Why security and privacy research lies at the centre of the information systems (IS) artefact: proposing a bold research agenda
Published 2017 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
Why security and privacy research lies at the centre of the information systems (IS) artefact: proposing a bold research agenda
Authors
Keywords
security, privacy, information technology (IT) artefact, information systems (IS) artefact, future research, online platforms, the Internet of things (IoT), big data, deterrence theory (DT), rational choice theory (RCT)
Journal
EUROPEAN JOURNAL OF INFORMATION SYSTEMS
Volume 26, Issue 6, Pages 546-563
Publisher
Informa UK Limited
Online
2017-11-21
DOI
10.1057/s41303-017-0066-x
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Sub-Cultural Differences in Information Ethics across China: Focus On Chinese Management Generation Gaps
- (2018) Maris Martinsons et al. Journal of the Association for Information Systems
- Toward a New Meta-Theory for Designing Information Systems (IS) Security Training Approaches
- (2018) Mari Karjalainen et al. Journal of the Association for Information Systems
- Infusing Ethical Considerations in Knowledge Management Scholarship: Toward a Research Agenda
- (2018) Sutirtha Chatterjee et al. Journal of the Association for Information Systems
- Examining the intended and unintended consequences of organisational privacy safeguards
- (2017) Rachida Parks et al. EUROPEAN JOURNAL OF INFORMATION SYSTEMS
- Information systems security policy implementation in practice: from best practices to situated practices
- (2017) Elina Niemimaa et al. EUROPEAN JOURNAL OF INFORMATION SYSTEMS
- Communicating Personal Health Information in Virtual Health Communities: An Integration of Privacy Calculus Model and Affective Commitment
- (2017) Nima Kordzadeh et al. Journal of the Association for Information Systems
- Got Phished? Internet Security and Human Vulnerability
- (2017) Sanjay Goel et al. Journal of the Association for Information Systems
- Robbing Peter to Pay Paul: Surrendering Privacy for Security’s Sake in an Identity Ecosystem
- (2017) Robert Crossler et al. Journal of the Association for Information Systems
- Cybercrime Deterrence and International Legislation: Evidence from Distributed Denial of Service Attacks
- (2017) Kai-Lung Hui et al. MIS QUARTERLY
- User Compensation as a Data Breach Recovery Action: An Investigation of the Sony PlayStation Network Breach
- (2017) Sigi Goode et al. MIS QUARTERLY
- Platform Ecosystems: How Developers Invert the Firm
- (2017) Geoffrey Parker et al. MIS QUARTERLY
- The Design Theory Nexus
- (2017) Pries-Heje et al. MIS QUARTERLY
- How Ethics Can Enhance Organizational Privacy: Lessons from the Choicepoint and TJX Data Breaches
- (2017) Culnan et al. MIS QUARTERLY
- Adoption of Electronic Health Records in the Presence of Privacy Concerns: The Elaboration Likelihood Model and Individual Persuasion
- (2017) Angst et al. MIS QUARTERLY
- User Participation in Information Systems Security Risk Management
- (2017) Spears et al. MIS QUARTERLY
- Toward Ethical Information Systems: The Contribution of Discourse Ethics
- (2017) Mingers et al. MIS QUARTERLY
- Neutralization: New Insights into the Problem of Employee Information Systems Security Policy Violations
- (2017) Siponen et al. MIS QUARTERLY
- Fear Appeals and Information Security Behaviors: An Empirical Study
- (2017) Johnston et al. MIS QUARTERLY
- Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness
- (2017) Bulgurcu et al. MIS QUARTERLY
- Correlated Failures, Diversification, and Information Security Risk Management
- (2017) Chen et al. MIS QUARTERLY
- State of the Information Privacy Literature: Where are We Now And Where Should We Go?
- (2017) Pavlou MIS QUARTERLY
- Information Privacy Research: An Interdisciplinary Review
- (2017) Smith et al. MIS QUARTERLY
- Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems
- (2017) Bélanger et al. MIS QUARTERLY
- Insiders’ Protection of Organizational Information Assets: Development of a Systematics-Based Taxonomy and Theory of Diversity for Protection-Motivated Behaviors
- (2017) Clay Posey et al. MIS QUARTERLY
- Beyond Deterrence: An Expanded View of Employee Computer Abuse
- (2017) Robert Willison et al. MIS QUARTERLY
- Proactive Versus Reactive Security Investments in the Healthcare Sector
- (2017) Juhee Kwon et al. MIS QUARTERLY
- A brief chronology of medical device security
- (2016) A. J. Burns et al. COMMUNICATIONS OF THE ACM
- Blockchain beyond bitcoin
- (2016) Sarah Underwood COMMUNICATIONS OF THE ACM
- How users perceive and respond to security messages: a NeuroIS research agenda and empirical study
- (2016) Bonnie Brinton Anderson et al. EUROPEAN JOURNAL OF INFORMATION SYSTEMS
- Dispositional and situational factors: influences on information security policy violations
- (2016) Allen C Johnston et al. EUROPEAN JOURNAL OF INFORMATION SYSTEMS
- “Cargo Cult” science in traditional organization and information systems survey research: A case for using nontraditional methods of data collection, including Mechanical Turk and online panels
- (2016) Paul Benjamin Lowry et al. JOURNAL OF STRATEGIC INFORMATION SYSTEMS
- Overconfidence in Phishing Email Detection
- (2016) Jingguo Wang et al. Journal of the Association for Information Systems
- Organizational Violations of Externally Governed Privacy and Security Rules: Explaining and Predicting Selective Violations under Conditions of Strain and Excess
- (2016) Jeffrey Wall et al. Journal of the Association for Information Systems
- Neural Correlates of Protection Motivation for Secure IT Behaviors: An fMRI Examination
- (2016) Merrill Warkentin et al. Journal of the Association for Information Systems
- Privacy and Big Data: Scalable Approaches to Sanitize Large Transactional Databases for Sharing
- (2016) Syam Menon et al. MIS QUARTERLY
- Twenty Security Considerations for Cloud-Supported Internet of Things
- (2016) Jatinder Singh et al. IEEE Internet of Things Journal
- Publishing and getting published in EJIS: marshaling contributions for a diversity of genres
- (2015) Dov Te'eni et al. EUROPEAN JOURNAL OF INFORMATION SYSTEMS
- The role of privacy assurance mechanisms in building trust and the moderating role of privacy concern
- (2015) Gaurav Bansal et al. EUROPEAN JOURNAL OF INFORMATION SYSTEMS
- Managing the introduction of information security awareness programmes in organisations
- (2015) Aggeliki Tsohou et al. EUROPEAN JOURNAL OF INFORMATION SYSTEMS
- Exploring information privacy regulation, risks, trust, and behavior
- (2015) Caroline Lancelot Miltgen et al. INFORMATION & MANAGEMENT
- Organizational information security as a complex adaptive system: insights from three agent-based models
- (2015) A. J. Burns et al. INFORMATION SYSTEMS FRONTIERS
- The Behavioral Roots of Information Systems Security: Exploring Key Factors Related to Unethical IT Use
- (2015) Sutirtha Chatterjee et al. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS
- The Impact of Organizational Commitment on Insiders’ Motivation to Protect Organizational Information Assets
- (2015) Clay Posey et al. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS
- Handle with care: How online social network providers’ privacy policies impact users’ information sharing behavior
- (2015) Jin Gerlach et al. JOURNAL OF STRATEGIC INFORMATION SYSTEMS
- Fake-Website Detection Tools: Identifying Elements that Promote Individuals’ Use and Enhance Their Performance
- (2015) Fatemeh Zahedi et al. Journal of the Association for Information Systems
- Insider Threats in a Financial Institution: Analysis of Attack-Proneness of Information Systems Applications
- (2015) Jingguo Wang et al. MIS QUARTERLY
- An Enhanced Fear Appeal Rhetorical Framework: Leveraging Threats to the Human Asset Through Sanctioning Rhetoric
- (2015) Allen C. Johnston et al. MIS QUARTERLY
- What Do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear that Motivate Protective Security Behaviors
- (2015) Scott R. Boss et al. MIS QUARTERLY
- Unique in the shopping mall: On the reidentifiability of credit card metadata
- (2015) Y.-A. de Montjoye et al. SCIENCE
- Bridging the divide: A qualitative comparison of information security thought patterns between information security professionals and ordinary organizational insiders
- (2014) Clay Posey et al. INFORMATION & MANAGEMENT
- Board-level IT governance and organizational performance
- (2013) Ofir Turel et al. EUROPEAN JOURNAL OF INFORMATION SYSTEMS
- A systematic methodology for privacy impact assessments: a design science approach
- (2013) Marie Caroline Oetzel et al. EUROPEAN JOURNAL OF INFORMATION SYSTEMS
- Guest editorial: A brief overview of data leakage and insider threats
- (2013) Carly L. Huth et al. INFORMATION SYSTEMS FRONTIERS
- Information disclosure on mobile devices: Re-examining privacy calculus with actual user behavior
- (2013) Mark J. Keith et al. INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES
- Organizations' Information Security Policy Compliance: Stick or Carrot Approach?
- (2013) Yan Chen et al. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS
- Future directions for behavioral information security research
- (2012) Robert E. Crossler et al. COMPUTERS & SECURITY
- Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts
- (2012) Tamara Dinev et al. EUROPEAN JOURNAL OF INFORMATION SYSTEMS
- Hacker Behavior, Network Effects, and the Security Software Market
- (2012) Debabrata Dey et al. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS
- Does deterrence work in reducing information security policy abuse by employees?
- (2011) Qing Hu et al. COMMUNICATIONS OF THE ACM
- A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings
- (2011) John D'Arcy et al. EUROPEAN JOURNAL OF INFORMATION SYSTEMS
- Out of fear or desire? Toward a better understanding of employees’ motivation to follow IS security policies
- (2011) Jai-Yeol Son INFORMATION & MANAGEMENT
- Privacy Concerns Versus Desire for Interpersonal Awareness in Driving the Use of Self-Disclosure Technologies: The Case of Instant Messaging in Two Cultures
- (2011) Paul Benjamin Lowry et al. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS
- Using an elaboration likelihood approach to better understand the persuasiveness of website privacy assurance cues for online consumers
- (2011) Paul Benjamin Lowry et al. JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE AND TECHNOLOGY
- Proposing the online community self-disclosure model: the case of working professionals in France and the U.K. who use online communities
- (2010) Clay Posey et al. EUROPEAN JOURNAL OF INFORMATION SYSTEMS
- The dark side of the Internet: Attacks, costs and responses
- (2010) Won Kim et al. INFORMATION SYSTEMS
- A survey on security issues in service delivery models of cloud computing
- (2010) S. Subashini et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness
- (2009) Tejaswini Herath et al. DECISION SUPPORT SYSTEMS
- An empirical study of customers’ perceptions of security and trust in e-payment systems
- (2009) Changsu Kim et al. Electronic Commerce Research and Applications
- What levels of moral reasoning and values explain adherence to information security rules? An empirical study
- (2009) Liisa Myyry et al. EUROPEAN JOURNAL OF INFORMATION SYSTEMS
- Behavioral and policy issues in information systems security: the insider threat
- (2009) Merrill Warkentin et al. EUROPEAN JOURNAL OF INFORMATION SYSTEMS
- Threat or coping appraisal: determinants of SMB executives’ decision to adopt anti-malware software
- (2009) Younghwa Lee et al. EUROPEAN JOURNAL OF INFORMATION SYSTEMS
- Protection motivation and deterrence: a framework for security policy compliance in organisations
- (2009) Tejaswini Herath et al. EUROPEAN JOURNAL OF INFORMATION SYSTEMS
- Information security management standards: Problems and solutions
- (2009) Mikko Siponen et al. INFORMATION & MANAGEMENT
- Information Security Threats: A Comparative Analysis of Impact, Probability, and Preparedness
- (2009) Mary Sumner INFORMATION SYSTEMS MANAGEMENT
- Secure activity resource coordination: empirical evidence of enhanced security awareness in designing secure business processes
- (2008) Fergle D'Aubeterre et al. EUROPEAN JOURNAL OF INFORMATION SYSTEMS
- Is There an On-line Advertisers' Dilemma? A Study of Click Fraud in the Pay-Per-Click Model
- (2008) Tamara Dinev et al. INTERNATIONAL JOURNAL OF ELECTRONIC COMMERCE
- Gaining Trust Through Online Privacy Protection: Self-Regulation, Mandatory Standards, or Caveat Emptor
- (2008) Zhulei Tang et al. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS
- Design and Ownership of Two-Sided Networks: Implications for Internet Platforms
- (2008) Yannis Bakos et al. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS
Publish scientific posters with Peeref
Peeref publishes scientific posters from all research disciplines. Our Diamond Open Access policy means free access to content and no publication fees for authors.
Learn MoreAdd your recorded webinar
Do you already have a recorded webinar? Grow your audience and get more views by easily listing your recording on Peeref.
Upload Now