Schedule

Subscribe to RSS Feed

2018
Thursday, August 16th
12:00 AM

A Conceptual Model to Understand Privacy Concerns in a Social P2P Payment App

Mohsen M. Jozani, The University of Texas at San Antonio
Emmanuel Ayaburi, The University of Texas Rio Grande Valley
Myung Ko, The University of Texas at San Antonio
Kim-Kwang Raymond Choo, The University of Texas at San Antonio

12:00 AM

A Framework for Creating Secure and Memorable Passwords

Martha McNeil, Dakota State University
Omar El-Gayar, Dakota State University
Cherie Noteboom, Dakota State University

12:00 AM

An Empirical Study on the Factors Contributing to Disclosing Personal Information Online: Insecurity in the Digital Age

Iqbal Amiri, University of Maryland University College
Ling Wang, NOVA Southeastern University
Yair Levy, NOVA Southeastern University
Inkyoung Hur, NOVA Southeastern University

12:00 AM

Assessing Fraud Risks in IT Security

Randi Jiang, Louisiana Tech University
Jae Ung Lee, Louisiana Tech University

12:00 AM

Behind Cyber Doors: Securing the Internet of Self

Alaa Nehme, Iowa State University
Joey F. George, Iowa State University

12:00 AM

Benchmarking Methodology Development for Establishing Information System Security Policy: A Design Science Approach

Martin (Dae Youp) Kang, University of Memphis
Sungyong Um, National University of Singapore
Ted (Euntae) Lee, University of Memphis
Horim Kim, Hallym University

12:00 AM

Blame Distribution Following Information Security Breaches

Andrew Miller, Mississippi State University
Kent Marett, Mississippi State University

12:00 AM

C-R-P-M-I: A framework to model cyber risk from phishing and mitigation through insurance

Arunabha Mukhopadhyay, IIM Lucknow
Baidyanath Biswas, IIM Lucknow
Shounak Pal, IIM Lucknow

12:00 AM

Can an Ego Defense Mechanism Model Help Explain Dysfunctional IS Security Behavior?

Abhijit Chaudhury, Bryant University
Debasish Mallick, University of St. Thomas

12:00 AM

Can IoT Devices Be Trusted? An Exploratory Study

Donald Privitera, Kennesaw State University
Lei Li, Kennesaw State University

12:00 AM

Communicating Compliance: Developing a GDPR Privacy Label

Grace Fox, Irish Centre for Cloud Computing and Commerce, Dublin City University
Colin Tonge, Irish Centre for Cloud Computing and Commerce, Dublin City University
Theo Lynn, Irish Centre for Cloud Computing and Commerce, Dublin City University
John Mooney, Pepperdine University Graziadio School of Business and Managemen

12:00 AM

Cyber Risk Quantification and Mitigation Framework for Healthcare using Machine Learning

Shounak Pal, Indian Institute of Management Lucknow
Arunabha Mukhopadhyay, Indian Institute of Management Lucknow

12:00 AM

Cyberbullying: Investigating the Roles of Power and Communication Medium

Zahra Aivazpour, university of texas at san antonio
Nicole Beebe, university of texas at san antonio

12:00 AM

Examining Technology Use Factors of Privacy-Enhancing Technologies: The Role of Perceived Anonymity and Trust

David Harborth, Goethe University Frankfurt am Main
Sebastian Pape, Goethe University Frankfurt am Main

12:00 AM

Exploring the Impact of Information Security Practices on Competitive Advantage

Dejan Kosutic, Grenoble Ecole de Management
Federico Pigni, Grenoble Ecole de Management

12:00 AM

Framework to explain factors affecting severity of exposure of medical data breach: a statistical analysis

Shounak Pal, Indian Institute of Management Lucknow
Arunabha Mukhopadhyay, Indian Institute of Management Lucknow

12:00 AM

How Do You Cope: Individuals’ Responses to Identity Theft Victimization

Yuan Li, University of Illinois at Springfield
Adel Yazdanmehr, Baruch College, CUNY
Jingguo Wang, University of Texas at Arlington
H. Raghav Rao, University of Texas at San Antonio

12:00 AM

Improving Security Message Adherence through Improved Comprehension: Neural and Behavioral Insights

Bonnie Anderson, Brigham Young University
Daniel Bjornn, Brigham Young University
Jeff Jenkins, Brigham Young University
Brock Kirwan, Brigham Young University
Anthony Vance, Brigham Young University

12:00 AM

Intelligent Home Assistant Use in the Home Environment

Robert E. Crossler, Washington State University
France Bélanger, Virginia Tech
Kim-Kwang Raymond Choo, University of Texas at San Antonio

12:00 AM

Investigating Privacy Concerns of Internet of Things (IoT) Users

Philip Menard, University of South Alabama
Gregory Bott, University of Alabama

12:00 AM

Investigating User Disclosure of Sensitive Information: An Extended ELM Theory

Kelvin King-Kizito, UTRGV
Jun Sun, UTRGV

12:00 AM

Iterating the Cybernetic Loops in Anti-Phishing Behavior: A Theoretical Integration

Alaa Nehme, Iowa State University
Joey F. George, Iowa State University

12:00 AM

Mobile Applications Security: Role of Privacy

Hamid Reza Nikkhah, University of Arkansas
Ali Balapour, University of Arkansas
Rajiv Sabherwal, University of Arkansas

12:00 AM

Moral and Subjective Norms: How do they Effect Information Security Compliance?

Punit Ahluwalia, University of Texas Rio Grande Valley
Mohammad Merhi, Indiana University South Bend

12:00 AM

Organizations’ Proactive Information Security Behavior

Fereshteh Ghahramani, University of Texas at Arlington
Daniel Chen, Texas Christian University
Jingguo Wang, University of Texas at Arlington

12:00 AM

Predicting Security Events in Cloud Computing

Vivek Singh, Information Systems Decision Sciences, MUMA College of Business, University of South Florida
Kaushik Dutta, Information Systems Decision Sciences, MUMA College of Business, University of South Florida

12:00 AM

Privacy by Design to Comply with GDPR: A Review on Third-Party Data Processors

Christian Kurtz, University of Hamburg
Martin Semmann, University of Hamburg
Tilo Böhmann, University of Hamburg

12:00 AM

Privacy Negotiation Mechanism in Internet of Things Environments

Fagner Roger Pereira Couto, Federal University of São Carlos
Sergio Zorzo, Federal University of São Carlos

12:00 AM

PRIVACY, SECURITY AND LEGISLATIVE ACTIONS RELATED TO DRONE USAGE

Beverly Medlin, Appalachian State University
Sandra Vannoy, Appalachian State University
Austin Eggers, Appalachian State University

12:00 AM

Resource-based Perspective on Slack and Data Breach

Qian WANG, The Hong Kong Polytechnic University
E.W.T. NGAI, The Hong Kong Polytechnic University

12:00 AM

RisCC – A Risk Management Tool for Cloud Computing Environments

Michael Adelmeyer, Osnabrueck University
Lukas Beike, Osnabrueck University
Mirko Buggenthin, Osnabrueck University
Sebastian Osada, Osnabrueck University
Frank Teuteberg, Osnabrueck University

12:00 AM

Russian Roulette or A Game of Whack A Mole? Effect of Overconfidence in Protecting Information Systems

Kelvin King-Kizito, UTRGV
Nan Xiao, UTRGV

12:00 AM

Satisfying Secure Load Balancing Expectations in the Cloud

Brian Cusack, AUT University
Eghbal Ghazizadeh, AUT University

12:00 AM

Security Related Information Sharing among Firms: Potential Theoretical Explanations

Radha Appan, Cleveland State University
Dinko Bacic, University of Southern Indiana
Sreedhar Madhavaram, Cleveland State University

12:00 AM

Security Violation Prevention; CPTED in the context of information Security

Sahar Farshadkhah, Louisiana Tech University
Jaeung Lee, Louisiana Tech University

12:00 AM

Spillover of Information Security Incidents’ Impact: The Moderating Role of Social Networks and IT

Joonghee Lee, Auburn University
Dianne Hall, Auburn University
Casey Cegielski, Auburn University

12:00 AM

The Business Value of Engaging in Counter-Breach Initiatives

Taha Havakhor, Oklahoma State University
Tianjian Zhang, Oklahoma State University
Bryan Hammer, Oklahoma State University

12:00 AM

The Effect of Values on Hacker Participation Volume in Online Communities

Ruby Booth, University of Memphis

12:00 AM

The Impact of Extended Global Ransomware Attacks on Trust: How the Attacker’s Competence and Institutional Trust Influence the Decision to Pay

Alex Zarifis, University of Mannheim, Germany
Xusen Cheng, University of International Business and Economics, China

12:00 AM

The Mediating Role of Psychological Ownership in Increasing Information Security Stewardship Behaviors

Obi Ogbanufe, University of North Texas

12:00 AM

The Misunderstood Link: Information Security Training Strategy

Henry G Torres, Arkansas State University
Saurabh Gupta, Kennesaw State University

12:00 AM

Towards a Development of Cybersecurity Risk-Responsibility Taxonomy of Small Enterprises for Data Breach Risk Mitigation

Keiona Davis, Nova Southeastern University
Yair Levy, Nova Southeastern University
Boštjan Delak, University of Maribor

12:00 AM

Using Cognitive Dissonance Theory to Explain Information Security Policy Violations

Nasim Talebi, University of Texas at San Antonio
Mohsen M. Jozani, University of Texas at San Antonio
Teju Herath, Brock University
H.Raghav Rao, University of Texas at San Antonio

12:00 AM

Vulnerability and Risk Assessment of XEN Hypervisor

Alan Litchfield, Auckland University of Technology
Abid Shahzad, Auckland University of Technology

12:00 AM