[HTML][HTML] Understanding managers' attitudes and behavioral intentions towards using artificial intelligence for organizational decision-making

G Cao, Y Duan, JS Edwards, YK Dwivedi - Technovation, 2021 - Elsevier
While using artificial intelligence (AI) could improve organizational decision-making, it also
creates challenges associated with the “dark side” of AI. However, there is a lack of research …

Protection motivation theory in information systems security research: A review of the past and a road map for the future

S Haag, M Siponen, F Liu - ACM SIGMIS Database: the DATABASE for …, 2021 - dl.acm.org
Protection motivation theory (PMT) is one of the most commonly used theories to examine
information security behaviors. Our systematic review of the application of PMT in …

Cognition in social engineering empirical research: a systematic literature review

P Burda, L Allodi, N Zannone - ACM Transactions on Computer-Human …, 2024 - dl.acm.org
The interdisciplinarity of the Social Engineering (SE) domain creates crucial challenges for
the development and advancement of empirical SE research, making it particularly difficult to …

Understanding online safety behaviors: A protection motivation theory perspective

HS Tsai, M Jiang, S Alhabash, R LaRose, NJ Rifon… - Computers & …, 2016 - Elsevier
Internet users experience a variety of online security threats that require them to enact safety
precautions. Protection motivation theory (PMT) provides a theoretical framework for …

A test of protection motivation theory in the information security literature: A meta-analytic structural equation modeling approach

J Mou, JF Cohen, A Bhattacherjee… - Journal of the Association …, 2022 - aisel.aisnet.org
Abstract Information security is one of the important domains of information systems
research today, with protection motivation theory (PMT) one of its most influential theoretical …

Individuals' internet security perceptions and behaviors

Y Chen, FM Zahedi - Mis Quarterly, 2016 - JSTOR
Little is known about the context sensitivity of users' online security perceptions and
behaviors to national and individual attributes, and there is inadequate research about the …

Why security and privacy research lies at the centre of the information systems (IS) artefact: Proposing a bold research agenda

PB Lowry, T Dinev, R Willison - European Journal of Information …, 2017 - Taylor & Francis
In this essay, we outline some important concerns in the hope of improving the effectiveness
of security and privacy research. We discuss the need to re-examine our understanding of …

" 8 amazing secrets for getting more clicks": detecting clickbaits in news streams using article informality

P Biyani, K Tsioutsiouliklis, J Blackmer - Proceedings of the AAAI …, 2016 - ojs.aaai.org
Clickbaits are articles with misleading titles, exaggerating the content on the landing page.
Their goal is to entice users to click on the title in order to monetize the landing page. The …

A novel approach to fake news detection in social networks using genetic algorithm applying machine learning classifiers

D Choudhury, T Acharjee - Multimedia Tools and Applications, 2023 - Springer
Now-a-days fake news have become part and parcel of our everyday life due to its quick
spreading in different social media. Fake news identification has been emerging as an …

Securing online privacy: An empirical test on Internet scam victimization, online privacy concerns, and privacy protection behaviors

H Chen, CE Beaudoin, T Hong - Computers in human behavior, 2017 - Elsevier
The current study identified the antecedents of being an Internet scam victim and how it
impacts online privacy concerns and privacy protection behaviors. Structural equation …