Steffi Haag
YOU?
Author Swipe
View article: Negotiating with LLMS: Prompt Hacks, Skill Gaps, and Reasoning Deficits
Negotiating with LLMS: Prompt Hacks, Skill Gaps, and Reasoning Deficits Open
Large language models LLMs like ChatGPT have reached the 100 Mio user barrier in record time and might increasingly enter all areas of our life leading to a diverse set of interactions between those Artificial Intelligence models and human…
View article: Protection Motivation Theory in Information Security Behavior Research: Reconsidering the Fundamentals
Protection Motivation Theory in Information Security Behavior Research: Reconsidering the Fundamentals Open
Scholars commonly use protection motivation theory (PMT) by Rogers to examine information systems (IS) security behaviors and behavioral intentions. A recent influential paper by Boss, Galletta, Lowry, Moody, and Polak (2015; hereafter BGL…
View article: Deviant Affordances: When Tensions, Deadlocks, and Nonconformance Generate Performance
Deviant Affordances: When Tensions, Deadlocks, and Nonconformance Generate Performance Open
Novel information technologies (ITs), such as mobile devices and third-party cloud services, offer users an increasing variety of action possibilities, i.e., affordances. Organizational IT policies, however, often specify their actualizati…