Pub Date : 2020-01-01DOI: 10.5859/KAIS.2020.29.3.237
Jong-hwa Lee
{"title":"Research on Designing Korean Emotional Dictionary using Intelligent Natural Language Crawling System in SNS","authors":"Jong-hwa Lee","doi":"10.5859/KAIS.2020.29.3.237","DOIUrl":"https://doi.org/10.5859/KAIS.2020.29.3.237","url":null,"abstract":"","PeriodicalId":42112,"journal":{"name":"African Journal of Information Systems","volume":"18 1","pages":"237-251"},"PeriodicalIF":0.7,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88135476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-01-01DOI: 10.5859/KAIS.2020.29.2.173
Yao Ziyan, Park, YoungKi, Taeho Hong
{"title":"A Study on the Effect of Reviewer's Attributes on the Usefulness of Online Review","authors":"Yao Ziyan, Park, YoungKi, Taeho Hong","doi":"10.5859/KAIS.2020.29.2.173","DOIUrl":"https://doi.org/10.5859/KAIS.2020.29.2.173","url":null,"abstract":"","PeriodicalId":42112,"journal":{"name":"African Journal of Information Systems","volume":"115 1","pages":"173-195"},"PeriodicalIF":0.7,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87951138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R ecent high-profile cybersecurity incidents, such as Equifax, Sony, and Target, have increased professional and regulatory attention. For example, organizations are under pressure to demonstrate that they are managing cybersecurity threats, and that they have effective processes and controls in place to detect, respond to, mitigate, and recover from breaches and other security events. Cybersecurity risk management involves not only improving internal controls, but also includes a wide range of factors from strategy, IT management, investment decisions, human behavior, disaster recovery/business continuity, and technical solutions to actual implementation and practices. From the regulatory perspective, the PCAOB explicitly included the assessment of cybersecurity risks in its 2018–2022 strategic plan (PCAOB 2018). Further, the Securities and Exchange Commission (SEC) recently issued reporting guidelines on cybersecurity risk disclosures (SEC 2018), while the AICPA proposed an assurance framework for auditors to use to evaluate an organization’s cybersecurity risk management policies and procedures (AICPA 2017). Accounting information systems (AIS) researchers, who stand at the intersection between information systems and accounting, can contribute to understanding the impact of cybersecurity on accounting information from different theoretical or empirical perspectives. For example, our emphasis on understanding how behavior impacts action may provide insight to managers as they develop and implement cybersecurity policies and work to prevent and detect cybersecurity breaches. Further, our knowledge of how financial and nonfinancial information impacts organizational value may be helpful to investigate how investors and auditors react to disclosed data security breaches. Finally, we offer this special-theme issue to encourage cybersecurity research by the broader accounting community. To illustrate, Banker and Feng (2019) and Richardson, Smith, and Watson (2019) demonstrate how archival financial methodology can be used to examine important cybersecurity issues. Accounting behavioral researchers are encouraged to follow the lead of Cheng and Walton (2019) and Frank, Grenier, and Pyzoha (2019) in using experiments to provide insights into cybersecurity challenges. Further, managerial researchers may find Curry, Marshall, Correia, and Crossler’s (2019) work helpful in generating ideas on how applicable theories and skills can be applied to this important topic.
{"title":"Implications of Cybersecurity on Accounting Information","authors":"Diane J. Janvrin, T. Wang","doi":"10.2308/isys-10715","DOIUrl":"https://doi.org/10.2308/isys-10715","url":null,"abstract":"R ecent high-profile cybersecurity incidents, such as Equifax, Sony, and Target, have increased professional and regulatory attention. For example, organizations are under pressure to demonstrate that they are managing cybersecurity threats, and that they have effective processes and controls in place to detect, respond to, mitigate, and recover from breaches and other security events. Cybersecurity risk management involves not only improving internal controls, but also includes a wide range of factors from strategy, IT management, investment decisions, human behavior, disaster recovery/business continuity, and technical solutions to actual implementation and practices. From the regulatory perspective, the PCAOB explicitly included the assessment of cybersecurity risks in its 2018–2022 strategic plan (PCAOB 2018). Further, the Securities and Exchange Commission (SEC) recently issued reporting guidelines on cybersecurity risk disclosures (SEC 2018), while the AICPA proposed an assurance framework for auditors to use to evaluate an organization’s cybersecurity risk management policies and procedures (AICPA 2017). Accounting information systems (AIS) researchers, who stand at the intersection between information systems and accounting, can contribute to understanding the impact of cybersecurity on accounting information from different theoretical or empirical perspectives. For example, our emphasis on understanding how behavior impacts action may provide insight to managers as they develop and implement cybersecurity policies and work to prevent and detect cybersecurity breaches. Further, our knowledge of how financial and nonfinancial information impacts organizational value may be helpful to investigate how investors and auditors react to disclosed data security breaches. Finally, we offer this special-theme issue to encourage cybersecurity research by the broader accounting community. To illustrate, Banker and Feng (2019) and Richardson, Smith, and Watson (2019) demonstrate how archival financial methodology can be used to examine important cybersecurity issues. Accounting behavioral researchers are encouraged to follow the lead of Cheng and Walton (2019) and Frank, Grenier, and Pyzoha (2019) in using experiments to provide insights into cybersecurity challenges. Further, managerial researchers may find Curry, Marshall, Correia, and Crossler’s (2019) work helpful in generating ideas on how applicable theories and skills can be applied to this important topic.","PeriodicalId":42112,"journal":{"name":"African Journal of Information Systems","volume":"33 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87909471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ABSTRACT In this study, we investigate the use of crowdsourcing websites in accounting research. Our analysis shows that the use of crowdsourcing in accounting research is relatively low, and these...
{"title":"The Use of Crowdsourcing and Social Media in Accounting Research","authors":"C. Ku, C. Ku, M. Firoozi","doi":"10.2308/ISYS-51978","DOIUrl":"https://doi.org/10.2308/ISYS-51978","url":null,"abstract":"ABSTRACT In this study, we investigate the use of crowdsourcing websites in accounting research. Our analysis shows that the use of crowdsourcing in accounting research is relatively low, and these...","PeriodicalId":42112,"journal":{"name":"African Journal of Information Systems","volume":"48 1","pages":"85-111"},"PeriodicalIF":0.7,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76292529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.5859/KAIS.2019.28.1.97
이륜경, Namho Chung, Taeho Hong
{"title":"Developing the online reviews based recommender models for multi-attributes using deep learning","authors":"이륜경, Namho Chung, Taeho Hong","doi":"10.5859/KAIS.2019.28.1.97","DOIUrl":"https://doi.org/10.5859/KAIS.2019.28.1.97","url":null,"abstract":"","PeriodicalId":42112,"journal":{"name":"African Journal of Information Systems","volume":"57 1","pages":"97-114"},"PeriodicalIF":0.7,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76566156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.5859/KAIS.2019.28.2.25
Hwan-Woo Lee, S. Lee, Jung, Kyoung-Chol
{"title":"The Impact of Artificial Intelligence Adoption in Candidates Screening and Job Interview on Intentions to Apply","authors":"Hwan-Woo Lee, S. Lee, Jung, Kyoung-Chol","doi":"10.5859/KAIS.2019.28.2.25","DOIUrl":"https://doi.org/10.5859/KAIS.2019.28.2.25","url":null,"abstract":"","PeriodicalId":42112,"journal":{"name":"African Journal of Information Systems","volume":"1 1","pages":"25-52"},"PeriodicalIF":0.7,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90336667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.5859/KAIS.2019.28.4.27
Byoungsoo Kim
{"title":"Understanding the formation mechanism of SNS addiction and its prevention strategy","authors":"Byoungsoo Kim","doi":"10.5859/KAIS.2019.28.4.27","DOIUrl":"https://doi.org/10.5859/KAIS.2019.28.4.27","url":null,"abstract":"","PeriodicalId":42112,"journal":{"name":"African Journal of Information Systems","volume":"55 1","pages":"27-47"},"PeriodicalIF":0.7,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84748886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.5859/KAIS.2019.28.2.129
Kim, Jongki, Kim, Ji-yun
{"title":"Why Do Mobile Device Users Take a Risky Behavior?: Focusing on Model of the Determinants of Risk Behavior","authors":"Kim, Jongki, Kim, Ji-yun","doi":"10.5859/KAIS.2019.28.2.129","DOIUrl":"https://doi.org/10.5859/KAIS.2019.28.2.129","url":null,"abstract":"","PeriodicalId":42112,"journal":{"name":"African Journal of Information Systems","volume":"31 1","pages":"129-152"},"PeriodicalIF":0.7,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76463360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.5859/KAIS.2019.28.1.155
Min Qu, 김은희
{"title":"A Study on Factors Influencing the Continuous Use Intention of Mobile Easy Payment Service: Integration of information system Post Acceptance Model and value model","authors":"Min Qu, 김은희","doi":"10.5859/KAIS.2019.28.1.155","DOIUrl":"https://doi.org/10.5859/KAIS.2019.28.1.155","url":null,"abstract":"","PeriodicalId":42112,"journal":{"name":"African Journal of Information Systems","volume":"29 1","pages":"155-181"},"PeriodicalIF":0.7,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85540062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.5859/KAIS.2019.28.2.153
Lee, So-hyun, 김민수, Hee-Woong Kim
{"title":"Comparative Analysis of Work-Life Balance Issues between Korea and the United States","authors":"Lee, So-hyun, 김민수, Hee-Woong Kim","doi":"10.5859/KAIS.2019.28.2.153","DOIUrl":"https://doi.org/10.5859/KAIS.2019.28.2.153","url":null,"abstract":"","PeriodicalId":42112,"journal":{"name":"African Journal of Information Systems","volume":"49 1","pages":"153-179"},"PeriodicalIF":0.7,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88934182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}