Submissions from 2013

PDF

Is Your Susceptibility to Phishing Dependent on Your Memory?, Bonnie Anderson, Anthony Vance, and David Eargle

PDF

Managing Risks in Crowd-Funding Platforms, Alvaro E. Arenas, Manan Podar, and Prasad Dalvi

PDF

End User Information Security Awareness Programs for Improving InformationSecurity in Banking Organizations: Preliminary Results from an Exploratory Study, Stefan Bauer, Edward W.N. Bernroider, and Katharina Chudzikowski

PDF

Contextual Dependencies in Information Systems Security, Peter Bednar, moufida sadok, and Vasilis Katos

PDF

The Role of User Computer Self-Efficacy, Cybersecurity Countermeasures Awareness, and Cybersecurity Skills Influence on Computer Misuse, MinSuk Choi, Yair Levy Ph.D., and Hovav Anat

PDF

Information Systems Security: The Role of Cultural Aspects in Organizational Settings, Lena Connolly and Michael Lang

PDF

How Moral Intensity and Impulsivity Moderate the Influence of Accountability on Access Policy Violations in Information Systems, David Eargle, Anthony Osborn Vance, and Paul Benjamin Lowry

PDF

Cross-border M&A and Information Security Breaches: An Institutional Distance Perspective, Carol Hsu and Tawei Wang

PDF

Information Sharing on Social Networking Sites: the role of perceived control of information and gender, xiaolin lin and Mahmood Hajli

PDF

Standard-Making in Information Security: A Literature Review, Kalle Räisänen

PDF

Investigating the Role of Multibiometric Authentication in Professional Certification E-exams, Garrett Smiley, Yair Levy Ph.D., Nathan Clarke, and Eric Ackerman

PDF

Enforcing Organizational Knowledge Protection: An Investigation of Currently Applied Measures, Stefan Thalmann and Markus Manhart

PDF

Misinformation in Online Health Communities, Srikanth Venkatesan, Wencui Han, Victoria Kisekka, Raj Sharman, Vidyadhar Kudumula, and Hardeep Singh Jaswal

Submissions from 2012

PDF

An Exploration of Security and Privacy Behavior of Elders on the Internet and comparison with Younger Adults, Rajarshi Chakraborthy, Sharmistha Bagchi-Sen, Raghav H. Rao, and Shambhu Upadhyaya

PDF

Nature vs. Nurture: The Genetic Basis of Behavioral Security, Tingting Chung and Dennis Galletta

PDF

Initial Validation and Empirical Development of the Construct of Computer Security Self-Efficacy (CSSE), Marlon Clarke and Yair Levy

PDF

Justifying Breaking the Glass: How Accountability Can Deter Unauthorized Access, David Eargle, Anthony Osborn Vance, Gove Allen, Daniel Barrick, Tyson Bearnson, and Tim Tialin

PDF

Organizational Information Security: The Impact of Employee Attitudes and Social Media Use, Isabelle Fagnot and Scott Paquette

PDF

A Model for Investigating Organizational Impact on Information Security Behavior, Waldo Rocha Flores and Mathias Ekstedt

PDF

Conceptualization of Constructs for Shaping Information Security Behavior: Towards a Measurement Instrument, Waldo Rocha Flores and Matus Korman

PDF

IDS Alarms Investigation with Limited Resources, Jatinder N.D. Gupta, Ezhil Kalaimannan, and Ravi Patnayakuni

PDF

A Framework for Enabling Privacy Preserving Analysis of Graph Properties in Distributed Graphs, Xiaoyun He

PDF

Dynamic Security of Virtualized Systems: An Analysis of Time-based Impact, Jerald Hughes, Manal M. Yunis, and Joseph Roge’

PDF

The Role of Formal and Social Control in Information Security Behaviors, Yu Wen Hung, Jack Shih-Chieh Hsu, and Sheng-Pao Shih

PDF

Information Security Policy Development Through the Lens of the Institutional Analysis and Development Framework, Susan M. Jones and Katherine M. Chudoba

PDF

Exploring Employees’ Escalating Behavior as an Antecedent of Information Security Policy Noncompliance Behaviour, Miranda Kajtazi

PDF

Online Privacy Concerns And Legal Assurance: A User Perspective, Hanna Krasnova and Paula Kift

PDF

Towards Better Understanding Cybersecurity: or are "Cyberspace" and "Cyber Space" the Same?, Stuart Madnick, Nazli Choucri, Steven Camiña, and Wei Lee Woon

PDF

Examining the Coping Appraisal Process in End User Security, Kent Marett and Nirmalee Ratnamalala

PDF

Assessing Relative Weights of Authentication Components: An Expert Panel Approach, Herbert J. Mattord, Yair Levy, and Steven Furnell

PDF

Toward Better Decisions With Respect To Is Security: Integrating Mindfulness Into IS Security Training, James L. Parrish and Tonia San Nicolas-Rocca

PDF

Sharing Personal Health Information via Health Information Exchanges: A Conceptual Model of Patient Willingness, John C. Pendergrass

PDF

Leaking Corporate Electronic Information and Employees’ Happiness: Is There a Connection?, Michelle M. Ramim

PDF

Market Failure Mechanisms in Cybersecurity, Jean-Loup Richet

PDF

A Structured Approach to Effective Access Control List Tuning, Jordan Shropshire and Art Gowan

PDF

A Reading Preference and Risk Taxonomy for Printed Proprietary Information Compromise in the Aerospace and Defense Industry, Joshua D. Stalker, Yair Levy, Yoram Eshet, and James L. Parrish

PDF

CollabSec: A Multi-Player Game for Researching and Teaching Information System Risk Assessment, Douglas Twitchell, Christie M. Fuller, David Biros, and Kent Marett

PDF

An Activity Theory Approach to Leak Detection and Mitigation in Personal Health Information (PHI), Rohit Valecha, Shambhu Upadhyaya, Raghav Rao, and Arun Keepanasseril

PDF

Impact of Protection Motivation and Deterrence on IS Security Policy Compliance: A Multi-Cultural View, Merrill Warkentin, Nirmalee Malimage, and Kalana Malimage

PDF

What Shapes Information System Misuse Intention? The Role of Leadership Style and Perceived Organizational Justice, JungA Youn, Frida F. Putri, and Hovav Anat