Stock market reactions to favorable and unfavorable information security events: A systematic literature review

SEA Ali, FW Lai, PDD Dominic, NJ Brown… - Computers & …, 2021 - Elsevier
The rapid digital transformations across every industry sector, accelerated partly due to the
COVID-19 pandemic, have increased organizations' use of information systems for …

[HTML][HTML] A cross-cultural study of the intention to use mobile banking between Lebanese and British consumers: Extending UTAUT2 with security, privacy and trust

M Merhi, K Hone, A Tarhini - Technology in Society, 2019 - Elsevier
This study aims to examine the key factors that may hinder or facilitate the adoption of
mobile banking services in a cross-cultural context. A conceptual framework was developed …

[HTML][HTML] Managing privacy in the digital economy

C Wang, N Zhang, C Wang - Fundamental Research, 2021 - Elsevier
In this era of the digital economy, proper management of digital privacy is critical for end-
users, service providers, platform vendors, and the government. Addressing the increasing …

The rise of human machines: How cognitive computing systems challenge assumptions of user-system interaction

S Schuetz, V Venkatesh - Journal of the Association for Information …, 2020 - papers.ssrn.com
Cognitive computing systems (CCS) are a new class of computing systems that implement
more human-like cognitive abilities. CCS are not a typical technological advancement but an …

Mobile application security: Role of perceived privacy as the predictor of security perceptions

A Balapour, HR Nikkhah, R Sabherwal - International Journal of Information …, 2020 - Elsevier
Despite mobile applications being at the frontier of mobile computation technologies,
security issues pose a threat to their adoption and diffusion. Recent studies suggest that …

Digital health innovation: exploring adoption of COVID-19 digital contact tracing apps

S Sharma, G Singh, R Sharma, P Jones… - IEEE transactions on …, 2020 - ieeexplore.ieee.org
With the outbreak of COVID-19, contact tracing is becoming a used intervention to control
the spread of this highly infectious disease. This article explores an individual's intention to …

What influences the purchase of virtual gifts in live streaming in China? A cultural context‐sensitive model

Z Guan, F Hou, B Li, CW Phang… - Information Systems …, 2022 - Wiley Online Library
China is one of the largest and fastest‐growing markets for live streaming, and the purchase
of virtual gifts in live streaming is the core for streamers and live streaming platforms in …

Health information privacy concerns, antecedents, and information disclosure intention in online health communities

X Zhang, S Liu, X Chen, L Wang, B Gao… - Information & Management, 2018 - Elsevier
This study explores the antecedents and consequences of health information privacy
concerns in online health communities by integrating the dual calculus and protection …

Privacy Concerns and Data Sharing in the Internet of Things: Mixed Methods Evidence from Connected Cars.

P Cichy, TO Salge, R Kohli - MIS quarterly, 2021 - search.ebscohost.com
Abstract The Internet of Things (IoT) is increasingly transforming the way we work, live, and
travel. IoT devices collect, store, analyze, and act upon a continuous stream of data as a by …

Why do adults engage in cyberbullying on social media? An integration of online disinhibition and deindividuation effects with the social structure and social learning …

PB Lowry, J Zhang, C Wang… - Information Systems …, 2016 - pubsonline.informs.org
The dramatic increase in social media use has challenged traditional social structures and
shifted a great deal of interpersonal communication from the physical world to cyberspace …