Simon Trang
Orcid: 0000-0002-4784-4038Affiliations:
- University of Paderborn, Germany
- University of Göttingen, Germany (former)
According to our database1,
Simon Trang
authored at least 74 papers
between 2013 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Integrating and synthesising technostress research: a meta-analysis on technostress creators, outcomes, and IS usage contexts.
Eur. J. Inf. Syst., May, 2024
Fortifying the Human Firewall: Designing a Virtual Reality-Based Test to Measure Individuals' Cyber Security Competencies.
Proceedings of the 28th Pacific Asia Conference on Information Systems, 2024
Using Digital Nudging in Medical decision-making - A Taxonomy to Inform Research and Practice.
Proceedings of the 28th Pacific Asia Conference on Information Systems, 2024
Data Size Matters: The Impact of Message Framing in Different Health Scenarios on the Donation of Personal Health Information.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024
Unlocking sustainable reporting: Leveraging knowledge graphs for ESG metrics extraction: The role of knowledge graphs in sustainability reporting.
Proceedings of the 54. Jahrestagung der Gesellschaft für Informatik, 2024
The Lower the Risk, the Lower the Premium? Conceptualizing an Artifact for Usage-Based Pricing of Personal Cyber Insurance Policies.
Proceedings of the 32nd European Conference on Information Systems, 2024
Will the Ransom Be Paid? - Examining Influencing Factors of the Ransomware-Payment Decision.
Proceedings of the 32nd European Conference on Information Systems, 2024
Do Investors Surf the Darknet? Exploring the Impact of Darknet Announcements on Market Reactions.
Proceedings of the 32nd European Conference on Information Systems, 2024
2023
Should i really do that? Using quantile regression to examine the impact of sanctions on information security policy compliance behavior.
Comput. Secur., October, 2023
Triad or Error? Introducing Three Basic Dimensions of Competence as a Driving Force for Information Security Performance.
Proceedings of the 44th International Conference on Information Systems, 2023
Bridging the Gap between Security Competencies and Security Threats: Toward a Cyber Security Domain Model.
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023
Is Social Learning Always Helpful? Using Quantile Regression to Examine the Impact of Social Learning on Information Security Policy Compliance Behavior.
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023
At What Price? Exploring the Potential and Challenges of Differentially Private Machine Learning for Healthcare.
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023
Chasing Cyber Security Unicorns: A Taxonomy-based Analysis of Cyber Security Start-ups' Business Models.
Proceedings of the 31st European Conference on Information Systems, 2023
A Qualitative Study on Acceptance Factors of Economic Approaches on IT Security Investment Decisions.
Proceedings of the 29th Americas Conference on Information Systems, 2023
A Process-Based Approach to Information Security Investment Evaluation: Design, Implementation, and Evaluation.
Proceedings of the 29th Americas Conference on Information Systems, 2023
2022
Electron. Mark., December, 2022
Co-creating business value through IT-business operational alignment in inter-organisational relationships: empirical evidence from regional networks.
Eur. J. Inf. Syst., 2022
Apologize or justify? Examining the impact of data breach response actions on stock value of affected companies?
Comput. Secur., 2022
Understanding the Corporate Use of IT Security Labels for IoT Products and Services: A Literature Review.
Proceedings of the Digital Transformation in the Viral Age, 2022
A Double-Edged Sword of Involvement: On the Tension Between Customers' Group Value and Self-Interest in Data Breach Response Processes.
Proceedings of the 43rd International Conference on Information Systems, 2022
Show Me Your Claims and I'll Tell You Your Offenses: Machine Learning-Based Decision Support for Fraud Detection on Medical Claim Data.
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022
The Double-Edged Sword of Health Data Breaches: A Comparison of Customer and Stock Price Perspectives on the Impact of Data Breaches of Response Strategies.
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022
Proceedings of the 30th European Conference on Information Systems, 2022
A Digitization Pipeline for Mixed-Typed Documents Using Machine Learning and Optical Character Recognition.
Proceedings of the Transdisciplinary Reach of Design Science Research, 2022
2021
HMD Prax. Wirtsch., 2021
What to do after a data breach? Examining apology and compensation as response strategies for health service providers.
Electron. Mark., 2021
Examining the role of stress and information security policy design in information security compliance behaviour: An experimental study of in-task behaviour.
Comput. Secur., 2021
The perils of gamification: Does engaging with gamified services increase users' willingness to disclose personal information?
Comput. Hum. Behav., 2021
Towards a Business Process-based Economic Evaluation and Selection of IT Security Measures.
Proceedings of the First International Workshop on Current Compliance Issues in Information Systems Research (CIISR'21) Co-located with the 16th International Conference on Wirtschaftsinformatik (WI'21), 2021
Let us work Together' - Insights from an Experiment with Conversational Agents on the Relation of Anthropomorphic Design, Dialog Support, and Performance.
Proceedings of the Innovation durch Informationssysteme, 2021
Healthcare in Fraudster's Crosshairs: Designing, Implementing and Evaluating a Machine Learning Approach for Anomaly Detection on Medical Prescription Claim Data.
Proceedings of the 25th Pacific Asia Conference on Information Systems, 2021
Do You Think It Is Fair? Effects of Data Breach Response Actions on Customer Justice.
Proceedings of the 25th Pacific Asia Conference on Information Systems, 2021
The Impact of Threat and Efficacy on Information Security Behavior: Applying an Extended Parallel Process Model to the Fear of Ransomware.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021
Fitness First or Safety First? Examining Adverse Consequences of Privacy Seals in the Event of a Data Breach.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021
How do employees learn security behavior? Examining the influence of individual cultural values and social learning on ISP compliance behavior.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021
Openness Always Pays off - Investigation of Diverse Actions in response Strategies to Data Breaches.
Proceedings of the 29th European Conference on Information Systems, 2021
2020
J. Assoc. Inf. Syst., 2020
One app to trace them all? Examining app specifications for mass acceptance of contact-tracing apps.
Eur. J. Inf. Syst., 2020
Proceedings of the Entwicklungen, 2020
Let's Travel the World Together: Toward an Understanding of Motivational Antecedents in Business Trip Ridesharing Services.
Proceedings of the Entwicklungen, 2020
The More, the Better? Compensation and Remorse as Data Breach Recovery Actions - An Experimental Scenario-based Investigation.
Proceedings of the Entwicklungen, 2020
Please be Silent? Examining the Impact of Data Breach Response Strategies on the Stock Value.
Proceedings of the 41st International Conference on Information Systems, 2020
Overcoming Digital Challenges: A Cross-Cultural Experimental Investigation of Recovering from Data Breaches.
Proceedings of the 41st International Conference on Information Systems, 2020
Why Electrify? - A Qualitative-Empirical Study on Electrification of Fleet Transportation Systems.
Proceedings of the 28th European Conference on Information Systems, 2020
Do I Get What I Expect? An Experimental Investigation of Different Data Breach Recovery Actions.
Proceedings of the 28th European Conference on Information Systems, 2020
Proceedings of the 26th Americas Conference on Information Systems, 2020
2019
A Meta-Analysis of Deterrence Theory in Information Security Policy Compliance Research.
Inf. Syst. Frontiers, 2019
Promoting Sustainable Mobility Beliefs with Persuasive and Anthropomorphic Design: Insights from an Experiment with a Conversational Agent.
Proceedings of the 40th International Conference on Information Systems, 2019
Another dark side of gamification? How and when gamified service use triggers information disclosure.
Proceedings of the 3rd International GamiFIN Conference, Levi, Finland, April 8-10, 2019., 2019
Conceptualization, Design, and Implementation of EconBPC - A Software Artifact for the Economic Analysis of Business Process Compliance.
Proceedings of the Conceptual Modeling - 38th International Conference, 2019
Fostering Information Security Compliance: Comparing the Predictive Power of Social Learning Theory and Deterrence Theory.
Proceedings of the 25th Americas Conference on Information Systems, 2019
Where Do You Want to Go Today: Understanding the Adoption of IS-Enabled Business Trip Ridesharing Services.
Proceedings of the 25th Americas Conference on Information Systems, 2019
2018
When Does Deterrence Work? A Moderation Meta-analysis of Employees' Information Security Policy Behavior.
Proceedings of the International Conference on Information Systems, 2018
Antecedents and Outcomes of Operational Alignment in the Context of Academic Institutions.
Proceedings of the 26th European Conference on Information Systems: Beyond Digitization, 2018
2016
Synthesizing and Integrating Research on IT-based Value Co-Creation: a Meta-Analysis.
Proceedings of the 24th European Conference on Information Systems, 2016
How Different Types of IS Assets Account for Synergy-Enabled Value in Multi-Unit Firms: Mapping of Critical Success Factors and Key Performance Indicators.
Proceedings of the 22nd Americas Conference on Information Systems, 2016
2015
The Contingent Role of Centrality in IT Network Governance: An Empirical Examination.
Pac. Asia J. Assoc. Inf. Syst., 2015
Integrating Industry Characteristics in Inter-Organizational IS Adoption Models: A Mixed Method Approach.
Proceedings of the 19th Pacific Asia Conference on Information Systems, 2015
E-Collaboration in Interorganizational Networks: A Literature Review and an Agenda for Future Research.
Proceedings of the 48th Hawaii International Conference on System Sciences, 2015
The Danger of Replacing Human Interaction in IS-driven Collaborative Consumption Services.
Proceedings of the 23rd European Conference on Information Systems, 2015
The Influence of Sociodemographic and Technology-Associated Factors on Stress from Human Interaction with Electric Vehicle Information Systems.
Proceedings of the 21st Americas Conference on Information Systems, 2015
Influence of Network Characteristics on Inter-Organizational IT Integration: The Role of Commitment and Trust.
Proceedings of the 21st Americas Conference on Information Systems, 2015
Value Co-creation through Network IT Alignment: An Empirical Examination in Regional Networks.
Proceedings of the 21st Americas Conference on Information Systems, 2015
2014
Proceedings of the 18th Pacific Asia Conference on Information Systems, 2014
Examining IT Alignment in Inter-Organizational Networks: Development and Application of a Measurment Instrument.
Proceedings of the 18th Pacific Asia Conference on Information Systems, 2014
Dimensions of Trust in the Acceptance of Inter-Organizational Information Systems in Networks: towards a Socio-Technical Perspective.
Proceedings of the 18th Pacific Asia Conference on Information Systems, 2014
E-Business Adoption at the Firm Level: Comparing the Predictive Power of Competing IS Adoption Models.
Proceedings of the International Conference on Information Systems, 2014
Collaborative Technologies in an Inter-organizational Context: Examining the Role of Perceived Information Security and Trust on Post-adoption.
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014
2013
Proceedings of the 43. Jahrestagung der Gesellschaft für Informatik, 2013
The Role Of Motivational Factors In Distributed Software Development Teams: An Empirical Investigation.
Proceedings of the 21st European Conference on Information Systems, 2013
Proceedings of the 19th Americas Conference on Information Systems, 2013