[HTML][HTML] A systematic analysis of failures in protecting personal health data: a sco** review
Personal health data breaches pose significant challenges to healthcare providers and
clients. This study systematically analyzes 5470 records and reviews 120 articles on this …
clients. This study systematically analyzes 5470 records and reviews 120 articles on this …
Impact of digital leadership capability on innovation performance: The role of platform digitization capability
Following a mixed-methods approach, we theorized that digital leadership influences
innovation performance by digitalizing the firm's platform. A multiple case study of ten …
innovation performance by digitalizing the firm's platform. A multiple case study of ten …
[HTML][HTML] Social media-induced fear of missing out (FoMO) and social media fatigue: The role of narcissism, comparison and disclosure
The pervasiveness of social media platforms (SMP) has resulted in users experiencing
feelings associated with the phenomena of fear of missing out (FoMO) and social media …
feelings associated with the phenomena of fear of missing out (FoMO) and social media …
Information avoidance behavior on social network sites: Information irrelevance, overload, and the moderating role of time pressure
Y Guo, Z Lu, H Kuang, C Wang - International Journal of Information …, 2020 - Elsevier
Drawing on the stressor-strain-outcome framework, this study investigates how information
irrelevance and overload induce social network fatigue, and the relationship of these …
irrelevance and overload induce social network fatigue, and the relationship of these …
Bring Your Own Device (BYOD) as reversed IT adoption: Insights into managers' co** strategies
Abstract The adoption of Bring Your Own Device (BYOD), initiated by employees, refers to
the provision and use of personal mobile devices and applications for both private and …
the provision and use of personal mobile devices and applications for both private and …
Understanding inconsistent employee compliance with information security policies through the lens of the extended parallel process model
Organizational information security (ISec) threats have exploded with advances in
globalization and technology. Thus, organizations are scrambling to find both technical and …
globalization and technology. Thus, organizations are scrambling to find both technical and …
Employees' in-role and extra-role information security behaviors from the PE fit perspective
Organizations are increasingly seeking ways to encourage employee in-role and extra-role
information security (InfoSec) behaviors for enhancing organizational InfoSec. One …
information security (InfoSec) behaviors for enhancing organizational InfoSec. One …
Beyond adaptive security co** behaviors: Theory and empirical evidence
Extant research seldom focuses on maladaptive security co** behaviors. Applying the
extended parallel process model, this study has developed a research model to reveal the …
extended parallel process model, this study has developed a research model to reveal the …
Linking perceived organizational politics to workplace cyberbullying perpetration: the role of anger and fear
The introduction of information and communication technologies in the workplace has
extended the scope of bullying behaviors at work to the online context. However, less is …
extended the scope of bullying behaviors at work to the online context. However, less is …
An analysis of fear factors predicting enterprise social media use in an era of communication visibility
Purpose The benefits associated with visibility in organizations depend on employees'
willingness to engage with technologies that utilize visible communication and make …
willingness to engage with technologies that utilize visible communication and make …