An unexplored gap in IT adoption research concerns the positive role of shared benefits even when personal information is exposed. To explore the evaluation paradigm of shared …
Abstract Information systems security behavioral research has primarily focused on individual cognitive processes and their impact on information security policy …
Amidst growing IT security challenges, psychological underpinnings of security behaviors have received considerable interest, eg cybersecurity Self-Efficacy (SE), the belief in one's …
In design science research, two important challenges exist to achieve greater influence in research and practice:(1) foster frequent reuse of artifacts and design theories and (2) …
Extant research has shown that neutralization processes can enable potential IS security policy violators to justify their behavior and overcome the deterrence effect of sanctions in …
AB Brendel, J Muntermann - Information Systems Journal, 2022 - Wiley Online Library
The replication of existing research studies and theories is considered a foundational pillar of knowledge accumulation and an important instrument of discourse across research …
A simple idea underpins the scientific process: All results should be subject to continued testing and questioning. Given the particularities of our international IS discipline, different …
A Vedadi, M Warkentin - AIS Transactions on Replication Research, 2016 - aisel.aisnet.org
One of the most significant factors to the survival of many service-based firms such as banks and insurance companies is customers' continuous use of their IT services. The focus of this …
The replication of existing knowledge (eg, previous study results) stands as an essential research practice across all science disciplines. Despite the importance of replication, the …