCIS) 2018, 2018 | 11 | 2018 |
SOCIAL MEDIA AND SOCIAL MOVEMENTS: A CASE OF WOMEN’S MARCH L Silva, R Syed Proceedings of the 27th European Conference on Information Systems (ECIS) 2019, 2019 | 7 | 2019 |
Trolls and Social Movement Participation: An Empirical Investigation P Bharati, C Lee, R Syed Proceedings of the American Conference on Information Systems (AMCIS) 2018, 2018 | 6 | 2018 |
Understanding Information Security. R Chowdhuri, G Dhillon Journal of Information System Security 8 (2), 2012 | 6 | 2012 |
Influence of trolling on social media participation: An empirical investigation P Bharati, C Lee, R Syed Academy of Management Proceedings 2019 (1), 18645, 2019 | 5 | 2019 |
de S-Soares, F.(2017) G Dhillon, R Syed Information security concerns in IT, 0 | 5 | |
Analyzing Software Vendors’ Patch Release Behavior in the Age of Social Media R Syed Proceedings of International Conference on Information Systems (ICIS) 2017, 2017 | 4 | 2017 |
Dynamics of Identity Threats in Online Social Networks: Modelling Individual and Organizational Perspectives R Syed Doctoral Dissertation, 2015 | 2 | 2015 |
Secure Outsourcing: An Investigation of the Fit between Clients and Providers G Dhillon, R Chowdhuri, F de Sá-Soares Security and Privacy Protection in Information Processing Systems: 28th IFIP …, 2013 | 2 | 2013 |