Submissions from 2016

PDF

Impact of SNS Diversity and Privacy Concerns on Information Seeking through Smartphones, Mohamed Abdelhamid, Srikanth Venkatesan, Joana Monteiro, and Raj Sharman

PDF

Financial Performance Impacts of Information Security Breaches, Atiya Avery and C Ranganathan

PDF

Contextualising the Insider Threat: A Mixed Method Study, Sean Browne, Dr. Willie Golden, and Michael Lang

PDF

User Archetypes for Effective Information Privacy Communication, Tobias Dehling, Manuel Schmidt-Kraepelin, Muhammed Demircan, Jakub Szefer, and Ali Sunyaev

PDF

Defining Objectives For Securing The Internet Of Things: A Value-Focused Thinking Approach, Gurpreet Dhillon, Lemuria Carter, and Javad Abed

PDF

A Picture vs. 1,000 Words: Threat Visualization and Verbalization in Information Security Fear Appeals, Vanessa Durner

PDF

Stopping Insiders before They Attack: Understanding Motivations and Drivers, Sanjay Goel, Kevin Williams, and Stan Zavoyskiy

PDF

Phishing Training: A Preliminary Look at the Effects of Different Types of Training, Shamya Karumbaiah, Ryan T. Wright, Alexandra Durcikova, and Matthew L. Jensen

PDF

Breaching News: Does Media Coverage Increase the Effects of Data Breach Event Disclosures on Firm Market Value?, Obi Ogbanufe and Atiya Avery

PDF

Going Through the “Emotions”: Identity Protective Responses, Obi Ogbanufe and Robert Pavur

PDF

Too Much of a Good Thing? An Investigation of the Negative Consequences of Information Security in a Healthcare Setting, Azadeh Savoli, Shamel Addas, and Isabelle Fagnot

PDF

Historical Consciousness of Cybersecurity in India, Ramesh Subramanian

PDF

A Maturity Model for Measuring Organizations Escalation Capability of IT-related Security Incidents in Sweden, Gunnar Wahlgren and Stewart Kowalski