[{"publication_status":"epub_ahead","issue":"2","year":"2025","citation":{"mla":"Trang, Simon Thanh-Nam, et al. “Deeper down the Rabbit Hole - How Technology Conspiracy Beliefs Emerge and Foster a Conspiracy Mindset.” <i>Information Systems Research (VHB Jourqual 3 A+, FT50)</i>, vol. 36, no. 2, 2025, doi:<a href=\"https://doi.org/10.1287/isre.2022.0494\">10.1287/isre.2022.0494</a>.","short":"S.T.-N. Trang, T. Krämer, M. Trenz, W. Weiger, Information Systems Research (VHB Jourqual 3 A+, FT50) 36 (2025).","bibtex":"@article{Trang_Krämer_Trenz_Weiger_2025, title={Deeper down the rabbit hole - How technology conspiracy beliefs emerge and foster a conspiracy mindset}, volume={36}, DOI={<a href=\"https://doi.org/10.1287/isre.2022.0494\">10.1287/isre.2022.0494</a>}, number={2}, journal={Information Systems Research (VHB Jourqual 3 A+, FT50)}, author={Trang, Simon Thanh-Nam and Krämer, Tobias  and Trenz, Manuel and Weiger, Welt}, year={2025} }","apa":"Trang, S. T.-N., Krämer, T., Trenz, M., &#38; Weiger, W. (2025). Deeper down the rabbit hole - How technology conspiracy beliefs emerge and foster a conspiracy mindset. <i>Information Systems Research (VHB Jourqual 3 A+, FT50)</i>, <i>36</i>(2). <a href=\"https://doi.org/10.1287/isre.2022.0494\">https://doi.org/10.1287/isre.2022.0494</a>","ieee":"S. T.-N. Trang, T. Krämer, M. Trenz, and W. Weiger, “Deeper down the rabbit hole - How technology conspiracy beliefs emerge and foster a conspiracy mindset,” <i>Information Systems Research (VHB Jourqual 3 A+, FT50)</i>, vol. 36, no. 2, 2025, doi: <a href=\"https://doi.org/10.1287/isre.2022.0494\">10.1287/isre.2022.0494</a>.","chicago":"Trang, Simon Thanh-Nam, Tobias  Krämer, Manuel Trenz, and Welt Weiger. “Deeper down the Rabbit Hole - How Technology Conspiracy Beliefs Emerge and Foster a Conspiracy Mindset.” <i>Information Systems Research (VHB Jourqual 3 A+, FT50)</i> 36, no. 2 (2025). <a href=\"https://doi.org/10.1287/isre.2022.0494\">https://doi.org/10.1287/isre.2022.0494</a>.","ama":"Trang ST-N, Krämer T, Trenz M, Weiger W. Deeper down the rabbit hole - How technology conspiracy beliefs emerge and foster a conspiracy mindset. <i>Information Systems Research (VHB Jourqual 3 A+, FT50)</i>. 2025;36(2). doi:<a href=\"https://doi.org/10.1287/isre.2022.0494\">10.1287/isre.2022.0494</a>"},"intvolume":"        36","date_updated":"2025-11-10T11:01:03Z","date_created":"2024-06-14T19:05:54Z","author":[{"last_name":"Trang","orcid":"0000-0002-4784-4038","id":"98948","full_name":"Trang, Simon Thanh-Nam","first_name":"Simon Thanh-Nam"},{"last_name":"Krämer","full_name":"Krämer, Tobias ","first_name":"Tobias "},{"last_name":"Trenz","full_name":"Trenz, Manuel","first_name":"Manuel"},{"full_name":"Weiger, Welt","last_name":"Weiger","first_name":"Welt"}],"volume":36,"title":"Deeper down the rabbit hole - How technology conspiracy beliefs emerge and foster a conspiracy mindset","doi":"10.1287/isre.2022.0494","type":"journal_article","publication":"Information Systems Research (VHB Jourqual 3 A+, FT50)","status":"public","_id":"54775","user_id":"98948","department":[{"_id":"792"}],"article_type":"original","language":[{"iso":"eng"}]},{"doi":"10.1177/02683962241295781","main_file_link":[{"url":"https://journals.sagepub.com/doi/10.1177/02683962241295781"}],"title":"Don’t count your chickens before they hatch: Conceptualizing and exploring deviations from polls during public health app releases","volume":40,"date_created":"2024-10-13T11:46:21Z","author":[{"first_name":"Simon Thanh-Nam","orcid":"0000-0002-4784-4038","last_name":"Trang","full_name":"Trang, Simon Thanh-Nam","id":"98948"},{"first_name":"Manuel","full_name":"Trenz, Manuel","last_name":"Trenz"},{"first_name":"Weiger","full_name":"Welf, Weiger","last_name":"Welf"}],"date_updated":"2025-11-10T11:00:21Z","intvolume":"        40","citation":{"ama":"Trang ST-N, Trenz M, Welf W. Don’t count your chickens before they hatch: Conceptualizing and exploring deviations from polls during public health app releases. <i>Journal of Information Technology</i>. 2025;40(3). doi:<a href=\"https://doi.org/10.1177/02683962241295781\">10.1177/02683962241295781</a>","chicago":"Trang, Simon Thanh-Nam, Manuel Trenz, and Weiger Welf. “Don’t Count Your Chickens before They Hatch: Conceptualizing and Exploring Deviations from Polls during Public Health App Releases.” <i>Journal of Information Technology</i> 40, no. 3 (2025). <a href=\"https://doi.org/10.1177/02683962241295781\">https://doi.org/10.1177/02683962241295781</a>.","ieee":"S. T.-N. Trang, M. Trenz, and W. Welf, “Don’t count your chickens before they hatch: Conceptualizing and exploring deviations from polls during public health app releases,” <i>Journal of Information Technology</i>, vol. 40, no. 3, 2025, doi: <a href=\"https://doi.org/10.1177/02683962241295781\">10.1177/02683962241295781</a>.","bibtex":"@article{Trang_Trenz_Welf_2025, title={Don’t count your chickens before they hatch: Conceptualizing and exploring deviations from polls during public health app releases}, volume={40}, DOI={<a href=\"https://doi.org/10.1177/02683962241295781\">10.1177/02683962241295781</a>}, number={3}, journal={Journal of Information Technology}, author={Trang, Simon Thanh-Nam and Trenz, Manuel and Welf, Weiger}, year={2025} }","short":"S.T.-N. Trang, M. Trenz, W. Welf, Journal of Information Technology 40 (2025).","mla":"Trang, Simon Thanh-Nam, et al. “Don’t Count Your Chickens before They Hatch: Conceptualizing and Exploring Deviations from Polls during Public Health App Releases.” <i>Journal of Information Technology</i>, vol. 40, no. 3, 2025, doi:<a href=\"https://doi.org/10.1177/02683962241295781\">10.1177/02683962241295781</a>.","apa":"Trang, S. T.-N., Trenz, M., &#38; Welf, W. (2025). Don’t count your chickens before they hatch: Conceptualizing and exploring deviations from polls during public health app releases. <i>Journal of Information Technology</i>, <i>40</i>(3). <a href=\"https://doi.org/10.1177/02683962241295781\">https://doi.org/10.1177/02683962241295781</a>"},"year":"2025","issue":"3","language":[{"iso":"eng"}],"article_type":"original","department":[{"_id":"792"}],"user_id":"98948","_id":"56603","status":"public","publication":"Journal of Information Technology","type":"journal_article"},{"publication":"European Journal of Information Systems (VHB Jourqual 3 A)","language":[{"iso":"eng"}],"issue":"4","quality_controlled":"1","year":"2025","date_created":"2024-06-04T09:44:49Z","publisher":"Informa UK Limited","title":"A field experiment on ISP training designs for enhancing employee information security compliance","type":"journal_article","status":"public","department":[{"_id":"792"}],"user_id":"98948","_id":"54576","publication_identifier":{"issn":["0960-085X","1476-9344"]},"publication_status":"published","page":"1-24","intvolume":"        34","citation":{"apa":"Nastjuk, I., Rampold, F., Trang, S. T.-N., &#38; Benitez, J. (2025). A field experiment on ISP training designs for enhancing employee information security compliance. <i>European Journal of Information Systems (VHB Jourqual 3 A)</i>, <i>34</i>(4), 1–24. <a href=\"https://doi.org/10.1080/0960085x.2024.2359460\">https://doi.org/10.1080/0960085x.2024.2359460</a>","bibtex":"@article{Nastjuk_Rampold_Trang_Benitez_2025, title={A field experiment on ISP training designs for enhancing employee information security compliance}, volume={34}, DOI={<a href=\"https://doi.org/10.1080/0960085x.2024.2359460\">10.1080/0960085x.2024.2359460</a>}, number={4}, journal={European Journal of Information Systems (VHB Jourqual 3 A)}, publisher={Informa UK Limited}, author={Nastjuk, Ilja and Rampold, Florian and Trang, Simon Thanh-Nam and Benitez, Jose}, year={2025}, pages={1–24} }","mla":"Nastjuk, Ilja, et al. “A Field Experiment on ISP Training Designs for Enhancing Employee Information Security Compliance.” <i>European Journal of Information Systems (VHB Jourqual 3 A)</i>, vol. 34, no. 4, Informa UK Limited, 2025, pp. 1–24, doi:<a href=\"https://doi.org/10.1080/0960085x.2024.2359460\">10.1080/0960085x.2024.2359460</a>.","short":"I. Nastjuk, F. Rampold, S.T.-N. Trang, J. Benitez, European Journal of Information Systems (VHB Jourqual 3 A) 34 (2025) 1–24.","chicago":"Nastjuk, Ilja, Florian Rampold, Simon Thanh-Nam Trang, and Jose Benitez. “A Field Experiment on ISP Training Designs for Enhancing Employee Information Security Compliance.” <i>European Journal of Information Systems (VHB Jourqual 3 A)</i> 34, no. 4 (2025): 1–24. <a href=\"https://doi.org/10.1080/0960085x.2024.2359460\">https://doi.org/10.1080/0960085x.2024.2359460</a>.","ieee":"I. Nastjuk, F. Rampold, S. T.-N. Trang, and J. Benitez, “A field experiment on ISP training designs for enhancing employee information security compliance,” <i>European Journal of Information Systems (VHB Jourqual 3 A)</i>, vol. 34, no. 4, pp. 1–24, 2025, doi: <a href=\"https://doi.org/10.1080/0960085x.2024.2359460\">10.1080/0960085x.2024.2359460</a>.","ama":"Nastjuk I, Rampold F, Trang ST-N, Benitez J. A field experiment on ISP training designs for enhancing employee information security compliance. <i>European Journal of Information Systems (VHB Jourqual 3 A)</i>. 2025;34(4):1-24. doi:<a href=\"https://doi.org/10.1080/0960085x.2024.2359460\">10.1080/0960085x.2024.2359460</a>"},"volume":34,"author":[{"first_name":"Ilja","last_name":"Nastjuk","full_name":"Nastjuk, Ilja"},{"first_name":"Florian","full_name":"Rampold, Florian","last_name":"Rampold"},{"first_name":"Simon Thanh-Nam","full_name":"Trang, Simon Thanh-Nam","id":"98948","orcid":"0000-0002-4784-4038","last_name":"Trang"},{"first_name":"Jose","full_name":"Benitez, Jose","last_name":"Benitez"}],"date_updated":"2025-11-10T11:01:45Z","doi":"10.1080/0960085x.2024.2359460"},{"language":[{"iso":"eng"}],"_id":"62151","department":[{"_id":"792"}],"user_id":"98948","status":"public","publication":"JMIR Medical Education","type":"journal_article","title":" Motivational Framing Strategies in Health Care Information Security Training: Randomized Controlled Trial","doi":"10.2196/73245","main_file_link":[{"url":"https://mededu.jmir.org/2025/1/e73245"}],"date_updated":"2025-11-10T11:07:53Z","volume":11,"author":[{"full_name":"Keller, Thomas","last_name":"Keller","first_name":"Thomas"},{"full_name":"Warwas, Julia","last_name":"Warwas","first_name":"Julia"},{"first_name":"Julia","last_name":"Klein","full_name":"Klein, Julia"},{"last_name":"Henkenjohann","full_name":"Henkenjohann, Richard","first_name":"Richard"},{"full_name":"Trenz, Manuel","last_name":"Trenz","first_name":"Manuel"},{"first_name":"Simon Thanh-Nam","full_name":"Trang, Simon Thanh-Nam","id":"98948","orcid":"0000-0002-4784-4038","last_name":"Trang"}],"date_created":"2025-11-10T10:59:00Z","year":"2025","intvolume":"        11","citation":{"bibtex":"@article{Keller_Warwas_Klein_Henkenjohann_Trenz_Trang_2025, title={ Motivational Framing Strategies in Health Care Information Security Training: Randomized Controlled Trial}, volume={11}, DOI={<a href=\"https://doi.org/10.2196/73245\">10.2196/73245</a>}, number={e73245}, journal={JMIR Medical Education}, author={Keller, Thomas and Warwas, Julia and Klein, Julia and Henkenjohann, Richard and Trenz, Manuel and Trang, Simon Thanh-Nam}, year={2025} }","short":"T. Keller, J. Warwas, J. Klein, R. Henkenjohann, M. Trenz, S.T.-N. Trang, JMIR Medical Education 11 (2025).","mla":"Keller, Thomas, et al. “ Motivational Framing Strategies in Health Care Information Security Training: Randomized Controlled Trial.” <i>JMIR Medical Education</i>, vol. 11, no. e73245, 2025, doi:<a href=\"https://doi.org/10.2196/73245\">10.2196/73245</a>.","apa":"Keller, T., Warwas, J., Klein, J., Henkenjohann, R., Trenz, M., &#38; Trang, S. T.-N. (2025).  Motivational Framing Strategies in Health Care Information Security Training: Randomized Controlled Trial. <i>JMIR Medical Education</i>, <i>11</i>(e73245). <a href=\"https://doi.org/10.2196/73245\">https://doi.org/10.2196/73245</a>","ama":"Keller T, Warwas J, Klein J, Henkenjohann R, Trenz M, Trang ST-N.  Motivational Framing Strategies in Health Care Information Security Training: Randomized Controlled Trial. <i>JMIR Medical Education</i>. 2025;11(e73245). doi:<a href=\"https://doi.org/10.2196/73245\">10.2196/73245</a>","chicago":"Keller, Thomas, Julia Warwas, Julia Klein, Richard Henkenjohann, Manuel Trenz, and Simon Thanh-Nam Trang. “ Motivational Framing Strategies in Health Care Information Security Training: Randomized Controlled Trial.” <i>JMIR Medical Education</i> 11, no. e73245 (2025). <a href=\"https://doi.org/10.2196/73245\">https://doi.org/10.2196/73245</a>.","ieee":"T. Keller, J. Warwas, J. Klein, R. Henkenjohann, M. Trenz, and S. T.-N. Trang, “ Motivational Framing Strategies in Health Care Information Security Training: Randomized Controlled Trial,” <i>JMIR Medical Education</i>, vol. 11, no. e73245, 2025, doi: <a href=\"https://doi.org/10.2196/73245\">10.2196/73245</a>."},"issue":"e73245"},{"status":"public","type":"journal_article","publication":"Communications of the Association for Information Systems","language":[{"iso":"eng"}],"_id":"62152","user_id":"98948","department":[{"_id":"792"}],"year":"2025","citation":{"mla":"Schütz, Florian, et al. “Better (Cyber) Insured than Sorry? Unraveling Cognitive Factors in the (Non-)Adoption of Personal Cyber Insurance Using FsQCA.” <i>Communications of the Association for Information Systems</i>, vol. accepted, 2025.","bibtex":"@article{Schütz_Ortiz de Guinea Lopez_Wolf_Trang_2025, title={Better (Cyber) Insured than Sorry? Unraveling Cognitive Factors in the (Non-)Adoption of Personal Cyber Insurance using fsQCA}, volume={accepted}, journal={Communications of the Association for Information Systems}, author={Schütz, Florian and Ortiz de Guinea Lopez, Ana and Wolf, Tobias and Trang, Simon Thanh-Nam}, year={2025} }","short":"F. Schütz, A. Ortiz de Guinea Lopez, T. Wolf, S.T.-N. Trang, Communications of the Association for Information Systems accepted (2025).","apa":"Schütz, F., Ortiz de Guinea Lopez, A., Wolf, T., &#38; Trang, S. T.-N. (2025). Better (Cyber) Insured than Sorry? Unraveling Cognitive Factors in the (Non-)Adoption of Personal Cyber Insurance using fsQCA. <i>Communications of the Association for Information Systems</i>, <i>accepted</i>.","ama":"Schütz F, Ortiz de Guinea Lopez A, Wolf T, Trang ST-N. Better (Cyber) Insured than Sorry? Unraveling Cognitive Factors in the (Non-)Adoption of Personal Cyber Insurance using fsQCA. <i>Communications of the Association for Information Systems</i>. 2025;accepted.","ieee":"F. Schütz, A. Ortiz de Guinea Lopez, T. Wolf, and S. T.-N. Trang, “Better (Cyber) Insured than Sorry? Unraveling Cognitive Factors in the (Non-)Adoption of Personal Cyber Insurance using fsQCA,” <i>Communications of the Association for Information Systems</i>, vol. accepted, 2025.","chicago":"Schütz, Florian, Ana Ortiz de Guinea Lopez, Tobias Wolf, and Simon Thanh-Nam Trang. “Better (Cyber) Insured than Sorry? Unraveling Cognitive Factors in the (Non-)Adoption of Personal Cyber Insurance Using FsQCA.” <i>Communications of the Association for Information Systems</i> accepted (2025)."},"title":"Better (Cyber) Insured than Sorry? Unraveling Cognitive Factors in the (Non-)Adoption of Personal Cyber Insurance using fsQCA","date_updated":"2025-11-10T11:08:07Z","date_created":"2025-11-10T11:06:01Z","author":[{"full_name":"Schütz, Florian","last_name":"Schütz","first_name":"Florian"},{"first_name":"Ana","full_name":"Ortiz de Guinea Lopez, Ana","last_name":"Ortiz de Guinea Lopez"},{"last_name":"Wolf","full_name":"Wolf, Tobias","first_name":"Tobias"},{"last_name":"Trang","orcid":"0000-0002-4784-4038","id":"98948","full_name":"Trang, Simon Thanh-Nam","first_name":"Simon Thanh-Nam"}],"volume":"accepted"},{"author":[{"first_name":"Gilbert Georg","last_name":"Hövel","id":"100338","full_name":"Hövel, Gilbert Georg"},{"first_name":"Tim","full_name":"Brinkmeier, Tim","last_name":"Brinkmeier"},{"last_name":"Trang","orcid":"0000-0002-4784-4038","full_name":"Trang, Simon Thanh-Nam","id":"98948","first_name":"Simon Thanh-Nam"}],"date_created":"2025-12-18T11:22:39Z","date_updated":"2025-12-18T11:22:59Z","main_file_link":[{"url":"https://aisel.aisnet.org/icis2025/cyb_security/cyb_security/8/"}],"title":"Trust Me If You Can! Examining the Role of Ransomware Darknet Platforms in Building Trust Between Hackers and Victims","citation":{"ieee":"G. G. Hövel, T. Brinkmeier, and S. T.-N. Trang, “Trust Me If You Can! Examining the Role of Ransomware Darknet Platforms in Building Trust Between Hackers and Victims,” 2025.","chicago":"Hövel, Gilbert Georg, Tim Brinkmeier, and Simon Thanh-Nam Trang. “Trust Me If You Can! Examining the Role of Ransomware Darknet Platforms in Building Trust Between Hackers and Victims.” In <i>Proceedings of the International Conference on Information Systems 2025</i>, 2025.","ama":"Hövel GG, Brinkmeier T, Trang ST-N. Trust Me If You Can! Examining the Role of Ransomware Darknet Platforms in Building Trust Between Hackers and Victims. In: <i>Proceedings of the International Conference on Information Systems 2025</i>. ; 2025.","short":"G.G. Hövel, T. Brinkmeier, S.T.-N. Trang, in: Proceedings of the International Conference on Information Systems 2025, 2025.","bibtex":"@inproceedings{Hövel_Brinkmeier_Trang_2025, title={Trust Me If You Can! Examining the Role of Ransomware Darknet Platforms in Building Trust Between Hackers and Victims}, booktitle={Proceedings of the International Conference on Information Systems 2025}, author={Hövel, Gilbert Georg and Brinkmeier, Tim and Trang, Simon Thanh-Nam}, year={2025} }","mla":"Hövel, Gilbert Georg, et al. “Trust Me If You Can! Examining the Role of Ransomware Darknet Platforms in Building Trust Between Hackers and Victims.” <i>Proceedings of the International Conference on Information Systems 2025</i>, 2025.","apa":"Hövel, G. G., Brinkmeier, T., &#38; Trang, S. T.-N. (2025). Trust Me If You Can! Examining the Role of Ransomware Darknet Platforms in Building Trust Between Hackers and Victims. <i>Proceedings of the International Conference on Information Systems 2025</i>."},"year":"2025","department":[{"_id":"792"}],"user_id":"98948","_id":"63199","language":[{"iso":"eng"}],"publication":"Proceedings of the International Conference on Information Systems 2025","type":"conference","status":"public"},{"issue":"3","year":"2024","citation":{"apa":"Nastjuk, I., Trang, S. T.-N., Grummeck-Braamt, J., Adam, M., &#38; Tarafdar, M. (2024). Integrating and Synthesizing Technostress Research: A Meta-Analysis on Technostress Creators, Outcomes, and Usage Contexts. <i>European Journal of Information Systems (VHB Jourqual 3 A)</i>, <i>33</i>(3).","mla":"Nastjuk, I., et al. “Integrating and Synthesizing Technostress Research: A Meta-Analysis on Technostress Creators, Outcomes, and Usage Contexts.” <i>European Journal of Information Systems (VHB Jourqual 3 A)</i>, vol. 33, no. 3, 2024.","short":"I. Nastjuk, S.T.-N. Trang, J. Grummeck-Braamt, M. Adam, M. Tarafdar, European Journal of Information Systems (VHB Jourqual 3 A) 33 (2024).","bibtex":"@article{Nastjuk_Trang_Grummeck-Braamt_Adam_Tarafdar_2024, title={Integrating and Synthesizing Technostress Research: A Meta-Analysis on Technostress Creators, Outcomes, and Usage Contexts}, volume={33}, number={3}, journal={European Journal of Information Systems (VHB Jourqual 3 A)}, author={Nastjuk, I. and Trang, Simon Thanh-Nam and Grummeck-Braamt, J. and Adam, M. and Tarafdar, M.}, year={2024} }","chicago":"Nastjuk, I., Simon Thanh-Nam Trang, J. Grummeck-Braamt, M. Adam, and M. Tarafdar. “Integrating and Synthesizing Technostress Research: A Meta-Analysis on Technostress Creators, Outcomes, and Usage Contexts.” <i>European Journal of Information Systems (VHB Jourqual 3 A)</i> 33, no. 3 (2024).","ieee":"I. Nastjuk, S. T.-N. Trang, J. Grummeck-Braamt, M. Adam, and M. Tarafdar, “Integrating and Synthesizing Technostress Research: A Meta-Analysis on Technostress Creators, Outcomes, and Usage Contexts,” <i>European Journal of Information Systems (VHB Jourqual 3 A)</i>, vol. 33, no. 3, 2024.","ama":"Nastjuk I, Trang ST-N, Grummeck-Braamt J, Adam M, Tarafdar M. Integrating and Synthesizing Technostress Research: A Meta-Analysis on Technostress Creators, Outcomes, and Usage Contexts. <i>European Journal of Information Systems (VHB Jourqual 3 A)</i>. 2024;33(3)."},"intvolume":"        33","date_updated":"2024-11-13T12:54:48Z","oa":"1","date_created":"2023-12-04T13:36:58Z","author":[{"full_name":"Nastjuk, I.","last_name":"Nastjuk","first_name":"I."},{"first_name":"Simon Thanh-Nam","id":"98948","full_name":"Trang, Simon Thanh-Nam","last_name":"Trang","orcid":"0000-0002-4784-4038"},{"full_name":"Grummeck-Braamt, J.","last_name":"Grummeck-Braamt","first_name":"J."},{"first_name":"M.","last_name":"Adam","full_name":"Adam, M."},{"last_name":"Tarafdar","full_name":"Tarafdar, M.","first_name":"M."}],"volume":33,"title":"Integrating and Synthesizing Technostress Research: A Meta-Analysis on Technostress Creators, Outcomes, and Usage Contexts","main_file_link":[{"open_access":"1","url":"https://www.tandfonline.com/doi/full/10.1080/0960085X.2022.2154712"}],"type":"journal_article","publication":"European Journal of Information Systems (VHB Jourqual 3 A)","status":"public","_id":"49456","user_id":"98948","department":[{"_id":"792"},{"_id":"681"}],"language":[{"iso":"eng"}]},{"publication_status":"published","issue":"3","year":"2024","citation":{"mla":"Wolf, T., et al. “The Technology-Behavioral Compensation Effect: Unintended Consequences of Health Technology Adoption.” <i>Journal of Information Technology (VHB Jourqual 3 A)</i>, vol. 39, no. 3, 2024, doi:<a href=\"https://doi.org/10.1177/02683962231183979\">10.1177/02683962231183979</a>.","short":"T. Wolf, S.T.-N. Trang, W. Weiger, M. Trenz, Journal of Information Technology (VHB Jourqual 3 A) 39 (2024).","bibtex":"@article{Wolf_Trang_Weiger_Trenz_2024, title={The technology-behavioral compensation effect: Unintended consequences of health technology adoption}, volume={39}, DOI={<a href=\"https://doi.org/10.1177/02683962231183979\">10.1177/02683962231183979</a>}, number={3}, journal={Journal of Information Technology (VHB Jourqual 3 A)}, author={Wolf, T. and Trang, Simon Thanh-Nam and Weiger, W. and Trenz, M.}, year={2024} }","apa":"Wolf, T., Trang, S. T.-N., Weiger, W., &#38; Trenz, M. (2024). The technology-behavioral compensation effect: Unintended consequences of health technology adoption. <i>Journal of Information Technology (VHB Jourqual 3 A)</i>, <i>39</i>(3). <a href=\"https://doi.org/10.1177/02683962231183979\">https://doi.org/10.1177/02683962231183979</a>","chicago":"Wolf, T., Simon Thanh-Nam Trang, W. Weiger, and M. Trenz. “The Technology-Behavioral Compensation Effect: Unintended Consequences of Health Technology Adoption.” <i>Journal of Information Technology (VHB Jourqual 3 A)</i> 39, no. 3 (2024). <a href=\"https://doi.org/10.1177/02683962231183979\">https://doi.org/10.1177/02683962231183979</a>.","ieee":"T. Wolf, S. T.-N. Trang, W. Weiger, and M. Trenz, “The technology-behavioral compensation effect: Unintended consequences of health technology adoption,” <i>Journal of Information Technology (VHB Jourqual 3 A)</i>, vol. 39, no. 3, 2024, doi: <a href=\"https://doi.org/10.1177/02683962231183979\">10.1177/02683962231183979</a>.","ama":"Wolf T, Trang ST-N, Weiger W, Trenz M. The technology-behavioral compensation effect: Unintended consequences of health technology adoption. <i>Journal of Information Technology (VHB Jourqual 3 A)</i>. 2024;39(3). doi:<a href=\"https://doi.org/10.1177/02683962231183979\">10.1177/02683962231183979</a>"},"intvolume":"        39","oa":"1","date_updated":"2024-11-13T12:55:27Z","author":[{"full_name":"Wolf, T.","last_name":"Wolf","first_name":"T."},{"first_name":"Simon Thanh-Nam","full_name":"Trang, Simon Thanh-Nam","id":"98948","orcid":"0000-0002-4784-4038","last_name":"Trang"},{"first_name":"W.","full_name":"Weiger, W.","last_name":"Weiger"},{"full_name":"Trenz, M.","last_name":"Trenz","first_name":"M."}],"date_created":"2023-12-04T13:35:52Z","volume":39,"title":"The technology-behavioral compensation effect: Unintended consequences of health technology adoption","main_file_link":[{"open_access":"1","url":"https://journals.sagepub.com/doi/full/10.1177/02683962231183979"}],"doi":"10.1177/02683962231183979","type":"journal_article","publication":"Journal of Information Technology (VHB Jourqual 3 A)","status":"public","_id":"49453","user_id":"98948","department":[{"_id":"792"},{"_id":"681"}],"language":[{"iso":"eng"}]},{"editor":[{"last_name":"Hövel","full_name":"Hövel, Gilbert","first_name":"Gilbert"},{"first_name":"Florian","last_name":"Schütz","full_name":"Schütz, Florian"},{"first_name":"Simon","last_name":"Trang","full_name":"Trang, Simon"}],"status":"public","type":"conference","publication":"PACIS 2024 Proceedings","language":[{"iso":"eng"}],"_id":"63201","user_id":"98948","department":[{"_id":"792"}],"year":"2024","citation":{"ama":"Hövel GG, Schütz F, Trang ST-N. Using Digital Nudging in Medical decision-making – A Taxonomy to Inform Research and Practice. In: Hövel G, Schütz F, Trang S, eds. <i>PACIS 2024 Proceedings</i>. ; 2024.","ieee":"G. G. Hövel, F. Schütz, and S. T.-N. Trang, “Using Digital Nudging in Medical decision-making – A Taxonomy to Inform Research and Practice,” in <i>PACIS 2024 Proceedings</i>, 2024.","chicago":"Hövel, Gilbert Georg, Florian Schütz, and Simon Thanh-Nam Trang. “Using Digital Nudging in Medical Decision-Making – A Taxonomy to Inform Research and Practice.” In <i>PACIS 2024 Proceedings</i>, edited by Gilbert Hövel, Florian Schütz, and Simon Trang, 2024.","bibtex":"@inproceedings{Hövel_Schütz_Trang_2024, title={Using Digital Nudging in Medical decision-making – A Taxonomy to Inform Research and Practice}, booktitle={PACIS 2024 Proceedings}, author={Hövel, Gilbert Georg and Schütz, Florian and Trang, Simon Thanh-Nam}, editor={Hövel, Gilbert and Schütz, Florian and Trang, Simon}, year={2024} }","short":"G.G. Hövel, F. Schütz, S.T.-N. Trang, in: G. Hövel, F. Schütz, S. Trang (Eds.), PACIS 2024 Proceedings, 2024.","mla":"Hövel, Gilbert Georg, et al. “Using Digital Nudging in Medical Decision-Making – A Taxonomy to Inform Research and Practice.” <i>PACIS 2024 Proceedings</i>, edited by Gilbert Hövel et al., 2024.","apa":"Hövel, G. G., Schütz, F., &#38; Trang, S. T.-N. (2024). Using Digital Nudging in Medical decision-making – A Taxonomy to Inform Research and Practice. In G. Hövel, F. Schütz, &#38; S. Trang (Eds.), <i>PACIS 2024 Proceedings</i>."},"title":"Using Digital Nudging in Medical decision-making – A Taxonomy to Inform Research and Practice","main_file_link":[{"url":"http://aisel.aisnet.org/pacis2024/track11_healthit/track11_healthit/7"}],"conference":{"name":"PACIS 2024 Proceedings"},"date_updated":"2025-12-18T11:37:21Z","author":[{"first_name":"Gilbert Georg","full_name":"Hövel, Gilbert Georg","id":"100338","last_name":"Hövel"},{"last_name":"Schütz","full_name":"Schütz, Florian","first_name":"Florian"},{"first_name":"Simon Thanh-Nam","orcid":"0000-0002-4784-4038","last_name":"Trang","full_name":"Trang, Simon Thanh-Nam","id":"98948"}],"date_created":"2025-12-18T11:31:44Z"},{"language":[{"iso":"eng"}],"_id":"63202","user_id":"98948","department":[{"_id":"792"}],"status":"public","type":"conference","publication":"ECIS 2024 Proceedings","title":"Will the Ransom Be Paid? Examining Influencing Factors of the Ransomware-Payment Decision","main_file_link":[{"url":"http://aisel.aisnet.org/ecis2024/is_governance/track21_is_govern/10"}],"conference":{"name":"ECIS 2024 Proceedings"},"date_updated":"2025-12-18T11:37:19Z","author":[{"first_name":"Gilbert Georg","id":"100338","full_name":"Hövel, Gilbert Georg","last_name":"Hövel"},{"last_name":"Veynshter","full_name":"Veynshter, Anton","first_name":"Anton"},{"first_name":"Florian","full_name":"Schütz, Florian","last_name":"Schütz"},{"first_name":"Simon Thanh-Nam","full_name":"Trang, Simon Thanh-Nam","id":"98948","orcid":"0000-0002-4784-4038","last_name":"Trang"}],"date_created":"2025-12-18T11:33:08Z","year":"2024","citation":{"apa":"Hövel, G. G., Veynshter, A., Schütz, F., &#38; Trang, S. T.-N. (2024). Will the Ransom Be Paid? Examining Influencing Factors of the Ransomware-Payment Decision. <i>ECIS 2024 Proceedings</i>. ECIS 2024 Proceedings.","mla":"Hövel, Gilbert Georg, et al. “Will the Ransom Be Paid? Examining Influencing Factors of the Ransomware-Payment Decision.” <i>ECIS 2024 Proceedings</i>, 2024.","short":"G.G. Hövel, A. Veynshter, F. Schütz, S.T.-N. Trang, in: ECIS 2024 Proceedings, 2024.","bibtex":"@inproceedings{Hövel_Veynshter_Schütz_Trang_2024, title={Will the Ransom Be Paid? Examining Influencing Factors of the Ransomware-Payment Decision}, booktitle={ECIS 2024 Proceedings}, author={Hövel, Gilbert Georg and Veynshter, Anton and Schütz, Florian and Trang, Simon Thanh-Nam}, year={2024} }","chicago":"Hövel, Gilbert Georg, Anton Veynshter, Florian Schütz, and Simon Thanh-Nam Trang. “Will the Ransom Be Paid? Examining Influencing Factors of the Ransomware-Payment Decision.” In <i>ECIS 2024 Proceedings</i>, 2024.","ieee":"G. G. Hövel, A. Veynshter, F. Schütz, and S. T.-N. Trang, “Will the Ransom Be Paid? Examining Influencing Factors of the Ransomware-Payment Decision,” presented at the ECIS 2024 Proceedings, 2024.","ama":"Hövel GG, Veynshter A, Schütz F, Trang ST-N. Will the Ransom Be Paid? Examining Influencing Factors of the Ransomware-Payment Decision. In: <i>ECIS 2024 Proceedings</i>. ; 2024."}},{"type":"conference","publication":" ECIS 2024 Proceedings","status":"public","user_id":"98948","department":[{"_id":"792"}],"_id":"63204","language":[{"iso":"eng"}],"citation":{"short":"F. Schütz, A. Lukowitsch, G. Hövel, S. Trang, in:  ECIS 2024 Proceedings, 2024.","bibtex":"@inproceedings{Schütz_Lukowitsch_Hövel_Trang_2024, title={The Lower the Risk, the Lower the Premium? Conceptualizing an Artifact for Usage-Based Pricing of Personal Cyber Insurance Policies}, booktitle={ ECIS 2024 Proceedings}, author={Schütz, Florian and Lukowitsch, Alexander and Hövel, Gilbert and Trang, Simon}, year={2024} }","mla":"Schütz, Florian, et al. “The Lower the Risk, the Lower the Premium? Conceptualizing an Artifact for Usage-Based Pricing of Personal Cyber Insurance Policies.” <i> ECIS 2024 Proceedings</i>, 2024.","apa":"Schütz, F., Lukowitsch, A., Hövel, G., &#38; Trang, S. (2024). The Lower the Risk, the Lower the Premium? Conceptualizing an Artifact for Usage-Based Pricing of Personal Cyber Insurance Policies. <i> ECIS 2024 Proceedings</i>.  ECIS 2024 Proceedings.","ama":"Schütz F, Lukowitsch A, Hövel G, Trang S. The Lower the Risk, the Lower the Premium? Conceptualizing an Artifact for Usage-Based Pricing of Personal Cyber Insurance Policies. In: <i> ECIS 2024 Proceedings</i>. ; 2024.","chicago":"Schütz, Florian, Alexander Lukowitsch, Gilbert Hövel, and Simon Trang. “The Lower the Risk, the Lower the Premium? Conceptualizing an Artifact for Usage-Based Pricing of Personal Cyber Insurance Policies.” In <i> ECIS 2024 Proceedings</i>, 2024.","ieee":"F. Schütz, A. Lukowitsch, G. Hövel, and S. Trang, “The Lower the Risk, the Lower the Premium? Conceptualizing an Artifact for Usage-Based Pricing of Personal Cyber Insurance Policies,” presented at the  ECIS 2024 Proceedings, 2024."},"year":"2024","date_created":"2025-12-18T11:35:47Z","author":[{"first_name":"Florian","full_name":"Schütz, Florian","last_name":"Schütz"},{"first_name":"Alexander","last_name":"Lukowitsch","full_name":"Lukowitsch, Alexander"},{"first_name":"Gilbert","last_name":"Hövel","full_name":"Hövel, Gilbert"},{"first_name":"Simon","last_name":"Trang","full_name":"Trang, Simon"}],"date_updated":"2025-12-18T11:37:16Z","main_file_link":[{"url":"http://aisel.aisnet.org/ecis2024/track02_general/track02_general/14"}],"conference":{"name":" ECIS 2024 Proceedings"},"title":"The Lower the Risk, the Lower the Premium? Conceptualizing an Artifact for Usage-Based Pricing of Personal Cyber Insurance Policies"},{"type":"conference","publication":"PACIS 2024","status":"public","user_id":"98948","department":[{"_id":"792"}],"_id":"63200","language":[{"iso":"eng"}],"citation":{"apa":"Schütz, F., Steenken, L., Menck,  jannes, Hugenberg, S., Köpfer, P., Hövel, G., &#38; Trang, S. (2024). Fortifying the Human Firewall: Designing a Virtual Reality-Based Test to Measure Individuals’ Cyber Security Competencies. <i>PACIS 2024</i>. PACIS 2024.","bibtex":"@inproceedings{Schütz_Steenken_Menck_Hugenberg_Köpfer_Hövel_Trang_2024, title={Fortifying the Human Firewall: Designing a Virtual Reality-Based Test to Measure Individuals’ Cyber Security Competencies}, booktitle={PACIS 2024}, author={Schütz, Florian and Steenken, Lennart and Menck, jannes and Hugenberg, Simon and Köpfer, Patricia and Hövel, Gilbert and Trang, Simon}, year={2024} }","short":"F. Schütz, L. Steenken,  jannes Menck, S. Hugenberg, P. Köpfer, G. Hövel, S. Trang, in: PACIS 2024, 2024.","mla":"Schütz, Florian, et al. “Fortifying the Human Firewall: Designing a Virtual Reality-Based Test to Measure Individuals’ Cyber Security Competencies.” <i>PACIS 2024</i>, 2024.","ama":"Schütz F, Steenken L, Menck  jannes, et al. Fortifying the Human Firewall: Designing a Virtual Reality-Based Test to Measure Individuals’ Cyber Security Competencies. In: <i>PACIS 2024</i>. ; 2024.","ieee":"F. Schütz <i>et al.</i>, “Fortifying the Human Firewall: Designing a Virtual Reality-Based Test to Measure Individuals’ Cyber Security Competencies,” presented at the PACIS 2024, 2024.","chicago":"Schütz, Florian, Lennart Steenken, jannes Menck, Simon Hugenberg, Patricia Köpfer, Gilbert Hövel, and Simon Trang. “Fortifying the Human Firewall: Designing a Virtual Reality-Based Test to Measure Individuals’ Cyber Security Competencies.” In <i>PACIS 2024</i>, 2024."},"year":"2024","author":[{"full_name":"Schütz, Florian","last_name":"Schütz","first_name":"Florian"},{"full_name":"Steenken, Lennart","last_name":"Steenken","first_name":"Lennart"},{"first_name":"jannes","full_name":"Menck, jannes","last_name":"Menck"},{"first_name":"Simon","full_name":"Hugenberg, Simon","last_name":"Hugenberg"},{"first_name":"Patricia","full_name":"Köpfer, Patricia","last_name":"Köpfer"},{"first_name":"Gilbert","last_name":"Hövel","full_name":"Hövel, Gilbert"},{"full_name":"Trang, Simon","last_name":"Trang","first_name":"Simon"}],"date_created":"2025-12-18T11:29:53Z","date_updated":"2025-12-18T11:29:57Z","conference":{"name":"PACIS 2024"},"title":"Fortifying the Human Firewall: Designing a Virtual Reality-Based Test to Measure Individuals' Cyber Security Competencies"},{"title":"Do Investors Surf the Darknet? Exploring the Impact of Darknet Announcements on Market Reactions","main_file_link":[{"url":"http://aisel.aisnet.org/ecis2024/track12_digtrans/track12_digtrans/21"}],"language":[{"iso":"eng"}],"date_updated":"2025-12-18T11:37:18Z","_id":"63203","user_id":"98948","date_created":"2025-12-18T11:34:21Z","author":[{"first_name":"Tim","full_name":"Brinkmeier, Tim","last_name":"Brinkmeier"},{"first_name":"Gilbert Georg","last_name":"Hövel","full_name":"Hövel, Gilbert Georg","id":"100338"},{"first_name":"Simon Thanh-Nam","full_name":"Trang, Simon Thanh-Nam","id":"98948","orcid":"0000-0002-4784-4038","last_name":"Trang"}],"department":[{"_id":"792"}],"year":"2024","editor":[{"full_name":"Brinkmeier, Tim","last_name":"Brinkmeier","first_name":"Tim"}],"citation":{"ama":"Brinkmeier T, Hövel GG, Trang ST-N. Do Investors Surf the Darknet? Exploring the Impact of Darknet Announcements on Market Reactions. In: Brinkmeier T, ed. ; 2024.","ieee":"T. Brinkmeier, G. G. Hövel, and S. T.-N. Trang, “Do Investors Surf the Darknet? Exploring the Impact of Darknet Announcements on Market Reactions,” 2024.","chicago":"Brinkmeier, Tim, Gilbert Georg Hövel, and Simon Thanh-Nam Trang. “Do Investors Surf the Darknet? Exploring the Impact of Darknet Announcements on Market Reactions.” edited by Tim Brinkmeier, 2024.","bibtex":"@inproceedings{Brinkmeier_Hövel_Trang_2024, title={Do Investors Surf the Darknet? Exploring the Impact of Darknet Announcements on Market Reactions}, author={Brinkmeier, Tim and Hövel, Gilbert Georg and Trang, Simon Thanh-Nam}, editor={Brinkmeier, Tim}, year={2024} }","short":"T. Brinkmeier, G.G. Hövel, S.T.-N. Trang, in: T. Brinkmeier (Ed.), 2024.","mla":"Brinkmeier, Tim, et al. <i>Do Investors Surf the Darknet? Exploring the Impact of Darknet Announcements on Market Reactions</i>. Edited by Tim Brinkmeier, 2024.","apa":"Brinkmeier, T., Hövel, G. G., &#38; Trang, S. T.-N. (2024). <i>Do Investors Surf the Darknet? Exploring the Impact of Darknet Announcements on Market Reactions</i> (T. Brinkmeier, Ed.)."},"status":"public","type":"conference"},{"department":[{"_id":"792"},{"_id":"681"}],"user_id":"98948","_id":"49455","language":[{"iso":"eng"}],"publication":"Computers & Security","type":"journal_article","status":"public","date_created":"2023-12-04T13:36:41Z","author":[{"last_name":"Hengstler","full_name":"Hengstler, S.","first_name":"S."},{"first_name":"S.","last_name":"Kuehnel","full_name":"Kuehnel, S."},{"first_name":"K.","last_name":"Masuch","full_name":"Masuch, K."},{"last_name":"Nastjuk","full_name":"Nastjuk, I.","first_name":"I."},{"last_name":"Trang","orcid":"0000-0002-4784-4038","full_name":"Trang, Simon Thanh-Nam","id":"98948","first_name":"Simon Thanh-Nam"}],"date_updated":"2024-06-04T09:47:23Z","title":"Should I Really do That? Using Quantile Regression to Examine the Impact of Sanctions on Information Security Policy Compliance Behavior","citation":{"chicago":"Hengstler, S., S. Kuehnel, K. Masuch, I. Nastjuk, and Simon Thanh-Nam Trang. “Should I Really Do That? Using Quantile Regression to Examine the Impact of Sanctions on Information Security Policy Compliance Behavior.” <i>Computers &#38; Security</i>, 2023.","ieee":"S. Hengstler, S. Kuehnel, K. Masuch, I. Nastjuk, and S. T.-N. Trang, “Should I Really do That? Using Quantile Regression to Examine the Impact of Sanctions on Information Security Policy Compliance Behavior,” <i>Computers &#38; Security</i>, 2023.","ama":"Hengstler S, Kuehnel S, Masuch K, Nastjuk I, Trang ST-N. Should I Really do That? Using Quantile Regression to Examine the Impact of Sanctions on Information Security Policy Compliance Behavior. <i>Computers &#38; Security</i>. Published online 2023.","bibtex":"@article{Hengstler_Kuehnel_Masuch_Nastjuk_Trang_2023, title={Should I Really do That? Using Quantile Regression to Examine the Impact of Sanctions on Information Security Policy Compliance Behavior}, journal={Computers &#38; Security}, author={Hengstler, S. and Kuehnel, S. and Masuch, K. and Nastjuk, I. and Trang, Simon Thanh-Nam}, year={2023} }","short":"S. Hengstler, S. Kuehnel, K. Masuch, I. Nastjuk, S.T.-N. Trang, Computers &#38; Security (2023).","mla":"Hengstler, S., et al. “Should I Really Do That? Using Quantile Regression to Examine the Impact of Sanctions on Information Security Policy Compliance Behavior.” <i>Computers &#38; Security</i>, 2023.","apa":"Hengstler, S., Kuehnel, S., Masuch, K., Nastjuk, I., &#38; Trang, S. T.-N. (2023). Should I Really do That? Using Quantile Regression to Examine the Impact of Sanctions on Information Security Policy Compliance Behavior. <i>Computers &#38; Security</i>."},"year":"2023"},{"status":"public","type":"journal_article","publication":"Journal of Product Innovation Management (VHB Jourqual 3 A)","language":[{"iso":"eng"}],"_id":"49457","user_id":"98948","department":[{"_id":"792"},{"_id":"681"}],"year":"2023","citation":{"apa":"Krämer, T., Weiger, W., Trang, S. T.-N., &#38; Trenz, M. (2023). Deflected by the Tin Foil Hat? Word-of-Mouth, Conspiracy Beliefs, and the Adoption of Public Health Apps. <i>Journal of Product Innovation Management (VHB Jourqual 3 A)</i>, <i>40</i>, 154–174.","mla":"Krämer, T., et al. “Deflected by the Tin Foil Hat? Word-of-Mouth, Conspiracy Beliefs, and the Adoption of Public Health Apps.” <i>Journal of Product Innovation Management (VHB Jourqual 3 A)</i>, vol. 40, 2023, pp. 154–74.","short":"T. Krämer, W. Weiger, S.T.-N. Trang, M. Trenz, Journal of Product Innovation Management (VHB Jourqual 3 A) 40 (2023) 154–174.","bibtex":"@article{Krämer_Weiger_Trang_Trenz_2023, title={Deflected by the Tin Foil Hat? Word-of-Mouth, Conspiracy Beliefs, and the Adoption of Public Health Apps}, volume={40}, journal={Journal of Product Innovation Management (VHB Jourqual 3 A)}, author={Krämer, T. and Weiger, W. and Trang, Simon Thanh-Nam and Trenz, M.}, year={2023}, pages={154–174} }","ieee":"T. Krämer, W. Weiger, S. T.-N. Trang, and M. Trenz, “Deflected by the Tin Foil Hat? Word-of-Mouth, Conspiracy Beliefs, and the Adoption of Public Health Apps,” <i>Journal of Product Innovation Management (VHB Jourqual 3 A)</i>, vol. 40, pp. 154–174, 2023.","chicago":"Krämer, T., W. Weiger, Simon Thanh-Nam Trang, and M. Trenz. “Deflected by the Tin Foil Hat? Word-of-Mouth, Conspiracy Beliefs, and the Adoption of Public Health Apps.” <i>Journal of Product Innovation Management (VHB Jourqual 3 A)</i> 40 (2023): 154–74.","ama":"Krämer T, Weiger W, Trang ST-N, Trenz M. Deflected by the Tin Foil Hat? Word-of-Mouth, Conspiracy Beliefs, and the Adoption of Public Health Apps. <i>Journal of Product Innovation Management (VHB Jourqual 3 A)</i>. 2023;40:154-174."},"page":"154-174","intvolume":"        40","title":"Deflected by the Tin Foil Hat? Word-of-Mouth, Conspiracy Beliefs, and the Adoption of Public Health Apps","date_updated":"2024-11-13T12:56:05Z","date_created":"2023-12-04T13:37:05Z","author":[{"full_name":"Krämer, T.","last_name":"Krämer","first_name":"T."},{"last_name":"Weiger","full_name":"Weiger, W.","first_name":"W."},{"id":"98948","full_name":"Trang, Simon Thanh-Nam","orcid":"0000-0002-4784-4038","last_name":"Trang","first_name":"Simon Thanh-Nam"},{"last_name":"Trenz","full_name":"Trenz, M.","first_name":"M."}],"volume":40},{"issue":"4","year":"2023","date_created":"2023-05-19T07:21:29Z","title":"Digital Responsibility – a Multilevel Framework for Responsible Digitalization","publication":"Business & Information Systems Engineering","file":[{"creator":"schryen","date_created":"2023-07-06T13:02:00Z","date_updated":"2023-07-06T13:02:00Z","access_level":"closed","file_name":"Digital_Responsibility- A Multilevel Framework for Responsible Digitilization- BISE Springer VERSION.pdf","file_id":"45871","file_size":373767,"content_type":"application/pdf","relation":"main_file","success":1}],"language":[{"iso":"eng"}],"ddc":["000"],"has_accepted_license":"1","publication_status":"published","intvolume":"        65","page":"463 - 474","citation":{"chicago":"Beverungen, Daniel, Dennis Kundisch, Milad Mirbabaie, Oliver Müller, Guido Schryen, Simon Thanh-Nam Trang, and Matthias Trier. “Digital Responsibility – a Multilevel Framework for Responsible Digitalization.” <i>Business &#38; Information Systems Engineering</i> 65, no. 4 (2023): 463–74. <a href=\"https://doi.org/10.1007/s12599-023-00822-x\">https://doi.org/10.1007/s12599-023-00822-x</a>.","ieee":"D. Beverungen <i>et al.</i>, “Digital Responsibility – a Multilevel Framework for Responsible Digitalization,” <i>Business &#38; Information Systems Engineering</i>, vol. 65, no. 4, pp. 463–474, 2023, doi: <a href=\"https://doi.org/10.1007/s12599-023-00822-x\">10.1007/s12599-023-00822-x</a>.","ama":"Beverungen D, Kundisch D, Mirbabaie M, et al. Digital Responsibility – a Multilevel Framework for Responsible Digitalization. <i>Business &#38; Information Systems Engineering</i>. 2023;65(4):463-474. doi:<a href=\"https://doi.org/10.1007/s12599-023-00822-x\">10.1007/s12599-023-00822-x</a>","bibtex":"@article{Beverungen_Kundisch_Mirbabaie_Müller_Schryen_Trang_Trier_2023, title={Digital Responsibility – a Multilevel Framework for Responsible Digitalization}, volume={65}, DOI={<a href=\"https://doi.org/10.1007/s12599-023-00822-x\">10.1007/s12599-023-00822-x</a>}, number={4}, journal={Business &#38; Information Systems Engineering}, author={Beverungen, Daniel and Kundisch, Dennis and Mirbabaie, Milad and Müller, Oliver and Schryen, Guido and Trang, Simon Thanh-Nam and Trier, Matthias}, year={2023}, pages={463–474} }","mla":"Beverungen, Daniel, et al. “Digital Responsibility – a Multilevel Framework for Responsible Digitalization.” <i>Business &#38; Information Systems Engineering</i>, vol. 65, no. 4, 2023, pp. 463–74, doi:<a href=\"https://doi.org/10.1007/s12599-023-00822-x\">10.1007/s12599-023-00822-x</a>.","short":"D. Beverungen, D. Kundisch, M. Mirbabaie, O. Müller, G. Schryen, S.T.-N. Trang, M. Trier, Business &#38; Information Systems Engineering 65 (2023) 463–474.","apa":"Beverungen, D., Kundisch, D., Mirbabaie, M., Müller, O., Schryen, G., Trang, S. T.-N., &#38; Trier, M. (2023). Digital Responsibility – a Multilevel Framework for Responsible Digitalization. <i>Business &#38; Information Systems Engineering</i>, <i>65</i>(4), 463–474. <a href=\"https://doi.org/10.1007/s12599-023-00822-x\">https://doi.org/10.1007/s12599-023-00822-x</a>"},"volume":65,"author":[{"last_name":"Beverungen","full_name":"Beverungen, Daniel","id":"59677","first_name":"Daniel"},{"first_name":"Dennis","last_name":"Kundisch","full_name":"Kundisch, Dennis","id":"21117"},{"last_name":"Mirbabaie","full_name":"Mirbabaie, Milad","id":"88691","first_name":"Milad"},{"first_name":"Oliver","id":"72849","full_name":"Müller, Oliver","last_name":"Müller"},{"first_name":"Guido","last_name":"Schryen","id":"72850","full_name":"Schryen, Guido"},{"first_name":"Simon Thanh-Nam","last_name":"Trang","orcid":"0000-0002-4784-4038","id":"98948","full_name":"Trang, Simon Thanh-Nam"},{"last_name":"Trier","full_name":"Trier, Matthias","id":"72744","first_name":"Matthias"}],"date_updated":"2026-03-12T13:44:38Z","doi":"10.1007/s12599-023-00822-x","type":"journal_article","status":"public","department":[{"_id":"277"},{"_id":"196"},{"_id":"646"},{"_id":"526"},{"_id":"198"},{"_id":"792"},{"_id":"276"},{"_id":"681"}],"user_id":"16205","_id":"45112","file_date_updated":"2023-07-06T13:02:00Z","article_type":"letter_note"},{"intvolume":"        32","page":"1917-1924","citation":{"chicago":"Nastjuk, I., Simon Thanh-Nam Trang, and E. Papageorgiou. “Smart Cities and Smart Governance Models for Future Cities.” <i>Electronic Markets</i> 32 (2022): 1917–24.","ieee":"I. Nastjuk, S. T.-N. Trang, and E. Papageorgiou, “Smart cities and smart governance models for future cities,” <i>Electronic Markets</i>, vol. 32, pp. 1917–1924, 2022.","ama":"Nastjuk I, Trang ST-N, Papageorgiou E. Smart cities and smart governance models for future cities. <i>Electronic Markets</i>. 2022;32:1917-1924.","mla":"Nastjuk, I., et al. “Smart Cities and Smart Governance Models for Future Cities.” <i>Electronic Markets</i>, vol. 32, 2022, pp. 1917–24.","short":"I. Nastjuk, S.T.-N. Trang, E. Papageorgiou, Electronic Markets 32 (2022) 1917–1924.","bibtex":"@article{Nastjuk_Trang_Papageorgiou_2022, title={Smart cities and smart governance models for future cities}, volume={32}, journal={Electronic Markets}, author={Nastjuk, I. and Trang, Simon Thanh-Nam and Papageorgiou, E.}, year={2022}, pages={1917–1924} }","apa":"Nastjuk, I., Trang, S. T.-N., &#38; Papageorgiou, E. (2022). Smart cities and smart governance models for future cities. <i>Electronic Markets</i>, <i>32</i>, 1917–1924."},"year":"2022","main_file_link":[{"url":"https://link.springer.com/article/10.1007/s12525-022-00609-0","open_access":"1"}],"title":"Smart cities and smart governance models for future cities","volume":32,"author":[{"first_name":"I.","last_name":"Nastjuk","full_name":"Nastjuk, I."},{"last_name":"Trang","orcid":"0000-0002-4784-4038","full_name":"Trang, Simon Thanh-Nam","id":"98948","first_name":"Simon Thanh-Nam"},{"full_name":"Papageorgiou, E.","last_name":"Papageorgiou","first_name":"E."}],"date_created":"2023-12-04T13:37:18Z","date_updated":"2024-06-04T09:48:00Z","oa":"1","status":"public","publication":"Electronic Markets","type":"journal_article","language":[{"iso":"eng"}],"department":[{"_id":"792"}],"user_id":"98948","_id":"49458"},{"status":"public","publication":"Electronic Markets","type":"journal_article","language":[{"iso":"eng"}],"_id":"49460","department":[{"_id":"792"}],"user_id":"98948","year":"2022","intvolume":"        31","page":"829-848","citation":{"apa":"Masuch, K., Greve, M., &#38; Trang, S. T.-N. (2022). What to do after a data breach? Examining apology and compensation as response strategies for health service providers. <i>Electronic Markets</i>, <i>31</i>, 829–848.","short":"K. Masuch, M. Greve, S.T.-N. Trang, Electronic Markets 31 (2022) 829–848.","mla":"Masuch, K., et al. “What to Do after a Data Breach? Examining Apology and Compensation as Response Strategies for Health Service Providers.” <i>Electronic Markets</i>, vol. 31, 2022, pp. 829–48.","bibtex":"@article{Masuch_Greve_Trang_2022, title={What to do after a data breach? Examining apology and compensation as response strategies for health service providers}, volume={31}, journal={Electronic Markets}, author={Masuch, K. and Greve, M. and Trang, Simon Thanh-Nam}, year={2022}, pages={829–848} }","ama":"Masuch K, Greve M, Trang ST-N. What to do after a data breach? Examining apology and compensation as response strategies for health service providers. <i>Electronic Markets</i>. 2022;31:829-848.","chicago":"Masuch, K., M. Greve, and Simon Thanh-Nam Trang. “What to Do after a Data Breach? Examining Apology and Compensation as Response Strategies for Health Service Providers.” <i>Electronic Markets</i> 31 (2022): 829–48.","ieee":"K. Masuch, M. Greve, and S. T.-N. Trang, “What to do after a data breach? Examining apology and compensation as response strategies for health service providers,” <i>Electronic Markets</i>, vol. 31, pp. 829–848, 2022."},"title":"What to do after a data breach? Examining apology and compensation as response strategies for health service providers","date_updated":"2024-06-04T09:50:51Z","volume":31,"author":[{"first_name":"K.","last_name":"Masuch","full_name":"Masuch, K."},{"first_name":"M.","full_name":"Greve, M.","last_name":"Greve"},{"first_name":"Simon Thanh-Nam","id":"98948","full_name":"Trang, Simon Thanh-Nam","orcid":"0000-0002-4784-4038","last_name":"Trang"}],"date_created":"2023-12-04T13:37:36Z"},{"language":[{"iso":"eng"}],"_id":"49459","user_id":"98948","department":[{"_id":"792"}],"status":"public","type":"journal_article","publication":"Computers & Security","title":"Apologize or Justify? Examining the Impact of Data Breach Response Actions on Stock Value of Affected Companies","date_updated":"2024-06-04T09:50:12Z","date_created":"2023-12-04T13:37:24Z","author":[{"last_name":"Masuch","full_name":"Masuch, K.","first_name":"K."},{"first_name":"M.","full_name":"Greve, M.","last_name":"Greve"},{"full_name":"Trang, Simon Thanh-Nam","id":"98948","last_name":"Trang","orcid":"0000-0002-4784-4038","first_name":"Simon Thanh-Nam"}],"volume":12,"year":"2022","citation":{"apa":"Masuch, K., Greve, M., &#38; Trang, S. T.-N. (2022). Apologize or Justify? Examining the Impact of Data Breach Response Actions on Stock Value of Affected Companies. <i>Computers &#38; Security</i>, <i>12</i>.","short":"K. Masuch, M. Greve, S.T.-N. Trang, Computers &#38; Security 12 (2022).","bibtex":"@article{Masuch_Greve_Trang_2022, title={Apologize or Justify? Examining the Impact of Data Breach Response Actions on Stock Value of Affected Companies}, volume={12}, journal={Computers &#38; Security}, author={Masuch, K. and Greve, M. and Trang, Simon Thanh-Nam}, year={2022} }","mla":"Masuch, K., et al. “Apologize or Justify? Examining the Impact of Data Breach Response Actions on Stock Value of Affected Companies.” <i>Computers &#38; Security</i>, vol. 12, 2022.","ieee":"K. Masuch, M. Greve, and S. T.-N. Trang, “Apologize or Justify? Examining the Impact of Data Breach Response Actions on Stock Value of Affected Companies,” <i>Computers &#38; Security</i>, vol. 12, 2022.","chicago":"Masuch, K., M. Greve, and Simon Thanh-Nam Trang. “Apologize or Justify? Examining the Impact of Data Breach Response Actions on Stock Value of Affected Companies.” <i>Computers &#38; Security</i> 12 (2022).","ama":"Masuch K, Greve M, Trang ST-N. Apologize or Justify? Examining the Impact of Data Breach Response Actions on Stock Value of Affected Companies. <i>Computers &#38; Security</i>. 2022;12."},"intvolume":"        12"},{"publication":"European Journal of Information Systems (VHB Jourqual 3 A)","type":"journal_article","status":"public","_id":"49461","department":[{"_id":"792"}],"user_id":"98948","language":[{"iso":"eng"}],"year":"2022","page":"166-187","intvolume":"        31","citation":{"mla":"Trang, Simon Thanh-Nam, et al. “Co-Creating Business Value through IT-Business Operational Alignment in Inter-Organisational Relationships: Empirical Evidence from Regional Networks.” <i>European Journal of Information Systems (VHB Jourqual 3 A)</i>, vol. 31, 2022, pp. 166–87.","short":"S.T.-N. Trang, M. Mandrella, M. Marrone, L. Kolbe, European Journal of Information Systems (VHB Jourqual 3 A) 31 (2022) 166–187.","bibtex":"@article{Trang_Mandrella_Marrone_Kolbe_2022, title={Co-creating business value through IT-business operational alignment in inter-organisational relationships: Empirical evidence from regional networks}, volume={31}, journal={European Journal of Information Systems (VHB Jourqual 3 A)}, author={Trang, Simon Thanh-Nam and Mandrella, M. and Marrone, M. and Kolbe, L.}, year={2022}, pages={166–187} }","apa":"Trang, S. T.-N., Mandrella, M., Marrone, M., &#38; Kolbe, L. (2022). Co-creating business value through IT-business operational alignment in inter-organisational relationships: Empirical evidence from regional networks. <i>European Journal of Information Systems (VHB Jourqual 3 A)</i>, <i>31</i>, 166–187.","chicago":"Trang, Simon Thanh-Nam, M. Mandrella, M. Marrone, and L. Kolbe. “Co-Creating Business Value through IT-Business Operational Alignment in Inter-Organisational Relationships: Empirical Evidence from Regional Networks.” <i>European Journal of Information Systems (VHB Jourqual 3 A)</i> 31 (2022): 166–87.","ieee":"S. T.-N. Trang, M. Mandrella, M. Marrone, and L. Kolbe, “Co-creating business value through IT-business operational alignment in inter-organisational relationships: Empirical evidence from regional networks,” <i>European Journal of Information Systems (VHB Jourqual 3 A)</i>, vol. 31, pp. 166–187, 2022.","ama":"Trang ST-N, Mandrella M, Marrone M, Kolbe L. Co-creating business value through IT-business operational alignment in inter-organisational relationships: Empirical evidence from regional networks. <i>European Journal of Information Systems (VHB Jourqual 3 A)</i>. 2022;31:166-187."},"date_updated":"2024-11-13T12:56:22Z","volume":31,"author":[{"first_name":"Simon Thanh-Nam","id":"98948","full_name":"Trang, Simon Thanh-Nam","last_name":"Trang","orcid":"0000-0002-4784-4038"},{"last_name":"Mandrella","full_name":"Mandrella, M.","first_name":"M."},{"last_name":"Marrone","full_name":"Marrone, M.","first_name":"M."},{"last_name":"Kolbe","full_name":"Kolbe, L.","first_name":"L."}],"date_created":"2023-12-04T13:37:43Z","title":"Co-creating business value through IT-business operational alignment in inter-organisational relationships: Empirical evidence from regional networks"}]
