Subscribe to RSS Feed (Opens in New Window)


A Comprehensive Framework for Comparing System Security Assessment Methods

Tianxi Dong
Surya Yadav

A Database-driven Model for Risk Assessment

John Pardue
Jeffrey Landry
Shweta Purawat

A Framework for Examining the Human Side of Anti-Forensic Measures

Jason Nikolai
Yong Wang
Raj Nepali

A Self-Regulatory Approach to Behavioral Compliance with IS Security Policies – “Come on, Baby, do the Locomotion”

Michaela Luecke
Judith Simon

Archetypes to Inform Information Security: The Organization Man and the Innovator

Rahul Singh
Jeffrey Wall
Gurpreet Dhillon

Communication Privacy Management in the Digital Age – Effects of General and Situational Privacy Concerns

Sabrina Hauff
Daniel Veit

Do it OR ELSE! Exploring the Effectiveness of Deterrence on Employee Compliance with Information Security Policies

Sal Aurigemma
Tom Mattson

Effects of IT-Culture Conflict and User Dissatisfaction on Information Security Policy Non-Compliance: A Sensemaking Perspective

Kuo-chung Chang
Yoke May Seow

Information Security & Insider Threats in Small Medical Practices

Nancy Martin
Thomas Imboden

Information Systems Security Training in Organizations: Andragogical Perspective

Patrick Offor
Gurvirender Tejay

Information Technology Security (ITSec): The Effects of SIEM Technology in Monitoring Employee Computer Use

Roberto Sandoval

Insider Espionage: Recognizing Ritualistic Behavior by Abstracting Technical Indicators from Past Cases

Michele Maasberg

News Media Sentiment of Data Breaches

Griselda Sinanaj

Privacy Momentum: A New Contextually Dynamic Conceptualization of Privacy

Caleb Bradberry
Hamid Nemati

Protection Motivation Driven Security Learning

Yi Ding
Peter Meso
Shuting Xu

Putting the ‘Motivation’ in Protection Motivation Theory: An Examination of Persuasive Communication via Extrinsic and Intrinsic Means

Philip Menard

Risks versus Rewards: Understanding the Predictors of Music Piracy

Sandra Vannoy
Dawn Medlin
charlie chen

SocBridge: Bridging the gap between Online Social Networks

Raj Nepali
Yong Wang

The Challenges of Implementing Standards Based Information Security within Family Influenced Firms: A Proposed Research Agenda

James Smith

The Effects of Salience, Deterrence, and Social Influence on Software Piracy: A Proposed Experimental Study

Marton Gergely
V. Rao

The Impact of Computer Monitoring on Policy Compliance: An Agency and Stewardship View

Nirmalee Ratnamalala
Kent Marett

The Role of Punishment and Task Dissonance in Information Security Policies Compliance

Mohammad Merhi
Punit Ahluwalia

Understanding Internet Abuses at Work Using Extended Rational Choice Theory

Han Li
Xin Luo
Jie Zhang
Rathindra Sarathy