default search action
Kristin Masuch
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c24]Julia Klein, Kristin Masuch, Laura Schulze, Simon Trang:
Data Size Matters: The Impact of Message Framing in Different Health Scenarios on the Donation of Personal Health Information. HICSS 2024: 3245-3254 - [c23]Ace Vo, Miloslava Plachkinova, Maike Greve, Kristin Masuch:
Introduction to the Minitrack on Security and Privacy Challenges for Healthcare. HICSS 2024: 3717-3718 - [c22]Florian Rampold, Julia Heinsohn, Florian Schütz, Julia Klein, Thomas Keller, Kristin Masuch, Julia Warwas:
Custom Solutions for Diverse Needs: Laying the Foundation for Tailored SETA Programs in the Healthcare Domain. HICSS 2024: 3719-3728 - 2023
- [j6]Sebastian Hengstler, Stephan Kuehnel, Kristin Masuch, Ilja Nastjuk, Simon Trang:
Should i really do that? Using quantile regression to examine the impact of sanctions on information security policy compliance behavior. Comput. Secur. 133: 103370 (2023) - [c21]Florian Schütz, Florian Rampold, Kristin Masuch, Patricia Köpfer, Dominik Mann, Julia Warwas, Simon Trang:
Bridging the Gap between Security Competencies and Security Threats: Toward a Cyber Security Domain Model. HICSS 2023: 6118-6127 - [c20]Florian Rampold, Kristin Masuch, Julia Warwas, Simon Trang:
Triad or Error? Introducing Three Basic Dimensions of Competence as a Driving Force for Information Security Performance. ICIS 2023 - 2022
- [j5]Kristin Masuch, Maike Greve, Simon Trang, Lutz M. Kolbe:
Apologize or justify? Examining the impact of data breach response actions on stock value of affected companies? Comput. Secur. 112: 102502 (2022) - [c19]Florian Schütz, Florian Rampold, Andre Kalisch, Kristin Masuch:
Consumer Cyber Insurance as Risk Transfer: A Coverage Analysis. CENTERIS/ProjMAN/HCist 2022: 521-528 - [c18]Florian Rampold, Florian Schütz, Kristin Masuch, Patricia Köpfer, Julia Warwas:
Are You Aware of Your Competencies? - the potentials of Competence Research to Design Effective SETA Programs. ECIS 2022 - [c17]Kristin Masuch, Maike Greve, Simon Trang:
The Double-Edged Sword of Health Data Breaches: A Comparison of Customer and Stock Price Perspectives on the Impact of Data Breaches of Response Strategies. HICSS 2022: 1-10 - [c16]Till Ole Diesterhöft, Kristin Masuch, Maike Greve, Simon Trang:
A Double-Edged Sword of Involvement: On the Tension Between Customers' Group Value and Self-Interest in Data Breach Response Processes. ICIS 2022 - [c15]Till Ole Diesterhöft, Saskia Isabel Schweneker, Kristin Masuch, Aycan Aslan, Marvin Braun:
The Role of Uncertainty in Data Breach Response Processes - A Reactance Theory Perspective. ICIS 2022 - [c14]Lucas Pfannenberg, Florian Schütz, Sarah Gronemann, Eylert Spils ad Wilken, Kristin Masuch, Simon Trang:
Understanding the Corporate Use of IT Security Labels for IoT Products and Services: A Literature Review. WEB 2022: 12-27 - 2021
- [j4]Kristin Masuch, Maike Greve, Simon Trang:
What to do after a data breach? Examining apology and compensation as response strategies for health service providers. Electron. Mark. 31(4): 829-848 (2021) - [j3]Alfred Benedikt Brendel, Maike Greve, Kristin Masuch, Simon Trang:
Corona Tracing Apps - Eine Analyse und Strukturierung des europäischen Marktes. HMD Prax. Wirtsch. 58(4): 698-711 (2021) - [c13]Kristin Masuch, Till Ole Diesterhöft, Maike Greve, Steffen Massanneck, Duy Khang Nguyen, Simon Trang, Lutz M. Kolbe:
Openness Always Pays off - Investigation of Diverse Actions in response Strategies to Data Breaches. ECIS 2021 - [c12]Kristin Masuch, Maike Greve, Simon Trang:
Fitness First or Safety First? Examining Adverse Consequences of Privacy Seals in the Event of a Data Breach. HICSS 2021: 1-10 - [c11]Kristin Masuch, Sebastian Hengstler, Laura Schulze, Simon Trang:
The Impact of Threat and Efficacy on Information Security Behavior: Applying an Extended Parallel Process Model to the Fear of Ransomware. HICSS 2021: 1-10 - [c10]Christine Harnischmacher, Kristin Masuch, Florian Reschke, Alfred Benedikt Brendel, Lutz M. Kolbe:
(I Can't Get No) Electrification - A Qualitative-Empirical Study on Electrification of Transportation Fleets. ICIS 2021 - [c9]Till Ole Diesterhöft, Maike Greve, Kristin Masuch, Simon Trang, Lutz M. Kolbe:
Do You Think It Is Fair? Effects of Data Breach Response Actions on Customer Justice. PACIS 2021: 71 - [c8]Tizian Matschak, Christoph Prinz, Kristin Masuch, Simon Trang:
Healthcare in Fraudster's Crosshairs: Designing, Implementing and Evaluating a Machine Learning Approach for Anomaly Detection on Medical Prescription Claim Data. PACIS 2021: 89 - 2020
- [j2]Stefanie Holly, Astrid Nieße, Martin Tröschel, Lasse Hammer, Christoph Franzius, Viktor Dmitriyev, Johannes Dorfner, Eric M. S. P. Veith, Christine Harnischmacher, Maike Greve, Kristin Masuch, Lutz M. Kolbe, Boris Wulff, Julian Kretz:
Flexibility management and provision of balancing services with battery-electric automated guided vehicles in the Hamburg container terminal Altenwerder. Energy Inform. 3(S1) (2020) - [j1]Raphael Meyer von Wolff, Sebastian Hobert, Kristin Masuch, Matthias Schumann:
Chatbots at Digital Workplaces - A Grounded-Theory Approach for Surveying Application Areas and Objectives. Pac. Asia J. Assoc. Inf. Syst. 12(2): 3 (2020) - [c7]Kristin Masuch, Maike Greve, Jens Cyrenius, Benjamin Wimmel, Simon Trang:
Do I Get What I Expect? An Experimental Investigation of Different Data Breach Recovery Actions. ECIS 2020 - [c6]Kristin Masuch, Christine Harnischmacher, Maike Greve, Simon Trang:
Why Electrify? - A Qualitative-Empirical Study on Electrification of Fleet Transportation Systems. ECIS 2020 - [c5]Maike Greve, Kristin Masuch, Sebastian Hengstler, Simon Trang:
Overcoming Digital Challenges: A Cross-Cultural Experimental Investigation of Recovering from Data Breaches. ICIS 2020 - [c4]Kristin Masuch, Maike Greve, Simon Trang:
Please be Silent? Examining the Impact of Data Breach Response Strategies on the Stock Value. ICIS 2020 - [c3]Maike Greve, Kristin Masuch, Simon Trang:
The More, the Better? Compensation and Remorse as Data Breach Recovery Actions - An Experimental Scenario-based Investigation. Wirtschaftsinformatik (Zentrale Tracks) 2020: 1278-1293
2010 – 2019
- 2019
- [c2]Tim-Benjamin Lembcke, Kristin Masuch, Simon Trang, Sebastian Hengstler, Patience Plics, Mustafa Pamuk:
Fostering Information Security Compliance: Comparing the Predictive Power of Social Learning Theory and Deterrence Theory. AMCIS 2019 - [c1]Raphael Meyer von Wolff, Kristin Masuch, Sebastian Hobert, Matthias Schumann:
What Do You Need Today? - An Empirical Systematization of Application Areas for Chatbots at Digital Workplaces. AMCIS 2019
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-20 21:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint