Cyberloafing: A review and research agenda

VKG Lim, TSH Teo - Applied Psychology, 2024 - Wiley Online Library
In an increasingly digitized world, the concept of cyberloafing has gained much attention as
employees use the Internet for personal purposes during work hours. Over the last two …

EPM 20/20: A review, framework, and research agenda for electronic performance monitoring

DM Ravid, DL Tomczak, JC White… - Journal of …, 2020 - journals.sagepub.com
Electronic performance monitoring (EPM) refers to the use of technological means to
observe, record, and analyze information that directly or indirectly relates to job …

Algorithmic control and gig workers: a legitimacy perspective of Uber drivers

M Wiener, WA Cram, A Benlian - European Journal of Information …, 2023 - Taylor & Francis
Organisations increasingly rely on algorithms to exert automated managerial control over
workers, referred to as algorithmic control (AC). The use of AC is already commonplace with …

The rise of human machines: How cognitive computing systems challenge assumptions of user-system interaction

S Schuetz, V Venkatesh - Journal of the Association for Information …, 2020 - papers.ssrn.com
Cognitive computing systems (CCS) are a new class of computing systems that implement
more human-like cognitive abilities. CCS are not a typical technological advancement but an …

Seeing the forest and the trees

WA Cram, J D'arcy, JG Proudfoot - MIS quarterly, 2019 - JSTOR
A rich stream of research has identified numerous antecedents to employee compliance
(and noncompliance) with information security policies. However, the number of competing …

Using design-science based gamification to improve organizational security training and compliance

M Silic, PB Lowry - Journal of management information systems, 2020 - Taylor & Francis
We conducted a design-science research project to improve an organization's compound
problems of (1) unsuccessful employee phishing prevention and (2) poorly received internal …

Why do adults engage in cyberbullying on social media? An integration of online disinhibition and deindividuation effects with the social structure and social learning …

PB Lowry, J Zhang, C Wang… - Information Systems …, 2016 - pubsonline.informs.org
The dramatic increase in social media use has challenged traditional social structures and
shifted a great deal of interpersonal communication from the physical world to cyberspace …

What are the trend and core knowledge of information security? A citation and co-citation analysis

WL Shiau, X Wang, F Zheng - Information & Management, 2023 - Elsevier
Abstract Information technology brings business success opportunities, but also causes
potential safety hazards to organizations. In response to the increasing academia and …

What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors

SR Boss, DF Galletta, PB Lowry, GD Moody, P Polak - MIS quarterly, 2015 - JSTOR
Because violations of information security (ISec) and privacy have become ubiquitous in
both personal and work environments, academic attention to ISec and privacy has taken on …

Organizational information security policies: a review and research framework

WA Cram, JG Proudfoot, J D'arcy - European Journal of Information …, 2017 - Taylor & Francis
A major stream of research within the field of information systems security examines the use
of organizational policies that specify how users of information and technology resources …