- Technology Adoption and User Behaviour
- Spam and Phishing Detection
- Information Systems Education and Curriculum Development
- Digital Marketing and Social Media
- Customer Service Quality and Loyalty
- Knowledge Management and Sharing
- Misinformation and Its Impacts
- Cybercrime and Law Enforcement Studies
- Information and Cyber Security
- Big Data and Business Intelligence
- Open Education and E-Learning
- Network Security and Intrusion Detection
- Information Systems Theories and Implementation
- Team Dynamics and Performance
- Deception detection and forensic psychology
- Information Technology Governance and Strategy
- Advanced Malware Detection Techniques
- Particle Detector Development and Performance
- FinTech, Crowdfunding, Digital Finance
- Blockchain Technology Applications and Security
- Experimental Learning in Engineering
- Impact of Technology on Adolescents
- Terrorism, Counterterrorism, and Political Violence
- Social Media and Politics
- Superconducting Materials and Applications
University of Virginia
2017-2023
College of Charleston
2023
Bournemouth University
2023
London School of Economics and Political Science
2023
University of Central Florida
2023
University of Pretoria
2023
Aalto University
2023
AID Atlanta
2023
National University of Singapore
2023
Informa (Sweden)
2023
Transformative artificially intelligent tools, such as ChatGPT, designed to generate sophisticated text indistinguishable from that produced by a human, are applicable across wide range of contexts. The technology presents opportunities well as, often ethical and legal, challenges, has the potential for both positive negative impacts organisations, society, individuals. Offering multi-disciplinary insight into some these, this article brings together 43 contributions experts in fields...
IS 2010 is the latest in a series of model curricula for undergraduate degrees Information Systems. It builds on foundation formed by this earlier work, but it major revision curriculum and incorporates several significant new characteristics. third collaborative effort ACM AIS. Both organizations have worldwide membership, and, therefore, includes elements that make more universally adaptable than its predecessors. not directly linked to degree structure any specific environment provides...
Recent work, in journals such as MIS Quarterly and Management Science, has highlighted the importance of evaluating influence common method bias (CMB) on results statistical analysis. In this research note, we assess utility unmeasured latent construct (ULMC) approach partial least squares (PLS), introduced by Liang et al. (2007). Such an assessment ULMC is important, because it been employed 76 studies since appeared early 2007. Using data generated via Monte Carlo simulations, use PLS...
Mindfulness is an important emerging topic. Individual mindfulness in IT use has not been studied systematically. Through three programmatic empirical studies, this paper develops a scale for and tests its utility the post-adoption sys
Although scholars have provided advice regarding how to conceptualize multidimensional constructs, less attention has been directed on evaluate structural equation models that include constructs. Further, the extant information systems literature little, and sometimes contradictory, direction operationalize This gap in we approach constructs merits because: (1) establishing construct validity is critical testing theory (2) recent advances software enable with more readily. Therefore, this...
Abstract Phishing has been a major problem for information systems managers and users several years now. In 2008, it was estimated that phishing resulted in close to $50 billion damages U.S. consumers businesses. Even so, research yet explore many of the reasons why Internet continue be exploited. The goal this paper is better understand behavioral factors may increase one's susceptibility complying with phisher's request personal information. Using past on deception detection, model...
Phishing attacks are at a record high and causing billions of dollars in losses. To mitigate phishing's impact, organizations often use rule-based training to teach individuals identify certain cues or apply set rules avoid phishing attacks. The approach has improved organizational defenses against phishing; however, regular repetition may not yield increasing resistance expand the toolkit available combat attacks, we used mindfulness theory develop novel that can be performed after familiar...
Phishing is a major threat to individuals and organizations. Along with billions of dollars lost annually, phishing attacks have led significant data breaches, loss corporate secrets, espionage. Despite the threat, potential targets little theoretical or practical guidance on which tactics are most dangerous require heightened caution. The current study extends persuasion motivation theory postulate why certain influence techniques especially when used in attacks. We evaluated our hypotheses...
Trust in technology is an emerging research domain that examines trust the artifact instead of people. Although previous finds can predict important outcomes, little has examined effect unmet expectations on trusting intentions. Furthermore, both and expectation disconfirmation theories suggest effects may be more complex than linear model depicts. However, this complexity only exist under certain contextual conditions. The current study contributes to literature by introducing a nonlinear...
Anomaly detectors are often used to produce a ranked list of statistical anomalies, which examined by human analysts in order extract the actual anomalies interest. This can be exceedingly difficult and time consuming when most high-ranking false positives not interesting from an application perspective. In this paper, we study how reduce analyst's effort incorporating their feedback about whether they investigate interest or not. particular, will adjust anomaly ranking after every analyst...
As the highest level of cloud computing delivery model, Software-as-a-Service (SaaS) has gained considerable popularity in industry as a new way deploying IT solutions, due to its low cost and high elasticity. However, business model associated with SaaS highlights importance for vendors understand how retain customers hyper-competitive market. In particular, increasing customer retention preventing from replacing adopted applications become crucial task all vendors. this study, using...
Phishing is an increasing threat that causes billions in losses and damage to productivity, trade secrets, reputations each year. This work explores how security gamification techniques can improve phishing reporting. We contextualized the cognitive evaluation theory (CET) as a kernel constructed prototype reporting system. With three experiments simulated setting, we tested elements of validation, attribution, incentives, public presentation for improvements experiential (e.g., motivation)...
How information systems impact task performance has attracted a significant amount of attention from researchers and generated high interest among practitioners. A commonly accepted view is that the potential must be realized through system use. Nevertheless, existing findings regarding use on are not yet conclusive. We attributed this to various conceptualizations unclear mechanisms which influences performance. Thus, research attempts create better understanding how To end, we developed an...
Social media for emergency management has emerged as a vital resource government agencies across the globe.In this study, we explore social strategies employed by governments to respond major weather-related events.Using monitoring software, analyze how is used in six cities following storms winter of 2012.We listen, monitor, and assess online discourse available on full range outlets (e.g., Twitter, Facebook, blogs).To glean further insight, conduct survey extract themes from citizen...
This paper summarizes the key elements of a panel presentation at Americas Conference for Information Systems (AMCIS) 2007 that reviewed current status joint Association Computing Machinery (ACM)/Association (AIS) undergraduate information systems model curriculum revision project. After providing brief historical overview IS curricula and describing reasons why is overdue, focuses on three main aspects proposal. These include: 1) extending reach applicability beyond business schools making...
This paper explores how an organization can utilize its employees to combat phishing attacks collectively through coordinating their activities create a human firewall. We knowledge management research on sharing guide the design of experiment that central reporting and dissemination platform for attacks. The 2x2 tests effects public attribution (to first person message) validation (by security team) messages motivation accuracy. Results demonstrate techniques are transferable organizational...