Subscribe to RSS Feed (Opens in New Window)

Schedule
2017
Thursday, August 10th
12:00 AM

A Systematic Review of Vulnerabilities in Hypervisors and Their Detection

Negotiating the tension between traditio SIGPhil, Auckland University of Technology
Abid Shahzad, Auckland University of Technology

12:00 AM

12:00 AM

Adoption of Identity Protection Service: An Integrated Protection Motivation – Precaution Adoption Process Model

Yuan Li, University of Illinois at Springfield
Jingguo Wang, The University of Texas at Arlington
H. Raghav Rao, The University of Texas at San Antonio

12:00 AM

12:00 AM

Antecedents of Information Privacy Assimilation in Indian IT Organizations: An Empirical Investigation

V S Prakash Attili, Infosys
Saji K. Mathew, IIT Madras
Vijayan Sugumaran, Oakland University

12:00 AM

12:00 AM

App Information Privacy Concerns

Christoph Buck, University Bayreuth
Simone Burster, University Bayreuth

12:00 AM

12:00 AM

Are Cryptocurrencies Criminals Best Friends? Examining the Co-Evolution of Bitcoin and Darknet Markets

Christian Janze, Goethe University Frankfurt

12:00 AM

12:00 AM

Behavioral Approach to Information Security Policy Compliance

Ashraf Mady, University of North Georgia
Saurabh Gupta, Kennesaw State University Coles College of Business

12:00 AM

12:00 AM

Beyond Compliance: Empowering Employees’ Extra-Role Security Behaviors in Dynamic Environments

Yaojie Li, Louisiana Tech University
Thomas Stafford, Louisiana Tech University
Bryan Fuller, Louisiana Tech University
Selwyn Ellis, Louisiana Tech University

12:00 AM

12:00 AM

Blockchain for Digital Crime Prevention: The Case of Health Informatics

Kane Smith, Virginia Commonwealth University
Gurpreet Dhillon, University of North Carolina Greensboro

12:00 AM

12:00 AM

Bridging the Security Gap between Software Developers and Penetration Testers: A Job Characteristic Theory Perspective

Hwee-Joo Kam, University of Tampa
Vishal Shah, Central Michigan University
Shuyuan Mary Ho, Florida State University

12:00 AM

12:00 AM

Developing Measurement Scales for Passwords Uniqueness and Secrecy

Ali Vedadi, Mississippi State University
Merrill Warkentin, Mississippi State University

12:00 AM

12:00 AM

Does Legal Protection from Host-countries Mitigates Information Security Risk in Multinational Enterprise Subsidiaries

Hong Chen, Old Dominion University
Yong Chen, Old Dominion University

12:00 AM

12:00 AM

Does the Development of Information Systems Resources Lead to the Development of Information Security Resources? An Empirical Investigation

Vasiliki Diamantopoulou, University of Brighton
Aggeliki Tsohou, Ionian University
Euripidis N. Loukis, University of the Aegean
Stefanos Gritzalis, University of the Aegean

12:00 AM

12:00 AM

Evaluation of IT Security Perception

nur sena tanrıverdi, Bogazici Universitesi
bilgin metin, Bogazici Universitesi

12:00 AM

12:00 AM

Evaluation of the reliability of using the prototype PPMark - a tool to support the computer human interaction in readings the privacy policies - using the GQM and TAM models.

Diego Roberto Gonçalves Pontes, Pontifical Catholic University of Minas Gerais
Sergio Donizetti Zorzo, Universidade Federal de São Carlos
Jose Santiago Moreira Mello, Universidade Federal de São Carlos

12:00 AM

12:00 AM

Examining self-disclosure on wearable devices: The roles of benefit structure and privacy calculus

Ersin Dincelli, University at Albany, SUNY
Xin Zhou, University at Albany, SUNY

12:00 AM

12:00 AM

Factors Influencing Employees’ Participation in Non-Malicious, Information Systems Security Deviant Behavior: Focus on Formal Control Mechanisms and Sanctions

Princely Ifinedo, Cape Breton University
Efosa C. Idemudia, Arkansas Tech University

12:00 AM

12:00 AM

Frequently Using Passwords Increases Their Memorability – A False Assumption or Reality?

Naomi Woods, Jyvaskylan Yliopisto

12:00 AM

12:00 AM

Hackers Delight: Knowledge Sharing Motives

Obi Ogbanufe, University of North Texas
Dan J. Kim, University of North Texas

12:00 AM

12:00 AM

Identifying Emerging Challenges for ICT industry in Ireland: Multiple Case Study Analysis of Data Privacy Breaches

Plamen Petkov, Dublin City University School of Computing
Markus Helfert, Dublin City University

12:00 AM

12:00 AM

Impacts of Generational Work Experience on Users’ Perceptions of Information Security

Jeffrey Cummings, UNCW
Amy J. Connolly, James Madison University
david gomillion, Texas A&M University Mays Business School

12:00 AM

12:00 AM

Influence of Information Overload on IT Security Behavior: A Theoretical Framework

Tridib Bandyopadhyay, Kennesaw State University
Humayun Zafar, Kennesaw State University

12:00 AM

12:00 AM

Information Security Policy Quality and Enforcement: Is Compliance a Solution to Fraud

Dennis Brown, Kennesaw State University
Humayun Zafar, Kennesaw State University

12:00 AM

12:00 AM

Information Sharing Behavior of the Older Adults: An Empirical Study of Their Online Privacy Concerns

Babita Gupta, California State University Monterey Bay
Anitha Chennamaneni, Texas A&M University Central Texas

12:00 AM

12:00 AM

IoT Security Adoption into Business Processes: A Socio-Technical View

Kavyashree Gollahalli Chandrashekhar, Lancaster University Management School
Forough Karimi-Alaghehband, HEC Montreal
Desiree Özgün, Lancaster University Management School

12:00 AM

12:00 AM

Is Self-Efficacy in Information Security Better Modeled as a Predictor Variable or a Mediator Variable in IS literature?

Dinesh Reddy, UTSA
Glenn Dietrich, University of Texas at San Antonio

12:00 AM

12:00 AM

Let Machines Unlearn – Machine Unlearning and the Right to be Forgotten

Chanhee Kwak, KAIST College of Busienss
Junyeong Lee, University of Science and Technology of China
Kyuhong Park, KAIST College of Business
Heeseok Lee, KAIST College of Busienss

12:00 AM

12:00 AM

Mobile Cloud-Computing Applications: A Privacy Cost-Benefit Model

Hamid Reza Nikkhah, Univeristy of Arkansas
Rajiv Sabherwal, University of Arkansas

12:00 AM

12:00 AM

Mobile Privacy: Users’ Expectations About the Behavior of Mobile Apps

Jose Santiago Moreira Mello, Universidade Federal de São Carlos
Sergio Donizetti Zorzo, Universidade Federal de São Carlos
Diego Roberto Gonçalves Pontes, Universidade Federal de Sao Carlos

12:00 AM

12:00 AM

Modeling Public Response to Data Breaches

Eric Bachura, University of Texas at San Antonio
Rohit Valecha, University of Texas at San Antonio
Rui Chen, Iowa State University
Raghav H. Rao, University of Texas at San Antonio

12:00 AM

12:00 AM

Personal Motivation Measures for Personal IT Security Behavior

Byron Marshall, Oregon State University
Michael Curry, Washington State University
John Coreia, Washington State University
Robert E. Crossler, Washington State University

12:00 AM

12:00 AM

Resiliency as an Outcome of Security Training and Awareness Programs

Angela D. Landress, Nova Southeastern University
James L. Parrish, Nova Southeastern University
Steven Terrell, Nova Southeastern University

12:00 AM

12:00 AM

Security Incident Recognition and Reporting (SIRR): An Industrial Perspective

George Grispos, Lero - The Irish Software Research Centre, University of Limerick
William Bradley Glisson, University of South Alabama
David Bourrie, University of South Alabama
Tim Storer, University of Glasgow
Stacy Miller, University of South Alabama

12:00 AM

12:00 AM

SELECTION OF PRIVACY ENHANCED COMMUNICATION: AN EXTENSION OF THE UTAUT2 THEORY

Tyler M. Pieron, Nova Southeastern University
James N. Smith, Nova Southeastern University

12:00 AM

12:00 AM

Sense-making in Cyber Security – Examining Responder Behaviors in Cyber-Attacks

Tommi Tapanainen, University of Liege

12:00 AM

12:00 AM

Seven C’s of Information Security

Mark-David McLaughlin, Bentley University
Janis L. Gogan, Bentley University

12:00 AM

12:00 AM

Strength of Ties as an Antecedent of Privacy Concerns: A Qualitative Research Study

Jakob Wirth, University of Bamberg

12:00 AM

12:00 AM

Studying the Tension Between Digital Innovation and Cybersecurity

Natasha Nelson, Schneider Electric US
Stuart Madnick, MIT

12:00 AM

12:00 AM

TD-CHAIN: A System to Enhance Transparency in Data Flows

Wei Chen, Department of Management Information Systems, The University of Arizona
David Sidi, School of Information, The University of Arizona
Laura Brandimarte, Department of Management Information Systems, The University of Arizona
Andrea Padula, Department of Computer Science, The University of Arizona

12:00 AM

12:00 AM

The Iterative Effect of IT Identity on Employee Cybersecurity Compliance Behaviors

Yao Shi, University of Memphis
Ruby E. Booth, University of Memphis
Judith Simon, University of Memphis

12:00 AM

12:00 AM

Understanding Digital Crime, Trust, and Control in Blockchain Technologies

Joseph B. Walton, Virginia Commonwealth University College of Humanities and Sciences
Gurpreet Dhillon, University of North Carolina Greensboro

12:00 AM

12:00 AM

Understanding Nuances of Privacy and Security in the Context of Information Systems

Ersin Dincelli, University at Albany, SUNY
Sanjay Goel, University at Albany, SUNY
Merrill Warkentin, Mississippi State University

12:00 AM

12:00 AM

Unpacking Privacy Paradox: A Dual Process Theory Approach

Zahra Aivazpour, University of Texas Health Science Center at San Antonio
Rohit Valecha, University of Texas at San Antonio
Raghav H. Rao, University of Texas at San Antonio

12:00 AM

12:00 AM

Using Active Probes to Detect Insiders Before They Steal Data

Sanjay Goel, University at Albany, SUNY
Kevin J. Williams, University at Albany, SUNY
Stan zavoyskiy, University at Albany, SUNY
Nicholas S. Rizzo, University at Albany, SUNY

12:00 AM