A qualitative systematic review of trust in technology

S Schuetz, L Kuai, MC Lacity… - Journal of Information …, 2024 - journals.sagepub.com
Although many information systems (IS) scholars have researched the antecedents and
consequences of trust in technology, the sheer amount of work published, authors' use of …

[HTML][HTML] Blockchain user digital identity big data and information security process protection based on network trust

F Wang, Y Gai, H Zhang - Journal of King Saud University-Computer and …, 2024 - Elsevier
This study aims to delve into the knowledge graph, functional pathways, and qualitative logic
among elements such as network trust, blockchain organization, user identity, big data, and …

Uncovering post-adoption usage of AI-based voice assistants: a technology affordance lens using a mixed-methods approach

Z Shao, J Zhang, L Zhang, J Benitez - European Journal of …, 2024 - Taylor & Francis
Despite the growing proliferation of AI-based voice assistants in our daily lives, how different
functions of AI-based voice assistants affect users' post-adoption usage behaviours remains …

Promoting Security Behaviors in Remote Work Environments: Personal Values Shaping Information Security Policy Compliance

CI Torres, RE Crossler - Information Systems Research, 2024 - pubsonline.informs.org
Cybersecurity threats and information security policy (ISP) compliance are critical concerns
for organizations. The recent trend of working from home has made individual characteristics …

[PDF][PDF] Identifying Cybersecurity Training Strategies Across Companies

S Bengtsson, A Kempf, B Weaver - lup.lub.lu.se
ABSTRACT (MAX. 200 ORD): Digital transformation is blending digital and physical realms,
transforming industries and amplifying cybersecurity challenges, emphasizing the need for …