Submissions from 2011
INFORMATION SECURITY BEHAVIOR: FACTORS AND RESEARCH DIRECTIONS, Sherly Abraham
The Role of Conflict Resolution in Designing and Implementing Information Security Policies: An Institutional Perspective, Sherly Abraham and Indushobha Chengalur-Smith
The Development of a Graduate Curriculum for Software Assurance, Mark Ardis and Nancy R. Mead
Towards a Managerial Decision Framework for Utilization of Cyber Insurance Instruments in IT security, Tridib Bandyopadhyay and Snehal Shidore
Understanding the Security in Privacy-Security Concerns: A Theoretical and Empirical Examination, Gaurav Bansal
Consumer Risk: The Importance of Privacy and Security while Connected to Wi-Fi Hotspots: Does Location Matter?, Patrick Curry
Threat Modeling the Cloud Computing, Mobile Device Toting, Consumerized Enterprise – an overview of considerations, Jeffrey A. Ingalsbe, Dan Shoemaker, and Nancy R. Mead
The Surprising Lack of Effect of Privacy Concerns on Intention to Use Online Social Networks, Eun Ju Jung, D. Harrison McKnight, Euisung Jung, and Nancy K. Lankton
Are All Commercial Websites Created Equal? Web Vendor Reputation and Security on Third Party Payment Use, Ruth C. King and Richard A. M. Schilhavy
Misinformation in Healthcare Social Networks: Contributing Factors, Victoria Kisekka, Raj Sharman, Ranjit Singh, and Gurdev Singh
Exploring the Influences of Implementation Intention on Information Security Behaviors, Gen-Yih Liao and Chia-Min Wang
Developing a Dichotomy of Information Privacy Concerns, Yuan Li
EFFECTS OF DEVELOPER COGNITIVE STYLE AND MOTIVATIONS ON INFORMATION SECURITY POLICY COMPLIANCE, Lakshman Mahadevan, Judith C. Simon, and Thomas O. Meservy
Model Driven Information Security Management - Evaluating and Applying the Meta Model of ISO 27001, Danijel Milicevic and Matthias Goeken
Software Compliance: The factors impacting compliance, René Moquin
The Economic Effect of Privacy Breach Announcements on Stocks: A Comprehensive Empirical Investigation, Aurelia Nicholas-Donald, Jesus Francisco Matus, SeungEui Ryu, and Adam M. Mahmood
Ethical Decision-Making in e-Learning: A Socio-technical Analysis of Informal Security Controls, Richelle L. Oakley and Rahul Singh
Differentiating Privacy and Security: A Content Analysis of B2C Websites, Marie Caroline Oetzel and Barbara Krumay
Healthcare Information Privacy Research: Iusses, Gaps and What Next?, Rachida Parks, Chao-Hsien Chu, and Heng Xu
Identity Theft and Used Gaming Consoles: Recovering Personal Information from Xbox 360 Hard Drives, Dr. Asley L. Podhradsky, Dr. Rob D'Ovidio, and Cindy Casey
ONLINE DISCLOSURE AND PRIVACY CONCERNS: A STUDY OF MOROCCAN AND AMERICAN FACEBOOK USERS, Natasha F. Veltri, Hanna Krasnova, and Wafa Elgarah
The Role of Perceptions of Organizational Injustice and Techniques of Neutralization in Forming Computer Abuse Intentions, Merrill Warkentin, Robert Willison, and Allen C. Johnston
Critical Success Factors for an Effective Security Risk Management Program: An Exploratory Case Study at a Fortune 500 Firm, Humayun Zafar, Jan G. Clark, Myung Ko, and Yoris A. Au
Designing Security Requirements – A Flexible, Balanced, and Threshold-Based Approach, Yanjun Zuo