{"title":"FACTORS INFLUENCING THE DEVELOPMENT OF A SUCCESSFUL CYBERSECURITY CULTURE","authors":"","doi":"10.48009/4_iis_2023_105","DOIUrl":"https://doi.org/10.48009/4_iis_2023_105","url":null,"abstract":"","PeriodicalId":33557,"journal":{"name":"Issues in Information Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135753449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A NARRATIVE REVIEW OF ADAVNTAGEOUS CYBERSECURITY FRAMEWORKS AND REGULATIONS IN THE UNITED STATES HEALTHCARE SYSTEM","authors":"","doi":"10.48009/4_iis_2023_126","DOIUrl":"https://doi.org/10.48009/4_iis_2023_126","url":null,"abstract":"","PeriodicalId":33557,"journal":{"name":"Issues in Information Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135753460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"THE INTEGRATION COMPONENTS BETWEEN ENTERPRISE INFORMATION ARCHITECTURE AND BUSINESS STRATEGY","authors":"","doi":"10.48009/2_iis_2023_110","DOIUrl":"https://doi.org/10.48009/2_iis_2023_110","url":null,"abstract":"","PeriodicalId":33557,"journal":{"name":"Issues in Information Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135753498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"THE UNKNOWN DYNAMISM IN THE ADOPTION OF THE INCIDENT COMMAND SYSTEM","authors":"","doi":"10.48009/4_iis_2023_118","DOIUrl":"https://doi.org/10.48009/4_iis_2023_118","url":null,"abstract":"","PeriodicalId":33557,"journal":{"name":"Issues in Information Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135753781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SOCIAL MEDIAL CHANNELS ARE NOT USEFUL FOR ELECTRONIC WORD-OF-MOUTH IN E-COMMERCE SERVICE RECOVERY","authors":"","doi":"10.48009/4_iis_2023_117","DOIUrl":"https://doi.org/10.48009/4_iis_2023_117","url":null,"abstract":"","PeriodicalId":33557,"journal":{"name":"Issues in Information Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135754000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"USING PREDICTIVE MODELING TO COMBAT MONEY LAUNDERING","authors":"","doi":"10.48009/1_iis_2023_120","DOIUrl":"https://doi.org/10.48009/1_iis_2023_120","url":null,"abstract":"","PeriodicalId":33557,"journal":{"name":"Issues in Information Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135754038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ARTIFICIAL INTELLIGENCE (AI) BIAS IMPACTS: CLASSIFICATION FRAMEWORK FOR EFFECTIVE MITIGATION","authors":"","doi":"10.48009/4_iis_2023_129","DOIUrl":"https://doi.org/10.48009/4_iis_2023_129","url":null,"abstract":"","PeriodicalId":33557,"journal":{"name":"Issues in Information Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135794983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"AN EXPLORATORY STUDY OF MODERATORS IN REMOTE GROUP SECURITY EFFECTIVENESS","authors":"","doi":"10.48009/1_iis_2023_126","DOIUrl":"https://doi.org/10.48009/1_iis_2023_126","url":null,"abstract":"","PeriodicalId":33557,"journal":{"name":"Issues in Information Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135750085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ARTIFICIAL INTELLIGENCE AND ITS POTENTIAL HARM THROUGH THE USE OF GENERATIVE ADVERSARIAL NETWORK IMAGE FILTERS ON TIKTOK","authors":"","doi":"10.48009/1_iis_2023_110","DOIUrl":"https://doi.org/10.48009/1_iis_2023_110","url":null,"abstract":"","PeriodicalId":33557,"journal":{"name":"Issues in Information Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135750088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CYBERSECURITY AWARENESS IN HIGHER EDUCATION: A COMPARATIVE ANALYSIS OF FACULTY AND STAFF","authors":"","doi":"10.48009/1_iis_2023_114","DOIUrl":"https://doi.org/10.48009/1_iis_2023_114","url":null,"abstract":"","PeriodicalId":33557,"journal":{"name":"Issues in Information Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135750093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}