Anat Hovav

According to our database1, Anat Hovav authored at least 47 papers between 1996 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Introduction to the Minitrack on Information Security in the era of Artificial General Intelligence (AGI).
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

2023
The effects of cyber regulations and security policies on organizational outcomes: a knowledge management perspective.
Eur. J. Inf. Syst., March, 2023

2022
Confucian Values, Social Fear, and Knowledge Sharing in Korean Organizations.
J. Comput. Inf. Syst., 2022

Development of methods for identifying an appropriate benchmarking peer to establish information security policy.
Expert Syst. Appl., 2022

2020
Benchmarking Methodology for Information Security Policy (BMISP): Artifact Development and Evaluation.
Inf. Syst. Frontiers, 2020

2019
The Effect of Paradoxical Tensions Between Confucian Culture and Organizational Culture on Fear and Knowledge Sharing Intention.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

2018
Rethinking the Prevailing Security Paradigm: Can User Empowerment with Traceability Reduce the Rate of Security Policy Circumvention?
Data Base, 2018

A Novel Method to Enhance ISSP Compliant: an Approach Drawing Upon the Concept of Empowerment in Erm System Workflow.
Proceedings of the 51st Hawaii International Conference on System Sciences, 2018

2017
Market Reaction to Security Breach Announcements: Evidence from South Korea.
Data Base, 2017

How Espoused Culture Influences Misuse Intention: A Micro-Institutional Theory Perspective.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

2016
This is my device! Why should I follow your rules? Employees' compliance with BYOD security policy.
Pervasive Mob. Comput., 2016

Dimensionality of Social Capital and Organizational Citizenship Behavior in Information Systems Project Teams.
J. Comput. Inf. Syst., 2016

The influence of information security on the adoption of web-based integrated information systems: an e-government study in Peru.
Inf. Technol. Dev., 2016

Impact of Psychological Empowerment, position and Awareness of Audit on Information Security Policy Compliance Intention.
Proceedings of the 20th Pacific Asia Conference on Information Systems, 2016

Responsible Innovation: The Role of MIS in the "Right to be Forgotten" Discourse.
Proceedings of the 22nd Americas Conference on Information Systems, 2016

2015
Empowerment or Control: Reconsidering Employee Security Policy Compliance in Terms of Authorization.
Proceedings of the 48th Hawaii International Conference on System Sciences, 2015

2014
Using scenarios to understand the frontiers of IS: Fifteen years later (a postscript).
Inf. Syst. Frontiers, 2014

The Ripple Effect of an Information Security Breach Event: A Stakeholder Analysis.
Commun. Assoc. Inf. Syst., 2014

Employees' Compliance with BYOD Security Policy: Insights from Reactance, Organizational Justice, and Protection Motivation Theory.
Proceedings of the 22st European Conference on Information Systems, 2014

2013
Using a Dairy Management Information System to Facilitate Precision Agriculture: The Case of the AfiMilk® System.
Inf. Syst. Manag., 2013

2012
Strategic value and drivers behind organizational adoption of enterprise DRM: The korean case.
J. Serv. Sci. Res., 2012

Applying an extended model of deterrence across cultures: An investigation of information systems misuse in the U.S. and South Korea.
Inf. Manag., 2012

2011
Organizational Informal Structure Influence On Project Success: Social Capital Approach.
Proceedings of the Pacific Asia Conference on Information Systems, 2011

Methods for Studying the Information Systems Future.
Proceedings of the Researching the Future in Information Systems, 2011

2010
Precision Agriculture in the Dairy Industry: The Case of the AfiMilk® System.
Proceedings of the Sustainable IT Collaboration Around the Globe. 16th Americas Conference on Information Systems, 2010

2009
User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach.
Inf. Syst. Res., 2009

Tutorial: Identity Management Systems and Secured Access Control.
Commun. Assoc. Inf. Syst., 2009

Adoption leadership and early planners: Comcast's IP upgrade strategy.
Commun. ACM, 2009

Identity Management.
Proceedings of the 15th Americas Conference on Information Systems, 2009

2008
From Hindsight to Foresight: Applying Futures Research Techniques in Information Systems.
Commun. Assoc. Inf. Syst., 2008

2007
The IS Organization of the Future: Four Scenarios for 2020.
Inf. Syst. Manag., 2007

Deterring internal information systems misuse.
Commun. ACM, 2007

2006
Academic Electronic Journals: Past, Present, and Future.
Adv. Comput., 2006

2005
Capital market reaction to defective IT products: The case of computer viruses.
Comput. Secur., 2005

Global Diffusion of the Internet V - The Changing Dynamic of the Internet: Early and Late Adopters of the IPv6 Standard.
Commun. Assoc. Inf. Syst., 2005

Are Prevailing Theories and Practices of IS Security Management Adequate? An Evaluation and Call to Action.
Proceedings of the A Conference on a Human Scale. 11th Americas Conference on Information Systems, 2005

2004
The Impact of Virus Attack Announcements on the Market Value of Firms.
Inf. Secur. J. A Glob. Perspect., 2004

A model of Internet standards adoption: the case of IPv6.
Inf. Syst. J., 2004

Managing academic e-journals.
Commun. ACM, 2004

The Role of Individual Characteristics on the Effectiveness of IS Security Countermeasures.
Proceedings of the 10th Americas Conference on Information Systems, 2004

2002
Future Penetration of Academic Electronic Journals: Four Scenarios.
Inf. Syst. Frontiers, 2002

2001
Internet Technology Diffusion: Adoption of IPV6.
Proceedings of the 9th European Conference on Information Systems, 2001

Managing academic electronic publishing: Six case studies.
Proceedings of the 9th European Conference on Information Systems, 2001

1999
Using Scenarios to Understand the Frontiers of IS.
Inf. Syst. Frontiers, 1999

1998
Adapting business process redesign concepts to learning processes.
Bus. Process. Manag. J., 1998

Social behavior in professional meetings: a video analysis of a panel discussion.
Proceedings of the ACM SIGCPR Conference on Computer Personnel Research, 1998

1996
Redesigning the questioning, discussion, and document processes.
Proceedings of the 1996 ACM SIGCPR/SIGMIS Conference on Computer personnel Research, 1996


  Loading...