首页 > 最新文献

European Journal of Information Systems最新文献

英文 中文
Cybersecurity Breach at a Big 4 Accounting Firm: Effects on Auditor Reputation 四大会计师事务所的网络安全漏洞:对审计师声誉的影响
IF 9.5 2区 管理学 Q1 Social Sciences Pub Date : 2023-06-01 DOI: 10.2308/isys-2022-006
B. Litt, Paul N. Tanyi, M. Watson
Public company investors rely on the Big 4 audit firms to provide assurance over internal controls and financial reporting. What, then, would happen if one of these very assurance providers suffered its own cybersecurity breach? We examine such an event in the major data breach of Deloitte in 2017. Using U.S. data from 2014 to 2019, we find Deloitte suffered significant reputational damage postbreach. Specifically, audit clients and existing shareholders became less likely to approve of Deloitte as the company’s auditor. Deloitte also charged lower audit fees after the incident. Furthermore, Deloitte’s audit clients suffered significant negative market reactions postbreach. Our results suggest pervasive implications of cyberattacks on auditor reputation and support recent congressional efforts to expand regulation in this area.
上市公司投资者依赖四大会计师事务所为内部控制和财务报告提供保证。那么,如果这些保障提供商中的某一家遭遇了网络安全漏洞,会发生什么呢?我们在2017年德勤的重大数据泄露事件中考察了这一事件。利用2014年至2019年的美国数据,我们发现德勤在数据泄露后遭受了严重的声誉损害。具体而言,审计客户和现有股东不太可能认可德勤作为该公司的审计机构。事件发生后,德勤也降低了审计费用。此外,德勤的审计客户在违规后遭受了显著的负面市场反应。我们的研究结果表明,网络攻击对审计师声誉的普遍影响,并支持最近国会在这一领域扩大监管的努力。
{"title":"Cybersecurity Breach at a Big 4 Accounting Firm: Effects on Auditor Reputation","authors":"B. Litt, Paul N. Tanyi, M. Watson","doi":"10.2308/isys-2022-006","DOIUrl":"https://doi.org/10.2308/isys-2022-006","url":null,"abstract":"\u0000 Public company investors rely on the Big 4 audit firms to provide assurance over internal controls and financial reporting. What, then, would happen if one of these very assurance providers suffered its own cybersecurity breach? We examine such an event in the major data breach of Deloitte in 2017. Using U.S. data from 2014 to 2019, we find Deloitte suffered significant reputational damage postbreach. Specifically, audit clients and existing shareholders became less likely to approve of Deloitte as the company’s auditor. Deloitte also charged lower audit fees after the incident. Furthermore, Deloitte’s audit clients suffered significant negative market reactions postbreach. Our results suggest pervasive implications of cyberattacks on auditor reputation and support recent congressional efforts to expand regulation in this area.","PeriodicalId":50486,"journal":{"name":"European Journal of Information Systems","volume":null,"pages":null},"PeriodicalIF":9.5,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87155127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Business Strategy and Cybersecurity Breaches 业务战略和网络安全漏洞
IF 9.5 2区 管理学 Q1 Social Sciences Pub Date : 2023-06-01 DOI: 10.2308/isys-2022-033
Tianpei Li, S. Walton
This study examines whether a firm’s business strategy is an underlying determinant of cybersecurity breach likelihood. Based on organizational theory, firm strategy can focus on innovation or efficiency, with innovative strategy firms being more likely to have weaker, decentralized control systems, multiple technologies, and greater risk than firms with an efficiency-focused strategy. Following the Miles and Snow (1978) strategy topology, we predict and find that the prospector business strategy is associated with greater breach likelihood. We further explore IT awareness within the firm. Ex ante, it is unclear whether strategic IT policy formation is impounded into a firm’s strategy or can be impacted by individual executives and nonstrategy firm characteristics. We find that IT understanding at the executive or firm level can affect the relationship between strategy and breach likelihood. Collectively, our results indicate that business strategy is a useful indicator in evaluating firms’ cybersecurity activities.
本研究考察了公司的商业战略是否是网络安全漏洞可能性的潜在决定因素。根据组织理论,企业战略可以关注创新或效率,与注重效率的企业相比,创新战略企业更有可能拥有较弱、分散的控制系统、多种技术和更大的风险。根据Miles和Snow(1978)的战略拓扑,我们预测并发现勘探者的商业战略与更大的违约可能性相关。我们进一步探索公司内部的信息技术意识。在此之前,还不清楚战略it政策的形成是否包含在公司的战略中,或者是否会受到个别高管和非战略公司特征的影响。我们发现,高管或公司层面的信息技术理解可以影响战略与违约可能性之间的关系。总体而言,我们的研究结果表明,企业战略是评估企业网络安全活动的有用指标。
{"title":"Business Strategy and Cybersecurity Breaches","authors":"Tianpei Li, S. Walton","doi":"10.2308/isys-2022-033","DOIUrl":"https://doi.org/10.2308/isys-2022-033","url":null,"abstract":"\u0000 This study examines whether a firm’s business strategy is an underlying determinant of cybersecurity breach likelihood. Based on organizational theory, firm strategy can focus on innovation or efficiency, with innovative strategy firms being more likely to have weaker, decentralized control systems, multiple technologies, and greater risk than firms with an efficiency-focused strategy. Following the Miles and Snow (1978) strategy topology, we predict and find that the prospector business strategy is associated with greater breach likelihood. We further explore IT awareness within the firm. Ex ante, it is unclear whether strategic IT policy formation is impounded into a firm’s strategy or can be impacted by individual executives and nonstrategy firm characteristics. We find that IT understanding at the executive or firm level can affect the relationship between strategy and breach likelihood. Collectively, our results indicate that business strategy is a useful indicator in evaluating firms’ cybersecurity activities.","PeriodicalId":50486,"journal":{"name":"European Journal of Information Systems","volume":null,"pages":null},"PeriodicalIF":9.5,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83963264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Editorial Policy 编辑政策
IF 9.5 2区 管理学 Q1 Social Sciences Pub Date : 2023-06-01 DOI: 10.2308/0888-7985-37.2.137
{"title":"Editorial Policy","authors":"","doi":"10.2308/0888-7985-37.2.137","DOIUrl":"https://doi.org/10.2308/0888-7985-37.2.137","url":null,"abstract":"","PeriodicalId":50486,"journal":{"name":"European Journal of Information Systems","volume":null,"pages":null},"PeriodicalIF":9.5,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90299924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
When Cash Is King - An Accounts Receivables App Accommodating Different Use Situations 当现金为王-一个应收账款应用程序适应不同的使用情况
IF 9.5 2区 管理学 Q1 Social Sciences Pub Date : 2023-06-01 DOI: 10.2308/isys-2022-022
Jörg H. Mayer, Linus Lischke, R. Quick, Friedrich Kalden
Today’s economic environment has accelerated an already changing working context for accounting. Collecting accounts receivables (AR) stands out, as it enables companies to turn invoices into cash. The objective of this article is to elaborate on both the most important use situations for an AR collection management and a subsequent app design accommodating these use situations. We take a healthcare product provider as our reference company and come up with nine use situations prioritized by an analytic hierarchy process as follows: (1) drive operational governance, (2) switch to a more proactive collection management, (3) increase order-to-cash process effectiveness, (4) set targets and monitor them, (5) automate AR process actions by an agent, (6) predict process errors in advance, (7) exchange information across departments, (8) set up a predictive liquidity management, and (9) automate workload tracking of AR process activities.
今天的经济环境加速了已经在变化的会计工作环境。收取应收账款(AR)很突出,因为它使公司能够将发票转化为现金。本文的目的是详细说明AR收集管理的最重要的使用情况以及适应这些使用情况的后续应用设计。我们以某医疗保健产品供应商为参考公司,通过层次分析法,得出以下九种使用情况的优先级:(1)推动运营治理,(2)转向更主动的收款管理,(3)提高订单到现金流程的有效性,(4)设定目标并监控它们,(5)代理自动化AR流程操作,(6)提前预测流程错误,(7)跨部门交换信息,(8)建立预测性流动性管理,(9)自动化AR流程活动的工作量跟踪。
{"title":"When Cash Is King - An Accounts Receivables App Accommodating Different Use Situations","authors":"Jörg H. Mayer, Linus Lischke, R. Quick, Friedrich Kalden","doi":"10.2308/isys-2022-022","DOIUrl":"https://doi.org/10.2308/isys-2022-022","url":null,"abstract":"\u0000 Today’s economic environment has accelerated an already changing working context for accounting. Collecting accounts receivables (AR) stands out, as it enables companies to turn invoices into cash. The objective of this article is to elaborate on both the most important use situations for an AR collection management and a subsequent app design accommodating these use situations. We take a healthcare product provider as our reference company and come up with nine use situations prioritized by an analytic hierarchy process as follows: (1) drive operational governance, (2) switch to a more proactive collection management, (3) increase order-to-cash process effectiveness, (4) set targets and monitor them, (5) automate AR process actions by an agent, (6) predict process errors in advance, (7) exchange information across departments, (8) set up a predictive liquidity management, and (9) automate workload tracking of AR process activities.","PeriodicalId":50486,"journal":{"name":"European Journal of Information Systems","volume":null,"pages":null},"PeriodicalIF":9.5,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83476258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Publishing the Data from "The Effects of Communication Mode and Culture on Deception Detection Accuracy" 发表“传播方式和文化对欺骗检测准确性的影响”数据
IF 9.5 2区 管理学 Q1 Social Sciences Pub Date : 2023-06-01 DOI: 10.2308/isys-2022-025
J. George, Manjul Gupta, Gabriel A. Giordano, Annette M. Mills, Vanesa M. Tennant, Carmen C. Lewis
With the publication of this article, we are making available the dataset collected for and analyzed in our 2018 MIS Quarterly article “The Effects of Communication Mode and Culture on Deception Detection Accuracy.” Our article examined the relationships between computer-based modes of communication and national culture on deception detection success. We provide additional information about the dataset and how it was collected, as well as suggestions for future research. This additional information should help any scholar interested in further analysis of the dataset or extending our study.
随着本文的发表,我们正在提供为2018年MIS季刊文章“通信模式和文化对欺骗检测准确性的影响”收集和分析的数据集。我们的文章研究了以计算机为基础的交流模式和国家文化对欺骗检测成功的关系。我们提供了关于数据集及其收集方式的额外信息,以及对未来研究的建议。这些额外的信息应该有助于任何对进一步分析数据集或扩展我们的研究感兴趣的学者。
{"title":"Publishing the Data from \"The Effects of Communication Mode and Culture on Deception Detection Accuracy\"","authors":"J. George, Manjul Gupta, Gabriel A. Giordano, Annette M. Mills, Vanesa M. Tennant, Carmen C. Lewis","doi":"10.2308/isys-2022-025","DOIUrl":"https://doi.org/10.2308/isys-2022-025","url":null,"abstract":"\u0000 With the publication of this article, we are making available the dataset collected for and analyzed in our 2018 MIS Quarterly article “The Effects of Communication Mode and Culture on Deception Detection Accuracy.” Our article examined the relationships between computer-based modes of communication and national culture on deception detection success. We provide additional information about the dataset and how it was collected, as well as suggestions for future research. This additional information should help any scholar interested in further analysis of the dataset or extending our study.","PeriodicalId":50486,"journal":{"name":"European Journal of Information Systems","volume":null,"pages":null},"PeriodicalIF":9.5,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72390705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Impact of Customer-Reported Cybersecurity Breaches on Key Supplier Innovations and Relationship Disruption 客户报告的网络安全漏洞对关键供应商创新和关系中断的影响
IF 9.5 2区 管理学 Q1 Social Sciences Pub Date : 2023-05-30 DOI: 10.2308/isys-2020-006
C. He, Jiangbo Huangfu, M. Kohlbeck, Lin Wang
Cybersecurity breaches (CBs) negatively influence the breached firms’ business functions, including their innovative investments. Recent research documents a spillover effect of CBs into supply chain firm performance. We extend this research and investigate the impact of customers’ CBs on suppliers’ innovative investments and the disruption of supplier-customer relationships. We find a significant negative association between customers’ reported CBs and suppliers’ innovative investments in the subsequent year. In addition, we find customer-reported CBs increase the likelihood of supplier-customer relationship disruption in the subsequent year. Our study contributes to the broader understanding of the negative impacts of CBs not only on the breached firm’s financial performance but also on key supplier innovation decisions. Data Availability: Data are available from the public sources cited in the text. JEL Classifications: L14; L29; M49; O30.
网络安全漏洞(CBs)对被入侵公司的业务功能产生负面影响,包括其创新投资。最近的研究证明了商业成本对供应链企业绩效的溢出效应。我们扩展了这一研究,并调查了客户对供应商创新投资的影响以及供应商-客户关系的中断。我们发现客户报告的成本成本与供应商在随后一年的创新投资之间存在显著的负相关关系。此外,我们发现客户报告的CBs增加了随后一年供应商-客户关系中断的可能性。我们的研究有助于更广泛地理解商业违约对违约公司财务绩效和关键供应商创新决策的负面影响。数据可用性:数据可从文本中引用的公共来源获得。JEL分类:L14;气密性好;M49;O30。
{"title":"The Impact of Customer-Reported Cybersecurity Breaches on Key Supplier Innovations and Relationship Disruption","authors":"C. He, Jiangbo Huangfu, M. Kohlbeck, Lin Wang","doi":"10.2308/isys-2020-006","DOIUrl":"https://doi.org/10.2308/isys-2020-006","url":null,"abstract":"\u0000 Cybersecurity breaches (CBs) negatively influence the breached firms’ business functions, including their innovative investments. Recent research documents a spillover effect of CBs into supply chain firm performance. We extend this research and investigate the impact of customers’ CBs on suppliers’ innovative investments and the disruption of supplier-customer relationships. We find a significant negative association between customers’ reported CBs and suppliers’ innovative investments in the subsequent year. In addition, we find customer-reported CBs increase the likelihood of supplier-customer relationship disruption in the subsequent year. Our study contributes to the broader understanding of the negative impacts of CBs not only on the breached firm’s financial performance but also on key supplier innovation decisions.\u0000 Data Availability: Data are available from the public sources cited in the text.\u0000 JEL Classifications: L14; L29; M49; O30.","PeriodicalId":50486,"journal":{"name":"European Journal of Information Systems","volume":null,"pages":null},"PeriodicalIF":9.5,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76863423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security by envelopment – a novel approach to data-security-oriented configuration of lightweight-automation systems 包络安全——一种面向数据安全的轻量级自动化系统配置新方法
IF 9.5 2区 管理学 Q1 Social Sciences Pub Date : 2023-05-25 DOI: 10.1080/0960085x.2023.2217362
Aleksandre Asatiani, Tuulikki Hakkarainen, Kimmo Paaso, Esko Penttinen
{"title":"Security by envelopment – a novel approach to data-security-oriented configuration of lightweight-automation systems","authors":"Aleksandre Asatiani, Tuulikki Hakkarainen, Kimmo Paaso, Esko Penttinen","doi":"10.1080/0960085x.2023.2217362","DOIUrl":"https://doi.org/10.1080/0960085x.2023.2217362","url":null,"abstract":"","PeriodicalId":50486,"journal":{"name":"European Journal of Information Systems","volume":null,"pages":null},"PeriodicalIF":9.5,"publicationDate":"2023-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48885334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Innovative and Novel Research Datasets Related to Cybersecurity Risk Disclosures: A Research Note 与网络安全风险披露相关的创新和新颖研究数据集:一份研究报告
IF 9.5 2区 管理学 Q1 Social Sciences Pub Date : 2023-05-24 DOI: 10.2308/isys-2022-065
Thomas G. Calderon, Lei Gao
This research note describes an innovative dataset that was developed and used by Gao, Calderon, and Tang (2020) and Calderon and Gao (2021) to examine cybersecurity risk disclosures. Our innovative dataset and contemporary text analytics methodology allowed us to develop interesting insights and identify various patterns in the disclosure of cybersecurity risks that publicly traded companies face. We believe that researchers can learn from our data and methodology, and contribute further to the literature on corporate disclosure in general and cybersecurity risks in particular.
本研究报告描述了由Gao, Calderon, and Tang(2020)和Calderon and Gao(2021)开发和使用的创新数据集,以检查网络安全风险披露。我们的创新数据集和现代文本分析方法使我们能够开发有趣的见解,并确定上市公司面临的网络安全风险披露的各种模式。我们相信,研究人员可以从我们的数据和方法中学习,并进一步为企业信息披露,特别是网络安全风险的文献做出贡献。
{"title":"Innovative and Novel Research Datasets Related to Cybersecurity Risk Disclosures: A Research Note","authors":"Thomas G. Calderon, Lei Gao","doi":"10.2308/isys-2022-065","DOIUrl":"https://doi.org/10.2308/isys-2022-065","url":null,"abstract":"\u0000 This research note describes an innovative dataset that was developed and used by Gao, Calderon, and Tang (2020) and Calderon and Gao (2021) to examine cybersecurity risk disclosures. Our innovative dataset and contemporary text analytics methodology allowed us to develop interesting insights and identify various patterns in the disclosure of cybersecurity risks that publicly traded companies face. We believe that researchers can learn from our data and methodology, and contribute further to the literature on corporate disclosure in general and cybersecurity risks in particular.","PeriodicalId":50486,"journal":{"name":"European Journal of Information Systems","volume":null,"pages":null},"PeriodicalIF":9.5,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79647065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
#Twitter: Examining the Impact of Earnings Format Choice and Rehashing Prior Positive Information on Market Prices #Twitter:检验盈利格式选择的影响,并重新整理先前的积极信息对市场价格的影响
IF 9.5 2区 管理学 Q1 Social Sciences Pub Date : 2023-05-17 DOI: 10.2308/isys-2021-034
Terence J. Pitre, R. Pinsker, Ronald J. Daigle, Y. Zhang
Using Twitter to disseminate information has two advantages: flexibility in presentation formats and the ability to redisclose a prior period’s information—referred to as “rehashing.” Our research examines the effect of these issues on market investors’ trading. Our experimental market results suggest that nonprofessional investors presented with whole-number quarterly earnings exhibit insensitivity to the large numbers (i.e., psychophysical numbing). Further, we find evidence suggesting that investors in the whole-number condition net the rehashed quarterly earnings information with current quarterly earnings information to counteract the psychophysical numbing effects, whereas those in the earnings per share (small-number) condition display a representativeness bias toward positive news when processing the rehashed information. Our results indicate that a firm can influence investor decisions when managers strategically disseminate larger whole numbers and rehash positive earnings information. Thus, our findings contribute novel information to the extant social media literature. Data Availability: Data are available from the first author upon request.
使用Twitter传播信息有两个优点:表示格式的灵活性和重新披露前一时期信息的能力,即“重新散列”。我们的研究考察了这些问题对市场投资者交易的影响。我们的市场实验结果表明,面对整数季度收益的非专业投资者对大数表现出不敏感(即心理物理麻木)。此外,我们发现证据表明,整数条件下的投资者将重组的季度收益信息与当前季度收益信息进行网络处理,以抵消心理物理麻木效应,而每股收益(小数)条件下的投资者在处理重组信息时表现出对积极新闻的代表性偏见。我们的研究结果表明,当管理者策略性地传播更大的整数和重复正面收益信息时,企业可以影响投资者的决策。因此,我们的发现为现有的社交媒体文献提供了新的信息。数据可用性:数据可根据要求从第一作者处获得。
{"title":"#Twitter: Examining the Impact of Earnings Format Choice and Rehashing Prior Positive Information on Market Prices","authors":"Terence J. Pitre, R. Pinsker, Ronald J. Daigle, Y. Zhang","doi":"10.2308/isys-2021-034","DOIUrl":"https://doi.org/10.2308/isys-2021-034","url":null,"abstract":"\u0000 Using Twitter to disseminate information has two advantages: flexibility in presentation formats and the ability to redisclose a prior period’s information—referred to as “rehashing.” Our research examines the effect of these issues on market investors’ trading. Our experimental market results suggest that nonprofessional investors presented with whole-number quarterly earnings exhibit insensitivity to the large numbers (i.e., psychophysical numbing). Further, we find evidence suggesting that investors in the whole-number condition net the rehashed quarterly earnings information with current quarterly earnings information to counteract the psychophysical numbing effects, whereas those in the earnings per share (small-number) condition display a representativeness bias toward positive news when processing the rehashed information. Our results indicate that a firm can influence investor decisions when managers strategically disseminate larger whole numbers and rehash positive earnings information. Thus, our findings contribute novel information to the extant social media literature.\u0000 Data Availability: Data are available from the first author upon request.","PeriodicalId":50486,"journal":{"name":"European Journal of Information Systems","volume":null,"pages":null},"PeriodicalIF":9.5,"publicationDate":"2023-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72693698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security and privacy risks in drone-based last mile delivery 无人机最后一英里配送的安全和隐私风险
IF 9.5 2区 管理学 Q1 Social Sciences Pub Date : 2023-05-17 DOI: 10.1080/0960085x.2023.2214744
Yu-Ju Tu, S. Piramuthu
{"title":"Security and privacy risks in drone-based last mile delivery","authors":"Yu-Ju Tu, S. Piramuthu","doi":"10.1080/0960085x.2023.2214744","DOIUrl":"https://doi.org/10.1080/0960085x.2023.2214744","url":null,"abstract":"","PeriodicalId":50486,"journal":{"name":"European Journal of Information Systems","volume":null,"pages":null},"PeriodicalIF":9.5,"publicationDate":"2023-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"59505163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
European Journal of Information Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1