The extent and impact of intellectual capital research: a two decade analysis

U Bamel, V Pereira, M Del Giudice… - Journal of Intellectual …, 2022 - emerald.com
Purpose This paper examines the leading publication trends including the extent and impact
of intellectual capital research in the Journal of Intellectual Capital (JIC) over a two-decade …

Toward an intellectual capital cyber security theory: insights from Lebanon

P Balozian, D Leidner, B Xue - Journal of Intellectual Capital, 2022 - emerald.com
Purpose Intellectual capital (IC) cyber security is a priority in all organizations. Because of
the dearth in IC cyber security (ICCS) research theories and the constant call to theory …

Transparency of artificial intelligence in healthcare: insights from professionals in computing and healthcare worldwide

J Bernal, C Mazo - Applied Sciences, 2022 - mdpi.com
Although it is widely assumed that Artificial Intelligence (AI) will revolutionise healthcare in
the near future, considerable progress must yet be made in order to gain the trust of …

Do intellectual property rights promote foreign direct investment inflows and technological exports in develo** and developed countries?

F ALshubiri, MK Al Ani - foresight, 2024 - emerald.com
Purpose This study aims to analyse the intellectual property rights (INPR), foreign direct
investment (FDI) inflows and technological exports of 32 develo** and developed …

Synthesizing Information Security Policy Compliance And Non-compliance: A Comprehensive Study And Unified Framework

A Aggarwal, SK Srivastava - Journal of Organizational Computing …, 2024 - Taylor & Francis
In today's organizational landscape, safeguarding information against both intentional and
unintentional insider threats has become a paramount concern. To address this challenge …

Cultural drivers behind employees neutralizing deviant information systems security behaviors

Y Mohammed, M Warkentin, T Beshah - Journal of Knowledge …, 2025 - emerald.com
Purpose This study aims to investigate how cultural factors–specifically power distance (PD)
and uncertainty avoidance (UA)–affect employees' use of neutralization techniques to …

Procedural information security countermeasure awareness and cybersecurity protection motivation in enhancing employee's cybersecurity protective behaviour

N Humaidi, SHA Alghazo - 2022 10th International Symposium …, 2022 - ieeexplore.ieee.org
Radical changes in the Industrial Revolution 4.0 (IR4. 0) have provoked several
organizations in developed and emerging economies to constantly re-evaluate …

High-risk deviant decisions: does neutralization still play a role?

BS Trinkle, M Warkentin, K Malimage… - Journal of the …, 2021 - aisel.aisnet.org
Extant research has shown that neutralization processes can enable potential IS security
policy violators to justify their behavior and overcome the deterrence effect of sanctions in …

Legal aspects of corporate systems for preventing cybercrime among personnel

B Dong, S Chernov, KO Akpinar - Crime, Law and Social Change, 2024 - Springer
The activities of enterprise employees can become a risk factor in terms of cybercrime, which
is often associated with their lack of preparedness to counter potential cyber threats. Many …

A game theory-based model for the dissemination of privacy information in online social networks

J He, Y Li, N Zhu - Future Internet, 2023 - mdpi.com
Online social networks (OSNs) have experienced rapid growth in recent years, and an
increasing number of people now use OSNs, such as Facebook and Twitter, to share and …