Romilla Syed

Orcid: 0000-0001-5933-8389

According to our database1, Romilla Syed authored at least 21 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Toxic Speech and Collective Engagement: Evidence from Roe v. Wade Fallout.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

Social Media Enabled Social Movements in Information Systems Research: A Lakatos Approach to Literature Review.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

Relationship between the Use of IT and Wellbeing: A Literature Review.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

2023
Investigation of Health Misinformation During the Covid-19 Pandemic.
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023

Social Media Enabled Social Movements in Information Systems Research: A Lakatos Approach to Review of Literature.
Proceedings of the 29th Americas Conference on Information Systems, 2023

2022
Social Movement Sustainability on Social Media: An Analysis of the Women's March Movement on Twitter.
J. Assoc. Inf. Syst., 2022

2020
Cybersecurity vulnerability management: A conceptual ontology and cyber intelligence alert system.
Inf. Manag., 2020

Core and Peripheral Users and Social Movement Mobilization.
Proceedings of the 41st International Conference on Information Systems, 2020

Social Movement and Core-Peripheral Network Mobilization.
Proceedings of the 26th Americas Conference on Information Systems, 2020

2019
Enterprise reputation threats on social media: A case of data breach framing.
J. Strateg. Inf. Syst., 2019

The Identity Management Value Model: A Design Science Approach to Assess Value Gaps on Social Media.
Decis. Sci., 2019

Social Media and Social movements: a Case of women's March.
Proceedings of the 27th European Conference on Information Systems, 2019

2018
What it takes to get retweeted: An analysis of software vulnerability messages.
Comput. Hum. Behav., 2018

Value-based information privacy objectives for Internet Commerce.
Comput. Hum. Behav., 2018

Cybersecurity Vulnerability Management: An Ontology-Based Conceptual Model.
Proceedings of the 24th Americas Conference on Information Systems, 2018

Trolls and Social Movement Participation: An Empirical Investigation.
Proceedings of the 24th Americas Conference on Information Systems, 2018

2017
Information security concerns in IT outsourcing: Identifying (in) congruence between clients and vendors.
Inf. Manag., 2017

Analyzing Software Vendors' Patch Release Behavior in the Age of Social Media.
Proceedings of the International Conference on Information Systems, 2017

Modeling Values of Internet of Things (IoT) Consumers' for Privacy Decision-Making.
Proceedings of the 23rd Americas Conference on Information Systems, 2017

2016
Interpreting information security culture: An organizational transformation case study.
Comput. Secur., 2016

2015
Dynamics of Data Breaches in Online Social Networks: Understanding Threats to Organizational Information Security Reputation.
Proceedings of the International Conference on Information Systems, 2015


  Loading...