{"title":"ENHANCING CYBERSECURITY USING A NEW DYNAMIC APPROACH TO AUTHENTICATION AND AUTHORIZATION","authors":"","doi":"10.48009/2_iis_2023_103","DOIUrl":"https://doi.org/10.48009/2_iis_2023_103","url":null,"abstract":"","PeriodicalId":33557,"journal":{"name":"Issues in Information Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135750094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PSYCHOLOGICAL TACTICS OF PHISHING EMAILS","authors":"","doi":"10.48009/2_iis_2023_107","DOIUrl":"https://doi.org/10.48009/2_iis_2023_107","url":null,"abstract":"","PeriodicalId":33557,"journal":{"name":"Issues in Information Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135753480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"FOUNDATION OF CYBERSECURITY INFOSCAPES: IT'S ALL ABOUT THE CULTURE","authors":"","doi":"10.48009/3_iis_2023_101","DOIUrl":"https://doi.org/10.48009/3_iis_2023_101","url":null,"abstract":"","PeriodicalId":33557,"journal":{"name":"Issues in Information Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135753486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"COMPARING CYBERSECURITY SKILLS AND CYBERSECURITY CURRICULA: A PRE AND POST COVID ANALYSIS","authors":"","doi":"10.48009/2_iis_2023_128","DOIUrl":"https://doi.org/10.48009/2_iis_2023_128","url":null,"abstract":"","PeriodicalId":33557,"journal":{"name":"Issues in Information Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135753487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"INTERNET OF THINGS (IOT): USERS' CONCERNS ABOUT PRIVACY AND SECURITY","authors":"","doi":"10.48009/2_iis_2023_116","DOIUrl":"https://doi.org/10.48009/2_iis_2023_116","url":null,"abstract":"","PeriodicalId":33557,"journal":{"name":"Issues in Information Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135753488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"INNOVATIVE APPROACH FOR TEACHING THE RECEIVER OPERATING CHARACTERISTIC (ROC) CURVE","authors":"","doi":"10.48009/3_iis_2023_109","DOIUrl":"https://doi.org/10.48009/3_iis_2023_109","url":null,"abstract":"","PeriodicalId":33557,"journal":{"name":"Issues in Information Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135753493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CAN SUCCESS VISUALIZATION HELP STUDENTS MANAGE THEIR CONCERNS ABOUT LEARNING TECHNICAL CONCEPTS?","authors":"","doi":"10.48009/2_iis_2023_118","DOIUrl":"https://doi.org/10.48009/2_iis_2023_118","url":null,"abstract":"","PeriodicalId":33557,"journal":{"name":"Issues in Information Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135753504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DEVELOPMENT OF A CONCEPTUAL MODEL FOR CONTINUOUS INTENTION TO USE ELEARNING","authors":"","doi":"10.48009/3_iis_2023_118","DOIUrl":"https://doi.org/10.48009/3_iis_2023_118","url":null,"abstract":"","PeriodicalId":33557,"journal":{"name":"Issues in Information Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135753786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"HOW AN OUTSIDE PERSPECTIVE CAN HELP AN ORGANIZATION ENHANCE THEIR SUPPLY CHAIN RISK MITIGATION STRATEGY","authors":"","doi":"10.48009/1_iis_2023_106","DOIUrl":"https://doi.org/10.48009/1_iis_2023_106","url":null,"abstract":"","PeriodicalId":33557,"journal":{"name":"Issues in Information Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135754001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"BLOCKCHAIN TECHNOLOGY IN THE FOOD SUPPLY CHAIN: INFLUENCES ON SUPPLIER RELATIONSHIPS AND OUTCOMES","authors":"","doi":"10.48009/3_iis_2023_127","DOIUrl":"https://doi.org/10.48009/3_iis_2023_127","url":null,"abstract":"","PeriodicalId":33557,"journal":{"name":"Issues in Information Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135754007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}