Follow

Submissions from 2011

PDF

INFORMATION SECURITY BEHAVIOR: FACTORS AND RESEARCH DIRECTIONS, Sherly Abraham

PDF

The Role of Conflict Resolution in Designing and Implementing Information Security Policies: An Institutional Perspective, Sherly Abraham and Indushobha Chengalur-Smith

PDF

The Development of a Graduate Curriculum for Software Assurance, Mark Ardis and Nancy R. Mead

PDF

Towards a Managerial Decision Framework for Utilization of Cyber Insurance Instruments in IT security, Tridib Bandyopadhyay and Snehal Shidore

PDF

Understanding the Security in Privacy-Security Concerns: A Theoretical and Empirical Examination, Gaurav Bansal

PDF

Consumer Risk: The Importance of Privacy and Security while Connected to Wi-Fi Hotspots: Does Location Matter?, Patrick Curry

PDF

Threat Modeling the Cloud Computing, Mobile Device Toting, Consumerized Enterprise – an overview of considerations, Jeffrey A. Ingalsbe, Dan Shoemaker, and Nancy R. Mead

PDF

The Surprising Lack of Effect of Privacy Concerns on Intention to Use Online Social Networks, Eun Ju Jung, D. Harrison McKnight, Euisung Jung, and Nancy K. Lankton

PDF

Are All Commercial Websites Created Equal? Web Vendor Reputation and Security on Third Party Payment Use, Ruth C. King and Richard A. M. Schilhavy

PDF

Misinformation in Healthcare Social Networks: Contributing Factors, Victoria Kisekka, Raj Sharman, Ranjit Singh, and Gurdev Singh

PDF

Exploring the Influences of Implementation Intention on Information Security Behaviors, Gen-Yih Liao and Chia-Min Wang

PDF

Developing a Dichotomy of Information Privacy Concerns, Yuan Li

PDF

EFFECTS OF DEVELOPER COGNITIVE STYLE AND MOTIVATIONS ON INFORMATION SECURITY POLICY COMPLIANCE, Lakshman Mahadevan, Judith C. Simon, and Thomas O. Meservy

PDF

Model Driven Information Security Management - Evaluating and Applying the Meta Model of ISO 27001, Danijel Milicevic and Matthias Goeken

PDF

Software Compliance: The factors impacting compliance, René Moquin

PDF

NG Augmented Ontology on shared cloud attack dimension Proceedings of the Seventeenth Americas Conference on Information Systems, Detroit, Michigan August 4th-7th 2011 1 Americas Conference on Information Systems AMCIS 2011 Detroit “Augmented Ontology to discover Shared Attack Dimension in Cloud Computing for Information Warfare Prediction”, Daniel CHINGWA NG

PDF

The Economic Effect of Privacy Breach Announcements on Stocks: A Comprehensive Empirical Investigation, Aurelia Nicholas-Donald, Jesus Francisco Matus, SeungEui Ryu, and Adam M. Mahmood

PDF

Ethical Decision-Making in e-Learning: A Socio-technical Analysis of Informal Security Controls, Richelle L. Oakley and Rahul Singh

PDF

Differentiating Privacy and Security: A Content Analysis of B2C Websites, Marie Caroline Oetzel and Barbara Krumay

PDF

Healthcare Information Privacy Research: Iusses, Gaps and What Next?, Rachida Parks, Chao-Hsien Chu, and Heng Xu

PDF

Identity Theft and Used Gaming Consoles: Recovering Personal Information from Xbox 360 Hard Drives, Dr. Asley L. Podhradsky, Dr. Rob D'Ovidio, and Cindy Casey

PDF

ONLINE DISCLOSURE AND PRIVACY CONCERNS: A STUDY OF MOROCCAN AND AMERICAN FACEBOOK USERS, Natasha F. Veltri, Hanna Krasnova, and Wafa Elgarah

PDF

The Role of Perceptions of Organizational Injustice and Techniques of Neutralization in Forming Computer Abuse Intentions, Merrill Warkentin, Robert Willison, and Allen C. Johnston

PDF

Critical Success Factors for an Effective Security Risk Management Program: An Exploratory Case Study at a Fortune 500 Firm, Humayun Zafar, Jan G. Clark, Myung Ko, and Yoris A. Au

PDF

Designing Security Requirements – A Flexible, Balanced, and Threshold-Based Approach, Yanjun Zuo