Publications (15)
A2 Review article, Literature review, Systematic review
How stage theorizing can improve recommendations against phishing attacks (2019)
Information Technology and People, 32 (4), 828-857, http://doi.org/10.1108/ITP-12-2017-0434
Tambe Ebot, Alain Claude
A2 Review article, Literature review, Systematic review
Artificial Intelligence for Cybersecurity : A Systematic Mapping of Literature (2020)
IEEE Access, 8, 146598-146612, http://doi.org/10.1109/ACCESS.2020.3013145, OA
Wiafe, Isaac; Koranteng, Felix N.; Obeng, Emmanuel N.; Assyne, Nana; Wiafe, Abigail; Gulliver, Stephen R.
A2 Review article, Literature review, Systematic review
State of the Art in Information Security Policy Development (2020)
Computers and Security, 88, 101608, http://doi.org/10.1016/j.cose.2019.101608, OA
Paananen, Hanna; Lapke, Michael; Siponen, Mikko
A2 Review article, Literature review, Systematic review
Toward a refined conceptualization of IS discontinuance : Reflection on the past and a way forward (2020)
Information and Management, 57 (2), 103167, http://doi.org/10.1016/j.im.2019.05.002, OA
Soliman, Wael; Rinta-Kahila, Tapani
A2 Review article, Literature review, Systematic review
Building Trust in the Sharing Economy : Current Approaches and Future Considerations (2021)
Journal of Cleaner Production, 279, 123724, http://doi.org/10.1016/j.jclepro.2020.123724, OA
Räisänen, Jaana; Ojala, Arto; Tuovinen, Tero