Kristin MasuchGeorg-August-Universität Göttingen | GAUG
Kristin Masuch
About
29
Publications
14,965
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
200
Citations
Publications
Publications (29)
In recent years, the number of data breaches in the healthcare sector has steadily increased. As a result, security, education, training, and awareness programs are recognized as an integral part of educating employees about security threats. Although these programs are considered commonplace in many organizations, they often follow one-size-fits-a...
Health data donation allows individuals to share their personal health information for the greater good. As privacy concerns hinder many individuals from disclosing such sensitive information, this study investigates how benefit appeals, attribute framing, and health conditions can influence the intention to donate personal health information. We c...
Deterrence theory is one of the most commonly used theories to study information security policy non-compliance behavior. However, the results of studies in the information security field are ambiguous. To further address this heterogeneity, various influencing factors have been considered in the context of deterrence theory. However, a current cha...
The internet has become an integral part of most people's lives. Although this has many advantages, such as constant entertainment and easy access to resources, the internet also has its downsides. Studies indicate that people tend to be more concerned with the cyber risks that arise from their internet usage than before. While cyber insurance for...
Security incidents are increasing in a wide range of organizational types and sizes worldwide. Although various threat models already exist to classify security threats, they seem to take insufficient account of which organizational assets the threat events are targeting. Therefore, we argue that conducting more job-specific IT security training is...
The Internet of Things (IoT) has become part of everyday life and recorded an increasing number of users. However, security concerns have been raised regardless of the many benefits of the technology. Especially for consumers in online shopping, it is difficult to distinguish between more and less safe products. One proposal is to carry a security...
Since the late 1990s, security education training and awareness (SETA) programs have become commonplace. Despite extensive research into the effective design of such programs and factors influencing compliance behavior, SETA programs tend not to be as effective as they should be. In order to tailor learning content as closely as possible to individ...
In the current transformation towards more sustainable forms of transportation, the logistics sector offers promising potential for a shift towards electric vehicles. In this study, we apply a qualitative content analysis approach to shed light on the factors influencing the adoption process of electric transportation fleets and how IS can facilita...
Innovative IT-enabled health services promise tremendous benefits for customers and service providers alike. Simultaneously, health services by nature process sensitive customer information, and data breaches have become an everyday phenomenon. The challenge that health service providers face is to find effective recovery strategies after data brea...
As cybersecurity incidents increase and become more potent, affected companies must react. This is especially relevant for data breaches, where companies are legally required to notify those affected. Hence, it can be assumed that data breaches invariably cause damage through disappointed customers and dissatisfied investors. By applying response a...
Zusammenfassung
Apps für die Kontaktnachverfolgungen – so genannte Corona Tracing Apps – stellen einen essentiellen Teil der nationalen Strategien zur Bekämpfung des COVID-19 Virus dar. Mithilfe dieser Technologie sollen Infektionsketten effektiver nachvollzogen und schnellstmöglich unterbrochen werden. Corona Tracing Apps lassen sich aus Perspekti...
The digitization of corporate processes and activities, accelerated by the COVID-19 pandemic, does not only hold advantages. Rapidly implemented software systems lead to an increased risk of data breaches, inducing adverse effects. As a countermeasure, companies can apply data breach response actions. In this paper, drawing on service failure liter...
Health insurance claim fraud is a serious problem for the health care industry. As it drives up costs and inefficiency, claim fraud must be effectively detected to provide economic and high-quality healthcare. In this paper, we present a hybrid machine learning approach that was developed, implemented, and evaluated in the context of a prescription...
Data breaches have become an everyday phenomenon. As a consequence, organizations no longer solely focus on prevention but also proactively prepare for the next data breach. A key element of these efforts is data breach response strategies that aim to retain trust and loyalty of the affected parties. Prior research provides important insights into...
The information security has become one of the most important topics in the modern information technology of companies. It influences the way companies work and the exchange of information between them. Information security policies are one of the most important instruments for compliance with information security (ISC). It is particularly importan...
Unlocking and managing flexibility is an important contribution to the integration of renewable energy and an efficient and resilient operation of the power system. In this paper, we discuss how the potential of a fleet of battery-electric transportation vehicles can be used to provide frequency containment reserve. To this end, we first examine th...
Companies around the world are faced with challenges in dealing with data breaches. While in Germany companies need to notify the affected and fear to lose their valuable customers, in Bolivia, where rapid digital globalization increases vulnerability, data security overall is not a publicly present topic, and customers are directly exposed to the...
Background: Chatbots are currently on the rise as more and more researchers tackle this topic from different perspectives. Simultaneously, workplaces and ways of working are increasingly changing in the context of digitalization. However, despite the promised benefits, the changes still show problems that should be tackled more purposefully by chat...
The increasing number of mobile devices and their interconnection, the amount of shared data and the risk of data loss increases. An example of this is fitness trackers, which collect a large amount of personal data and share it with other devices and platforms. Due to the high-risk potential, data breaches can have far-reaching impacts on the busi...
With the increasing number of companies actively collecting data, the number of data breaches has exploded. It can be observed that affected often discontinue their relationship with the company. In order to avoid this kind of response, companies should develop and deploy their own recovery strategies. In our paper, we examined the effectiveness of...
Information security compliance behavior research has produced several theoretical models derived from different disciplines to explain or predict violations of information security policies (ISP) or related employee intentions. The application of these theories to ISP violations has led to an increasing number of information security behavioral mo...
The risk of data breaches increases with the amount of data shared and with the rising number of mobile devices. In particular, mobile devices such as fitness trackers collect a large amount of personal data and share it with other devices and platforms. In many circumstances, the relationship between those affected by a data breach and the company...
Information security has become an important aspect of contemporary information technology in organizations and influence the way in which work is done and information is sent between organizations. Human information system behaviors with regard to information security policies, i.e. information security compliance (ISC) must not be ignored, as the...
The application of chatbots in digital workplaces is currently on the rise. Especially in customer or employee support scenarios this kind of artificial intelligence and natural language-based human-computer interface is been used. However, the application of chatbots in real work scenarios is still considered barely and unknown. Therefore, we aim...