Simon Trang

Orcid: 0000-0002-4784-4038

Affiliations:
  • University of Paderborn, Germany
  • University of Göttingen, Germany (former)


According to our database1, Simon Trang authored at least 74 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Integrating and synthesising technostress research: a meta-analysis on technostress creators, outcomes, and IS usage contexts.
Eur. J. Inf. Syst., May, 2024

Fortifying the Human Firewall: Designing a Virtual Reality-Based Test to Measure Individuals' Cyber Security Competencies.
Proceedings of the 28th Pacific Asia Conference on Information Systems, 2024

Using Digital Nudging in Medical decision-making - A Taxonomy to Inform Research and Practice.
Proceedings of the 28th Pacific Asia Conference on Information Systems, 2024

Data Size Matters: The Impact of Message Framing in Different Health Scenarios on the Donation of Personal Health Information.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

Unlocking sustainable reporting: Leveraging knowledge graphs for ESG metrics extraction: The role of knowledge graphs in sustainability reporting.
Proceedings of the 54. Jahrestagung der Gesellschaft für Informatik, 2024

The Lower the Risk, the Lower the Premium? Conceptualizing an Artifact for Usage-Based Pricing of Personal Cyber Insurance Policies.
Proceedings of the 32nd European Conference on Information Systems, 2024

Will the Ransom Be Paid? - Examining Influencing Factors of the Ransomware-Payment Decision.
Proceedings of the 32nd European Conference on Information Systems, 2024

Do Investors Surf the Darknet? Exploring the Impact of Darknet Announcements on Market Reactions.
Proceedings of the 32nd European Conference on Information Systems, 2024

2023
Should i really do that? Using quantile regression to examine the impact of sanctions on information security policy compliance behavior.
Comput. Secur., October, 2023

Digital Responsibility.
Bus. Inf. Syst. Eng., August, 2023

Triad or Error? Introducing Three Basic Dimensions of Competence as a Driving Force for Information Security Performance.
Proceedings of the 44th International Conference on Information Systems, 2023

Bridging the Gap between Security Competencies and Security Threats: Toward a Cyber Security Domain Model.
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023

Is Social Learning Always Helpful? Using Quantile Regression to Examine the Impact of Social Learning on Information Security Policy Compliance Behavior.
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023

At What Price? Exploring the Potential and Challenges of Differentially Private Machine Learning for Healthcare.
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023

Chasing Cyber Security Unicorns: A Taxonomy-based Analysis of Cyber Security Start-ups' Business Models.
Proceedings of the 31st European Conference on Information Systems, 2023

A Qualitative Study on Acceptance Factors of Economic Approaches on IT Security Investment Decisions.
Proceedings of the 29th Americas Conference on Information Systems, 2023

A Process-Based Approach to Information Security Investment Evaluation: Design, Implementation, and Evaluation.
Proceedings of the 29th Americas Conference on Information Systems, 2023

2022
Smart cities and smart governance models for future cities.
Electron. Mark., December, 2022

Co-creating business value through IT-business operational alignment in inter-organisational relationships: empirical evidence from regional networks.
Eur. J. Inf. Syst., 2022

Apologize or justify? Examining the impact of data breach response actions on stock value of affected companies?
Comput. Secur., 2022

Understanding the Corporate Use of IT Security Labels for IoT Products and Services: A Literature Review.
Proceedings of the Digital Transformation in the Viral Age, 2022

A Double-Edged Sword of Involvement: On the Tension Between Customers' Group Value and Self-Interest in Data Breach Response Processes.
Proceedings of the 43rd International Conference on Information Systems, 2022

Show Me Your Claims and I'll Tell You Your Offenses: Machine Learning-Based Decision Support for Fraud Detection on Medical Claim Data.
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022

The Double-Edged Sword of Health Data Breaches: A Comparison of Customer and Stock Price Perspectives on the Impact of Data Breaches of Response Strategies.
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022

Towards a Taxonomy of Information Security Policy Non-Compliance Behavior.
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022

A Taxonomy of Machine Learning-based Fraud Detection Systems.
Proceedings of the 30th European Conference on Information Systems, 2022

A Digitization Pipeline for Mixed-Typed Documents Using Machine Learning and Optical Character Recognition.
Proceedings of the Transdisciplinary Reach of Design Science Research, 2022

2021
Corona Tracing Apps - Eine Analyse und Strukturierung des europäischen Marktes.
HMD Prax. Wirtsch., 2021

What to do after a data breach? Examining apology and compensation as response strategies for health service providers.
Electron. Mark., 2021

Examining the role of stress and information security policy design in information security compliance behaviour: An experimental study of in-task behaviour.
Comput. Secur., 2021

The perils of gamification: Does engaging with gamified services increase users' willingness to disclose personal information?
Comput. Hum. Behav., 2021

Towards a Business Process-based Economic Evaluation and Selection of IT Security Measures.
Proceedings of the First International Workshop on Current Compliance Issues in Information Systems Research (CIISR'21) Co-located with the 16th International Conference on Wirtschaftsinformatik (WI'21), 2021

Let us work Together' - Insights from an Experiment with Conversational Agents on the Relation of Anthropomorphic Design, Dialog Support, and Performance.
Proceedings of the Innovation durch Informationssysteme, 2021

Healthcare in Fraudster's Crosshairs: Designing, Implementing and Evaluating a Machine Learning Approach for Anomaly Detection on Medical Prescription Claim Data.
Proceedings of the 25th Pacific Asia Conference on Information Systems, 2021

Do You Think It Is Fair? Effects of Data Breach Response Actions on Customer Justice.
Proceedings of the 25th Pacific Asia Conference on Information Systems, 2021

The Impact of Threat and Efficacy on Information Security Behavior: Applying an Extended Parallel Process Model to the Fear of Ransomware.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

Fitness First or Safety First? Examining Adverse Consequences of Privacy Seals in the Event of a Data Breach.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

How do employees learn security behavior? Examining the influence of individual cultural values and social learning on ISP compliance behavior.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

Openness Always Pays off - Investigation of Diverse Actions in response Strategies to Data Breaches.
Proceedings of the 29th European Conference on Information Systems, 2021

2020
Synthesizing and Integrating Research on IT-Based Value Cocreation: A Meta-Analysis.
J. Assoc. Inf. Syst., 2020

One app to trace them all? Examining app specifications for mass acceptance of contact-tracing apps.
Eur. J. Inf. Syst., 2020

Can Gamification lead to Increase Paid Crowdworkers Output?
Proceedings of the Entwicklungen, 2020

Let's Travel the World Together: Toward an Understanding of Motivational Antecedents in Business Trip Ridesharing Services.
Proceedings of the Entwicklungen, 2020

The More, the Better? Compensation and Remorse as Data Breach Recovery Actions - An Experimental Scenario-based Investigation.
Proceedings of the Entwicklungen, 2020

Please be Silent? Examining the Impact of Data Breach Response Strategies on the Stock Value.
Proceedings of the 41st International Conference on Information Systems, 2020

Overcoming Digital Challenges: A Cross-Cultural Experimental Investigation of Recovering from Data Breaches.
Proceedings of the 41st International Conference on Information Systems, 2020

Why Electrify? - A Qualitative-Empirical Study on Electrification of Fleet Transportation Systems.
Proceedings of the 28th European Conference on Information Systems, 2020

Do I Get What I Expect? An Experimental Investigation of Different Data Breach Recovery Actions.
Proceedings of the 28th European Conference on Information Systems, 2020

What to do for a Literature Review? - A Synthesis of Literature Review Practices.
Proceedings of the 26th Americas Conference on Information Systems, 2020

2019
A Meta-Analysis of Deterrence Theory in Information Security Policy Compliance Research.
Inf. Syst. Frontiers, 2019

Promoting Sustainable Mobility Beliefs with Persuasive and Anthropomorphic Design: Insights from an Experiment with a Conversational Agent.
Proceedings of the 40th International Conference on Information Systems, 2019

Another dark side of gamification? How and when gamified service use triggers information disclosure.
Proceedings of the 3rd International GamiFIN Conference, Levi, Finland, April 8-10, 2019., 2019

Conceptualization, Design, and Implementation of EconBPC - A Software Artifact for the Economic Analysis of Business Process Compliance.
Proceedings of the Conceptual Modeling - 38th International Conference, 2019

Fostering Information Security Compliance: Comparing the Predictive Power of Social Learning Theory and Deterrence Theory.
Proceedings of the 25th Americas Conference on Information Systems, 2019

Where Do You Want to Go Today: Understanding the Adoption of IS-Enabled Business Trip Ridesharing Services.
Proceedings of the 25th Americas Conference on Information Systems, 2019

2018
When Does Deterrence Work? A Moderation Meta-analysis of Employees' Information Security Policy Behavior.
Proceedings of the International Conference on Information Systems, 2018

Antecedents and Outcomes of Operational Alignment in the Context of Academic Institutions.
Proceedings of the 26th European Conference on Information Systems: Beyond Digitization, 2018

2016
Synthesizing and Integrating Research on IT-based Value Co-Creation: a Meta-Analysis.
Proceedings of the 24th European Conference on Information Systems, 2016

How Different Types of IS Assets Account for Synergy-Enabled Value in Multi-Unit Firms: Mapping of Critical Success Factors and Key Performance Indicators.
Proceedings of the 22nd Americas Conference on Information Systems, 2016

2015
The Contingent Role of Centrality in IT Network Governance: An Empirical Examination.
Pac. Asia J. Assoc. Inf. Syst., 2015

Integrating Industry Characteristics in Inter-Organizational IS Adoption Models: A Mixed Method Approach.
Proceedings of the 19th Pacific Asia Conference on Information Systems, 2015

E-Collaboration in Interorganizational Networks: A Literature Review and an Agenda for Future Research.
Proceedings of the 48th Hawaii International Conference on System Sciences, 2015

The Danger of Replacing Human Interaction in IS-driven Collaborative Consumption Services.
Proceedings of the 23rd European Conference on Information Systems, 2015

The Influence of Sociodemographic and Technology-Associated Factors on Stress from Human Interaction with Electric Vehicle Information Systems.
Proceedings of the 21st Americas Conference on Information Systems, 2015

Influence of Network Characteristics on Inter-Organizational IT Integration: The Role of Commitment and Trust.
Proceedings of the 21st Americas Conference on Information Systems, 2015

Value Co-creation through Network IT Alignment: An Empirical Examination in Regional Networks.
Proceedings of the 21st Americas Conference on Information Systems, 2015

2014
One Size Fits All? The contingent Role of Centrality in IT Network Governance.
Proceedings of the 18th Pacific Asia Conference on Information Systems, 2014

Examining IT Alignment in Inter-Organizational Networks: Development and Application of a Measurment Instrument.
Proceedings of the 18th Pacific Asia Conference on Information Systems, 2014

Dimensions of Trust in the Acceptance of Inter-Organizational Information Systems in Networks: towards a Socio-Technical Perspective.
Proceedings of the 18th Pacific Asia Conference on Information Systems, 2014

E-Business Adoption at the Firm Level: Comparing the Predictive Power of Competing IS Adoption Models.
Proceedings of the International Conference on Information Systems, 2014

Collaborative Technologies in an Inter-organizational Context: Examining the Role of Perceived Information Security and Trust on Post-adoption.
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014

2013
IT Governance in Unternehmensnetzwerken - Eine kontingenztheoretische Betrachtung.
Proceedings of the 43. Jahrestagung der Gesellschaft für Informatik, 2013

The Role Of Motivational Factors In Distributed Software Development Teams: An Empirical Investigation.
Proceedings of the 21st European Conference on Information Systems, 2013

IT Governance in a Network Context: Literature Review and Agenda for Research.
Proceedings of the 19th Americas Conference on Information Systems, 2013


  Loading...