January 2022
·
147 Reads
·
15 Citations
This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.
January 2022
·
147 Reads
·
15 Citations
May 2021
·
29 Reads
·
2 Citations
Information & Management
The prevalence of security threats like ransomware continues to increase and victimize a wide range of targets, which includes municipal information systems. These attacks are commonly reported in media outlets available in attacked communities. This study seeks to understand how effective news reporting can be toward influencing the behavior of people who live within the proximity of the attack. The results suggest a geographic influence on individual behaviors that could well extend beyond the context of information security into other areas of behavioral IS research.
... Existing literature has indicated that various demographic factors, including sex and class level (Dacillo et al., 2022;Purba et al., 2022;Fauville et al., 2023;Oducado et al., 2022;Salim et al., 2022;Usta Kara & Esroy, 2022), could contribute to shaping individuals' experiences of ZEF. Notably, gender has been implicated in Zoom-related fatigue studies (George et al., 2022;Ratan et al., 2021;Shockley et al., 2021). Emerging research also suggests potential disparities in how individuals perceive and navigate challenges within online interactions based on these factors (Dacillo et al., 2022;Purba et al., 2022;Ratan et al., 2021;Usta Kara & Esroy, 2022). ...
January 2022
... It is only by doing so that enterprises may be able to reduce the change in operational errors during data repair when they are attacked by ransomware, so as to lower the operational downtime resulting from attacks [55]. Currently, the best methods to prevent direct ransomware attacks are to rely on backup, strengthen users' education, install software preventing rogue programs in relevant information-related devices, and prevent users from opening malicious emails, etc. [56]. ...
May 2021
Information & Management