A sociotechnical view of algorithmic fairness

M Dolata, S Feuerriegel… - Information Systems …, 2022 - Wiley Online Library
Algorithmic fairness (AF) has been framed as a newly emerging technology that mitigates
systemic discrimination in automated decision‐making, providing opportunities to improve …

Organizational information security policies: a review and research framework

WA Cram, JG Proudfoot, J D'arcy - European Journal of Information …, 2017 - Springer
A major stream of research within the field of information systems security examines the use
of organizational policies that specify how users of information and technology resources …

[HTML][HTML] Seeing the forest and the trees: a meta-analysis of the antecedents to information security policy compliance

WA Cram, J D'arcy, JG Proudfoot - MIS quarterly, 2019 - dl.acm.org
A rich stream of research has identified numerous antecedents to employee compliance
(and noncompliance) with information security policies. However, the number of competing …

An enhanced fear appeal rhetorical framework

AC Johnston, M Warkentin, M Siponen - MIS quarterly, 2015 - JSTOR
Fear appeals, which are used widely in information security campaigns, have become
common tools in motivating individual compliance with information security policies and …

Cognitive‐affective drivers of employees' daily compliance with information security policies: A multilevel, longitudinal study

J D'Arcy, PB Lowry - Information Systems Journal, 2019 - Wiley Online Library
We present a model of employee compliance with information security policy (ISP) that (1)
explicates stable, cognitive beliefs regarding the consequences of compliance and …

Motivating information security policy compliance: The critical role of supervisor-subordinate guanxi and organizational commitment

C Liu, N Wang, H Liang - International Journal of Information Management, 2020 - Elsevier
Employees' non-compliance with organizational information security policy (ISP) when using
informational resources has become the main reason for continuous security incidents …

Why security and privacy research lies at the centre of the information systems (IS) artefact: Proposing a bold research agenda

PB Lowry, T Dinev, R Willison - European Journal of Information Systems, 2017 - Springer
In this essay, we outline some important concerns in the hope of improving the effectiveness
of security and privacy research. We discuss the need to re-examine our understanding of …

The impact of leadership on employees' intended information security behaviour: An examination of the full‐range leadership theory

N Guhr, B Lebek, MH Breitner - Information Systems Journal, 2019 - Wiley Online Library
Explaining the influence of management leadership on employees' information security
behaviour is an important focus in information systems research and for companies and …

Employees' information security policy compliance: A norm activation perspective

A Yazdanmehr, J Wang - Decision Support Systems, 2016 - Elsevier
This study explores the role of norms in employees' compliance with an organizational
information security policy (ISP). Drawing upon norm activation theory, social norms theory …

There's No place like home: Understanding users' intentions toward securing internet-of-things (IoT) smart home networks

SJ Philip, TJ Luu, T Carte - Computers in Human Behavior, 2023 - Elsevier
Modern households are increasingly becoming digitized as they contain numerous Internet-
connected networked devices throughout the home. However, this growth in the adoption of …