Følg
Romilla Syed
Titel
Citeret af
Citeret af
År
Information security concerns in IT outsourcing: Identifying (in) congruence between clients and vendors
G Dhillon, R Syed, F de Sá-Soares
Information & Management 54 (4), 452-464, 2017
1052017
Interpreting information security culture: An organizational transformation case study
G Dhillon, R Syed, C Pedron
Computers & Security 56, 63-69, 2016
1012016
Cybersecurity vulnerability management: A conceptual ontology and cyber intelligence alert system
R Syed
Information & Management 57 (6), 103334, 2020
882020
Enterprise reputation threats on social media: A case of data breach framing
R Syed
The Journal of Strategic Information Systems 28 (3), 257-274, 2019
812019
Ontology based integration of XBRL filings for financial decision making
R Syed, VY Yoon, RT Redmond, UO Etudo
Decision Support Systems 68, 64-76, 2014
402014
What it takes to get retweeted: An analysis of software vulnerability messages
R Syed, M Rahafrooz, JM Keisler
Computers in Human Behavior 80, 207-215, 2018
322018
Value-based information privacy objectives for Internet Commerce
G Dhillon, T Oliveira, R Syed
Computers in Human Behavior 87, 292-307, 2018
252018
The identity management value model: A design science approach to assess value gaps on social media
R Syed, G Dhillon, J Merrick
Decision Sciences 50 (3), 498-536, 2019
192019
Individual values for protecting identity in social networks
G Dhillon, R Chowdhuri
Proceedings of International Conference on Information Systems (ICIS) 2013, 2013
162013
Dynamics of Data Breaches in Online Social Networks: Understanding Threats to Organizational Information Security Reputation
R Syed, G Dhillon
Proceedings of International Conference on Information Systems (ICIS) 2015, 2015
152015
Cybersecurity Vulnerability Management: An Ontology-Based Conceptual Model
R Syed, H Zhong
Proceedings of the American Conference on Information Systems (AMCIS) 2018, 2018
122018
Social movement sustainability on social media: An analysis of the women’s March Movement on Twitter
R Syed, L Silva
Journal of the Association for Information Systems 24 (1), 249-293, 2023
82023
SOCIAL MEDIA AND SOCIAL MOVEMENTS: A CASE OF WOMEN’S MARCH
L Silva, R Syed
Proceedings of the 27th European Conference on Information Systems (ECIS) 2019, 2019
72019
Understanding Information Security.
R Chowdhuri, G Dhillon
Journal of Information System Security 8 (2), 2012
72012
Trolls and Social Movement Participation: An Empirical Investigation
P Bharati, C Lee, R Syed
Proceedings of the American Conference on Information Systems (AMCIS) 2018, 2018
62018
Influence of trolling on social media participation: An empirical investigation
P Bharati, C Lee, R Syed
Academy of Management Proceedings 2019 (1), 18645, 2019
52019
de S-Soares, F.(2017)
G Dhillon, R Syed
Information security concerns in IT, 0
5
Analyzing Software Vendors’ Patch Release Behavior in the Age of Social Media
R Syed
Proceedings of International Conference on Information Systems (ICIS) 2017, 2017
42017
Dynamics of Identity Threats in Online Social Networks: Modelling Individual and Organizational Perspectives
R Syed
Doctoral Dissertation, 2015
22015
Relationship between the Use of IT and Wellbeing: A Literature Review
H Jeong, R Syed
12024
Systemet kan ikke foretage handlingen nu. Prøv igen senere.
Artikler 1–20