Antecedents and consequences of data breaches: A systematic review
F Schlackl, N Link, H Hoehle - Information & Management, 2022 - Elsevier
Research on data breaches is scattered across disciplines and methodologies. To help
consolidate it, we review 43 articles on data breaches' antecedents and 83 on their …
consolidate it, we review 43 articles on data breaches' antecedents and 83 on their …
[HTML][HTML] The whole of cyber defense: Syncing practice and theory
KM de Nobrega, AF Rutkowski, C Saunders - The Journal of Strategic …, 2024 - Elsevier
This review explores the problems Chief Information Security Officers (CISOs) and other
cyber professionals face when defending their organization against cyberattacks. Using a …
cyber professionals face when defending their organization against cyberattacks. Using a …
Data security crisis in universities: identification of key factors affecting data breach incidents
J Li, W Xiao, C Zhang - Humanities and Social Sciences …, 2023 - nature.com
The extremely complex and dynamic digital environments of universities make them highly
vulnerable to the risk of data breaches. This study empirically investigated the factors …
vulnerable to the risk of data breaches. This study empirically investigated the factors …
Information Technology Innovativeness and Data-Breach Risk: A Longitudinal Study
The adoption of new Information Technology (IT) innovations has led to increased
uncertainty among employees, a greater demand for security measures, and more entry …
uncertainty among employees, a greater demand for security measures, and more entry …
Four decades of Chief Information Officer research: a literature review and research agenda based on main path analysis
Despite the relevance and maturity of the Chief Information Officer (CIO) research field, no
studies exist that exhaustively summarize the current body of knowledge, focusing on the …
studies exist that exhaustively summarize the current body of knowledge, focusing on the …
What do we need to know about the Chief Information Security Officer? A literature review and research agenda
Since its establishment in the 1990s, the role of chief information security officer (CISO) has
become critical to organizations in managing cybersecurity risks. However, despite …
become critical to organizations in managing cybersecurity risks. However, despite …
Vendor selection in the wake of data breaches: A longitudinal study
With the increasing digitization and networking of medical data and personal health
information, information security has become a critical factor in vendor selection. However …
information, information security has become a critical factor in vendor selection. However …
Firm diversity and data breach risk: a longitudinal study
Q Wang, EWT Ngai - The Journal of Strategic Information Systems, 2022 - Elsevier
Research has extensively investigated the rationale of firm diversity from the economic
perspective, but little is known about how such a strategy may affect information security …
perspective, but little is known about how such a strategy may affect information security …
The impact of managers' IT experience on the enterprises' digital transformation: Empirical evidence from China
X Pan, G Xu - Applied Economics, 2024 - Taylor & Francis
Digital transformation has become a primary strategic choice of enterprises in recent years.
We use Chinese A-share listed companies in Shanghai and Shenzhen as samples, use text …
We use Chinese A-share listed companies in Shanghai and Shenzhen as samples, use text …
Unintended consequences: Examining the effects of government digital regulation on corporate fintech innovation in China
W Tan, Q Tang, W Sun, X Du - Emerging Markets Review, 2025 - Elsevier
In the financial sector, government digital regulation significantly influences the development
of financial technology (fintech), yet it has not been sufficiently studied. This research …
of financial technology (fintech), yet it has not been sufficiently studied. This research …