Privacy champions in software teams: Understanding their motivations, strategies, and challenges

M Tahaei, A Frik, K Vaniea - Proceedings of the 2021 CHI Conference …, 2021 - dl.acm.org
Software development teams are responsible for making and implementing software design
decisions that directly impact end-user privacy, a challenging task to do well. Privacy …

Identification of key cyberbullies: A text mining and social network analysis approach

YJ Choi, BJ Jeon, HW Kim - Telematics and Informatics, 2021 - Elsevier
Cyberbullying is a major problem in society, and the damage it causes is becoming
increasingly significant. Previous studies on cyberbullying focused on detecting and …

Linking cybersecurity and accounting: An event, impact, response framework

DJ Janvrin, T Wang - Accounting Horizons, 2022 - publications.aaahq.org
Due to recent high-profile cybersecurity breaches and increased practitioner and regulatory
attention, organizations are under pressure to consider the accounting implications of these …

Cyber-resiliency for digital enterprises: a strategic leadership perspective

J Loonam, J Zwiegelaar, V Kumar… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
As organizations increasingly view information as one of their most valuable assets, which
supports the creation and distribution of their products and services, information security will …

Can peers help reduce violations of information security policies? The role of peer monitoring

A Yazdanmehr, J Wang - European Journal of Information Systems, 2023 - Taylor & Francis
Peers may help others avoid violating organisational information security policies (ISPs).
This study explores how peer monitoring reduces employee ISP violation intention. We …

Computer network information security protection faced by digital art museums based on the internet of things

Q Wang, L Li, S Hu - Wireless Communications and Mobile …, 2021 - Wiley Online Library
The development of the Internet of things provides a great opportunity for the development of
all walks of life, but it also brings many risks in the process, of which the most important thing …

Investigating the diffusion of IT consumerization in the workplace: A case study using social network analysis

D Dang-Pham, S Pittayachawan, V Bruno… - Information Systems …, 2019 - Springer
IT consumerization, or the end-user's adoption of consumer IT for work purpose, is an
emerging topic which recently attracted the attention of researchers and practitioners. This …

[PDF][PDF] 信息安全治理与企业绩效: 一个被调节的中介作用模型

甄杰, 谢宗晓, 李康宏, 林润辉 - 南开管理评论, 2020 - nbr.nankai.edu.cn
摘要本文基于对199 家中国企业开展的信息安全管理调查数据, 探讨了信息安全治理对企业绩效
的影响, 信息安全整合能力的中介作用及高管支持的调节作用. 逐步层级回归和被调节的路径 …

Employees' Cybersecurity Behaviour in the Mobile Context: The Role of Self-Efficacy and Psychological Ownership

SF Verkijika - 2020 2nd International Multidisciplinary …, 2020 - ieeexplore.ieee.org
Mobile devices are widely known to be a cybersecurity risk for organisations. However, their
use for work purposes is largely becoming a common practice as most organisations rather …

Nadal: A neighbor-aware deep learning approach for inferring interpersonal trust using smartphone data

GF Bati, VK Singh - Computers, 2020 - mdpi.com
Interpersonal trust mediates multiple socio-technical systems and has implications for
personal and societal well-being. Consequently, it is crucial to devise novel machine …