default search action
Simon Trang 0001
Person information
- affiliation: University of Paderborn, Germany
- affiliation (former): University of Göttingen, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]Ilja Nastjuk, Simon Trang, Julius-Viktor Grummeck-Braamt, Marc T. P. Adam, Monideepa Tarafdar:
Integrating and synthesising technostress research: a meta-analysis on technostress creators, outcomes, and IS usage contexts. Eur. J. Inf. Syst. 33(3): 361-382 (2024) - [c57]Jana Driller, Simon Thanh-Nam Trang:
Unlocking sustainable reporting: Leveraging knowledge graphs for ESG metrics extraction: The role of knowledge graphs in sustainability reporting. INFORMATIK 2024: 1877-1883 - [c56]Julia Klein, Kristin Masuch, Laura Schulze, Simon Trang:
Data Size Matters: The Impact of Message Framing in Different Health Scenarios on the Donation of Personal Health Information. HICSS 2024: 3245-3254 - [c55]Gilbert Georg Hövel, Florian Schütz, Simon Trang:
Using Digital Nudging in Medical decision-making - A Taxonomy to Inform Research and Practice. PACIS 2024 - [c54]Florian Schütz, Lennart Steenken, Jannes Heinrich Diedrich Menck, Simon Hugenberg, Patricia Köpfer, Gilbert Georg Hövel, Simon Trang:
Fortifying the Human Firewall: Designing a Virtual Reality-Based Test to Measure Individuals' Cyber Security Competencies. PACIS 2024 - 2023
- [j13]Matthias Trier, Dennis Kundisch, Daniel Beverungen, Oliver Müller, Guido Schryen, Milad Mirbabaie, Simon Trang:
Digital Responsibility. Bus. Inf. Syst. Eng. 65(4): 463-474 (2023) - [j12]Sebastian Hengstler, Stephan Kuehnel, Kristin Masuch, Ilja Nastjuk, Simon Trang:
Should i really do that? Using quantile regression to examine the impact of sanctions on information security policy compliance behavior. Comput. Secur. 133: 103370 (2023) - [c53]Tizian Matschak, Ilja Nastjuk, Laura Niedzela, Stephan Kuehnel, Simon Trang:
A Process-Based Approach to Information Security Investment Evaluation: Design, Implementation, and Evaluation. AMCIS 2023 - [c52]Laura Niedzela, Stephan Kuehnel, Ilja Nastjuk, Tizian Matschak, Stefan Sackmann, Simon Trang:
A Qualitative Study on Acceptance Factors of Economic Approaches on IT Security Investment Decisions. AMCIS 2023 - [c51]Florian Schütz, Bastian Spierau, Florian Rampold, Robert C. Nickerson, Simon Trang:
Chasing Cyber Security Unicorns: A Taxonomy-based Analysis of Cyber Security Start-ups' Business Models. ECIS 2023 - [c50]Aycan Aslan, Tizian Matschak, Maike Greve, Simon Trang, Lutz M. Kolbe:
At What Price? Exploring the Potential and Challenges of Differentially Private Machine Learning for Healthcare. HICSS 2023: 3277-3286 - [c49]Sebastian Hengstler, Stephan Kühnel, Simon Trang:
Is Social Learning Always Helpful? Using Quantile Regression to Examine the Impact of Social Learning on Information Security Policy Compliance Behavior. HICSS 2023: 4159-4168 - [c48]Florian Schütz, Florian Rampold, Kristin Masuch, Patricia Köpfer, Dominik Mann, Julia Warwas, Simon Trang:
Bridging the Gap between Security Competencies and Security Threats: Toward a Cyber Security Domain Model. HICSS 2023: 6118-6127 - [c47]Florian Rampold, Kristin Masuch, Julia Warwas, Simon Trang:
Triad or Error? Introducing Three Basic Dimensions of Competence as a Driving Force for Information Security Performance. ICIS 2023 - [e2]Stephan Kuehnel, Ilja Nastjuk, Stefan Sackmann, Simon Trang:
Proceedings of the 3rd International Workshop on Current Information Security and Compliance Issues in Information Systems Research (CIISR 2023) Co-located with the 18th International Conference on Wirtschaftsinformatik (WI 2023), Paderborn, Germany, September 18, 2023. CEUR Workshop Proceedings 3512, CEUR-WS.org 2023 [contents] - 2022
- [j11]Kristin Masuch, Maike Greve, Simon Trang, Lutz M. Kolbe:
Apologize or justify? Examining the impact of data breach response actions on stock value of affected companies? Comput. Secur. 112: 102502 (2022) - [j10]Simon Trang, Markus Mandrella, Mauricio Marrone, Lutz M. Kolbe:
Co-creating business value through IT-business operational alignment in inter-organisational relationships: empirical evidence from regional networks. Eur. J. Inf. Syst. 31(2): 166-187 (2022) - [j9]Ilja Nastjuk, Simon Trang, Elpiniki I. Papageorgiou:
Smart cities and smart governance models for future cities. Electron. Mark. 32(4): 1917-1924 (2022) - [c46]Tizian Matschak, Florian Rampold, Malte Hellmeier, Christoph Prinz, Simon Trang:
A Digitization Pipeline for Mixed-Typed Documents Using Machine Learning and Optical Character Recognition. DESRIST 2022: 195-207 - [c45]Tizian Matschak, Simon Trang, Christoph Prinz:
A Taxonomy of Machine Learning-based Fraud Detection Systems. ECIS 2022 - [c44]Sebastian Hengstler, Robert C. Nickerson, Simon Trang:
Towards a Taxonomy of Information Security Policy Non-Compliance Behavior. HICSS 2022: 1-10 - [c43]Kristin Masuch, Maike Greve, Simon Trang:
The Double-Edged Sword of Health Data Breaches: A Comparison of Customer and Stock Price Perspectives on the Impact of Data Breaches of Response Strategies. HICSS 2022: 1-10 - [c42]Tizian Matschak, Christoph Prinz, Florian Rampold, Simon Trang:
Show Me Your Claims and I'll Tell You Your Offenses: Machine Learning-Based Decision Support for Fraud Detection on Medical Claim Data. HICSS 2022: 1-9 - [c41]Till Ole Diesterhöft, Kristin Masuch, Maike Greve, Simon Trang:
A Double-Edged Sword of Involvement: On the Tension Between Customers' Group Value and Self-Interest in Data Breach Response Processes. ICIS 2022 - [c40]Lucas Pfannenberg, Florian Schütz, Sarah Gronemann, Eylert Spils ad Wilken, Kristin Masuch, Simon Trang:
Understanding the Corporate Use of IT Security Labels for IoT Products and Services: A Literature Review. WEB 2022: 12-27 - 2021
- [j8]Simon Trang, Welf H. Weiger:
The perils of gamification: Does engaging with gamified services increase users' willingness to disclose personal information? Comput. Hum. Behav. 116: 106644 (2021) - [j7]Simon Trang, Ilja Nastjuk:
Examining the role of stress and information security policy design in information security compliance behaviour: An experimental study of in-task behaviour. Comput. Secur. 104: 102222 (2021) - [j6]Kristin Masuch, Maike Greve, Simon Trang:
What to do after a data breach? Examining apology and compensation as response strategies for health service providers. Electron. Mark. 31(4): 829-848 (2021) - [j5]Alfred Benedikt Brendel, Maike Greve, Kristin Masuch, Simon Trang:
Corona Tracing Apps - Eine Analyse und Strukturierung des europäischen Marktes. HMD Prax. Wirtsch. 58(4): 698-711 (2021) - [c39]Kristin Masuch, Till Ole Diesterhöft, Maike Greve, Steffen Massanneck, Duy Khang Nguyen, Simon Trang, Lutz M. Kolbe:
Openness Always Pays off - Investigation of Diverse Actions in response Strategies to Data Breaches. ECIS 2021 - [c38]Sebastian Hengstler, Natalya Pryazhnykova, Simon Trang:
How do employees learn security behavior? Examining the influence of individual cultural values and social learning on ISP compliance behavior. HICSS 2021: 1-10 - [c37]Kristin Masuch, Maike Greve, Simon Trang:
Fitness First or Safety First? Examining Adverse Consequences of Privacy Seals in the Event of a Data Breach. HICSS 2021: 1-10 - [c36]Kristin Masuch, Sebastian Hengstler, Laura Schulze, Simon Trang:
The Impact of Threat and Efficacy on Information Security Behavior: Applying an Extended Parallel Process Model to the Fear of Ransomware. HICSS 2021: 1-10 - [c35]Till Ole Diesterhöft, Maike Greve, Kristin Masuch, Simon Trang, Lutz M. Kolbe:
Do You Think It Is Fair? Effects of Data Breach Response Actions on Customer Justice. PACIS 2021: 71 - [c34]Tizian Matschak, Christoph Prinz, Kristin Masuch, Simon Trang:
Healthcare in Fraudster's Crosshairs: Designing, Implementing and Evaluating a Machine Learning Approach for Anomaly Detection on Medical Prescription Claim Data. PACIS 2021: 89 - [c33]Sascha Lichtenberg, Johannes Bührke, Alfred Benedikt Brendel, Simon Trang, Stephan Diederich, Stefan Morana:
Let us work Together' - Insights from an Experiment with Conversational Agents on the Relation of Anthropomorphic Design, Dialog Support, and Performance. Wirtschaftsinformatik 2021 - [c32]Stephan Kühnel, Stefan Sackmann, Simon Trang, Ilja Nastjuk, Tizian Matschak, Laura Niedzela, Leonard Nake:
Towards a Business Process-based Economic Evaluation and Selection of IT Security Measures. CIISR@Wirtschaftsinformatik 2021: 7-21 - [e1]Stephan Kühnel, Stefan Sackmann, Simon Trang:
Proceedings of the First International Workshop on Current Compliance Issues in Information Systems Research (CIISR'21) Co-located with the 16th International Conference on Wirtschaftsinformatik (WI'21), Online (initially located in Duisburg-Essen, Germany), March 9th, 2021. CEUR Workshop Proceedings 2966, CEUR-WS.org 2021 [contents] - 2020
- [j4]Simon Trang, Manuel Trenz, Welf H. Weiger, Monideepa Tarafdar, Christy M. K. Cheung:
One app to trace them all? Examining app specifications for mass acceptance of contact-tracing apps. Eur. J. Inf. Syst. 29(4): 415-428 (2020) - [j3]Markus Mandrella, Simon Trang, Lutz M. Kolbe:
Synthesizing and Integrating Research on IT-Based Value Cocreation: A Meta-Analysis. J. Assoc. Inf. Syst. 21(2): 4 (2020) - [c31]Alfred Benedikt Brendel, Simon Trang, Mauricio Marrone, Sascha Lichtenberg, Lutz M. Kolbe:
What to do for a Literature Review? - A Synthesis of Literature Review Practices. AMCIS 2020 - [c30]Kristin Masuch, Maike Greve, Jens Cyrenius, Benjamin Wimmel, Simon Trang:
Do I Get What I Expect? An Experimental Investigation of Different Data Breach Recovery Actions. ECIS 2020 - [c29]Kristin Masuch, Christine Harnischmacher, Maike Greve, Simon Trang:
Why Electrify? - A Qualitative-Empirical Study on Electrification of Fleet Transportation Systems. ECIS 2020 - [c28]Maike Greve, Kristin Masuch, Sebastian Hengstler, Simon Trang:
Overcoming Digital Challenges: A Cross-Cultural Experimental Investigation of Recovering from Data Breaches. ICIS 2020 - [c27]Kristin Masuch, Maike Greve, Simon Trang:
Please be Silent? Examining the Impact of Data Breach Response Strategies on the Stock Value. ICIS 2020 - [c26]Sascha Lichtenberg, Tim-Benjamin Lembcke, Mattheus Brening, Alfred Benedikt Brendel, Simon Trang:
Can Gamification lead to Increase Paid Crowdworkers Output? Wirtschaftsinformatik (Zentrale Tracks) 2020: 1188-1202 - [c25]Maike Greve, Kristin Masuch, Simon Trang:
The More, the Better? Compensation and Remorse as Data Breach Recovery Actions - An Experimental Scenario-based Investigation. Wirtschaftsinformatik (Zentrale Tracks) 2020: 1278-1293 - [c24]Bernd Herrenkind, Tim-Benjamin Lembcke, Stephan Diederich, Simon Trang, Lutz M. Kolbe:
Let's Travel the World Together: Toward an Understanding of Motivational Antecedents in Business Trip Ridesharing Services. Wirtschaftsinformatik (Zentrale Tracks) 2020: 1474-1489
2010 – 2019
- 2019
- [j2]Simon Trang, Alfred Benedikt Brendel:
A Meta-Analysis of Deterrence Theory in Information Security Policy Compliance Research. Inf. Syst. Frontiers 21(6): 1265-1284 (2019) - [c23]Bernd Herrenkind, Tim-Benjamin Lembcke, Simon Trang, Alfred Benedikt Brendel, Lutz M. Kolbe:
Where Do You Want to Go Today: Understanding the Adoption of IS-Enabled Business Trip Ridesharing Services. AMCIS 2019 - [c22]Tim-Benjamin Lembcke, Kristin Masuch, Simon Trang, Sebastian Hengstler, Patience Plics, Mustafa Pamuk:
Fostering Information Security Compliance: Comparing the Predictive Power of Social Learning Theory and Deterrence Theory. AMCIS 2019 - [c21]Stephan Kühnel, Simon Thanh-Nam Trang, Sebastian Lindner:
Conceptualization, Design, and Implementation of EconBPC - A Software Artifact for the Economic Analysis of Business Process Compliance. ER 2019: 378-386 - [c20]Simon Trang, Welf H. Weiger:
Another dark side of gamification? How and when gamified service use triggers information disclosure. GamiFIN 2019: 142-153 - [c19]Stephan Diederich, Sascha Lichtenberg, Alfred Benedikt Brendel, Simon Trang:
Promoting Sustainable Mobility Beliefs with Persuasive and Anthropomorphic Design: Insights from an Experiment with a Conversational Agent. ICIS 2019 - 2018
- [c18]Yannik Gehrke, Patrick Schanze, Markus Mandrella, Simon Trang:
Antecedents and Outcomes of Operational Alignment in the Context of Academic Institutions. ECIS 2018: 80 - [c17]Simon Trang:
When Does Deterrence Work? A Moderation Meta-analysis of Employees' Information Security Policy Behavior. ICIS 2018 - 2016
- [c16]Markus Mandrella, Sebastian Zander, Simon Trang:
How Different Types of IS Assets Account for Synergy-Enabled Value in Multi-Unit Firms: Mapping of Critical Success Factors and Key Performance Indicators. AMCIS 2016 - [c15]Markus Mandrella, Simon Trang, Lutz M. Kolbe:
Synthesizing and Integrating Research on IT-based Value Co-Creation: a Meta-Analysis. ECIS 2016: Research Paper 19 - 2015
- [j1]Simon Trang, Sebastian Zander, Lutz M. Kolbe:
The Contingent Role of Centrality in IT Network Governance: An Empirical Examination. Pac. Asia J. Assoc. Inf. Syst. 7(1): 3 (2015) - [c14]Björn Hildebrandt, Lutz M. Kolbe, Markus Mandrella, Simon Trang, Sebastian Zander:
Value Co-creation through Network IT Alignment: An Empirical Examination in Regional Networks. AMCIS 2015 - [c13]Lutz M. Kolbe, Markus Mandrella, Simon Trang, Sebastian Zander:
Influence of Network Characteristics on Inter-Organizational IT Integration: The Role of Commitment and Trust. AMCIS 2015 - [c12]Lutz M. Kolbe, Ilja Nastjuk, Simon Trang:
The Influence of Sociodemographic and Technology-Associated Factors on Stress from Human Interaction with Electric Vehicle Information Systems. AMCIS 2015 - [c11]Simon Trang, Sebastian Busse, Johannes Schmidt, Tamara Falk, Mauricio Marrone:
The Danger of Replacing Human Interaction in IS-driven Collaborative Consumption Services. ECIS 2015 - [c10]Sebastian Zander, Simon Thanh-Nam Trang, Lutz M. Kolbe:
E-Collaboration in Interorganizational Networks: A Literature Review and an Agenda for Future Research. HICSS 2015: 244-253 - [c9]Sebastian Zander, Simon Thanh-Nam Trang, Markus Mandrella, Mauricio Marrone, Lutz M. Kolbe:
Integrating Industry Characteristics in Inter-Organizational IS Adoption Models: A Mixed Method Approach. PACIS 2015: 206 - 2014
- [c8]Simon Thanh-Nam Trang, Thierry Jean Ruch, Lutz M. Kolbe:
Collaborative Technologies in an Inter-organizational Context: Examining the Role of Perceived Information Security and Trust on Post-adoption. HICSS 2014: 160-169 - [c7]Simon Trang, Sebastian Zander, Lutz M. Kolbe:
E-Business Adoption at the Firm Level: Comparing the Predictive Power of Competing IS Adoption Models. ICIS 2014 - [c6]Simon Trang, Sebastian Zander, Lutz M. Kolbe:
Dimensions of Trust in the Acceptance of Inter-Organizational Information Systems in Networks: towards a Socio-Technical Perspective. PACIS 2014: 41 - [c5]Simon Thanh-Nam Trang, Sebastian Zander, Lutz M. Kolbe:
Examining IT Alignment in Inter-Organizational Networks: Development and Application of a Measurment Instrument. PACIS 2014: 183 - [c4]Simon Trang, Sebastian Zander, Malte Schmitz, Lutz M. Kolbe:
One Size Fits All? The contingent Role of Centrality in IT Network Governance. PACIS 2014: 384 - 2013
- [c3]Simon Thanh-Nam Trang, Nicky Opitz, Lutz M. Kolbe:
IT Governance in a Network Context: Literature Review and Agenda for Research. AMCIS 2013 - [c2]Vujdan El Khatib, Simon Trang, Kai Reimers:
The Role Of Motivational Factors In Distributed Software Development Teams: An Empirical Investigation. ECIS 2013: 221 - [c1]Simon Thanh-Nam Trang, Malte Schmitz, Lutz M. Kolbe:
IT Governance in Unternehmensnetzwerken - Eine kontingenztheoretische Betrachtung. GI-Jahrestagung 2013: 1276-1290
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:35 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint