Zobrazeno 1 - 10
of 15
pro vyhledávání: '"Philip Menard"'
Publikováno v:
Information Systems Journal. 32:888-926
Publikováno v:
Information Systems Journal.
Publikováno v:
Proceedings on cybersecurity education, research and practice.
This study implemented an expert panel to assess the content validity of hypothetical scenarios to be used in a survey of cybersecurity risk across project meta-phases. Six out of 10 experts solicited completed the expert panel exercise. Results indi
Publikováno v:
European Journal of Information Systems. 32:287-314
Data breaches and cyber incidents are on the rise, and companies continually research new technologies to defend against attacks and protect customer data. The blockchain is a data store designed t...
Autor:
Miloslava Plachkinova, Philip Menard
Publikováno v:
Information Systems Frontiers. 24:1395-1416
The Internet of Things (IoT) has gained popularity among home consumers due to its characteristics related to automation, information gathering, and purported physical security benefits. In an effort to capitalize on an expanding market, IoT develope
Publikováno v:
Information & Management. 56:754-766
Evidence of cyber activities in developing nations has renewed discourse on users’ intention to protect information in the global economy. We present a context theorization in which espoused individualism–collectivism and uncertainty avoidance ar
Autor:
Karen S. McNeal, Merrill Warkentin, Kathleen Sherman-Morris, Philip Menard, Lesley Strawderman, Daniel W. Carruth
Publikováno v:
Natural Hazards. 92:927-942
This study explores the influence of three factors on a person’s decision to drive in winter weather: destination, affected area, and caution level. Participants (n = 555) completed an online survey that included scenarios with text of a simulated
Publikováno v:
Journal of the Association for Information Systems. 18:758-786
Publikováno v:
Journal of Management Information Systems. 34:1203-1230
Managers desiring to protect information systems must understand how to most effectively motivate users to engage in secure behaviors. Information security researchers have frequently studied indiv...
Publikováno v:
Journal of Computer Information Systems. 59:32-42
Organizations have recognized the revenue potential for social commerce (purchasing products via social networks), but such transactions only comprise a small percentage of revenue. Companies have yet to determine the factors that contribute to socia