[HTML][HTML] How is privacy behavior formulated? a review of current research and synthesis of information privacy behavioral factors

I Paspatis, A Tsohou, S Kokolakis - Multimodal Technologies and …, 2023 - mdpi.com
What influences Information Communications and Technology (ICT) users' privacy
behavior? Several studies have shown that users state to care about their personal data …

A qualitative systematic review of trust in technology

S Schuetz, L Kuai, MC Lacity… - Journal of Information …, 2024 - journals.sagepub.com
Although many information systems (IS) scholars have researched the antecedents and
consequences of trust in technology, the sheer amount of work published, authors' use of …

Data security crisis in universities: Identification of key factors affecting data breach incidents

J Li, W ** a data breach protection capability framework in retailing
MR Uddin, S Akter, WJT Lee - International Journal of Production …, 2024 - Elsevier
Protecting data in retail operations is vital in the age of data-driven digital transformation.
Businesses face a constant challenge from data breaches due to the unpredictable and …

Vendor selection in the wake of data breaches: A longitudinal study

Q Wang, S Jiang, EWT Ngai… - Journal of Operations …, 2024 - Wiley Online Library
With the increasing digitization and networking of medical data and personal health
information, information security has become a critical factor in vendor selection. However …

Abnormal returns to artificial intelligence patent infringement litigations

JS Teli, A Rai, YK Lin - Journal of Management Information …, 2024 - Taylor & Francis
Artificial intelligence (AI) has become an important driver of economic growth and
innovation. With rapid advances in AI, firms have a strategic opportunity to re-envision the …

Post hoc security and privacy concerns in mobile apps: the moderating roles of mobile apps' features and providers

HR Nikkhah, V Grover, R Sabherwal - Information & Computer …, 2024 - emerald.com
Purpose This study aims to argue that user's continued use behavior is contingent upon two
perceptions (ie the app and the provider). This study examines the moderating effects of …

Investigating the use of protective technologies after data breach: The roles of psychological distance, technological service type and organizational justice

EW Ayaburi, FK Andoh-Baidoo, J Lee, M Siponen - Computers & Security, 2024 - Elsevier
Protective information technologies (PITs) are crucial for preventing security and privacy
issues, but their application by customers following a data breach has not been thoroughly …

Digitally-enabled antecedents of trust, repurchase intention and the impact of blockchain traceability labels

L Zhang, Z Shao, T Zhao, X Li, J Zhang - Electronic Commerce Research …, 2024 - Elsevier
Despite the growing literature focusing on digitalization in e-commerce, there remains a
scarcity of studies exploring innovative ways to enhance online consumers' trust. Our study …