Browse the AMCIS 2012 proceedings:

Subscribe to RSS Feed

A Global Perspective of Privacy Protection Practices

Noushin Ashrafi, Boston, MA, United States.
Jean-Pierre Kuilboer, Management Science and Information Systems, University of Massachusetts Boston, Boston, MA, United States.

A Preliminary Taxonomy for Software Failure Impact

Simone Krug, Information Systems, University of Mannheim, Mannheim, Ba-Wue, Germany.
Robert Nickerson, College of Business, San Francisco State University, State University, CA, United States.
Hugo Campidelli, Information Systems, University of Mannheim, Mannheim, Ba-Wue, Germany.

A Secure Cloud Internetwork Model with Economic and Social Incentives (SCIMES)

Alan Rea, Western Michigan University, Kalamazoo, MI, United States.
Xiaojun Cao, Georgia State University, Atlanta, GA, United States.
Aparna Gupta, Rensselaer Polytechnic Institute, Troy, NY, United States.
Nirmala Shenoy, Rochester Institute of Technology, Rochester, NY, United States.

An Examination of the Success of Post-merger IT Integration

Meng-Hsien Lin, Management of Information Systems, National Chengchi University, Taipei City,
Shari Shang, Management of Information Systems, National Chengchi University, Taipei City,

An RFID Survivability Impact Model in the Military Domain

Joseph Julik, University of North Dakota, Grand Forks, ND, United States.
Yanjun Zuo, University of North Dakota, Grand Forks, ND, United States.

Better Safe than Sorry: A Conceptual Framework for the Use of the Cloud

Olajumoke Azogu, University of North Texas, Denton, TX, United States.
Sherry Ryan, ITDS, University of North Texas, Denton, TX, United States.

Browser Update Practices in Households: Insights from Protection Motivation Theory and Customer Satisfaction

Srikar Velichety, Management Information Systems, University of Arizona, Tucson, AZ, United States.
Alexandra Durcikova, The University of Arizona, Tucson, United States.

Cloud Computing in the Financial Industry – A Road Paved with Security Pitfalls?

Ulrich Lampe, Technische Universität Darmstadt, Darmstadt, Germany.
Olga Wenge, Technische Universität Darmstadt, Darmstadt, Germany.
Alexander Müller, Technische Universität Darmstadt, Darmstadt, Germany.
Ralf Schaarschmidt, IBM Global Business Services, Frankfurt am Main, Germany.

Conceptualizing Data Security Threats and Countermeasures in the E-Discovery Process with Misuse Cases

Janine Spears, College of Computing and Digital Media, DePaul University, Chicago, IL, United States.

Database Intrusion Detection: Defending Against the Insider Threat

Kevin Barton, Computer Information Systems and Security, Our Lady of the Lake University, San Antonio, TX, United States.

Exploring Organizational Human Resource Information System Security

Humayun Zafar, Computer Science and Information Systems, Kennesaw State University, Kennesaw, GA, United States.

"Heading for the Clouds?" Implications for Cloud Computing Adopters

Norah Abokhodair, Information School, University of Washington, Seattle, WA, United States.
Hazel Taylor, Information School, University of Washington, Seattle, WA, United States.
Jitsuko Hasegawa, Information School, University of Washington, Seattle, WA, United States.
Surry Jones Mowery, Information School, University of Washington, Seattle, WA, United States.

Information Security Management: A System Dynamics Approach

Derek Nazareth, University of Wisconsin Milwaukee, Milwaukee, WI, United States.
Jae Choi, Computer Information Systems, Alabama State University, Montgomery, AL, United States.

Information Security Policy Compliance: The Role of Information Security Awareness

Ahmad Al-Omari, College of Business and Information Systems, Dakota State University, Madison, SD, United States.
Omar El-Gayar, College of Business and Information Systems, Dakota State University, Madison, SD, United States.
Amit Deokar, College of Business and Information Systems, Dakota State University, Madison, SD, United States.

Information Security Strategy: In Search of a Role

Roger Seeholzer, Computer Studies, University of Maryland University College Europe, APO, United States.

Instant Messaging privacy in the clouds

Lizbeth Granda Paredes, Departamento de Computação, Universidad Federal de São Carlos, São Carlos, São Paulo, Brazil.
Sergio Donizetti Zorzo, Departamento de Computação, Universidade Federal de São Carlos, São Carlos, São Paulo, Brazil.

Matrix Passwords: A Proposed Methodology of Password Authentication

Xiao Zhang, Systems and Tchnology Management, University of Texas at San Antonio, San Antonio, TX, United States.
Jan Clark, Systems and Tchnology Management, University of Texas at San Antonio, San Antonio, TX, United States.

Offshored Data Privacy: Determining the Factors and their relative Effect

Anupam Nath, Business Admin, Elizabeth City State University, Elizabeth City, NC, United States.
Azam Bejou, Business Admin, Elizabeth City State University, Elizabeth City, NC, United States.

Password Policy Effects on Entropy and Recall: Research in Progress

Jim Marquardson, Center for the Management of Information, University of Arizona, Tucson, AZ, United States.

Perceived Privacy Breach – the Construct, the Scale, and its Antecedents

Altaf Ahmad, Information Systems, Arizona State University, Tempe, AZ, United States.
Peter Mykytyn, Department of Management, Southern Illinois University Carbondale, Carbondale, IL, United States.

Prospect Theory and Information Security Investment Decisions

Diana Young, Information Systems, University of Texas at San Antonio, San Antonio, TX, United States.
Nicole Beebe, Information Systems & Technology Management, The University of Texas at San Antonio, San Antonio, TX, United States.
Frederick Chang, Information Systems & Technology Management, The University of Texas at San Antonio, San Antonio, TX, United States.

Security Risk Management Can Be Investigated! Presenting the Relation Between Research Rigor and an Effective Study

Humayun Zafar, Department of Information Systems, Kennesaw State University, Kennesaw, GA, United States.
Jan Clark, Information Systems and Cyber Security, University of Texas at San Antonio, San Antonio, TX, United States.
Myung Ko, Information Systems and Cyber Security, University of Texas at San Antonio, San Antonio, TX, United States.

SOCIAL COMMERCE: THE ROLE OF TRUST

Mahmood Hajli, Birkbeck, University of London, london, United Kingdom.

The Dark Side of Leadership in Information Systems Security: A Model of the Effect of Manager Transgressions on Employee Security Behaviors

Jeffrey Wall, Information Systems and Operations Management, University of North Carolina--Greensboro, Greensboro, NC, United States.
Lakshmi Iyer, ISOM, The University of North Carolina at Greensboro, Greensboro, NC, United States.

The Influence of Technology Characteristics on Privacy Calculus: A Theoretical Framework

Mohammad Najjar, University of Memphis, Memphis, TN, United States.
Son Bui, University of Memphis, Memphis, TN, United States.

The Quest for Complete Security Protection: An Empirical Analysis of an Individual’s 360 Degree Protection from File and Data Loss

Robert Crossler, Department of Management and Information Systems, Mississippi State University, Mississippi State, MS, United States.
F Belanger, Virginia Tech, Blacksburg, VA, United States.

The Role of Individual Characteristics on Insider Abuse Intentions

Merrill Warkentin, Mgmt & Information Systems, Mississippi State University, Mississippi State, MS, United States.
Maranda McBride, North Carolina A&T State University, Greensboro, NC, United States.
Lemuria Carter, School of Business and Economics, North Carolina A&T State University, Greensboro, NC, United States.
Allen Johnston, University of Alabama Birmingham, Birmingham, AL, United States.

The Role of Situation Awareness in Detecting Criminal Intrusions: A Different Perspective on Information Security Awareness

Bartlomiej Hanus, Information Technology & Decision Sciences, University of North Texas, Denton, TX, United States.
Yu Wu, ITDS, University of North Texas, Denton, TX, United States.

Using Domain Knowledge to Facilitate Cyber Security Analysis

Peng He, Information Systems, UMBC, Baltimore, MD, United States.
Lina Zhou, Information Systems, UMBC, Baltimore, MD, United States.
George Karabatis, Information Systems, UMBC, Baltimore, MD, United States.