Cognition in social engineering empirical research: a systematic literature review

P Burda, L Allodi, N Zannone - ACM Transactions on Computer-Human …, 2024 - dl.acm.org
The interdisciplinarity of the Social Engineering (SE) domain creates crucial challenges for
the development and advancement of empirical SE research, making it particularly difficult to …

Stress in the cybersecurity profession: a systematic review of related literature and opportunities for future research

T Singh, AC Johnston, J D'Arcy… - … Journal: Practice, Process …, 2023 - emerald.com
Purpose The impact of stress on personal and work-related outcomes has been studied in
the information systems (IS) literature across several professions. However, the …

Why security and privacy research lies at the centre of the information systems (IS) artefact: Proposing a bold research agenda

PB Lowry, T Dinev, R Willison - European Journal of Information …, 2017 - Taylor & Francis
In this essay, we outline some important concerns in the hope of improving the effectiveness
of security and privacy research. We discuss the need to re-examine our understanding of …

Appealing to sense and sensibility: System 1 and system 2 interventions for fake news on social media

PL Moravec, A Kim, AR Dennis - Information Systems …, 2020 - pubsonline.informs.org
Disinformation on social media—commonly called “fake news”—has become a major
concern around the world, and many fact-checking initiatives have been launched to …

Questioning racial and gender bias in AI-based recommendations: Do espoused national cultural values matter?

M Gupta, CM Parra, D Dennehy - Information Systems Frontiers, 2022 - Springer
One realm of AI, recommender systems have attracted significant research attention due to
concerns about its devastating effects to society's most vulnerable and marginalised …

Eyes wide open: The role of situational information security awareness for security‐related behaviour

L Jaeger, A Eckhardt - Information Systems Journal, 2021 - Wiley Online Library
Most contemporary studies on information security focus on largely static phenomena in
examining security‐related behaviours. We take a more dynamic, situational and …

Don't even think about it! The effects of antineutralization, informational, and normative communication on information security compliance

JB Barlow, M Warkentin, D Ormond… - Journal of the …, 2018 - aisel.aisnet.org
Organizations use security education, training, and awareness (SETA) programs to counter
internal security threats and promote compliance with information security policies. Yet …

Tuning out security warnings

A Vance, JL Jenkins, BB Anderson, DK Bjornn… - MIS Quarterly, 2018 - JSTOR
Research in the fields of information systems and human-computer interaction has shown
that habituation—decreased response to repeated stimulation—is a serious threat to the …

More harm than good? How messages that interrupt can make us vulnerable

JL Jenkins, BB Anderson, A Vance… - Information Systems …, 2016 - pubsonline.informs.org
System-generated alerts are ubiquitous in personal computing and, with the proliferation of
mobile devices, daily activity. While these interruptions provide timely information, research …

The phishing funnel model: a design artifact to predict user susceptibility to phishing websites

A Abbasi, D Dobolyi, A Vance… - Information Systems …, 2021 - pubsonline.informs.org
Phishing is a significant security concern for organizations, threatening employees and
members of the public. Phishing threats against employees can lead to severe security …