首页 > 最新文献

Journal of Computer Information Systems最新文献

英文 中文
Social Networking Technologies in SMEs: A Bibliometric Analysis 中小企业的社会网络技术:文献计量分析
4区 管理学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-02 DOI: 10.1080/08874417.2023.2273811
Sandip Rakshit, Anand Jeyaraj, Tripti Paul, Sandeep Mondal
ABSTRACTThe increasing popularity of social networking for small-and-medium enterprises (SMEs) has resulted in a significant body of research. This study conducts a bibliometric analysis to identify the intellectual structure of the research domain and the major research themes within the domain. Based on a sample of 1710 prior studies published between 2010 and 2021, this study identifies the leading authors, institutions, countries, keywords, and co-authorship networks. Further, SME social media marketing, SME social media performance, and SME social media innovation are identified as the major themes of research. This study identifies the critical areas and potential directions for future research.KEYWORDS: Bibliometric analysissocial networkingSMEs decision makingco-citation analysisco-word analysisco-authorshipco-occurrences Disclosure statementNo potential conflict of interest was reported by the author(s).
摘要社交网络在中小企业中的日益普及已经引起了大量的研究。本研究采用文献计量学分析,确定研究领域的知识结构和领域内的主要研究主题。本研究基于2010年至2021年间发表的1710项先前研究的样本,确定了主要作者、机构、国家、关键词和合著者网络。进一步,将中小企业社会化媒体营销、中小企业社会化媒体绩效和中小企业社会化媒体创新确定为研究的主要主题。本研究确定了未来研究的关键领域和潜在方向。关键词:文献计量分析社会网络中小企业决策共被引分析词分析作者共现披露声明作者未报告潜在利益冲突
{"title":"Social Networking Technologies in SMEs: A Bibliometric Analysis","authors":"Sandip Rakshit, Anand Jeyaraj, Tripti Paul, Sandeep Mondal","doi":"10.1080/08874417.2023.2273811","DOIUrl":"https://doi.org/10.1080/08874417.2023.2273811","url":null,"abstract":"ABSTRACTThe increasing popularity of social networking for small-and-medium enterprises (SMEs) has resulted in a significant body of research. This study conducts a bibliometric analysis to identify the intellectual structure of the research domain and the major research themes within the domain. Based on a sample of 1710 prior studies published between 2010 and 2021, this study identifies the leading authors, institutions, countries, keywords, and co-authorship networks. Further, SME social media marketing, SME social media performance, and SME social media innovation are identified as the major themes of research. This study identifies the critical areas and potential directions for future research.KEYWORDS: Bibliometric analysissocial networkingSMEs decision makingco-citation analysisco-word analysisco-authorshipco-occurrences Disclosure statementNo potential conflict of interest was reported by the author(s).","PeriodicalId":54855,"journal":{"name":"Journal of Computer Information Systems","volume":"133 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135933048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information Security Practices and Intervention Among Teenagers 青少年资讯安全实践及干预
4区 管理学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-10-26 DOI: 10.1080/08874417.2023.2270453
Satish Radhakrishnan, Lavanya Rajendran
ABSTRACTIn the digital age, information is drastically exchanged among users. This data exchange paved the way for unsolicited access by cybercriminals, which could lead to psychological and financial loss. In this study, through a pre- and posttest experimental design, 668 Indian teenagers aged between fifteen and nineteen were evaluated last year. The preliminary study revealed low performance by teenagers in e-mail practices, password management, software practices, social media usage, and privacy settings. Through a novel intervention, 36 teenagers were observed through a curated information security module. The pretest and posttest analyses significantly supported the effects of security training, and Cohen’s d effect size reiterated the importance of progressive outcomes in their security literacy and practices. The intervention focused on the importance of threat perception and coping appraisal for inculcating security parameters and behavioral change among the teenagers.KEYWORDS: Information security awarenesssecurity practicesemail securitypassword securitysecurity training AcknowledgmentsWe would like to thank all the candidates who have participated in this research and spent time with us in spite of their busy commitments.Disclosure statementNo potential conflict of interest was reported by the author(s).
在数字时代,用户之间的信息交换非常频繁。这种数据交换为网络犯罪分子未经请求的访问铺平了道路,这可能导致心理和经济损失。在这项研究中,通过测试前和测试后的实验设计,去年对668名年龄在15至19岁之间的印度青少年进行了评估。初步研究显示,青少年在电子邮件使用、密码管理、软件使用、社交媒体使用和隐私设置方面表现不佳。通过一种新颖的干预,36名青少年通过策划的信息安全模块进行观察。前测和后测分析显著支持安全培训的效果,Cohen的效应大小重申了安全素养和实践中进步结果的重要性。干预的重点是威胁感知和应对评价对青少年安全参数灌输和行为改变的重要性。关键词:信息安全意识安全实践电子邮件安全密码安全安全培训致谢我们要感谢所有参与这项研究的候选人,感谢他们在百忙之中与我们共度时光。披露声明作者未报告潜在的利益冲突。
{"title":"Information Security Practices and Intervention Among Teenagers","authors":"Satish Radhakrishnan, Lavanya Rajendran","doi":"10.1080/08874417.2023.2270453","DOIUrl":"https://doi.org/10.1080/08874417.2023.2270453","url":null,"abstract":"ABSTRACTIn the digital age, information is drastically exchanged among users. This data exchange paved the way for unsolicited access by cybercriminals, which could lead to psychological and financial loss. In this study, through a pre- and posttest experimental design, 668 Indian teenagers aged between fifteen and nineteen were evaluated last year. The preliminary study revealed low performance by teenagers in e-mail practices, password management, software practices, social media usage, and privacy settings. Through a novel intervention, 36 teenagers were observed through a curated information security module. The pretest and posttest analyses significantly supported the effects of security training, and Cohen’s d effect size reiterated the importance of progressive outcomes in their security literacy and practices. The intervention focused on the importance of threat perception and coping appraisal for inculcating security parameters and behavioral change among the teenagers.KEYWORDS: Information security awarenesssecurity practicesemail securitypassword securitysecurity training AcknowledgmentsWe would like to thank all the candidates who have participated in this research and spent time with us in spite of their busy commitments.Disclosure statementNo potential conflict of interest was reported by the author(s).","PeriodicalId":54855,"journal":{"name":"Journal of Computer Information Systems","volume":"493 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136376378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Recent Advancements in Machine Learning for Cybercrime Prediction 机器学习在网络犯罪预测中的最新进展
4区 管理学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-10-24 DOI: 10.1080/08874417.2023.2270457
Elluri, Lavanya, Mandalapu, Varun, Vyas, Piyush, Roy, Nirmalya
ABSTRACTCybercrime is a growing threat to organizations and individuals worldwide, with criminals using sophisticated techniques to breach security systems and steal sensitive data. This paper aims to comprehensively survey the latest advancements in cybercrime prediction, highlighting the relevant research. For this purpose, we reviewed more than 150 research articles and discussed 50 most recent and appropriate ones. We start the review with some standard methods cybercriminals use and then focus on the latest machine and deep learning techniques, which detect anomalous behavior and identify potential threats. We also discuss transfer learning, which allows models trained on one dataset to be adapted for use on another dataset. We then focus on active and reinforcement learning as part of early-stage algorithmic research in cybercrime prediction. Finally, we discuss critical innovations, research gaps, and future research opportunities in Cybercrime prediction. This paper presents a holistic view of cutting-edge developments and publicly available datasets.KEYWORDS: Cybercrime predictionmachine learningcybersecurity AcknowledgmentsThe authors wish to acknowledge all those who contributed to the preparation and revision of the manuscript.Disclosure statementNo potential conflict of interest was reported by the author(s).
摘要网络犯罪对世界各地的组织和个人构成了日益严重的威胁,犯罪分子利用复杂的技术破坏安全系统并窃取敏感数据。本文旨在全面综述网络犯罪预测的最新进展,重点介绍相关研究。为此,我们回顾了150多篇研究文章,并讨论了50篇最新和最合适的文章。我们首先回顾了网络犯罪分子使用的一些标准方法,然后关注最新的机器和深度学习技术,这些技术可以检测异常行为并识别潜在威胁。我们还讨论了迁移学习,它允许在一个数据集上训练的模型适用于另一个数据集。然后,我们将重点放在主动学习和强化学习上,作为网络犯罪预测早期算法研究的一部分。最后,我们讨论了网络犯罪预测的关键创新、研究差距和未来的研究机会。本文介绍了前沿发展和公开可用数据集的整体视图。关键词:网络犯罪预测;机器学习;网络安全致谢作者希望感谢所有为本文的准备和修订做出贡献的人。披露声明作者未报告潜在的利益冲突。
{"title":"Recent Advancements in Machine Learning for Cybercrime Prediction","authors":"Elluri, Lavanya, Mandalapu, Varun, Vyas, Piyush, Roy, Nirmalya","doi":"10.1080/08874417.2023.2270457","DOIUrl":"https://doi.org/10.1080/08874417.2023.2270457","url":null,"abstract":"ABSTRACTCybercrime is a growing threat to organizations and individuals worldwide, with criminals using sophisticated techniques to breach security systems and steal sensitive data. This paper aims to comprehensively survey the latest advancements in cybercrime prediction, highlighting the relevant research. For this purpose, we reviewed more than 150 research articles and discussed 50 most recent and appropriate ones. We start the review with some standard methods cybercriminals use and then focus on the latest machine and deep learning techniques, which detect anomalous behavior and identify potential threats. We also discuss transfer learning, which allows models trained on one dataset to be adapted for use on another dataset. We then focus on active and reinforcement learning as part of early-stage algorithmic research in cybercrime prediction. Finally, we discuss critical innovations, research gaps, and future research opportunities in Cybercrime prediction. This paper presents a holistic view of cutting-edge developments and publicly available datasets.KEYWORDS: Cybercrime predictionmachine learningcybersecurity AcknowledgmentsThe authors wish to acknowledge all those who contributed to the preparation and revision of the manuscript.Disclosure statementNo potential conflict of interest was reported by the author(s).","PeriodicalId":54855,"journal":{"name":"Journal of Computer Information Systems","volume":"44 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135220216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Spoofed Email Based Cyberattack Detection Using Machine Learning 基于欺骗电子邮件的机器学习网络攻击检测
4区 管理学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-10-20 DOI: 10.1080/08874417.2023.2270452
Sanjeev Shukla, Manoj Misra, Gaurav Varshney
ABSTRACTCyberattacks on e-mails are of different types, but the most pervasive and ubiquitous are spoofing attacks. Our approach uses memory forensics to extract e-mail headers from live memory to perform an e-mail header investigation to identify spoofing attacks. We have identified the research gaps and advanced our work to achieve better results. In this paper, we have made two significant improvements. First is URL validation module that uses a novel technique of checking each captured URL with an MX record and e-mail URL features. This scheme is fast, and reduces the total time from 35 sec to 27 sec. Second, spoofed e-mail detection is ameliorated by applying an ML model built using two novel e-mail header fields (BIMI and X-FraudScore) and four authentication header fields (SPF, DKIM, DMARC, and ARC). This enhances the spoofed e-mail detection accuracy from 96.15% to 97.57% with low false positives.KEYWORDS: Email spoofingemail attacksmemory forensicsemail forensicscyber-security Disclosure statementNo potential conflict of interest was reported by the author(s).Data availability statementThe datasets generated during and/or analyzed during the current study are available from the corresponding author on reasonable request through email.
摘要针对电子邮件的网络攻击有多种类型,但最普遍和最普遍的是欺骗攻击。我们的方法使用内存取证从实时内存中提取电子邮件头,以执行电子邮件头调查以识别欺骗攻击。我们已经确定了研究差距,并推进了我们的工作,以取得更好的结果。在本文中,我们做了两个显著的改进。首先是URL验证模块,它使用一种新颖的技术,用MX记录和电子邮件URL特性检查每个捕获的URL。该方案速度快,将总时间从35秒减少到27秒。其次,通过使用两个新的电子邮件头字段(BIMI和X-FraudScore)和四个认证头字段(SPF, DKIM, DMARC和ARC)构建的ML模型,改进了欺骗电子邮件检测。这使得欺骗电子邮件的检测准确率从96.15%提高到97.57%,并且误报率低。关键词:电子邮件欺骗电子邮件攻击记忆取证电子邮件取证网络安全披露声明作者未报告潜在的利益冲突。数据可用性声明当前研究期间生成和/或分析的数据集可通过电子邮件从通讯作者处合理索取。
{"title":"Spoofed Email Based Cyberattack Detection Using Machine Learning","authors":"Sanjeev Shukla, Manoj Misra, Gaurav Varshney","doi":"10.1080/08874417.2023.2270452","DOIUrl":"https://doi.org/10.1080/08874417.2023.2270452","url":null,"abstract":"ABSTRACTCyberattacks on e-mails are of different types, but the most pervasive and ubiquitous are spoofing attacks. Our approach uses memory forensics to extract e-mail headers from live memory to perform an e-mail header investigation to identify spoofing attacks. We have identified the research gaps and advanced our work to achieve better results. In this paper, we have made two significant improvements. First is URL validation module that uses a novel technique of checking each captured URL with an MX record and e-mail URL features. This scheme is fast, and reduces the total time from 35 sec to 27 sec. Second, spoofed e-mail detection is ameliorated by applying an ML model built using two novel e-mail header fields (BIMI and X-FraudScore) and four authentication header fields (SPF, DKIM, DMARC, and ARC). This enhances the spoofed e-mail detection accuracy from 96.15% to 97.57% with low false positives.KEYWORDS: Email spoofingemail attacksmemory forensicsemail forensicscyber-security Disclosure statementNo potential conflict of interest was reported by the author(s).Data availability statementThe datasets generated during and/or analyzed during the current study are available from the corresponding author on reasonable request through email.","PeriodicalId":54855,"journal":{"name":"Journal of Computer Information Systems","volume":"6 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135567535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Temporal Graph Infomax for Imbalanced Insider Threat Detection 用于不平衡内部威胁检测的深度时间图信息集
4区 管理学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-10-18 DOI: 10.1080/08874417.2023.2267510
Peng Gao, Haotian Zhang, Ming Wang, Weiyong Yang, Xinshen Wei, Zhuo Lv, Zengzhou Ma
ABSTRACTInsider threats pose a significant concern for critical information infrastructures. Graph neural networks are widely used for detection due to their ability to model complex relationships among network entities. However, deep learning algorithms struggle with learning from business system data as anomalies are extremely rare. To tackle this challenge, we propose deep temporal graph infomax (DTGI), a new method for detecting insider threats in real-world scenarios with highly imbalanced data. DTGI utilizes an extended continuous-time dynamic heterogeneous graph network and a behavior context constraint anomaly sample generator. This generator incorporates attack behavior context constraints to augment attack samples and enhance the performance of the supervised model. Extensive experiments conducted on the CERT dataset, consisting of over one million records, demonstrate that DTGI surpasses state-of-the-art methods in terms of detection performance.KEYWORDS: Insider threatanomaly detectiondynamic graphgraph neural networkgraph contrastive learning Disclosure statementNo potential conflict of interest was reported by the author(s).Additional informationFundingThis work is supported by the State Grid Science and Technology Project [Project No.5108-202224046A-1-1-ZN].
内部威胁是关键信息基础设施面临的一个重要问题。图神经网络由于能够对网络实体之间的复杂关系进行建模而被广泛用于检测。然而,深度学习算法很难从业务系统数据中学习,因为异常非常罕见。为了应对这一挑战,我们提出了深度时序图信息集(DTGI),这是一种在数据高度不平衡的现实场景中检测内部威胁的新方法。DTGI利用扩展的连续时间动态异构图网络和行为上下文约束异常样本生成器。该生成器结合了攻击行为上下文约束,以增加攻击样本并提高监督模型的性能。在CERT数据集上进行的大量实验,包括超过一百万条记录,表明DTGI在检测性能方面超过了最先进的方法。关键词:内部威胁异常检测动态图形神经网络对比学习披露声明作者未报告潜在的利益冲突。本研究由国家电网科技计划项目[项目No.5108-202224046A-1-1-ZN]资助。
{"title":"Deep Temporal Graph Infomax for Imbalanced Insider Threat Detection","authors":"Peng Gao, Haotian Zhang, Ming Wang, Weiyong Yang, Xinshen Wei, Zhuo Lv, Zengzhou Ma","doi":"10.1080/08874417.2023.2267510","DOIUrl":"https://doi.org/10.1080/08874417.2023.2267510","url":null,"abstract":"ABSTRACTInsider threats pose a significant concern for critical information infrastructures. Graph neural networks are widely used for detection due to their ability to model complex relationships among network entities. However, deep learning algorithms struggle with learning from business system data as anomalies are extremely rare. To tackle this challenge, we propose deep temporal graph infomax (DTGI), a new method for detecting insider threats in real-world scenarios with highly imbalanced data. DTGI utilizes an extended continuous-time dynamic heterogeneous graph network and a behavior context constraint anomaly sample generator. This generator incorporates attack behavior context constraints to augment attack samples and enhance the performance of the supervised model. Extensive experiments conducted on the CERT dataset, consisting of over one million records, demonstrate that DTGI surpasses state-of-the-art methods in terms of detection performance.KEYWORDS: Insider threatanomaly detectiondynamic graphgraph neural networkgraph contrastive learning Disclosure statementNo potential conflict of interest was reported by the author(s).Additional informationFundingThis work is supported by the State Grid Science and Technology Project [Project No.5108-202224046A-1-1-ZN].","PeriodicalId":54855,"journal":{"name":"Journal of Computer Information Systems","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135825277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Potential of Generative Artificial Intelligence Across Disciplines: Perspectives and Future Directions 跨学科生成人工智能的潜力:观点和未来方向
4区 管理学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-10-05 DOI: 10.1080/08874417.2023.2261010
Keng-Boon Ooi, Garry Wei-Han Tan, Mostafa Al-Emran, Mohammed A. Al-Sharafi, Alexandru Capatina, Amrita Chakraborty, Yogesh K. Dwivedi, Tzu-Ling Huang, Arpan Kumar Kar, Voon-Hsien Lee, Xiu-Ming Loh, Adrian Micu, Patrick Mikalef, Emmanuel Mogaji, Neeraj Pandey, Ramakrishnan Raman, Nripendra P. Rana, Prianka Sarker, Anshuman Sharma, Ching-I Teng, Samuel Fosso Wamba, Lai-Wan Wong
ABSTRACTIn a short span of time since its introduction, generative artificial intelligence (AI) has garnered much interest at both personal and organizational levels. This is because of its potential to cause drastic and widespread shifts in many aspects of life that are comparable to those of the Internet and smartphones. More specifically, generative AI utilizes machine learning, neural networks, and other techniques to generate new content (e.g. text, images, music) by analyzing patterns and information from the training data. This has enabled generative AI to have a wide range of applications, from creating personalized content to improving business operations. Despite its many benefits, there are also significant concerns about the negative implications of generative AI. In view of this, the current article brings together experts in a variety of fields to expound and provide multi-disciplinary insights on the opportunities, challenges, and research agendas of generative AI in specific industries (i.e. marketing, healthcare, human resource, education, banking, retailing, the workplace, manufacturing, and sustainable IT management).KEYWORDS: Generative artificial intelligencemachine learninglarge language modelChatGPTBard Disclosure statementNo potential conflict of interest was reported by the author(s).
摘要:生成式人工智能(AI)自推出以来,在很短的时间内引起了个人和组织层面的极大兴趣。这是因为它有可能在生活的许多方面引起剧烈而广泛的变化,堪比互联网和智能手机。更具体地说,生成式人工智能利用机器学习、神经网络和其他技术,通过分析来自训练数据的模式和信息来生成新的内容(例如文本、图像、音乐)。这使得生成式人工智能具有广泛的应用,从创建个性化内容到改善业务运营。尽管生成式人工智能有很多好处,但也有很多人担心它的负面影响。鉴于此,本文汇集了各个领域的专家,就特定行业(即营销、医疗保健、人力资源、教育、银行、零售、工作场所、制造业和可持续IT管理)的生成式人工智能的机遇、挑战和研究议程进行阐述和提供多学科见解。关键词:生成式人工智能机器学习大型语言模型chatgptbard披露声明作者未报告潜在的利益冲突。
{"title":"The Potential of Generative Artificial Intelligence Across Disciplines: Perspectives and Future Directions","authors":"Keng-Boon Ooi, Garry Wei-Han Tan, Mostafa Al-Emran, Mohammed A. Al-Sharafi, Alexandru Capatina, Amrita Chakraborty, Yogesh K. Dwivedi, Tzu-Ling Huang, Arpan Kumar Kar, Voon-Hsien Lee, Xiu-Ming Loh, Adrian Micu, Patrick Mikalef, Emmanuel Mogaji, Neeraj Pandey, Ramakrishnan Raman, Nripendra P. Rana, Prianka Sarker, Anshuman Sharma, Ching-I Teng, Samuel Fosso Wamba, Lai-Wan Wong","doi":"10.1080/08874417.2023.2261010","DOIUrl":"https://doi.org/10.1080/08874417.2023.2261010","url":null,"abstract":"ABSTRACTIn a short span of time since its introduction, generative artificial intelligence (AI) has garnered much interest at both personal and organizational levels. This is because of its potential to cause drastic and widespread shifts in many aspects of life that are comparable to those of the Internet and smartphones. More specifically, generative AI utilizes machine learning, neural networks, and other techniques to generate new content (e.g. text, images, music) by analyzing patterns and information from the training data. This has enabled generative AI to have a wide range of applications, from creating personalized content to improving business operations. Despite its many benefits, there are also significant concerns about the negative implications of generative AI. In view of this, the current article brings together experts in a variety of fields to expound and provide multi-disciplinary insights on the opportunities, challenges, and research agendas of generative AI in specific industries (i.e. marketing, healthcare, human resource, education, banking, retailing, the workplace, manufacturing, and sustainable IT management).KEYWORDS: Generative artificial intelligencemachine learninglarge language modelChatGPTBard Disclosure statementNo potential conflict of interest was reported by the author(s).","PeriodicalId":54855,"journal":{"name":"Journal of Computer Information Systems","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134947432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Legal and Privacy Concerns of BYOD Adoption BYOD采用的法律和隐私问题
4区 管理学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-10-02 DOI: 10.1080/08874417.2023.2259346
Kenan Degirmenci, Michael H. Breitner, Ferry Nolte, Jens Passlick
We investigate legal concerns in privacy calculus, which are currently not given enough attention in privacy research. Legal aspects can lead to liability issues in various information systems scenarios such as bring your own device (BYOD) in the workplace. To analyze the impact of legal concerns in privacy calculus, we conducted a quantitative study by surveying 542 employees from three countries: United States, Germany, and South Korea. Building on our research model to test our hypothesized relationships, structural equation modeling was employed. Our findings provide recommendations for multinational organizations to mitigate legal concerns in privacy calculus. A comparison of the three countries reveals that employees from the United States and South Korea place greater emphasis on legal concerns compared to German employees. We develop an understanding of employees’ concerns with liability issues, and how these affect their privacy calculus in a BYOD context.
本文探讨了隐私演算中存在的法律问题,这些问题目前在隐私研究中还没有得到足够的重视。法律方面可能导致各种信息系统场景中的责任问题,例如在工作场所携带自己的设备(BYOD)。为了分析法律问题对隐私计算的影响,我们对来自美国、德国和韩国三个国家的542名员工进行了定量研究。在我们的研究模型的基础上,采用结构方程模型来检验我们假设的关系。我们的研究结果为跨国组织减轻隐私演算中的法律问题提供了建议。对这三个国家的比较表明,与德国员工相比,美国和韩国的员工更重视法律问题。我们了解员工对责任问题的关注,以及这些问题如何影响他们在BYOD环境下的隐私计算。
{"title":"Legal and Privacy Concerns of BYOD Adoption","authors":"Kenan Degirmenci, Michael H. Breitner, Ferry Nolte, Jens Passlick","doi":"10.1080/08874417.2023.2259346","DOIUrl":"https://doi.org/10.1080/08874417.2023.2259346","url":null,"abstract":"We investigate legal concerns in privacy calculus, which are currently not given enough attention in privacy research. Legal aspects can lead to liability issues in various information systems scenarios such as bring your own device (BYOD) in the workplace. To analyze the impact of legal concerns in privacy calculus, we conducted a quantitative study by surveying 542 employees from three countries: United States, Germany, and South Korea. Building on our research model to test our hypothesized relationships, structural equation modeling was employed. Our findings provide recommendations for multinational organizations to mitigate legal concerns in privacy calculus. A comparison of the three countries reveals that employees from the United States and South Korea place greater emphasis on legal concerns compared to German employees. We develop an understanding of employees’ concerns with liability issues, and how these affect their privacy calculus in a BYOD context.","PeriodicalId":54855,"journal":{"name":"Journal of Computer Information Systems","volume":"889 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135829915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Post-Quantum Cryptography Research Landscape: A Scientometric Perspective 后量子密码学研究前景:科学计量学视角
4区 管理学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-29 DOI: 10.1080/08874417.2023.2260333
Priya Sharma, Vrinda Gupta, Sandeep Kumar Sood
ABSTRACTPost-quantum cryptography (PQC) is under development to guard against the threats of quantum computers by implementing a new class of cryptosystems. In this direction, much work has been done since 2006, which has led to many publications. Hence, this study presents an overview of PQC research through scientometric analysis of the data containing 1611 publications published from 2006 to 2023, retrieved from the Scopus database. The analysis identifies growth, trends, leading countries, and significant publications, providing insights into impactful PQC research. It also demonstrates a significant rise in publications after 2015, and the United States is a highly productive country. Furthermore, this study also discusses the managerial view, which can assist technology managers in understanding its impact on global and local markets. The findings of this analysis can be a valuable resource for researchers, policymakers, and stakeholders interested in the future of cryptography and other potential impacts of quantum computing.KEYWORDS: Post-quantum cryptography (PQC)scientometricVOSviewerpublication trendsmanagerial perspective Disclosure statementNo potential conflict of interest was reported by the author(s).Data availability statementThe data supporting the findings presented in this article is downloadable from Scopus database or can be made available by the corresponding author upon reasonable request.Notesa These classifications of economic status are done according to statistics prepared by the Economy Analysis and Policy Division (EAPD) of the Department of Economy and Social Affairs of the United Nations Secretariat. For more, readers are requested to refer toCitation50
摘要后量子密码学(post -quantum cryptography, PQC)是一种新型的密码系统,旨在防范量子计算机的威胁。在这个方向上,自2006年以来已经做了很多工作,这导致了许多出版物。因此,本研究通过对Scopus数据库中2006年至2023年发表的1611篇论文的科学计量分析,概述了PQC研究的概况。该分析确定了增长、趋势、主要国家和重要出版物,为有影响力的PQC研究提供了见解。它还显示,2015年之后,美国的出版物数量显著增加,美国是一个生产力很高的国家。此外,本研究还讨论了管理观点,这可以帮助技术经理了解其对全球和当地市场的影响。对于对密码学的未来和量子计算的其他潜在影响感兴趣的研究人员、政策制定者和利益相关者来说,这一分析的结果可以成为宝贵的资源。关键词:后量子密码学(PQC)科学计量学vosview出版趋势管理观点披露声明作者未报告潜在的利益冲突。数据可用性声明支持本文研究结果的数据可从Scopus数据库下载,或应通讯作者的合理要求提供。这些经济地位分类是根据联合国秘书处经济和社会事务部经济分析和政策司(经济分析和政策司)编制的统计数字作出的。欲了解更多,请参阅citation50
{"title":"Post-Quantum Cryptography Research Landscape: A Scientometric Perspective","authors":"Priya Sharma, Vrinda Gupta, Sandeep Kumar Sood","doi":"10.1080/08874417.2023.2260333","DOIUrl":"https://doi.org/10.1080/08874417.2023.2260333","url":null,"abstract":"ABSTRACTPost-quantum cryptography (PQC) is under development to guard against the threats of quantum computers by implementing a new class of cryptosystems. In this direction, much work has been done since 2006, which has led to many publications. Hence, this study presents an overview of PQC research through scientometric analysis of the data containing 1611 publications published from 2006 to 2023, retrieved from the Scopus database. The analysis identifies growth, trends, leading countries, and significant publications, providing insights into impactful PQC research. It also demonstrates a significant rise in publications after 2015, and the United States is a highly productive country. Furthermore, this study also discusses the managerial view, which can assist technology managers in understanding its impact on global and local markets. The findings of this analysis can be a valuable resource for researchers, policymakers, and stakeholders interested in the future of cryptography and other potential impacts of quantum computing.KEYWORDS: Post-quantum cryptography (PQC)scientometricVOSviewerpublication trendsmanagerial perspective Disclosure statementNo potential conflict of interest was reported by the author(s).Data availability statementThe data supporting the findings presented in this article is downloadable from Scopus database or can be made available by the corresponding author upon reasonable request.Notesa These classifications of economic status are done according to statistics prepared by the Economy Analysis and Policy Division (EAPD) of the Department of Economy and Social Affairs of the United Nations Secretariat. For more, readers are requested to refer toCitation50","PeriodicalId":54855,"journal":{"name":"Journal of Computer Information Systems","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135193537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT and Blockchain: A Review and a Technical-Legal-Social Acceptance Model 物联网和区块链:回顾和技术-法律-社会接受模型
4区 管理学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-29 DOI: 10.1080/08874417.2023.2259334
Katia Guerra, Chang Koh, Victor Prybutok, Vess Johnson
ABSTRACTInternet of Things (IoT) and blockchain are complex digital technologies characterized by a strong connection and dependency between individuals, data, and information technology (IT). A socio-technical perspective that captures the dynamic interaction of social, legal, and technical artifacts is essential to understanding the IoT and blockchain phenomena. This review provides direction for employing a social-technical perspective across IoT and blockchain studies. The findings lead to new insights for developing a theoretical framework, research model, and research agenda to investigate IoT and blockchain technology. Practitioners and institutions can use these findings to develop strategies to promote the adoption of IoT and blockchain technologies through specific technical, legal, and social strategies. Overall, this research is unique in its attempt to trace new trajectories for future IS scholars and practitioners facing the complexity of IoT and blockchain.KEYWORDS: Internet of thingsblockchainsocio-technical paradigmsocial, legal, and technical factors Disclosure statementNo potential conflict of interest was reported by the author(s).
物联网(IoT)和区块链是复杂的数字技术,其特点是个体、数据和信息技术(IT)之间具有很强的联系和依赖性。捕捉社会、法律和技术工件的动态交互的社会技术视角对于理解物联网和区块链现象至关重要。这篇综述为在物联网和区块链研究中采用社会技术视角提供了方向。这些发现为开发研究物联网和区块链技术的理论框架、研究模型和研究议程提供了新的见解。从业者和机构可以利用这些发现制定战略,通过具体的技术、法律和社会战略促进物联网和区块链技术的采用。总的来说,这项研究的独特之处在于,它试图为未来面对物联网和区块链复杂性的is学者和从业者追踪新的轨迹。关键词:物联网区块链社会技术范式社会、法律和技术因素披露声明作者未报告潜在的利益冲突。
{"title":"IoT and Blockchain: A Review and a Technical-Legal-Social Acceptance Model","authors":"Katia Guerra, Chang Koh, Victor Prybutok, Vess Johnson","doi":"10.1080/08874417.2023.2259334","DOIUrl":"https://doi.org/10.1080/08874417.2023.2259334","url":null,"abstract":"ABSTRACTInternet of Things (IoT) and blockchain are complex digital technologies characterized by a strong connection and dependency between individuals, data, and information technology (IT). A socio-technical perspective that captures the dynamic interaction of social, legal, and technical artifacts is essential to understanding the IoT and blockchain phenomena. This review provides direction for employing a social-technical perspective across IoT and blockchain studies. The findings lead to new insights for developing a theoretical framework, research model, and research agenda to investigate IoT and blockchain technology. Practitioners and institutions can use these findings to develop strategies to promote the adoption of IoT and blockchain technologies through specific technical, legal, and social strategies. Overall, this research is unique in its attempt to trace new trajectories for future IS scholars and practitioners facing the complexity of IoT and blockchain.KEYWORDS: Internet of thingsblockchainsocio-technical paradigmsocial, legal, and technical factors Disclosure statementNo potential conflict of interest was reported by the author(s).","PeriodicalId":54855,"journal":{"name":"Journal of Computer Information Systems","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135193680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Job Performance in Digital Work: Do Personality Traits Matter? 数字化工作中的工作表现:人格特质重要吗?
4区 管理学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-27 DOI: 10.1080/08874417.2023.2255551
Sophia Xiaoxia Duan, Hepu Deng
This paper investigates whether personality traits matter in job performance in digital work. A conceptual model is developed within the background of the big five personality traits theory and the boundary theory. This model is then tested and validated using structural equation modeling of the survey data in Australia. The study shows that agreeableness, conscientiousness, and extraversion significantly influence job performance while neuroticism and conscientiousness have significant influence on work-life balance. It finds that individuals’ attitude toward digital work negatively moderates the influence of agreeableness on work-life balance and the impact of conscientiousness on job performance. The study reveals that work-life balance has a significant and direct influence on job performance. This study extends existing research on the relationship between job performance, work-life balance, and personality traits and enhances the knowledge of the interplay between digital technologies and individuals in digital work.
本文研究了数字化工作中人格特质对工作绩效的影响。在大五人格特质理论和边界理论的背景下,建立了一个概念模型。然后使用澳大利亚调查数据的结构方程模型对该模型进行了测试和验证。研究发现,亲和性、尽责性和外向性显著影响工作绩效,神经质和尽责性显著影响工作与生活的平衡。研究发现,个体对数字工作的态度负向调节了亲和性对工作与生活平衡的影响和尽责性对工作绩效的影响。研究发现,工作与生活的平衡对工作绩效有显著而直接的影响。本研究扩展了已有的工作绩效、工作与生活平衡、人格特质之间关系的研究,增强了对数字工作中数字技术与个体之间相互作用的认识。
{"title":"Job Performance in Digital Work: Do Personality Traits Matter?","authors":"Sophia Xiaoxia Duan, Hepu Deng","doi":"10.1080/08874417.2023.2255551","DOIUrl":"https://doi.org/10.1080/08874417.2023.2255551","url":null,"abstract":"This paper investigates whether personality traits matter in job performance in digital work. A conceptual model is developed within the background of the big five personality traits theory and the boundary theory. This model is then tested and validated using structural equation modeling of the survey data in Australia. The study shows that agreeableness, conscientiousness, and extraversion significantly influence job performance while neuroticism and conscientiousness have significant influence on work-life balance. It finds that individuals’ attitude toward digital work negatively moderates the influence of agreeableness on work-life balance and the impact of conscientiousness on job performance. The study reveals that work-life balance has a significant and direct influence on job performance. This study extends existing research on the relationship between job performance, work-life balance, and personality traits and enhances the knowledge of the interplay between digital technologies and individuals in digital work.","PeriodicalId":54855,"journal":{"name":"Journal of Computer Information Systems","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135535370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Computer Information Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1