Journal of Management Information Systems
Keyword: cybersecurity
Keyword Index
List of articles:
Wolff, Josephine
Perverse Effects in Defense of Computer Systems: When More Is Less
Journal of Management Information Systems
Vol. 33 No. 2 2016
pp. 597-620
Anderson, Bonnie Brinton,
Vance, Anthony,
Kirwan, C Brock,
Jenkins, Jeffrey L,
and
Eargle, David
From Warning to Wallpaper: Why the Brain Habituates to Security Warnings and What Can Be Done About It
Journal of Management Information Systems
Vol. 33 No. 3 2016
pp. 713-743
Li, Weifeng,
Chen, Hsinchun,
and
Nunamaker, Jay F
Identifying and Profiling Key Sellers in Cyber Carding Community: AZSecure Text Mining System
Journal of Management Information Systems
Vol. 33 No. 4 2016
pp. 1059-1086
Yin, Hao Hua Sun,
Langenheldt, Klaus,
Harlev, Mikkel,
Mukkamala, Raghava Rao,
and
Vatrapu, Ravi
Regulating Cryptocurrencies: A Supervised Machine Learning Approach to De-Anonymizing the Bitcoin Blockchain
Journal of Management Information Systems
Vol. 36 No. 1 2019
pp. 37-73
Zhuang, Yunhui,
Choi, Yunsik,
He, Shu,
Leung, Alvin Chung Man,
Lee, Gene Moo,
and
Whinston, Andrew
Understanding Security Vulnerability Awareness, Firm Incentives, and ICT Development in Pan-Asia
Journal of Management Information Systems
Vol. 37 No. 3 2020
pp. 668-693
Schuetz, Sebastian W,
Benjamin Lowry, Paul,
Pienta, Daniel A,
and
Bennett Thatcher, Jason
The Effectiveness of Abstract Versus Concrete Fear Appeals in Information Security
Journal of Management Information Systems
Vol. 37 No. 3 2020
pp. 723-757
Ng, Ka Chung,
Zhang, Xiaojun,
Thong, James Y L,
and
Tam, Kar Yan
Protecting Against Threats to Information Security: An Attitudinal Ambivalence Perspective
Journal of Management Information Systems
Vol. 38 No. 3 2021
pp. 732-764
Ullman, Steven,
Samtani, Sagar,
Zhu, Hongyi,
Lazarine, Ben,
Chen, Hsinchun,
and
Nunamaker, Jay F
Enhancing Vulnerability Prioritization in Cloud Computing Using Multi-View Representation Learning
Journal of Management Information Systems
Vol. 41 No. 3 2024
pp. 708-743
Ebrahimi, Reza,
Hu, James Lee,
Zhang, Ning,
Nunamaker, Jay F,
and
Chen, Hsinchun
Defending Deep Learning-Based Raw Malware Detectors Against Adversarial Attacks: A Sequence Modeling Approach
Journal of Management Information Systems
Vol. 42 No. 4 2025
pp. 1118-1148
Yoo, Eunae,
Craighead, Christopher W,
and
Samtani, Sagar
Dependency Network Structure and Security Vulnerabilities in Software Supply Chains
Journal of Management Information Systems
Vol. 42 No. 4 2025
pp. 1149-1176