Immersive virtual reality in the age of the Metaverse: A hybrid-narrative review based on the technology affordance perspective
E Dincelli, A Yayla - The journal of strategic information systems, 2022 - Elsevier
Immersive virtual reality (VR) that utilizes head-mounted displays (HMD) is one of the key
emerging technologies of the 21st century and has drawn keen attention from consumers …
emerging technologies of the 21st century and has drawn keen attention from consumers …
Information security awareness and behavior: a theory-based literature review
B Lebek, J Uffen, M Neumann, B Hohler… - Management …, 2014 - emerald.com
Purpose–This paper aims to provide an overview of theories used in the field of employees'
information systems (IS) security behavior over the past decade. Research gaps and …
information systems (IS) security behavior over the past decade. Research gaps and …
Consumers' decisions in social commerce context: An empirical investigation
J Chen, XL Shen - Decision Support Systems, 2015 - Elsevier
With the popularity and growth of social networking, consumers often rely on the advice and
recommendations from online friends when making purchase decisions. Social commerce in …
recommendations from online friends when making purchase decisions. Social commerce in …
Unveiling the dark side of social networking sites: Personal and work-related consequences of social networking site addiction
Although previous research has explored the effects of social networking site (SNS) use in
organizations, researchers have focused little on its negative consequences. This article …
organizations, researchers have focused little on its negative consequences. This article …
Editor's comments: an update and extension to SEM guidelines for administrative and social science research
The objective of this guide, therefore, is to provide a comprehensive, organized, and
contemporary summary of the minimal necessary reporting required of SEM research so that …
contemporary summary of the minimal necessary reporting required of SEM research so that …
Practicing safe computing: A multimethod empirical examination of home computer user security behavioral intentions
CL Anderson, R Agarwal - MIS quarterly, 2010 - JSTOR
Although firms are expending substantial resources to develop technology and processes
that can help safeguard the security of their computing assets, increased attention is being …
that can help safeguard the security of their computing assets, increased attention is being …
Specifying formative constructs in information systems research
While researchers go to great lengths to justify and prove theoretical links between
constructs, the relationship between measurement items and constructs is often ignored. By …
constructs, the relationship between measurement items and constructs is often ignored. By …
Toward agile: an integrated analysis of quantitative and qualitative field data on software development agility
As business and technology environments change at an unpre cedented rate, software
development agility to respond to changing user requirements has become increasingly …
development agility to respond to changing user requirements has become increasingly …
The role of extra-role behaviors and social controls in information security policy effectiveness
JSC Hsu, SP Shih, YW Hung… - Information systems …, 2015 - pubsonline.informs.org
Although most behavioral security studies focus on organizational in-role behaviors such as
information security policy (ISP) compliance, the role of organizational extra-role behaviors …
information security policy (ISP) compliance, the role of organizational extra-role behaviors …
Impact of IS capabilities on firm performance: The roles of organizational agility and industry technology intensity
Drawing on the information technology (IT)‐enabled capabilities perspective, this study
develops a model that extends our knowledge of the mechanisms through which IT …
develops a model that extends our knowledge of the mechanisms through which IT …