A Conceptual Examination of Distrusting Beliefs in Older Adults about the Internet Rajarshi Chakraborthy, University at Buffalo |
||
Andrew Green, Kennesaw State University |
||
An Information Security Model and its Validation Joobin Choobineh, Texas A & M University - College Station |
||
Jeffrey D. Wall, University of North Carolina at Greensboro |
||
Comprehensive Access Control for Data Warehouses Long Flory Mrs., VIRGINIA COMMONWEALTH UNIVERSITY |
||
Connecting to Unfamiliar Wi-Fi Hotspots - A Risk Taking Perspective Hoon Seok Choi, University of Texas at San Antonio |
||
Jeffrey D. Wall, University of North Carolina at Greensboro |
||
Examining Personal Information Privacy-Protective Responses (IPPR) with the Use of Smart Devices Minoo Modaresnezhad, University of North Carolina at Greensboro |
||
Eye Gazing Behaviors in Online Deception Jinie Pak, University of Maryland Baltimore County |
||
Factors of Password-based Authentication Herbert J. Mattord, Kennesaw State University |
||
Information Security Policies Compliance: The Role of Organizational Punishment Mohammad I. Merhi, University of Texas - Pan American |
||
Schools of Thought in Software Piracy Research Marton Gergely, The University of Texas at San Antonio |
||
Tatiana Ermakova, Technical University of Berlin |
||
Social Networks and Information Privacy: A Model for Low-income Countries Berhanu Borena Kelecha Mr., Addis Ababa University |
||
The Efficacy of IS Security and Privacy Governance Structures Minoo Modaresnezhad |
||
The Impact of Security and Privacy Concerns on Home Internet Use by Parents and Children James N. Morgan, Northern Arizona University |