Subscribe to RSS Feed (Opens in New Window)
A Conceptual Model for the Development of a National Cybersecurity Index: An Integrated Framework Kai Koong, University of Texas-Pan American |
|
A Mask based approach for Lossless Colour Image Steganography. Abhinash Jha, LNMIIT |
|
A Security Behavior Model of Employees in Cyberspace Wu He, Old Dominion University |
|
Dan Kim, University of North Texas |
|
Yi Ding, Georgia Gwinnett College |
|
Analyzing Information Security Model for Small-Medium Sized Businesses Yazan Alshboul, Dakota State University |
|
Beyond Security and Privacy Perception: An Approach to Biometric Authentication Perception Change Dan Kim, University of North Texas |
|
Big Data LifeCycle: Threats and Security Model Yazan Alshboul, Dakota State University |
|
Communication Privacy Management and Self-Disclosure on Social Media - A Case of Facebook Anitha Chennamaneni, Texas A& M University - Central Texas |
|
Salehu Anteneh, Addis Ababa University |
|
Coping with BYOD Security Threat: From Management Perspective Zhiling Tu, McMaster University |
|
Detecting malicious short URLs on Twitter Yazan Alshboul, Dakota State University |
|
Dan Kim, University of North Texas |
|
Varghese Jacob, University of Texas at Dallas |
|
Kim-Kwang Raymond Choo, University of South Australia |
|
End-user IT Security Policy Compliance: A Confidence-Building Measures Approach Emmanuel Ayaburi, The University of Texas at San Antonio |
|
Examining the Role of Privacy in Virtual Migration: The Case of WhatsApp and Threema Michel Schreiner, Ludwig-Maximilians-Universität München |
|
Nurul Hidayah Ab Rahman, University of South Australia |
|
Glenn Browne, Rawls College of Business Administration, Texas Tech University |
|
Hiding in Plain Sight: Scrubbing Unwanted Information Charles Wood, Duquesne University |
|
Identifying and measuring the dimensions of risky IT behavior Arash Negahban, California State University, Chico |
|
Tilahun Arage, Addis Ababa University |
|
Information Privacy Assimilation in Organizations – A Neo Institutional Approach V S Prakash Attili, Infosys |
|
Information Security Investment: Expected Utility Approach with Correlated Information Assets Sanjaya Mayadunne, Georgia Gwinnett College |
|
Information Security: Modeling the Unconscious Mind Neale Martin, Sublime Behavior |
|
Information Technology Change and the Effects on User Behavior and Cyber Security Roberto Sandoval, University of Texas at San Antonio |
|
John Drake, East Carolina University |
|
Measuring User Satisfaction with IS Security Wynne Chin, University of Houston |
|
Stefan Bauer, Vienna University of Economics and Business |
|
Robert Brookshire, University of South Carolina |
|
NSA Revelations of Privacy Breaches: Do Investors Care? Timo Cziesla, University of Göttingen |
|
RITESH CHUGH, Central Queensland University |
|
Phishing Attacks Over Time: A Longitudinal Study Albert Harris, Appalachian State University |
|
Privacy Controls and Disclosure Behavior Edoardo Airoldi, Harvard University |
|
Privacy Protecting Behavior in Social Network Sites Claus-Peter H. Ernst, Frankfurt University of Applied Sciences |
|
Privacy Risks in Mobile Dating Apps Kim-Kwang Raymond Choo, University of South Australia |
|
Screening Job Candidates with Social Media: A Manipulation of Disclosure Requests John Drake, East Carolina University |
|
Securing Supervisory Control and Data Acquisition Systems: Factors and Research Direction Emmanuel Ayaburi, The University of Texas at San Antonio |
|
Security Incident Response Criteria: A Practitioner's Perspective George Grispos, University of Glasgow |
|
Tawfiq Alashoor, Georgia State University |
|
State Transgression on Electronic Expression: Is it for Real? Anjali Kaushik, Management Development Institute |
|
The Impact of Technostress on Users’ Responses to Security Warnings: A NeuroIS Study Bonnie Anderson, Brigham Young University |
|
Gustavo Montesdioca, Universidade Federal do Rio Grande do Sul (UFRGS) |
|
Mirmahdi Darbanhosseiniamirkhiz, Kent State University |
|
The Role of Cognitive Disposition in Deconstructing the Privacy Paradox: A Neuroscience Study Zareef Mohammed, Nova Southeastern University |