A decade of NeuroIS research: progress, challenges, and future directions

R Riedl, T Fischer, PM Léger, FD Davis - ACM SIGMIS Database: the …, 2020 - dl.acm.org
NeuroIS is a field in Information Systems (IS) that makes use of neuroscience and
neurophysiological tools and knowledge to better understand the development, adoption …

The role of privacy fatigue in online privacy behavior

H Choi, J Park, Y Jung - Computers in Human Behavior, 2018 - Elsevier
The increasing difficulty in managing one's online personal data leads to individuals feeling
a loss of control. Additionally, repeated consumer data breaches have given people a sense …

Trust me, if you can: a study on the factors that influence consumers' purchase intention triggered by chatbots based on brain image evidence and self-reported …

C Yen, MC Chiang - Behaviour & Information Technology, 2021 - Taylor & Francis
Nowadays, chatbots is one of the fast rising artificial intelligence (AI) trend relates to the
utilisation of applications that interact with users in a conversational format and mimic …

[HTML][HTML] The whole of cyber defense: Syncing practice and theory

KM de Nobrega, AF Rutkowski, C Saunders - The Journal of Strategic …, 2024 - Elsevier
This review explores the problems Chief Information Security Officers (CISOs) and other
cyber professionals face when defending their organization against cyberattacks. Using a …

Tuning out security warnings

A Vance, JL Jenkins, BB Anderson, DK Bjornn… - MIS Quarterly, 2018 - JSTOR
Research in the fields of information systems and human-computer interaction has shown
that habituation—decreased response to repeated stimulation—is a serious threat to the …

More harm than good? How messages that interrupt can make us vulnerable

JL Jenkins, BB Anderson, A Vance… - Information Systems …, 2016 - pubsonline.informs.org
System-generated alerts are ubiquitous in personal computing and, with the proliferation of
mobile devices, daily activity. While these interruptions provide timely information, research …

To cyberloaf or not to cyberloaf: The impact of the announcement of formal organizational controls

L Khansa, J Kuem, M Siponen… - Journal of Management …, 2017 - Taylor & Francis
We investigate the changing causal relationships between cyberloafing behavior and its
antecedents after the announcement of formal organizational controls that, unlike informal …

The android platform security model

R Mayrhofer, JV Stoep, C Brubaker… - ACM Transactions on …, 2021 - dl.acm.org
Android is the most widely deployed end-user focused operating system. With its growing
set of use cases encompassing communication, navigation, media consumption …

Semi-supervised cyber threat identification in dark net markets: A transductive and deep learning approach

M Ebrahimi, JF Nunamaker Jr… - Journal of Management …, 2020 - Taylor & Francis
ABSTRACT Dark Net Marketplaces (DNMs), online selling platforms on the dark web,
constitute a major component of the underground economy. Due to the anonymity and …

Which phish get caught? An exploratory study of individuals′ susceptibility to phishing

GD Moody, DF Galletta, BK Dunn - European Journal of Information …, 2017 - Taylor & Francis
Phishing, or the practice of sending deceptive electronic communications to acquire private
information from victims, results in significant financial losses to individuals and businesses …