Compliance with Bring Your Own Device security policies in organizations: A systematic literature review

R Palanisamy, AA Norman, MLM Kiah - Computers & Security, 2020 - Elsevier
Abstract The omnipresence of Bring Your Own Device (BYOD) in organizations and
employees' lives makes it a challenge to ensure adherence to security policy. In such …

The lifecycle of algorithmic decision-making systems: Organizational choices and ethical challenges

M Marabelli, S Newell, V Handunge - The Journal of Strategic Information …, 2021 - Elsevier
In this viewpoint article we discuss algorithmic decision-making systems (ADMS), which we
view as organizational sociotechnical systems with their use in practice having …

Smart offices: A productivity and well-being perspective

S Papagiannidis, D Marikyan - International Journal of Information …, 2020 - Elsevier
The rapid development of information communication technology has led towards the
emergence of the “connected world” characterised by the pervasive embeddedness of smart …

Cloud manufacturing adoption: a comprehensive review

MS Kavre, VK Sunnapwar, BB Gardas - Information Systems and e …, 2023 - Springer
To provide a comprehensive review of cloud manufacturing (CM) adoption, this study
performed a systematic literature review of 111 journal papers on CM adoption that were …

Enterprise social media and cyber-slacking: A Kahn's model perspective

A Nusrat, Y He, A Luqman, A Waheed, A Dhir - Information & Management, 2021 - Elsevier
This study investigates the associations between enterprise social media (ESM) use,
psychological conditions, and cyber-slacking in the workplace and examines the mediating …

Dealing with digital traces: Understanding protective behaviors on mobile devices

F Bélanger, RE Crossler - The Journal of Strategic Information Systems, 2019 - Elsevier
With increasingly digitization, more and more information is collected from individuals and
organizations, leading to several privacy concerns. These risks are further heightened in the …

Neural correlates of protection motivation for secure IT behaviors: An fMRI examination

M Warkentin, E Walden, AC Johnston… - Journal of the …, 2016 - aisel.aisnet.org
Abstract Information security management programs have long included “fear appeals”,
managerial communiqués designed to promote secure behaviors among organizational …

Shared benefits and information privacy: what determines smart meter technology adoption?

M Warkentin, S Goel, P Menard - Journal of the Association for …, 2017 - aisel.aisnet.org
An unexplored gap in IT adoption research concerns the positive role of shared benefits
even when personal information is exposed. To explore the evaluation paradigm of shared …

Using IT design to prevent cyberbullying

PB Lowry, GD Moody, S Chatterjee - Journal of management …, 2017 - Taylor & Francis
The rise of social media has fostered increasing instances of deviant behavior. Arguably, the
most notable of these is cyberbullying (CB), which is an increasing global concern because …

Perceived argument quality's effect on threat and coping appraisals in fear appeals: An experiment and exploration of realism check heuristics

JD Wall, M Warkentin - Information & Management, 2019 - Elsevier
Persuasion is key to encourage compliance with information security policies through fear
appeals, though research has not examined how the perceived quality of their arguments …