Subscribe to RSS Feed (Opens in New Window)
A Conceptual Examination of Distrusting Beliefs in Older Adults about the Internet Rajarshi Chakraborthy, University at Buffalo |
|
Andrew Green, Kennesaw State University |
|
An Information Security Model and its Validation Joobin Choobineh, Texas A & M University - College Station |
|
Jeffrey D. Wall, University of North Carolina at Greensboro |
|
Comprehensive Access Control for Data Warehouses Long Flory Mrs., VIRGINIA COMMONWEALTH UNIVERSITY |
|
Connecting to Unfamiliar Wi-Fi Hotspots - A Risk Taking Perspective Hoon Seok Choi, University of Texas at San Antonio |
|
Jeffrey D. Wall, University of North Carolina at Greensboro |
|
Examining Personal Information Privacy-Protective Responses (IPPR) with the Use of Smart Devices Minoo Modaresnezhad, University of North Carolina at Greensboro |
|
Eye Gazing Behaviors in Online Deception Jinie Pak, University of Maryland Baltimore County |
|
Factors of Password-based Authentication Herbert J. Mattord, Kennesaw State University |
|
Information Security Policies Compliance: The Role of Organizational Punishment Mohammad I. Merhi, University of Texas - Pan American |
|
Schools of Thought in Software Piracy Research Marton Gergely, The University of Texas at San Antonio |
|
Tatiana Ermakova, Technical University of Berlin |
|
Social Networks and Information Privacy: A Model for Low-income Countries Berhanu Borena Kelecha Mr., Addis Ababa University |
|
The Efficacy of IS Security and Privacy Governance Structures Minoo Modaresnezhad |
|
The Impact of Security and Privacy Concerns on Home Internet Use by Parents and Children James N. Morgan, Northern Arizona University |