[HTML][HTML] A systematic analysis of failures in protecting personal health data: A sco** review

J Pool, S Akhlaghpour, F Fatehi… - International Journal of …, 2024 - Elsevier
Personal health data breaches pose significant challenges to healthcare providers and
clients. This study systematically analyzes 5470 records and reviews 120 articles on this …

Cyber risk and cybersecurity: a systematic review of data availability

F Cremer, B Sheehan, M Fortmann… - The Geneva papers …, 2022 - pmc.ncbi.nlm.nih.gov
Cybercrime is estimated to have cost the global economy just under USD 1 trillion in 2020,
indicating an increase of more than 50% since 2018. With the average cyber insurance …

[HTML][HTML] Information security risk assessments following cybersecurity breaches: The mediating role of top management attention to cybersecurity

FA Shaikh, M Siponen - Computers & Security, 2023 - Elsevier
Abstract Information Systems (IS) research on managerial response to cybersecurity
breaches has largely focused on externally oriented actions such as customer redressal and …

Antecedents and consequences of data breaches: A systematic review

F Schlackl, N Link, H Hoehle - Information & Management, 2022 - Elsevier
Research on data breaches is scattered across disciplines and methodologies. To help
consolidate it, we review 43 articles on data breaches' antecedents and 83 on their …

Enabling cybersecurity incident response agility through dynamic capabilities: the role of real-time analytics

H Naseer, K Desouza, SB Maynard… - European Journal of …, 2024 - Taylor & Francis
We explore how organisations enable agility in their cybersecurity incident response (IR)
process by develo** dynamic capabilities using real-time analytics (RTA). Drawing on …

Information systems security research agenda: Exploring the gap between research and practice

G Dhillon, K Smith, I Dissanayaka - The Journal of Strategic Information …, 2021 - Elsevier
This paper undertakes a systematic review of the Information Systems Security literature.
The literature review consists of three parts: First, we perform topic modeling of major …

[PDF][PDF] An empirical investigation of company response to data breaches

HR Nikkhah, V Grover - MIS Quarterly, 2022 - wordpressua.uark.edu
Companies may face serious adverse consequences as a result of a data breach event. To
repair the potential damage to relationships with stakeholders after data breaches …

Data breach announcements and stock market reactions: a matter of timing?

J Foerderer, SW Schuetz - Management Science, 2022 - pubsonline.informs.org
Although firms' announcement of data breaches can lead to reputational or operational
damages, extant research suggests that stock markets are relatively unresponsive to such …

Why security and privacy research lies at the centre of the information systems (IS) artefact: Proposing a bold research agenda

PB Lowry, T Dinev, R Willison - European Journal of Information …, 2017 - Taylor & Francis
In this essay, we outline some important concerns in the hope of improving the effectiveness
of security and privacy research. We discuss the need to re-examine our understanding of …

Mental models and expectation violations in conversational AI interactions

GM Grimes, RM Schuetzler, JS Giboney - Decision Support Systems, 2021 - Elsevier
Artificial Intelligence is increasingly becoming integrated in many aspects of human life. One
particular AI comes in the form of conversational agents (CAs) such as Siri, Alexa, and …