Subscribe to RSS Feed (Opens in New Window)

Schedule

A Conceptual Examination of Distrusting Beliefs in Older Adults about the Internet

Rajarshi Chakraborthy, University at Buffalo
H. Raghav Rao, University at Buffalo
Shambhu J. Upadhyaya, University at Buffalo
Sharmistha Bagchi-Sen, University at Buffalo

Addressing Emerging Information Security Personnel Needs. A Look at Competitions in Academia: Do Cyber Defense Competitions Work?

Andrew Green, Kennesaw State University
Humayun Zafar, Kennesaw State University

An Information Security Model and its Validation

Joobin Choobineh, Texas A & M University - College Station

Are Conceptualizations of Employee Compliance and Noncompliance in Information Security Research Adequate? Developing Taxonomies of Compliance and Noncompliance

Jeffrey D. Wall, University of North Carolina at Greensboro
Lakshmi Iyer, University of North Carolina at Greensboro
A.F. Salam, The University of North Carolina at Greensboro

Comprehensive Access Control for Data Warehouses

Long Flory Mrs., VIRGINIA COMMONWEALTH UNIVERSITY
Kweku-Muata Osei-Bryson Mr., Virginia Commonwealth University

Connecting to Unfamiliar Wi-Fi Hotspots - A Risk Taking Perspective

Hoon Seok Choi, University of Texas at San Antonio
Darrell Carpenter, University of Texas at San Antonio

Control-Related Motivations and Information Security Policy Compliance: The Effect of Reflective and Reactive Autonomy

Jeffrey D. Wall, University of North Carolina at Greensboro
Prashant Palvia, University of North Carolina at Greensboro

Examining Personal Information Privacy-Protective Responses (IPPR) with the Use of Smart Devices

Minoo Modaresnezhad, University of North Carolina at Greensboro
Lakshmi Iyer, University of North Carolina at Greensboro
Hamid Nemati, University of North Carolina at Greensboro

Eye Gazing Behaviors in Online Deception

Jinie Pak, University of Maryland Baltimore County
Lina Zhou, University of Maryland Baltimore County

Factors of Password-based Authentication

Herbert J. Mattord, Kennesaw State University
Yair Levy, Graduate School of Computer and Information Sciences, Nova Southeastern University, Fort Lauderdale, FL, United States.
Steven Furnell, Plymouth University

Information Security Policies Compliance: The Role of Organizational Punishment

Mohammad I. Merhi, University of Texas - Pan American
Punit Ahluwalia, The University of Texas- Pan American

Schools of Thought in Software Piracy Research

Marton Gergely, The University of Texas at San Antonio
V. Srinivasan (Chino) Rao, The University of Texas at San Antonio

Security and Privacy System Requirements for Adopting Cloud Computing in Healthcare Data Sharing Scenarios

Tatiana Ermakova, Technical University of Berlin
Benjamin Fabian, Humboldt University of Berlin
Rüdiger Zarnekow, Technical University of Berlin

Social Networks and Information Privacy: A Model for Low-income Countries

Berhanu Borena Kelecha Mr., Addis Ababa University
France Belanger, Virginia Tech
Dejene Ejigu, Addis Ababa University

The Efficacy of IS Security and Privacy Governance Structures

Minoo Modaresnezhad
Prashant Palvia, University of North Carolina at Greensboro

The Impact of Security and Privacy Concerns on Home Internet Use by Parents and Children

James N. Morgan, Northern Arizona University
Suryanarayanan Ravindran, Northern Arizona University