Privacy champions in software teams: Understanding their motivations, strategies, and challenges

M Tahaei, A Frik, K Vaniea - Proceedings of the 2021 CHI Conference …, 2021 - dl.acm.org
Software development teams are responsible for making and implementing software design
decisions that directly impact end-user privacy, a challenging task to do well. Privacy …

Identification of key cyberbullies: A text mining and social network analysis approach

YJ Choi, BJ Jeon, HW Kim - Telematics and Informatics, 2021 - Elsevier
Cyberbullying is a major problem in society, and the damage it causes is becoming
increasingly significant. Previous studies on cyberbullying focused on detecting and …

Cyber-resiliency for digital enterprises: a strategic leadership perspective

J Loonam, J Zwiegelaar, V Kumar… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
As organizations increasingly view information as one of their most valuable assets, which
supports the creation and distribution of their products and services, information security will …

Linking cybersecurity and accounting: An event, impact, response framework

DJ Janvrin, T Wang - Accounting Horizons, 2022 - publications.aaahq.org
Due to recent high-profile cybersecurity breaches and increased practitioner and regulatory
attention, organizations are under pressure to consider the accounting implications of these …

Can peers help reduce violations of information security policies? The role of peer monitoring

A Yazdanmehr, J Wang - European Journal of Information Systems, 2023 - Taylor & Francis
Peers may help others avoid violating organisational information security policies (ISPs).
This study explores how peer monitoring reduces employee ISP violation intention. We …

[HTML][HTML] Multiplex Social Network Analysis to Understand the Social Engagement of Patients in Online Health Communities

Y Lu, X Wang, L Su, H Zhao - Mathematics, 2023 - mdpi.com
Social network analysis has been widely used in various fields including online health
communities. However, it is still a challenge to understand how patients' individual …

Computer network information security protection faced by digital art museums based on the internet of things

Q Wang, L Li, S Hu - Wireless Communications and Mobile …, 2021 - Wiley Online Library
The development of the Internet of things provides a great opportunity for the development of
all walks of life, but it also brings many risks in the process, of which the most important thing …

Investigating the diffusion of IT consumerization in the workplace: A case study using social network analysis

D Dang-Pham, S Pittayachawan, V Bruno… - Information Systems …, 2019 - Springer
IT consumerization, or the end-user's adoption of consumer IT for work purpose, is an
emerging topic which recently attracted the attention of researchers and practitioners. This …

Employees' Cybersecurity Behaviour in the Mobile Context: The Role of Self-Efficacy and Psychological Ownership

SF Verkijika - 2020 2nd International Multidisciplinary …, 2020 - ieeexplore.ieee.org
Mobile devices are widely known to be a cybersecurity risk for organisations. However, their
use for work purposes is largely becoming a common practice as most organisations rather …

Explaining the development of information security climate and an information security support network: a longitudinal social network analysis

D Dang-Pham, K Kautz, S Pittayachawan… - … Journal of Information …, 2019 - journal.acs.org.au
Behavioural information security (InfoSec) research has studied InfoSec at workplaces
through the employees' perceptions of InfoSec climate, which is determined by observable …