Browse the ECIS 2014 Proceedings

Subscribe to RSS Feed

AN ONLINE EXPERIMENT ON CONSUMERS' SUSCEPTIBILITY TO FALL FOR POST-TRANSACTION MARKETING SCAMS

Complete Research Paper

Alan Nochenson, The Pennsylvania State University, University Park, Pennsylvania, USA
Jens Grossklags, The Pennsylvania State University, University Park, PA, United States

BUILDING THE NEXT GENERATION OF CYBER SECURITY PROFESSIONALS

Complete Research Paper

Ben Martini, University of South Australia, Adelaide , South Australia, Australia
Kim-Kwang Raymond Choo, University of South Australia, Adelaide, South Australia, Australia

CYBERSECURITY INFORMATION SHARING: A FRAMEWORK FOR SUSTAINABLE INFORMATION SECURITY MANAGEMENT IN UK SME SUPPLY CHAINS

Complete Research Paper

Riyana Lewis, Brunel University, Uxbridge, Middlesex, United Kingdom
Panos Louvieris, Brunel University, Uxbridge, Middlesex, United Kingdom
Pamela Abbott, Brunel University, Uxbridge, Middlesex, United Kingdom
Natalie Clewley, Brunel University, Uxbridge, Middlesex, United Kingdom
Kevin Jones, EADS Innovation Works, Newport, United Kingdom

EXPLORING THE IMPACT OF RESTRICTIVE DEFAULT PRIVACY SETTINGS ON THE PRIVACY CALCULUS ON SOCIAL NETWORK SITES

Complete Research Paper

Markus Tschersich, Goethe University Frankfurt, Frankfurt am Main, Hessen, Germany
Reinhardt Botha, Nelson Mandela University, Port Elizabeth, South Africa

EXPRESSIVE OR INSTRUMENTAL: THE DUAL PERSPECTIVE MODEL OF PERSONAL WEB USAGE AT WORKPLACE

Research-in-Progress Paper

Hemin Jiang, University of Jyvaeskylae, Jyvaeskylä, Finland
Aggeliki Tsohou, University of Jyväskylä, Jyvaeskylae, Finland

FACEBOOK PRIVACY HARDENING USING VIRAL TECHNIQUES

Research-in-Progress Paper

Iwan Gulenko, Technical University of Munich, Munich, Germany

INFORMATION SECURITY AS A DETERMINANT OF NATION´S NETWORKED READINESS: A COUNTRY LEVEL ANALYSIS

Complete Research Paper

Manal Yunis, University of Texas - Pan American, Edinburg, Texas, United States
Madison Ngafeeson, Northern Michigan University, Marquette, Michigan, United States
Kai Koong, University of Texas-Pan American, Edinburg, Texas, United States

ISFAM: THE INFORMATION SECURITY FOCUS AREA MATURITY MODEL

Complete Research Paper

Marco Spruit, Utrecht University, Utrecht, Netherlands
Martijn Röling, Utrecht University, Utrecht, Netherlands

OBLIVION ON THE WEB: AN INQUIRY OF USER NEEDS AND TECHNOLOGIES

Complete Research Paper

Alexander Novotny, Vienna University of Economics and Business, Vienna, Austria
Sarah Spiekermann, Vienna University of Economics and Business, Vienna, Austria

PERCEIVED IT SECURITY RISKS IN CLOUD ADOPTION: THE ROLE OF PERCEPTUAL INCONGRUENCE BETWEEN USERS AND PROVIDERS

Complete Research Paper

André Loske, Darmstadt University of Technology - Chair of Software Business & Information Management, Darmstadt, Germany
Thomas Widjaja, Darmstadt University of Technology - Chair of Software Business & Information Management, Darmstadt, Germany
Alexander Benlian, Darmstadt University of Technology - Chair of Information Systems & Electronic Services, Darmstadt, Germany
Peter Buxmann, Darmstadt University of Technology - Chair of Software Business & Information Management, Darmstadt, Germany

ROLE MODEL OPTIMIZATION FOR SECURE ROLE-BASED IDENTITY MANAGEMENT

Complete Research Paper

Ludwig Fuchs, Nexis GmbH, Regensburg, Bavaria, Germany
Michael Kunz, University of Regensburg, Regensburg, Germany
Günther Pernul, University of Regensburg, Regensburg, Bavaria, Germany

SOCIAL DESIRABILITY BIAS IN SOFTWARE PIRACY RESEARCH

Research-in-Progress Paper

Marton Gergely, The University of Texas at San Antonio, San Antonio, Texas, United States
V. Srinivasan (Chino) Rao, The University of Texas at San Antonio, San Antonio, Texas, United States

THE UNCONSCIOUS APP CONSUMER: DISCOVERING AND COMPARING THE INFORMATION-SEEKING PATTERNS AMONG MOBILE APPLICATION CONSUMERS

Complete Research Paper

Christoph Buck, University Bayreuth, Bayreuth, Germany
Chris Horbel, University of Southern Denmark, Esbjerg, Denmark
Claas Christian Germelmann, University Bayreuth, Bayreuth, Germany
Torsten Eymann, University of Bayreuth, Bayreuth, Germany

VISUALIZING SOCIAL ROLES - DESIGN AND EVALUATION OF A BIRD'S-EYE VIEW OF SOCIAL NETWORK PRIVACY SETTINGS

Complete Research Paper

Michael Netter, University of Regensburg, Regensburg, Bavaria, Germany
Michael Weber, University of Regensburg, Regensburg, Bavaria, Germany
Michael Diener, University of Regensburg, Regensburg, Bavaria, Germany
Günther Pernul, University of Regensburg, Regensburg, Bavaria, Germany