Kristin Masuch

Orcid: 0000-0002-6628-0207

According to our database1, Kristin Masuch authored at least 30 papers between 2019 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Introduction to the Minitrack on Security and Privacy Challenges for Healthcare.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

Custom Solutions for Diverse Needs: Laying the Foundation for Tailored SETA Programs in the Healthcare Domain.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

Data Size Matters: The Impact of Message Framing in Different Health Scenarios on the Donation of Personal Health Information.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

2023
Should i really do that? Using quantile regression to examine the impact of sanctions on information security policy compliance behavior.
Comput. Secur., October, 2023

Triad or Error? Introducing Three Basic Dimensions of Competence as a Driving Force for Information Security Performance.
Proceedings of the 44th International Conference on Information Systems, 2023

Bridging the Gap between Security Competencies and Security Threats: Toward a Cyber Security Domain Model.
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023

2022
Apologize or justify? Examining the impact of data breach response actions on stock value of affected companies?
Comput. Secur., 2022

Understanding the Corporate Use of IT Security Labels for IoT Products and Services: A Literature Review.
Proceedings of the Digital Transformation in the Viral Age, 2022

The Role of Uncertainty in Data Breach Response Processes - A Reactance Theory Perspective.
Proceedings of the 43rd International Conference on Information Systems, 2022

A Double-Edged Sword of Involvement: On the Tension Between Customers' Group Value and Self-Interest in Data Breach Response Processes.
Proceedings of the 43rd International Conference on Information Systems, 2022

The Double-Edged Sword of Health Data Breaches: A Comparison of Customer and Stock Price Perspectives on the Impact of Data Breaches of Response Strategies.
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022

Are You Aware of Your Competencies? - the potentials of Competence Research to Design Effective SETA Programs.
Proceedings of the 30th European Conference on Information Systems, 2022

Consumer Cyber Insurance as Risk Transfer: A Coverage Analysis.
Proceedings of the CENTERIS 2022 - International Conference on ENTERprise Information Systems / ProjMAN - International Conference on Project MANagement / HCist, 2022

2021
Corona Tracing Apps - Eine Analyse und Strukturierung des europäischen Marktes.
HMD Prax. Wirtsch., 2021

What to do after a data breach? Examining apology and compensation as response strategies for health service providers.
Electron. Mark., 2021

Healthcare in Fraudster's Crosshairs: Designing, Implementing and Evaluating a Machine Learning Approach for Anomaly Detection on Medical Prescription Claim Data.
Proceedings of the 25th Pacific Asia Conference on Information Systems, 2021

Do You Think It Is Fair? Effects of Data Breach Response Actions on Customer Justice.
Proceedings of the 25th Pacific Asia Conference on Information Systems, 2021

(I Can't Get No) Electrification - A Qualitative-Empirical Study on Electrification of Transportation Fleets.
Proceedings of the 42nd International Conference on Information Systems, 2021

The Impact of Threat and Efficacy on Information Security Behavior: Applying an Extended Parallel Process Model to the Fear of Ransomware.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

Fitness First or Safety First? Examining Adverse Consequences of Privacy Seals in the Event of a Data Breach.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

Openness Always Pays off - Investigation of Diverse Actions in response Strategies to Data Breaches.
Proceedings of the 29th European Conference on Information Systems, 2021

2020
Chatbots at Digital Workplaces - A Grounded-Theory Approach for Surveying Application Areas and Objectives.
Pac. Asia J. Assoc. Inf. Syst., 2020

Flexibility management and provision of balancing services with battery-electric automated guided vehicles in the Hamburg container terminal Altenwerder.
Energy Inform., 2020

The More, the Better? Compensation and Remorse as Data Breach Recovery Actions - An Experimental Scenario-based Investigation.
Proceedings of the Entwicklungen, 2020

Please be Silent? Examining the Impact of Data Breach Response Strategies on the Stock Value.
Proceedings of the 41st International Conference on Information Systems, 2020

Overcoming Digital Challenges: A Cross-Cultural Experimental Investigation of Recovering from Data Breaches.
Proceedings of the 41st International Conference on Information Systems, 2020

Why Electrify? - A Qualitative-Empirical Study on Electrification of Fleet Transportation Systems.
Proceedings of the 28th European Conference on Information Systems, 2020

Do I Get What I Expect? An Experimental Investigation of Different Data Breach Recovery Actions.
Proceedings of the 28th European Conference on Information Systems, 2020

2019
What Do You Need Today? - An Empirical Systematization of Application Areas for Chatbots at Digital Workplaces.
Proceedings of the 25th Americas Conference on Information Systems, 2019

Fostering Information Security Compliance: Comparing the Predictive Power of Social Learning Theory and Deterrence Theory.
Proceedings of the 25th Americas Conference on Information Systems, 2019


  Loading...