Skip Nav Destination
Close Modal
Update search
Filter
All
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
All
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
All
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
All
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
All
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
All
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Article Type
Issue Section
Date
Availability
1-20 of 1547
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
Journal:
Journal of Information Systems
Journal of Information Systems (2022)
Published: 23 November 2022
Journal Articles
Journal:
Journal of Information Systems
Journal of Information Systems (2022)
Published: 22 November 2022
Journal Articles
Journal:
Journal of Information Systems
Journal of Information Systems (2022)
Published: 25 October 2022
Journal Articles
Journal:
Journal of Information Systems
Journal of Information Systems (2022)
Published: 24 October 2022
Journal Articles
Journal:
Journal of Information Systems
Journal of Information Systems (2022)
Published: 11 October 2022
Journal Articles
Journal:
Journal of Information Systems
Journal of Information Systems (2022)
Published: 11 October 2022
Journal Articles
Journal:
Journal of Information Systems
Journal of Information Systems (2022) 36 (3): 235–239.
Published: 01 September 2022
Journal Articles
Journal:
Journal of Information Systems
Journal of Information Systems (2022) 36 (3): i–vi.
Published: 01 September 2022
Journal Articles
Journal:
Journal of Information Systems
Journal of Information Systems (2022) 36 (3): 61–81.
Published: 01 September 2022
Journal Articles
Journal:
Journal of Information Systems
Journal of Information Systems (2022) 36 (3): 27–60.
Published: 01 September 2022
Journal Articles
Journal:
Journal of Information Systems
Journal of Information Systems (2022) 36 (3): 83–113.
Published: 01 September 2022
Images
Published: 01 September 2022
FIGURE 1 Theoretical Model C = Construct; M = Measure. All variables are defined in Appendix A. More
Images
Published: 01 September 2022
FIGURE 2 Marginal Effects of PSS on the Probability of being Phished We predict the (marginal) effect of PSS on the probability of being phished based on the same model: The patterns in the two graphs are consistent with the arguments that cognition variables moderate the association between PSS and the susceptibility to phishing attacks. The y-axis in the figure represents the predictions of the probability of being phished by keeping all participants' PSS at specific value as indicated by the x-axis. All other variables are controlled at (sub)sample medians. Observations are first restricted to subgroups, and then estimates of predictions are calculated. For example, after restricting the observations to the bank firm and low BART group (BART_L: BART is lower than the median value of the full sample), predictions are then estimated by keeping PSS at specified values on x-axis and all other variables at median values of each subgroup. All variables are defined in Appendix A. More
Images
Published: 01 September 2022
Panel A: Adjusted Predictions of BART on Pr(phished) We predict the (marginal) effect of BART/STROOP/TASITE on the probability of being phished based on the same model: The patterns in the two graphs are consistent with the arguments that PSS differentially moderates the association between each cognition variable and the susceptibility to phishing attacks. The y-axis in the figure represents the predictions of the probability of being phished by keeping each cognition variable for all participants at specific values as indicated by the x-axis. All other variables are controlled at (sub)sample medians. Observations are first restricted to subgroups, and then estimates of predictions are calculated. For example, for BART, after restricting the observations to the bank firm and low PSS group (PSS_L: PSS is lower than the median value of the full sample), predictions are then estimated by keeping BART at specified values on the x-axis and all other variables at median values of each subgroup. All variables are defined in Appendix A. More
Images
Published: 01 September 2022
Panel B: Adjusted Predictions of STROOP on Pr(phished) More
Images
Published: 01 September 2022
Panel C: Adjusted Predictions of TASITE on Pr(phished) More
Images
in Cybersecurity Breaches in the Supply Chain and Earnings Management
> Journal of Information Systems
Published: 01 September 2022
FIGURE 1 Transaction Cost Theory Framework Figure 1 presents the transaction cost theory framework. Boxes outline the three key theoretical constructs: asset specificity, transaction frequency, and uncertainty. Trapezoids reflect two assumptions: bounded rationality and opportunism. More
Journal Articles
Journal:
Journal of Information Systems
Journal of Information Systems (2022) 36 (3): 211–217.
Published: 01 September 2022
Includes: Supplementary data
Journal Articles
Journal:
Journal of Information Systems
Journal of Information Systems (2022) 36 (3): 219–234.
Published: 01 September 2022
Journal Articles
Journal:
Journal of Information Systems
Journal of Information Systems (2022) 36 (3): 115–128.
Published: 01 September 2022