Schedule

Subscribe to RSS Feed

2015
Sunday, December 13th
12:00 AM

A Multi-Theoretical Literature Review on Information Security Investments using the Resource-Based View and the Organizational Learning Theory

Eva Weishäupl, University of Regensburg
Emrah Yasasin, University of Regensburg
Guido Schryen, University Regensburg

12:00 AM

A Study of the Effect of Privacy Assurance Mechanisms on Self-disclosure in Social Networking Sites from the View of Protection Motivation Theory

Mohammadreza Mousavizadeh, University of North Texas
Dan Kim, University of North Texas

12:00 AM

Determinants of Information Security Awareness: An Empirical Investigation in Higher Education

Peiqin Zhang, Texas State University
Xun Li, University of North Carolina at Charlotte

12:00 AM

Employee ISP Compliance Intentions: An Empirical Test of Empowerment

Yurita Abdul Talib, Universiti Utara Malaysia
Gurpreet Dhillon, Virginia Commonwealth University

12:00 AM

Guarding Against the Erosion of Competitive Advantage: A Knowledge Leakage Mitigation Model

Atif Ahmad, University of Melbourne
Heidi Tscherning, Deakin University
Rachelle Bosua, University of Melbourne
Rens Scheepers, Deakin University

12:00 AM

How Values Shape Concerns about Privacy for Self and Others

Tawfiq Alashoor, Georgia State University
Mark Keil, Georgia State University
Leigh Liu, Georgia State University
Jeff Smith, Miami University

12:00 AM

Measuring Individuals' Concerns over Collective Privacy on Social Networking Sites

Haiyan Jia, Pennsylvania State University
Heng Xu, Pennsylvania State University

12:00 AM

Network Effects and Data Breaches: Investigating the Impact of Information Sharing and the Cyber Black Market

Michele Maasberg, The University of Texas at San Antonio
Charles Liu, University of Texas at San Antonio

12:00 AM

Perceived Information-Based Vulnerability of Enterprise Information Systems: Concept, Antecedents, and Outcomes

Sarah Träutlein, Technische Universität Darmstadt
Jin Gerlach, Technische Universität Darmstadt

12:00 AM

Securing BYOD: A Study of Framing and Neutralization Effects on Mobile Device Security Policy Compliance

Vanessa Garza, Our Lady of the Lake University
Xiang Guo, Our Lady of the Lake University

12:00 AM

Susceptibility to Social Engineering in Social Networking Sites: The Case of Facebook

Abdullah Algarni, Queensland University of Technology
Yue Xu, Queensland University of Technology
Taizan Chan, Queensland University of Technology

12:00 AM

The Evolution of Privacy Norms: Mapping 35 Years of Technology-Related Privacy Discourse, 1980-2014

Patrick Cichy, RWTH Aachen University
Torsten-Oliver Salge, RWTH Aachen University

12:00 AM

The Privacy Paradox: The Role of Cognitive Absorption in the Social Networking Activity

Tawfiq Alashoor, Georgia State University
Richard Baskerville, Georgia State University

12:00 AM

Top Management Can Lower Resistance toward Information Security Compliance

Mohammad Merhi, Indiana University South Bend
Punit Ahluwalia, University of Texas Pan American

12:00 AM

Understanding Mobile Banking Applications’ Security risks through Blog Mining and the Workflow Technology

Wu He, Old Dominion University
Xin Tian, Old Dominion University
Jiancheng Shen, Old Dominion University
Yaohang Li, Old Dominion University

12:00 AM

Understanding Switching Subscription Behavior in the Context of Campus Emergency Notification Services: An Extended Privacy Calculus Model

Wencui Han, SUNY Buffalo
Raj Sharman, SUNY at Buffalo
Raghav Rao, State University of New York at Buffalo

12:00 AM

Using Conjoint Analysis to Investigate the Value of Interdependent Privacy in Social App Adoption Scenarios

Yu Pu, Pennsylvania State University
Jens Grossklags, Pennsylvania State University

12:00 AM

When Disclosure is Involuntary: Empowering Users with Control to Reduce Concerns

David Wilson, University of Oklahoma
Ryan Schuetzler, University of Nebraska - Omaha
Bradley Dorn, University of Arizona
Jeffrey Proudfoot, Bentley University

12:00 AM