Ahmed, E.M. Modelling information and communications technology cyber security externalities Spillover EFFECTS on sustainable economic growth. J. Knowl. Econ. 2021, 12, 412â430. [CrossRef]
- Alshaikh, M.; Adamson, B. From awareness to influence: Toward a model for improving employeesâ security behaviour. Pers. Ubiquitous Comput. 2021, 25, 829â841. [CrossRef]
Paper not yet in RePEc: Add citation now
- Angst, C.M.; Block, E.S.; DâArcy, J.; Kelley, K. When do it security investments matter? Accounting for the influence of institutional factors in the context of healthcare data breaches. MIS Q. 2017, 41, 893â916. [CrossRef]
Paper not yet in RePEc: Add citation now
- Armenia, S.; Angelini, M.; Nonino, F.; Palombi, G.; Schlitzer, M.F. A dynamic simulation approach to support the evaluation of cyber risks and security investments in SMEs. Decis. Support Syst. 2021, 147, 113580. [CrossRef]
Paper not yet in RePEc: Add citation now
- Bharadwaj, A.S. A resource-based perspective on information technology capability and firm performance: An empirical investigation. MIS Q. 2000, 24, 169â196. [CrossRef]
Paper not yet in RePEc: Add citation now
Blazevic, V.; Lievens, A. Learning during the new financial service innovation process-Antecedents and performance effects. J. Bus. Res. 2004, 57, 374â391. [CrossRef]
- Chang, S.E.; Ho, C.B. Organizational factors to the effectiveness of implementing information security management. Ind. M. Dat. Sys. 2006, 106, 345â361. [CrossRef]
Paper not yet in RePEc: Add citation now
Chang, Y.W.; Chen, J. What motivates customers to shop in smart shops? The impacts of smart technology and technology readiness. J. Retail. Consum. Serv. 2021, 58, 102325. [CrossRef]
Chatterjee, S.; Wernerfelt, B. The link between resources and type of diversification: Theory and evidence. Strateg. Manag. J. 1991, 12, 33â48. [CrossRef]
- Cheng, T.-H. The empirical study of usability and credibility on Intention usage of government-to-citizen services. J. Appl. Data Sci. 2021, 2, 36â44. [CrossRef]
Paper not yet in RePEc: Add citation now
- DâArcy, J.; Herath, T.; Shoss, M.K. Understanding employee responses to stressful information security requirements: A coping perspective. J. Manag. Inf. Syst. 2014, 31, 285â318. [CrossRef]
Paper not yet in RePEc: Add citation now
- Das, T.K.; Teng, B.S. A resource-based theory of strategic alliances. J. Manag. 2000, 26, 31â61. [CrossRef]
Paper not yet in RePEc: Add citation now
- Daud, M.; Rasiah, R.; George, M.; Asirvatham, D.; Thangiah, G. Bridging the gap between organisational practices and cyber security compliance: Can cooperation promote compliance in organisations. Int. J. Bus. Soc. 2018, 19, 161â180.
Paper not yet in RePEc: Add citation now
Demirkan, S.; Demirkan, I.; McKee, A. Blockchain technology in the future of business cyber security and accounting. J. Manag. Anal. 2020, 7, 189â208. [CrossRef]
- DiMaggio, P.J.; Powell, W.W. The iron cage revisited institutional isomorphism and collective rationality in organizational fields. Adv. Strateg. Manag. 2000, 17, 143â166.
Paper not yet in RePEc: Add citation now
- Du, H.T.; Tho, N.X. Purchasing power parity between Vietnam and United States. Int. J. Appl. Inf. Manag. 2022, 2, 26â33.
Paper not yet in RePEc: Add citation now
Eccles, R.G.; Ioannou, I.; Serafeim, G. The impact of corporate sustainability on organizational processes and performance. Manag. Sci. 2014, 60, 2835â2857. [CrossRef]
- Eilts, D. An Empirical Assessment of Cybersecurity Readiness and Resilience in Small Businesses. Ph.D. Thesis, Nova Southeastern University, Fort Lauderdale, FL, USA, 16 April 2020.
Paper not yet in RePEc: Add citation now
- Estetikha, A.K.A.; Gutama, D.H.; Pradana, M.G.; Wijaya, D.P. Comparison of K-means clustering & logistic regression on university data to differentiate between public and private university. Int. J. Inform. Inf. Syst. 2021, 4, 21â29.
Paper not yet in RePEc: Add citation now
- Franco, M.; Haase, H. Firm resources and entrepreneurial orientation as determinants for collaborative entrepreneurship. Manag. Decis. 2013, 51, 680â696. [CrossRef]
Paper not yet in RePEc: Add citation now
Gao, X.; Zhong, W. A differential game approach to security investment and information sharing in a competitive environment. IIE Trans. Institute Ind. 2016, 48, 511â526. [CrossRef]
- Gefen, D.; Rigdon, E.E.; Straub, D.; Quarterly, S.M.I.S.; June, N. Editorâs comments: An update and extension to SEM guidelines for administrative and social science research. MIS Q. 2019, 35, 3â14. [CrossRef]
Paper not yet in RePEc: Add citation now
- Hariguna, T. An Empirical Study to Understanding Students Continuance Intention Use of Multimedia Online Learning. Int. J. Appl. Inf. Manag. 2021, 1, 42â52. [CrossRef] Sustainability 2021, 13, 13761 20 of 20
Paper not yet in RePEc: Add citation now
- Hasan, S.; Ali, M.; Kurnia, S.; Thurasamy, R. Evaluating the cyber security readiness of organizations and its influence on performance. J. Inf. Secur. Appl. 2021, 58, 102726. [CrossRef]
Paper not yet in RePEc: Add citation now
- Herold, R. Addressing privacy issues during disaster recovery. Inf. Syst. Secur. 2006, 14, 16â22. [CrossRef]
Paper not yet in RePEc: Add citation now
- Hitoshi, H.; Shogo, K.; Masakazu, O. The effectiveness of the body of knowledge process in the startup analysis of efficiency by applying startup management body of knowledge (SUBOK) guide. Int. J. Appl. Inf. Manag. 2021, 1, 28â49. [CrossRef]
Paper not yet in RePEc: Add citation now
- Hoc, L.; Fong, N.; Law, R. A primer on partial least squares structural equation modeling (PLS-SEM). Eur. J. Tour. Res. 2014, 6, 211â213.
Paper not yet in RePEc: Add citation now
- Hofer, C.W.; Schendel, D. Strategy Formulation: Analytic Concepts; West Publishing: West St. Paul, MN, USA, 1978.
Paper not yet in RePEc: Add citation now
- Hori, M. Study of career education for women: Development of global human resources. Int. J. Appl. Inf. Manag. 2021, 1, 11â20. [CrossRef]
Paper not yet in RePEc: Add citation now
Hsu, C.; Lee, J.-N.; Straub, D.W. Institutional influences on information systems security innovations. Inf. Syst. Res. 2012, 23, 918â939. [CrossRef]
- Hwang, K.; Choi, M. Effects of innovation-supportive culture and organizational citizenship behavior on e-government information system security stemming from mimetic isomorphism. Gov. Inf. Q. 2017, 34, 183â198. [CrossRef]
Paper not yet in RePEc: Add citation now
- Integrating technology readiness into business technology: The TRAM model. Psychol. Mark. 2010, 31, 224â238.
Paper not yet in RePEc: Add citation now
- Kankanhalli, A.; Teo, H.H.; Tan, B.C.Y.; Wei, K.K. An integrative study of information systems security effectiveness. Int. J. Inf. Manag. 2003, 23, 139â154. [CrossRef]
Paper not yet in RePEc: Add citation now
- Kasperskylab. KSN Report: Ransomware and Malicious Cryptominers 2016â2018. Retrieved from Kaspersky Business Hub. 2018. Available online: https://cloud.kaspersky.com (accessed on 21 July 2021).
Paper not yet in RePEc: Add citation now
Kong, H.-K.; Kim, T.-S.; Kim, J. An analysis on effects of information security investments: A BSC perspective. J. Intell. Manuf. 2012, 23, 941â953. [CrossRef]
- Kraemer, S.; Carayon, P.; Clem, J. Human and organizational factors in computer and information security: Pathways to vulnerabilities. Comput. Secur. 2009, 28, 509â520. [CrossRef]
Paper not yet in RePEc: Add citation now
- Krishnan, R.; Martin, X.; Noorderhaven, N.G. When does trust matter to alliance performance? Acad. Manag. J. 2006, 49, 894â917. [CrossRef]
Paper not yet in RePEc: Add citation now
- Kuan, K.K.Y.; Chau, P.Y.K. A perception-based model for EDI adoption in small businesses using a technology-organizationenvironment framework. Inf. Manag. 2001, 38, 507â521. [CrossRef] Sustainability 2021, 13, 13761 19 of 20
Paper not yet in RePEc: Add citation now
- Ky Vien, N. Modelling the relationship of perceived quality, destination image, and tourist satisfaction at the destination level. Int. J. Appl. Inf. Manag. 2021, 1, 165â172. [CrossRef]
Paper not yet in RePEc: Add citation now
- Lesma, V.B.; Okada, H. Effect of textual errors on the evaluation of a foreign online store. Int. J. Inform. Inf. Syst. 2020, 3, 121â127. [CrossRef]
Paper not yet in RePEc: Add citation now
- Li, L.; He, W.; Xu, L.; Ash, I.; Anwar, M.; Yuan, X. Investigating the impact of cyber security policy awareness on employeesâ cyber security behavior. Int. J. Inf. Manag. 2018, 45, 13â24. [CrossRef]
Paper not yet in RePEc: Add citation now
- Lin, C.H.; Shih, H.Y.; Sher, P.J. Integrating technology readiness into technology acceptance: The TRAM model. Psychol. Mark. 2007, 24, 641â657. [CrossRef]
Paper not yet in RePEc: Add citation now
- Lin, J.S.C.; Hsieh, P.L. Refinement of the technology readiness index scale: A replication and cross-validation in the self-service technology context. J. Serv. Manag. 2012, 23, 34â53. [CrossRef]
Paper not yet in RePEc: Add citation now
- Lin, J.S.C.; Hsieh, P.L. The influence of technology readiness on satisfaction and behavioral intentions toward self-service technologies. Comput. Hum. Behav. 2007, 23, 1597â1615. [CrossRef]
Paper not yet in RePEc: Add citation now
- Lin, Y.J. An exploration into trust and privacy management in a digital age. Int. J. Appl. Inf. Manag. 2022, 2, 34â43. [CrossRef]
Paper not yet in RePEc: Add citation now
- Maillard, D. The obsolescence of man in the digital society. Int. J. Appl. Inf. Manag. 2021, 1, 99â124. [CrossRef]
Paper not yet in RePEc: Add citation now
Mohebbi, S.; Li, X. Coalitional game theory approach to modeling suppliersâ collaboration in supply networks. Int. J. Prod. Econ. 2015, 169, 333â342. [CrossRef]
- Moskal, E.J. A model for establishing a cyber security center of excellence. Inf. Syst. Educ. Conf. 2015, 13, 97â108.
Paper not yet in RePEc: Add citation now
Nagurney, A.; Shukla, S. Multifirm models of cyber security investment competition vs. cooperation and network vulnerability. Eur. J. Oper. Res. 2017, 260, 588â600. [CrossRef]
- Neumann, J.V.; Morgenstern, O. Theory of Games and Economic Behavior; Princeton University Press: Princeton, NJ, USA, 1944.
Paper not yet in RePEc: Add citation now
- Nicholson, S. How ethical hacking can protect organisations from a greater threat. Comput. Fraud Secur. 2019, 2019, 15â19. [CrossRef]
Paper not yet in RePEc: Add citation now
- Njenga, K.; Jordaan, P. We want to do it our way: The neutralisation approach to managing information systems security by small businesses. Afr. J. Inf. Syst. 2015, 8, 3.
Paper not yet in RePEc: Add citation now
- Nugroho, M.A.; Fajar, M.A. Effects of technology readiness towards acceptance of mandatory web-based attendance system. Procedia Comput. Sci. 2017, 124, 319â328. [CrossRef]
Paper not yet in RePEc: Add citation now
- Oliveira, T.; Martins, M.F. Information technology adoption models at firm level: Review of literature. In Proceedings of the 4th European Conference on Information Systems Management, Lisbon, Portugal, 9â10 September 2010; pp. 312â322.
Paper not yet in RePEc: Add citation now
- Osborne, M.J. An Introduction to Game Theory; Oxford University Press: New York, NY, USA, 2004.
Paper not yet in RePEc: Add citation now
Pala, A.; Zhuang, J. Information sharing in cyber security: A review. Decis. Anal. 2019, 16, 172â196. [CrossRef]
- Pan, M.J.; Jang, W.Y. Determinants of the adoption of enterprise resource planning within the technology-organizationenvironment framework: Taiwanâs communications industry. J. Comput. Inf. Syst. 2008, 48, 94â102.
Paper not yet in RePEc: Add citation now
- Parasuraman, A. Technology readiness index (TRI): A multiple item scale to measure readiness to embrace new technologies. J. Serv. Res. 2000, 2, 307â320. [CrossRef]
Paper not yet in RePEc: Add citation now
- Parasuraman, A.; Colby, C.L. An updated and streamlined technology readiness index: TRI 2.0. J. Serv. Res. 2015, 18, 59â74. [CrossRef]
Paper not yet in RePEc: Add citation now
- Park, Y.; El Sawy, O.A.; Fiss, P.C. The role of business intelligence and communication technologies in organizational agility: A configurational approach. J. Assoc. Inf. Syst. 2017, 18, 648â686. [CrossRef]
Paper not yet in RePEc: Add citation now
- Pearson, N. A larger problem: Financial and reputational risks. Comput. Fraud Secur. 2014, 2014, 11â13. [CrossRef]
Paper not yet in RePEc: Add citation now
- Pradana, M.G.; Ha, H.T. Maximizing strategy improvement in mall customer segmentation using K-means clustering. J. Appl. Data Sci. 2021, 2, 19â25. [CrossRef]
Paper not yet in RePEc: Add citation now
- Puhakainen, P.; Siponen, M. Improving employeesâ compliance through information systems security training: An action research study. MIS Q. 2010, 34, 757â778. [CrossRef]
Paper not yet in RePEc: Add citation now
- Quigley, K.; Burns, C.; Stallard, K. Cyber gurusâ: A rhetorical analysis of the language of cyber security specialists and the implications for security policy and critical infrastructure protection. Gov. Inf. Q. 2015, 32, 108â117. [CrossRef]
Paper not yet in RePEc: Add citation now
- Rîndas , u, S.-M. Emerging Information Technologies in Accounting and Related Security RisksâWhat is the Impact on the Romanian Accounting Profession. J. Account. Manag. Inf. Syst. 2017, 16, 581â609. [CrossRef]
Paper not yet in RePEc: Add citation now
- Radanliev, P.; De Roure, D.C.; Nurse, J.R.C.; Mantilla Montalvo, R.; Cannady, S.; Santos, O.; Maddox, L.T.; Burnap, P.; Maple, C. Future developments in standardisation of cyber risk in the Internet of Things (IoT). SN Appl. Sci. 2020, 2, 1â16. [CrossRef]
Paper not yet in RePEc: Add citation now
- Ramayah, T.; Cheah, J.; Francis, C.; Hiram, T.; Mumtaz, A.M. Partial least squares structural equation modeling (PLS-SEM) using SmartPLS 3.0: An updated guide and practical guide to statistical analysis. Handb. Mark. Res. 2021, 1â47.
Paper not yet in RePEc: Add citation now
- Ravichandran, T.; Lertwongsatien, C. Effect of information systems resources and capabilities on firm performance: A resourcebased perspective. J. Manag. Inf. Syst. 2005, 21, 237â276. [CrossRef]
Paper not yet in RePEc: Add citation now
- Rhee, H.S.; Kim, C.; Ryu, Y.U. Self-efficacy in information security: Its influence on end usersâ information security practice behavior. Comput. Secur. 2009, 28, 816â826. [CrossRef]
Paper not yet in RePEc: Add citation now
- Roy, S.; Balaji, M.; Quazi, A.; Quaddus, M. Predictors of customer acceptance of and resistance to smart technologies in the retail sector. Predict. J. Retail. Consum. Serv. 2018, 42, 147â160. [CrossRef]
Paper not yet in RePEc: Add citation now
- Ruighaver, A.B.; Maynard, S.B.; Chang, S. Organisational security culture: Extending the end-user perspective. Comput. Secur. 2007, 26, 56â62. [CrossRef]
Paper not yet in RePEc: Add citation now
- Ruohonen, J. An acid test for europeanization: Public cyber security procurement in the European Union. Eur. J. Secur. Res. 2020, 5, 349â377. [CrossRef]
Paper not yet in RePEc: Add citation now
- Security Intel, McAfee Labs Report Finds 93 Percent of Security Operations Center Managers Overwhelmed by Alerts and Unable to Triage Potential Threats. Available online: https://newsroom.intel.com (accessed on 12 June 2021).
Paper not yet in RePEc: Add citation now
Shirodkar, V.; Mohr, A.T. Resource tangibility and foreign firmsâ corporate political strategies in emerging economies: Evidence from India. Manag. Int. Rev. 2015, 55, 801â825. [CrossRef]
- Skopik, F.; Settanni, G.; Fiedler, R. A problem shared is a problem halved: A survey on the dimensions of collective cyber defense through security information sharing. Comput. Secur. 2016, 60, 154â176. [CrossRef]
Paper not yet in RePEc: Add citation now
- Smith, G.E.; Watson, K.J.; Baker, W.H.; Pokorski, J.A. A critical balance: Collaboration and security in the IT-enabled supply chain. Int. J. Prod. Res. 2007, 45, 2595â2613. [CrossRef]
Paper not yet in RePEc: Add citation now
- Smith, S.; Winchester, D.; Bunker, D.; Jamieson, R. Circuits of power: A study of mandated compliance to an information systems security de jure standard in a government organization. MIS Q. 2010, 34, 463â486. [CrossRef]
Paper not yet in RePEc: Add citation now
- Su, W.-J. The effects of safety management systems, attitude and commitment on safety behaviors and performance. Int. J. Appl. Inf. Manag. 2021, 1, 187â199. [CrossRef]
Paper not yet in RePEc: Add citation now
- Sumner, M. Information security threats: A comparative analysis of impact, probability, and preparedness. Inf. Syst. Manag. 2009, 26, 2â12. [CrossRef]
Paper not yet in RePEc: Add citation now
- Takakuwa, K. Difficulties of integrating human resources management globally by Japanese corporations. Int. J. Appl. Inf. Manag. 2021, 1, 173â185. [CrossRef]
Paper not yet in RePEc: Add citation now
Tang, M.; Li, M.; Zhang, T. The impacts of organizational culture on information security culture: A case study. Inf. Technol. Manag. 2016, 17, 179â186. [CrossRef]
- Ten, C.W.; Manimaran, G.; Liu, C.C. Cyber security for critical infrastructures: Attack and defense modeling. IEEE Trans. Syst. Man Cybern. Part A Syst. Hum. 2010, 40, 853â865. [CrossRef]
Paper not yet in RePEc: Add citation now
- Thelen, G. Leadership in a global world management training requirement using the example of the Asian studies program at University of Applied Sciences (HTWG) Konstanz. Int. J. Appl. Inf. Manag. 2021, 1, 125â135. [CrossRef]
Paper not yet in RePEc: Add citation now
- To, T.-T. Determinants of trade balance in Vietnam during the period 1989â2013. Int. J. Appl. Inf. Manag. 2022, 2, 13â25. [CrossRef]
Paper not yet in RePEc: Add citation now
- Tsou, H.-T.; Hsu, S.H.-Y. Performance effects of technology-organization-environment openness, service co-production, and digital-resource readiness: The case of the IT industry. Int. J. Inf. Manag. 2015, 35, 1â14. [CrossRef]
Paper not yet in RePEc: Add citation now
Uddin, M.H.; Ali, M.H.; Hassan, M.K. Cybersecurity hazards and financial system vulnerability: A synthesis of literature. Risk Manag. 2020, 22, 239â309. [CrossRef]
- Umami, I. Comparing Epsilon greedy and Thompson sampling model for multi-armed bandit algorithm on marketing dataset. J. Appl. Data Sci. 2021, 2, 14â25. [CrossRef]
Paper not yet in RePEc: Add citation now
- Vance, A.; Benjamin Lowry, P.; Wilson, D.W. Using trust and anonymity to expand the use of anonymizing systems that improve security across organizations. Secur. J. 2017, 30, 979â999. [CrossRef]
Paper not yet in RePEc: Add citation now
Venkatesh, V.; Bala, H. Adoption and impacts of interorganizational business process standards: Role of partnering synergy. Inf. Syst. Res. 2012, 23, 1131â1157. [CrossRef]
- Wall, J.D.; Lowry, P.B.; Barlow, J.B. Organizational violations of externally governed privacy and security rules: Explaining and predicting selective violations under conditions of strain and excess. J. Assoc. Inf. Syst. 2016, 7, 39â76. [CrossRef]
Paper not yet in RePEc: Add citation now
- Wang, Y.; So, K.K.F.; Sparks, B.A. Technology readiness and customer satisfaction with travel technologies: A cross-country investigation. J. Travel Res. 2017, 56, 563â577. [CrossRef]
Paper not yet in RePEc: Add citation now
Wolff, J.A.; Reed, R. Firm resources and joint ventures: What determines zero-sum versus positive-sum outcomes? Manag. Decis. Econ. 2000, 21, 269â284. [CrossRef]
Zhu, K.; Kraemer, K.L. Post-adoption variations in usage and value of e-business by organizations: Cross-country evidence from the retail industry. Inf. Syst. Res. 2005, 16, 61â84. [CrossRef]