3,134
Views
103
CrossRef citations to date
0
Altmetric
Guest Editorial

Why security and privacy research lies at the centre of the information systems (IS) artefact: proposing a bold research agenda

, &

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (14)

Rachida F Parks, Rolf T Wigand & Paul Benjamin Lowry. (2023) Balancing information privacy and operational utility in healthcare: proposing a privacy impact assessment (PIA) framework. European Journal of Information Systems 32:6, pages 1052-1069.
Read now
Paul Benjamin Lowry, Gregory D. Moody, Srikanth Parameswaran & Nicholas James Brown. (2023) Examining the Differential Effectiveness of Fear Appeals in Information Security Management Using Two-Stage Meta-Analysis. Journal of Management Information Systems 40:4, pages 1099-1138.
Read now
Aleksandre Asatiani, Tuuli Hakkarainen, Kimmo Paaso & Esko Penttinen. (2023) Security by envelopment – a novel approach to data-security-oriented configuration of lightweight-automation systems. European Journal of Information Systems 0:0, pages 1-23.
Read now
Yu-Ju Tu & Selwyn Piramuthu. (2023) Security and privacy risks in drone-based last mile delivery. European Journal of Information Systems 0:0, pages 1-14.
Read now
Ernestine Dickhaut, Andreas Janson, Matthias Söllner & Jan Marco Leimeister. (2023) Lawfulness by design – development and evaluation of lawful design patterns to consider legal requirements. European Journal of Information Systems 0:0, pages 1-28.
Read now
Mahdi Nasrullah Al-Ameen, Sonali T. Marne, Kanis Fatema, Matthew Wright & Shannon Scielzo. (2022) On improving the memorability of system-assigned recognition-based passwords. Behaviour & Information Technology 41:5, pages 1115-1131.
Read now
Xiaotong Li. (2021) Decision making of optimal investment in information security for complementary enterprises based on game theory. Technology Analysis & Strategic Management 33:7, pages 755-769.
Read now
Ersin Dincelli & InduShobha Chengalur-Smith. (2020) Choose your own training adventure: designing a gamified SETA artefact for improving information security and privacy through interactive storytelling. European Journal of Information Systems 29:6, pages 669-687.
Read now
Sebastian W. Schuetz, Paul Benjamin Lowry, Daniel A. Pienta & Jason Bennett Thatcher. (2020) The Effectiveness of Abstract Versus Concrete Fear Appeals in Information Security. Journal of Management Information Systems 37:3, pages 723-757.
Read now
Mario Silic & Paul Benjamin Lowry. (2020) Using Design-Science Based Gamification to Improve Organizational Security Training and Compliance. Journal of Management Information Systems 37:1, pages 129-161.
Read now
Nik Rushdi Hassan, John Mingers & Bernd Stahl. (2018) Philosophy and information systems: where are we and where should we go?. European Journal of Information Systems 27:3, pages 263-277.
Read now

Articles from other publishers (89)

Osman Can Çetlenbik, Ahmet Ali Süzen & Burhan Duman. (2024) IOT SECURITY AND SOFTWARE TESTING. Yalvaç Akademi Dergisi 9:1, pages 26-32.
Crossref
Siqi Hu, Carol Hsu & Zhongyun Zhou. (2023) Understanding employees' perceptions of SETA events: the role of pedagogical and communication approaches. Internet Research 34:2, pages 294-319.
Crossref
Javad Pool, Saeed Akhlaghpour, Farhad Fatehi & Andrew Burton-Jones. (2024) A systematic analysis of failures in protecting personal health data: A scoping review. International Journal of Information Management 74, pages 102719.
Crossref
Hamid Reza Nikkhah, Varun Grover & Rajiv Sabherwal. (2023) Post hoc security and privacy concerns in mobile apps: the moderating roles of mobile apps’ features and providers. Information & Computer Security 32:1, pages 1-37.
Crossref
Daeeun Daniel Choi & Paul Benjamin Lowry. (2024) Balancing the commitment to the common good and the protection of personal privacy: Consumer adoption of sustainable, smart connected cars. Information & Management 61:1, pages 103876.
Crossref
Thembekile O. Mayayise. 2024. Proceedings of Eighth International Congress on Information and Communication Technology. Proceedings of Eighth International Congress on Information and Communication Technology 265 282 .
Raffaele Trequattrini, Matteo Palmaccio, Mario Turco & Alberto Manzari. (2023) The contribution of blockchain technologies to anti‐corruption practices: A systematic literature review. Business Strategy and the Environment 33:1, pages 4-18.
Crossref
Feng Xu, Carol Hsu, Tawei (David) Wang & Paul Benjamin Lowry. (2023) The antecedents of employees' proactive information security behaviour: The perspective of proactive motivation. Information Systems Journal.
Crossref
Ali Vedadi, Nita Brooks & Tim Greer. (2023) Investigating the role of internal security resources in post-adoption satisfaction with the Security-as-a-Service model: an organizational mindfulness perspective. Journal of Enterprise Information Management 36:6, pages 1583-1609.
Crossref
Foo Nin Ho, Nga Ho-Dac & J. Sonia Huang. (2023) The Effects of Privacy and Data Breaches on Consumers’ Online Self-Disclosure, Protection Behavior, and Message Valence. SAGE Open 13:3.
Crossref
Julia Lenz, Zdravko Bozakov, Steffen Wendzel & Simon Vrhovec. (2023) Why people replace their aging smart devices: A push–pull–mooring perspective. Computers & Security 130, pages 103258.
Crossref
Allen Lim, Chai Lee Goi, Peter Dell & Mei Teh Goi. (2023) Generation Y’s behavioural usage of small businesses’ retail websites: gender difference. Journal of Science and Technology Policy Management.
Crossref
Naurin Farooq Khan, Naveed Ikram, Sumera Saleem & Saad Zafar. (2022) Cyber-security and risky behaviors in a developing country context: a Pakistani perspective. Security Journal 36:2, pages 373-405.
Crossref
David Michael Hull, Sebastian Walter Schuetz & Paul Benjamin Lowry. (2023) Tell me a story: The effects that narratives exert on meaningful-engagement outcomes in antiphishing training. Computers & Security 129, pages 103252.
Crossref
Hung-Pin Shih & Wuqiang Liu. (2023) Beyond the trade-offs on Facebook: the underlying mechanisms of privacy choices. Information Systems and e-Business Management 21:2, pages 353-387.
Crossref
Karl van der Schyff, Greg Foster, Karen Renaud & Stephen Flowerday. (2023) Online Privacy Fatigue: A Scoping Review and Research Agenda. Future Internet 15:5, pages 164.
Crossref
Juan Vicente Barraza de la Paz, Luis Alberto Rodríguez-Picón, Víctor Morales-Rocha & Soledad Vianey Torres-Argüelles. (2023) A Systematic Review of Risk Management Methodologies for Complex Organizations in Industry 4.0 and 5.0. Systems 11:5, pages 218.
Crossref
A. J. Burns, Tom L. Roberts, Clay Posey, Paul Benjamin Lowry & Bryan Fuller. (2023) Going Beyond Deterrence: A Middle-Range Theory of Motives and Controls for Insider Computer Abuse. Information Systems Research 34:1, pages 342-362.
Crossref
Oluwafemi Akanfe, Rohit Valecha & H. Raghav Rao. (2023) Design of a Compliance Index for Privacy Policies: A Study of Mobile Wallet and Remittance Services. IEEE Transactions on Engineering Management 70:3, pages 864-876.
Crossref
Fengjiao Zhang, Zhao Pan & Yaobin Lu. (2023) AIoT-enabled smart surveillance for personal data digitalization: Contextual personalization-privacy paradox in smart home. Information & Management 60:2, pages 103736.
Crossref
Allen Johnston, Paul M. Di Gangi, France Bélanger, Robert E. Crossler, Mikko Siponen, Merrill Warkentin & Tripti Singh. (2023) Seeking rhetorical validity in fear appeal research: An application of rhetorical theory. Computers & Security 125, pages 103020.
Crossref
David Hull, Sebastian Schuetz & Paul Benjamin Lowry. (2023) Tell Me A Story: The Effects That Narratives Exert on Meaningful-Engagement Outcomes in Antiphishing Training. SSRN Electronic Journal.
Crossref
Hamid Reza Nikkhah & Rajiv Sabherwal. (2021) Information disclosure willingness and mobile cloud computing collaboration apps: the impact of security and assurance mechanisms. Information Technology & People 35:7, pages 1855-1883.
Crossref
Xiaolong Yan & Yingying Feng. (2022) Secure wireless network system based on deep reinforcement learning network. Optik 271, pages 170167.
Crossref
Nils Koester, Patrick Cichy, David Antons & Torsten Oliver Salge. (2022) Perceived privacy risk in the Internet of Things: determinants, consequences, and contingencies in the case of connected cars. Electronic Markets 32:4, pages 2333-2355.
Crossref
Shiwei Sun, John R. Drake & Dianne Hall. (2022) When Job Candidates Experience Social Media Privacy Violations. Journal of Global Information Management 30:1, pages 1-25.
Crossref
V. S. Prakash Attili, Saji K. Mathew & Vijayan Sugumaran. (2021) Information Privacy Assimilation in IT Organizations. Information Systems Frontiers 24:5, pages 1497-1513.
Crossref
Manjul Gupta, Carlos M. Parra & Denis Dennehy. (2021) Questioning Racial and Gender Bias in AI-based Recommendations: Do Espoused National Cultural Values Matter?. Information Systems Frontiers 24:5, pages 1465-1481.
Crossref
Carol Xiaojuan Ou, Xiaowei Zhang, Spyros Angelopoulos, Robert M. Davison & Noury Janse. (2022) Security breaches and organization response strategy: Exploring consumers’ threat and coping appraisals. International Journal of Information Management 65, pages 102498.
Crossref
Ya Zhou & Xiaobo Jiao. (2021) Intelligent analysis system for signal processing tasks based on LSTM recurrent neural network algorithm. Neural Computing and Applications 34:15, pages 12257-12269.
Crossref
Roozmehr Safi. (2022) Detecting Change in Professional Conduct Using Information from the Internet. ACM SIGMIS Database: the DATABASE for Advances in Information Systems 53:3, pages 49-70.
Crossref
Anjuli Franz & Alexander Benlian. (2022) Exploring interdependent privacy – Empirical insights into users’ protection of others’ privacy on online platforms. Electronic Markets.
Crossref
Byron Marshall, Michael Curry, Robert E. Crossler & John Correia. (2021) Machine Learning and Survey-based Predictors of InfoSec Non-Compliance. ACM Transactions on Management Information Systems 13:2, pages 1-20.
Crossref
Xiaodong Mao & Fei Xu. (2022) Research on the Popularity Prediction of Multimedia Network Information Based on Fast K Neighbor Algorithm. Journal of Electrical and Computer Engineering 2022, pages 1-11.
Crossref
Yalan Hu, Abdullah Al-Barakati & Pratibha Rani. (2022) INVESTIGATING THE INTERNET-OF-THINGS (IOT) RISKS FOR SUPPLY CHAIN MANAGEMENT USING Q-RUNG ORTHOPAIR FUZZY-SWARA-ARAS FRAMEWORK. Technological and Economic Development of Economy 0:0, pages 1-26.
Crossref
L.G. Pee & Shan L Pan. (2022) Climate-intelligent cities and resilient urbanisation: Challenges and opportunities for information research. International Journal of Information Management 63, pages 102446.
Crossref
Zaheer Abbas Kazmi & Mahmoud Sodangi. (2022) Modeling the Constraints to the Utilization of the Internet of Things in Managing Supply Chains of Off-Site Construction: An Approach toward Sustainable Construction. Buildings 12:3, pages 388.
Crossref
Christian Nedu Osakwe, Marek Hudik, David Říha, Michael Stros & T. Ramayah. (2022) Critical factors characterizing consumers’ intentions to use drones for last-mile delivery: Does delivery risk matter?. Journal of Retailing and Consumer Services 65, pages 102865.
Crossref
Zhiyan Wu & Jifeng Luo. (2022) Online information privacy and price: A theoretical model and empirical tests. Information & Management 59:2, pages 103583.
Crossref
Yan Chen, Weidong Xia & Karlene Cousins. (2022) Voluntary and instrumental information security policy compliance: an integrated view of prosocial motivation, self-regulation and deterrence. Computers & Security 113, pages 102568.
Crossref
Mikko Siponen, Wael Soliman & Anthony Vance. (2022) Common Misunderstandings of Deterrence Theory in Information Systems Research and Future Research Directions. ACM SIGMIS Database: the DATABASE for Advances in Information Systems 53:1, pages 25-60.
Crossref
Hanne Sørum, Ragnhild Eg & Wanda Presthus. (2022) A Gender Perspective on GDPR and Information Privacy. Procedia Computer Science 196, pages 175-182.
Crossref
Farkhondeh Hassandoust, Maduka Subasinghage & Allen C Johnston. (2022) A neo-institutional perspective on the establishment of information security knowledge sharing practices. Information & Management 59:1, pages 103574.
Crossref
Yaman Roumani. (2022) Detection time of data breaches. Computers & Security 112, pages 102508.
Crossref
Christoph Buck, Tamara Dinev & Reza Ghaiumy Anaraky. 2022. Modern Socio-Technical Perspectives on Privacy. Modern Socio-Technical Perspectives on Privacy 43 60 .
Giovanna Culot, Guido Nassimbeni, Matteo Podrecca & Marco Sartor. (2021) The ISO/IEC 27001 information security management standard: literature review and theory-based research agenda. The TQM Journal 33:7, pages 76-105.
Crossref
Yaman Roumani. (2021) Patching zero-day vulnerabilities: an empirical analysis. Journal of Cybersecurity 7:1.
Crossref
Syed Emad Azhar Ali, Fong-Woon Lai, P.D.D. Dominic, Nicholas James Brown, Paul Benjamin Benjamin Lowry & Rao Faizan Ali. (2021) Stock market reactions to favorable and unfavorable information security events: A systematic literature review. Computers & Security 110, pages 102451.
Crossref
Wentian Cai & Huijun Yao. (2021) Research on Information Security Risk Assessment Method Based on Fuzzy Rule Set. Wireless Communications and Mobile Computing 2021, pages 1-12.
Crossref
Yan Chen, Dennis F. Galletta, Paul Benjamin Lowry, Xin (Robert) Luo, Gregory D. MoodyRobert Willison. (2021) Understanding Inconsistent Employee Compliance with Information Security Policies Through the Lens of the Extended Parallel Process Model. Information Systems Research 32:3, pages 1043-1065.
Crossref
Sutirtha Chatterjee, Suprateek Sarker, Michael J. Lee, Xiao Xiao & Amany Elbanna. (2020) A possible conceptualization of the information systems ( IS ) artifact: A general systems theory perspective 1 . Information Systems Journal 31:4, pages 550-578.
Crossref
Hanne Sørum & Wanda Presthus. (2020) Dude, where's my data? The GDPR in practice, from a consumer's point of view. Information Technology & People 34:3, pages 912-929.
Crossref
Simon Trang & Ilja Nastjuk. (2021) Examining the role of stress and information security policy design in information security compliance behaviour: An experimental study of in-task behaviour. Computers & Security 104, pages 102222.
Crossref
Mario Silic & Paul Benjamin Lowry. (2019) Breaking Bad in Cyberspace: Understanding why and how Black Hat Hackers Manage their Nerves to Commit their Virtual Crimes. Information Systems Frontiers 23:2, pages 329-341.
Crossref
Anna-Marie Ortloff, Steven Zimmerman, David Elsweiler & Niels Henze. (2021) The Effect of Nudges and Boosts on Browsing Privacy in a Naturalistic Environment. The Effect of Nudges and Boosts on Browsing Privacy in a Naturalistic Environment.
Ray Qing Cao, Dara G. Schniederjans & Vicky Ching Gu. (2021) Stakeholder sentiment in service supply chains: big data meets agenda-setting theory. Service Business 15:1, pages 151-175.
Crossref
Yves Barlette, Annabelle Jaouen & Paméla Baillette. (2021) Bring Your Own Device (BYOD) as reversed IT adoption: Insights into managers’ coping strategies. International Journal of Information Management 56, pages 102212.
Crossref
Kuang-Ming Kuo, Paul C. Talley & Dyi-Yih Michael Lin. (2021) Hospital Staff’s Adherence to Information Security Policy: A Quest for the Antecedents of Deterrence Variables. INQUIRY: The Journal of Health Care Organization, Provision, and Financing 58, pages 004695802110295.
Crossref
Scott Mongeau & Andrzej HajdasinskiScott Mongeau & Andrzej Hajdasinski. 2021. Cybersecurity Data Science. Cybersecurity Data Science 317 346 .
Mohammad Moeini, Robert D. Galliers, Boyka Simeonova & Alex Wilson. 2021. Advancing Information Systems Theories. Advancing Information Systems Theories 275 308 .
Grace Fox. 2021. Data Privacy and Trust in Cloud Computing. Data Privacy and Trust in Cloud Computing 59 78 .
Bahtijar Vogel, Miranda Kajtazi, Joseph Bugeja & Rimpu Varshney. (2020) Openness and Security Thinking Characteristics for IoT Ecosystems. Information 11:12, pages 564.
Crossref
Shintaro Okazaki, Martin Eisend, Kirk Plangger, Ko de Ruyter & Dhruv Grewal. (2020) Understanding the Strategic Consequences of Customer Privacy Concerns: A Meta-Analytic Review. Journal of Retailing 96:4, pages 458-473.
Crossref
Andreas Schroeder, Parikshit Naik, Ali Ziaee Bigdeli & Tim Baines. (2020) Digitally enabled advanced services: a socio-technical perspective on the role of the internet of things (IoT). International Journal of Operations & Production Management 40:7/8, pages 1243-1268.
Crossref
Marco Schletz, Ana Cardoso, Gabriela Prata Dias & Søren Salomo. (2020) How Can Blockchain Technology Accelerate Energy Efficiency Interventions? A Use Case Comparison. Energies 13:22, pages 5869.
Crossref
Rao Faizan Ali, P.D.D. Dominic & Kashif Ali. (2020) Organizational Governance, Social Bonds and Information Security Policy Compliance: A Perspective towards Oil and Gas Employees. Sustainability 12:20, pages 8576.
Crossref
Joseph Bugeja, Andreas Jacobsson & Paul Davidsson. (2020) Is your home becoming a spy?. Is your home becoming a spy?.
Mohammad Moeini, Boyka Simeonova, Robert D Galliers & Alex Wilson. (2020) Theory borrowing in IT-rich contexts: Lessons from IS strategy research. Journal of Information Technology 35:3, pages 270-282.
Crossref
Ruwan Bandara, Mario Fernando & Shahriar Akter. (2019) Privacy concerns in E-commerce: A taxonomy and a future research agenda. Electronic Markets 30:3, pages 629-647.
Crossref
Stefan Becher, Armin Gerl, Bianca Meier & Felix Bölz. (2020) Big Picture on Privacy Enhancing Technologies in e-Health: A Holistic Personal Privacy Workflow. Information 11:7, pages 356.
Crossref
Dezhi Wu, Gregory D. Moody, Jun Zhang & Paul Benjamin Lowry. (2020) Effects of the design of mobile security notifications and mobile app usability on users’ security perceptions and continued use intention. Information & Management 57:5, pages 103235.
Crossref
Mathias Eggert & Jens Alberts. (2020) Frontiers of business intelligence and analytics 3.0: a taxonomy-based literature review and research agenda. Business Research 13:2, pages 685-739.
Crossref
Bongsik Shin & Paul Benjamin Lowry. (2020) A review and theoretical explanation of the ‘Cyberthreat-Intelligence (CTI) capability’ that needs to be fostered in information security practitioners and how this can be accomplished. Computers & Security 92, pages 101761.
Crossref
Kholekile L. Gwebu, Jing Wang & Michael Y. Hu. (2019) Information security policy noncompliance: An integrative social influence model. Information Systems Journal 30:2, pages 220-269.
Crossref
Nadine Guhr, Oliver Werth, Philip Peter Hermann Blacha & Michael H. Breitner. (2020) Privacy concerns in the smart home context. SN Applied Sciences 2:2.
Crossref
Grace Fox & Theo Lynn. 2020. The Cloud-to-Thing Continuum. The Cloud-to-Thing Continuum 123 140 .
Hyungjin Lukas Kim, Anat Hovav & Jinyoung Han. (2019) Protecting intellectual property from insider threats. Journal of Intellectual Capital 21:2, pages 181-202.
Crossref
Bilge Yigit Ozkan, Marco Spruit, Roland Wondolleck & Verónica Burriel Coll. (2019) Modelling adaptive information security for SMEs in a cluster. Journal of Intellectual Capital 21:2, pages 235-256.
Crossref
A. J. Burns. (2019) Security Organizing. ACM SIGMIS Database: the DATABASE for Advances in Information Systems 50:4, pages 14-27.
Crossref
Sadaf Hina, Dhanapal Durai Dominic Panneer Selvam & Paul Benjamin Lowry. (2019) Institutional governance and protection motivation: Theoretical insights into shaping employees’ security compliance behavior in higher education institutions in the developing world. Computers & Security 87, pages 101594.
Crossref
Ivano Bongiovanni. (2019) The least secure places in the universe? A systematic literature review on information security management in higher education. Computers & Security 86, pages 350-357.
Crossref
Valentine Weydert, Pierre Desmet & Caroline Lancelot-Miltgen. (2019) Convincing consumers to share personal data: double-edged effect of offering money. Journal of Consumer Marketing 37:1, pages 1-9.
Crossref
Haejung Yun, Gwanhoo Lee & Dan J Kim. (2019) A chronological review of empirical research on personal information privacy concerns: An analysis of contexts and research constructs. Information & Management 56:4, pages 570-601.
Crossref
Jin P. Gerlach, Nicole Eling, Nora Wessels & Peter Buxmann. (2018) Flamingos on a slackline: Companies' challenges of balancing the competing demands of handling customer information and privacy. Information Systems Journal 29:2, pages 548-575.
Crossref
Nadine Guhr, Benedikt Lebek & Michael H. Breitner. (2018) The impact of leadership on employees' intended information security behaviour: An examination of the full‐range leadership theory. Information Systems Journal 29:2, pages 340-362.
Crossref
Reza Saneei Moghadam & Ricardo Colomo-Palacios. (2018) Information security governance in big data environments: A systematic mapping. Procedia Computer Science 138, pages 401-408.
Crossref
Victoria Fast & Daniel Schnurr. (2021) Incentivizing Data Donations and the Adoption of COVID-19 Contact-Tracing Apps: A Randomized Controlled Online Experiment on the German Corona-Warn-App. SSRN Electronic Journal.
Crossref
Javad K. Pool & Saeed Akhlaghpour. (2019) Causes and Impacts of Personal Health Information (PHI) Breaches: A Scoping Review and Thematic Analysis. SSRN Electronic Journal.
Crossref
Mohammad Jalali, Maike Bruckes, Daniel Westmattelmann & Gerhard Schewe. (2019) Why Employees (Still) Click on Phishing Links: An Investigation in Hospitals. SSRN Electronic Journal.
Crossref

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.