Romilla Syed
Orcid: 0000-0001-5933-8389
According to our database1,
Romilla Syed
authored at least 21 papers
between 2015 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024
Social Media Enabled Social Movements in Information Systems Research: A Lakatos Approach to Literature Review.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024
2023
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023
Social Media Enabled Social Movements in Information Systems Research: A Lakatos Approach to Review of Literature.
Proceedings of the 29th Americas Conference on Information Systems, 2023
2022
Social Movement Sustainability on Social Media: An Analysis of the Women's March Movement on Twitter.
J. Assoc. Inf. Syst., 2022
2020
Cybersecurity vulnerability management: A conceptual ontology and cyber intelligence alert system.
Inf. Manag., 2020
Proceedings of the 41st International Conference on Information Systems, 2020
Proceedings of the 26th Americas Conference on Information Systems, 2020
2019
J. Strateg. Inf. Syst., 2019
The Identity Management Value Model: A Design Science Approach to Assess Value Gaps on Social Media.
Decis. Sci., 2019
Proceedings of the 27th European Conference on Information Systems, 2019
2018
Comput. Hum. Behav., 2018
Comput. Hum. Behav., 2018
Proceedings of the 24th Americas Conference on Information Systems, 2018
Proceedings of the 24th Americas Conference on Information Systems, 2018
2017
Information security concerns in IT outsourcing: Identifying (in) congruence between clients and vendors.
Inf. Manag., 2017
Proceedings of the International Conference on Information Systems, 2017
Proceedings of the 23rd Americas Conference on Information Systems, 2017
2016
Interpreting information security culture: An organizational transformation case study.
Comput. Secur., 2016
2015
Dynamics of Data Breaches in Online Social Networks: Understanding Threats to Organizational Information Security Reputation.
Proceedings of the International Conference on Information Systems, 2015