[HTML][HTML] A systematic analysis of failures in protecting personal health data: a sco** review

J Pool, S Akhlaghpour, F Fatehi… - International Journal of …, 2024 - Elsevier
Personal health data breaches pose significant challenges to healthcare providers and
clients. This study systematically analyzes 5470 records and reviews 120 articles on this …

Impact of digital leadership capability on innovation performance: The role of platform digitization capability

J Benitez, A Arenas, A Castillo, J Esteves - Information & Management, 2022 - Elsevier
Following a mixed-methods approach, we theorized that digital leadership influences
innovation performance by digitalizing the firm's platform. A multiple case study of ten …

[HTML][HTML] Social media-induced fear of missing out (FoMO) and social media fatigue: The role of narcissism, comparison and disclosure

F Jabeen, A Tandon, J Sithipolvanichgul… - Journal of Business …, 2023 - Elsevier
The pervasiveness of social media platforms (SMP) has resulted in users experiencing
feelings associated with the phenomena of fear of missing out (FoMO) and social media …

Information avoidance behavior on social network sites: Information irrelevance, overload, and the moderating role of time pressure

Y Guo, Z Lu, H Kuang, C Wang - International Journal of Information …, 2020 - Elsevier
Drawing on the stressor-strain-outcome framework, this study investigates how information
irrelevance and overload induce social network fatigue, and the relationship of these …

Bring Your Own Device (BYOD) as reversed IT adoption: Insights into managers' co** strategies

Y Barlette, A Jaouen, P Baillette - International journal of information …, 2021 - Elsevier
Abstract The adoption of Bring Your Own Device (BYOD), initiated by employees, refers to
the provision and use of personal mobile devices and applications for both private and …

Understanding inconsistent employee compliance with information security policies through the lens of the extended parallel process model

Y Chen, DF Galletta, PB Lowry, X Luo… - Information Systems …, 2021 - pubsonline.informs.org
Organizational information security (ISec) threats have exploded with advances in
globalization and technology. Thus, organizations are scrambling to find both technical and …

Employees' in-role and extra-role information security behaviors from the PE fit perspective

Y Yin, C Hsu, Z Zhou - Computers & Security, 2023 - Elsevier
Organizations are increasingly seeking ways to encourage employee in-role and extra-role
information security (InfoSec) behaviors for enhancing organizational InfoSec. One …

Beyond adaptive security co** behaviors: Theory and empirical evidence

Y Chen, XR Luo, H Li - Information & Management, 2022 - Elsevier
Extant research seldom focuses on maladaptive security co** behaviors. Applying the
extended parallel process model, this study has developed a research model to reveal the …

Linking perceived organizational politics to workplace cyberbullying perpetration: the role of anger and fear

OF Malik, S Pichler - Journal of Business Ethics, 2023 - Springer
The introduction of information and communication technologies in the workplace has
extended the scope of bullying behaviors at work to the online context. However, less is …

An analysis of fear factors predicting enterprise social media use in an era of communication visibility

W Van Zoonen, JW Treem, A Sivunen - Internet Research, 2022 - emerald.com
Purpose The benefits associated with visibility in organizations depend on employees'
willingness to engage with technologies that utilize visible communication and make …