Text mining in cybersecurity: A systematic literature review

L Ignaczak, G Goldschmidt, CAD Costa… - ACM Computing …, 2021 - dl.acm.org
The growth of data volume has changed cybersecurity activities, demanding a higher level
of automation. In this new cybersecurity landscape, text mining emerged as an alternative to …

From fighting COVID-19 pandemic to tackling sustainable development goals: An opportunity for responsible information systems research

SL Pan, S Zhang - International journal of information management, 2020 - Elsevier
The recent outbreak of the COVID-19 pandemic has posed a significant threat to the healthy
lives and well-being of billions of people worldwide. As the world begins to open up from …

[HTML][HTML] An update for taxonomy designers: methodological guidance from information systems research

D Kundisch, J Muntermann, AM Oberländer… - Business & Information …, 2021 - Springer
Taxonomies are classification systems that help researchers conceptualize phenomena
based on their dimensions and characteristics. To address the problem of 'ad-hoc'taxonomy …

Why security and privacy research lies at the centre of the information systems (IS) artefact: Proposing a bold research agenda

PB Lowry, T Dinev, R Willison - European Journal of Information …, 2017 - Taylor & Francis
In this essay, we outline some important concerns in the hope of improving the effectiveness
of security and privacy research. We discuss the need to re-examine our understanding of …

An extended digital forensic readiness and maturity model

A Taiwo, I Claims - Forensic Science International: Digital Investigation, 2022 - Elsevier
Digital forensics readiness (DFR) is an important part of the growing forensic domain.
Research on DFR has been given little attention, while available DFR models have focused …

[图书][B] Cybercrime and digital forensics: An introduction

TJ Holt, AM Bossler, KC Seigfried-Spellar - 2022 - taylorfrancis.com
This book offers a comprehensive and integrative introduction to cybercrime. It provides an
authoritative synthesis of the disparate literature on the various types of cybercrime, the …

[HTML][HTML] Organizational science and cybersecurity: abundant opportunities for research at the interface

RS Dalal, DJ Howard, RJ Bennett, C Posey… - Journal of business and …, 2022 - Springer
Cybersecurity is an ever-present problem for organizations, but organizational science has
barely begun to enter the arena of cybersecurity research. As a result, the “human factor” in …

Cultivating proactive information security behavior and individual creativity: The role of human relations culture and IT use governance

C Lin, JLS Wittmer, XR Luo - Information & Management, 2022 - Elsevier
This study developed the concept of proactive information security behavior and examined
its connections with individual creativity and two organizational context factors: human …

[HTML][HTML] Philosophy and information systems: where are we and where should we go?

NR Hassan, J Mingers, B Stahl - European Journal of Information …, 2018 - Taylor & Francis
All research is philosophy in action. A lack of attention to and understanding of philosophy
can render research and its outcomes misleading or vacuous. Understanding philosophical …

Audit firm assessments of cyber-security risk: evidence from audit fees and SEC comment letters

P Rosati, F Gogolin, T Lynn - The International Journal of …, 2019 - World Scientific
This study investigates the impact of cyber-security incidents on audit fees. Using a sample
of 5,687 firms, we find that (i) breached firms are charged 12% higher audit fees, and (ii) …