Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] A systematic analysis of failures in protecting personal health data: A sco** review
Personal health data breaches pose significant challenges to healthcare providers and
clients. This study systematically analyzes 5470 records and reviews 120 articles on this …
clients. This study systematically analyzes 5470 records and reviews 120 articles on this …
Cyber risk and cybersecurity: a systematic review of data availability
Cybercrime is estimated to have cost the global economy just under USD 1 trillion in 2020,
indicating an increase of more than 50% since 2018. With the average cyber insurance …
indicating an increase of more than 50% since 2018. With the average cyber insurance …
[HTML][HTML] Information security risk assessments following cybersecurity breaches: The mediating role of top management attention to cybersecurity
Abstract Information Systems (IS) research on managerial response to cybersecurity
breaches has largely focused on externally oriented actions such as customer redressal and …
breaches has largely focused on externally oriented actions such as customer redressal and …
Antecedents and consequences of data breaches: A systematic review
Research on data breaches is scattered across disciplines and methodologies. To help
consolidate it, we review 43 articles on data breaches' antecedents and 83 on their …
consolidate it, we review 43 articles on data breaches' antecedents and 83 on their …
Enabling cybersecurity incident response agility through dynamic capabilities: the role of real-time analytics
We explore how organisations enable agility in their cybersecurity incident response (IR)
process by develo** dynamic capabilities using real-time analytics (RTA). Drawing on …
process by develo** dynamic capabilities using real-time analytics (RTA). Drawing on …
Information systems security research agenda: Exploring the gap between research and practice
This paper undertakes a systematic review of the Information Systems Security literature.
The literature review consists of three parts: First, we perform topic modeling of major …
The literature review consists of three parts: First, we perform topic modeling of major …
[PDF][PDF] An empirical investigation of company response to data breaches
Companies may face serious adverse consequences as a result of a data breach event. To
repair the potential damage to relationships with stakeholders after data breaches …
repair the potential damage to relationships with stakeholders after data breaches …
Data breach announcements and stock market reactions: a matter of timing?
Although firms' announcement of data breaches can lead to reputational or operational
damages, extant research suggests that stock markets are relatively unresponsive to such …
damages, extant research suggests that stock markets are relatively unresponsive to such …
Why security and privacy research lies at the centre of the information systems (IS) artefact: Proposing a bold research agenda
In this essay, we outline some important concerns in the hope of improving the effectiveness
of security and privacy research. We discuss the need to re-examine our understanding of …
of security and privacy research. We discuss the need to re-examine our understanding of …
Mental models and expectation violations in conversational AI interactions
Artificial Intelligence is increasingly becoming integrated in many aspects of human life. One
particular AI comes in the form of conversational agents (CAs) such as Siri, Alexa, and …
particular AI comes in the form of conversational agents (CAs) such as Siri, Alexa, and …