- Privacy, Security, and Data Protection
- Technology Adoption and User Behaviour
- Information and Cyber Security
- Misinformation and Its Impacts
- Spam and Phishing Detection
- Social Media and Politics
- Cybercrime and Law Enforcement Studies
- Disaster Management and Resilience
- Public Relations and Crisis Communication
- Auction Theory and Applications
- Opinion Dynamics and Social Influence
- Knowledge Management and Sharing
- Digital Platforms and Economics
- Digital Marketing and Social Media
- Network Security and Intrusion Detection
- Complex Network Analysis Techniques
- Service-Oriented Architecture and Web Services
- Software Engineering Techniques and Practices
- Impact of Technology on Adolescents
- Advanced Malware Detection Techniques
- Customer Service Quality and Loyalty
- E-Government and Public Services
- FinTech, Crowdfunding, Digital Finance
- Information Systems Theories and Implementation
- User Authentication and Security Systems
The University of Texas at San Antonio
2016-2024
University of Portland
2023
Kennesaw State University
2023
University at Buffalo, State University of New York
2009-2020
Audie L. Murphy Memorial VA Hospital
2019
University of Delaware
2018
Brock University
2018
Sahmyook University
2018
American University of Sharjah
2018
AID Atlanta
2016-2018
Recent extreme events show that Twitter, a micro-blogging service, is emerging as the dominant social reporting tool to spread information on crises. It elevating online public community status of first responders who can collectivel
Developing a framework to analyze coordination patterns occurring in the emergency response life cycle.
Digitization within Human Resource Management (HRM) has resulted in Artificial Intelligence (AI) becoming increasingly prevalent Systems (HRMS) and HR Information (HRIS). The tactical procedures of recruitment, employee performance evaluation satisfaction, compensation benefit analysis, best practice discipline management, training development systems have seen a growth the incorporation AI. To better understand this evolution, we seek to explore publication sources literature that feature...
Abstract Email plays an important role in the digital economy but is threatened by increasingly sophisticated cybercrimes. A number of security services have been developed, including email authentication service designed to cope with threats. It remains unknown how users perceive and evaluate these consequently form their adoption intention. Drawing on Technology Acceptance Model Threat Avoidance Theory, this paper investigates factors that affect user intention adopt service. Our results...
Abstract Micro‐blogging websites (such as twitter), a new information channel, was widely reported outperforming the mainstream channels in numerous ways during massive 2008 China earthquake, including beating first official news released from USGS to report initial tremor (BBC May 12 2008). According Twitter.com, there have been noticeable spikes of twitter usage disasters and other large events, serving an extremely powerful effective fast response service. This raises some important...
This study explores the role of social media in change by analyzing Twitter data collected during 2011 Egypt Revolution. Particular attention is paid to notion collective sense making, which considered a critical aspect for emergence action change. We suggest that making through can be conceptualized as human-machine collaborative information processing involves an interplay signs, grammar, humans, and technologies. focus on occurrences hashtags among high volume tweets sense-making...
Mobile payment services hold the potential for financial inclusion in developing economies. Low-income countries are characterized by distinctive conditions like price sensitivity, low digital penetration, high risk of failure, and competitive emerging markets, which further influence mobile usage. We develop a research model to identify contextual facilitators (like benefit, network externalities, trust, habit) barriers risk, lack facilitating conditions, operational constraints) driving...
Post-analyses of major extreme events reveal that information sharing is critical for effective emergency response. The lack consistent data standards current management practice, however, hinders efficient flow among incident responders. In this paper, we adopt a third-generation activity theory guided approach to develop model can be used in the response fire-related events. This prescribes core reduce interoperability barriers. validated through three-step including request comment (RFC)...
This study investigates the risk of insider threats associated with different applications within a financial institution. Extending routine activity theory (RAT) from criminology literature to information systems security, hypotheses regarding how appli
This study investigates users’ coping responses in the process of phishing email detection. Three common are identified based on literature: task-focused coping, emotion-focused (i.e., worry and self-criticism), avoidance coping. The three used to conceptualize a higher-order construct, adaptiveness, that resides continuum between maladaptive adaptive (manifested as increased decreased coping). Drawing extended parallel model behavioral decision-making literature, this paper examines...
article Free Access Share on Information systems frontiers Authors: Jagdish Chandra Science and Technology directorate at the U.S. Army Research Laboratory in Adelphi, MD MDView Profile , Salvatore T. March Carlson School of Management University Minnesota MinnesotaView Satyen Mukherjee Microelectronic Devices, Circuits Systems Department, Philips Laboratories Briarcliff Manor, NY NYView Will Pape VeriFone, Inc. Inc.View R. Ramesh State New York Buffalo BuffaloView H. Raghav Rao Ray O....
article Share on Consumer-perceived risk in e-commerce transactions Authors: A. F. Salam University of North Carolina, Greensboro GreensboroView Profile , H. R. Rao State New York, Buffalo BuffaloView C. Pegels Authors Info & Claims Communications the ACMVolume 46Issue 12December 2003pp 325–331https://doi.org/10.1145/953460.953517Published:01 December 2003Publication History 71citation4,723DownloadsMetricsTotal Citations71Total Downloads4,723Last 12 Months173Last 6 weeks19 Get Citation...