Subscribe to RSS Feed

A Conceptual Model for the Development of a National Cybersecurity Index: An Integrated Framework

Kai Koong, University of Texas-Pan American
Manal Yunis, Lebanese American University

A Mask based approach for Lossless Colour Image Steganography.

Abhinash Jha, LNMIIT
Maheshkumar Kolekar, IIT Patna
Apurva Singh, LNMIIT
Sneha Srivastava, LNMIIT

A Security Behavior Model of Employees in Cyberspace

Wu He, Old Dominion University
Ivan Ash, Old Dominion University
Ling Li, Old Dominion University
Li Xu, Old Dominion University
Mohd Anwar, North Carolina A&T State University
Xiaohong Yuan, North Carolina A&T State University

A Study of the Effect of Privacy Assurance Mechanisms on Self-disclosure in Social Networking Sites from the View of Protection Motivation Theory

Dan Kim, University of North Texas
Mohammadreza Mousavizadeh, University of North Texas
Mohammadreza Mousavizadeh, University of North Texas-College of Business

A Theoretical Model for Customizable Learning/Training to Enhance Individuals’ Systems Security Behavior

Yi Ding, Georgia Gwinnett College
Peter Meso, Georgia Gwinnett College
Shuting Xu, Georgia Gwinnett College

Analyzing Information Security Model for Small-Medium Sized Businesses

Yazan Alshboul, Dakota State University
Kevin Streff, Dakota State University

Beyond Security and Privacy Perception: An Approach to Biometric Authentication Perception Change

Dan Kim, University of North Texas
Obi Ogbanufe, University of North Texas

Big Data LifeCycle: Threats and Security Model

Yazan Alshboul, Dakota State University
Raj Nepali, Dakota State University
Yong Wang, Dakota State University

Communication Privacy Management and Self-Disclosure on Social Media - A Case of Facebook

Anitha Chennamaneni, Texas A& M University - Central Texas
Aakash Taneja, Richard Stockton College

Conceptualizing Information Privacy Concern in Low-Income Countries: an Ethiopian Language Instrument for Social Network Sites Context

Salehu Anteneh, Addis Ababa University
France Belanger, Virginia Tech
Berhanu Borena, Addis Ababa University
Dejene Ejigu, Addis Ababa University

Coping with BYOD Security Threat: From Management Perspective

Zhiling Tu, McMaster University
Yufei Yuan, McMaster University

Detecting malicious short URLs on Twitter

Yazan Alshboul, Dakota State University
Raj Nepali, Dakota State University
Yong Wang, Dakota State University

Does Information Sensitivity Make A Difference? Mobile Applications’ Privacy Statements: A Text Mining Approach

Dan Kim, University of North Texas
Mehrdad Koohikamali, University of North Texas

Economics of Cloud Security

Varghese Jacob, University of Texas at Dallas
Srinivasan Raghunathan, University of Texas at Dallas
Mingwen Yang, University of Texas at Dallas

Employees’ Intended Information Security Behaviour in Real Estate Organisations: a Protection Motivation Perspective

Kim-Kwang Raymond Choo, University of South Australia
Alireza Heravi, University of South Australia
Deepa Mani, University of South Australia
Sameera Mubarak, University of South Australia

End-user IT Security Policy Compliance: A Confidence-Building Measures Approach

Emmanuel Ayaburi, The University of Texas at San Antonio

Examining the Role of Privacy in Virtual Migration: The Case of WhatsApp and Threema

Michel Schreiner, Ludwig-Maximilians-Universität München
Thomas Hess, Ludwig-Maximilians-Universität München

Factors Influencing the Adoption of Cloud Incident Handling Strategy: A Preliminary Study in Malaysia

Nurul Hidayah Ab Rahman, University of South Australia
Kim-Kwang Raymond Choo, University of South Australia

Goal Framing as a Persuasive Technique to Promote Safe Behavior in the Domain of Information Security

Glenn Browne, Rawls College of Business Administration, Texas Tech University
Roozmehr Safi, Rawls College of Business Administration, Texas Tech University

Hiding in Plain Sight: Scrubbing Unwanted Information

Charles Wood, Duquesne University

Identifying and measuring the dimensions of risky IT behavior

Arash Negahban, California State University, Chico
John Windsor, University of North Texas

Influence of National Culture on Employees’ Compliance with Information Systems Security (ISS) Policies: Towards ISS Culture in Ethiopian Companies

Tilahun Arage, Addis Ababa University
France Belanger, Virginia Tech
Tibebe Beshah, Addis Ababa University

Information Privacy Assimilation in Organizations – A Neo Institutional Approach

V S Prakash Attili, Infosys
Saji Mathew, IIT Madras
Vijayan Sugumaran, Oakland University

Information Security Investment: Expected Utility Approach with Correlated Information Assets

Sanjaya Mayadunne, Georgia Gwinnett College
SungJune Park, University of North Carolina at Charlotte

Information Security: Modeling the Unconscious Mind

Neale Martin, Sublime Behavior
Humayun Zafar, Kennesaw State University

Information Technology Change and the Effects on User Behavior and Cyber Security

Roberto Sandoval, University of Texas at San Antonio

Job Applicants’ Information Privacy-Protective Response: Exploring the Roles of Technology Readiness and Trust

John Drake, East Carolina University
Dianne Hall, Auburn University
Shiwei Sun, Auburn University
Yichuan Wang, Auburn University

Measuring User Satisfaction with IS Security

Wynne Chin, University of Houston
Reza Vaezi, Kennesaw State University
Reza Vaezi, University of Houston

Mind the Threat! A Qualitative Case Study on Information Security Awareness Programs in European Banks

Stefan Bauer, Vienna University of Economics and Business
Katharina Chudzikowski, University of Bath

Mobile Application Installation Influences: Have Mobile Device Users Become Desensitized to Excessive Permission Requests?

Robert Brookshire, University of South Carolina
Mark Harris, University of South Carolina
Karen Patten, University of South Carolina
Elizabeth Regan, University of South Carolina

NSA Revelations of Privacy Breaches: Do Investors Care?

Timo Cziesla, University of Göttingen
Jan Kemper, University of Göttingen
Jan Muntermann, University of Göttingen
Griselda Sinanaj, University of Göttingen

Perceived Utility as a Motivational Factor in Affecting Users’ Decisions to Download and Install Potentially Spyware-Infected Software

RITESH CHUGH, Central Queensland University
Kenneth Howah, Central Queensland University

Phishing Attacks Over Time: A Longitudinal Study

Albert Harris, Appalachian State University
Dave Yates, University of Denver

Privacy Controls and Disclosure Behavior

Edoardo Airoldi, Harvard University
Hasan Cavusoglu, University of British Columbia
Huseyin Cavusoglu, University of Texas at Dallas
Tuan Phan, National University of Singapore

Privacy Protecting Behavior in Social Network Sites

Claus-Peter H. Ernst, Frankfurt University of Applied Sciences
Jella Pfeiffer, Karlsruhe Institute of Technology (KIT)
Franz Rothlauf, Johannes Gutenberg-Universität Mainz

Privacy Risks in Mobile Dating Apps

Kim-Kwang Raymond Choo, University of South Australia
Jody Farnden, University of South Australia
Ben Martini, University of South Australia

Screening Job Candidates with Social Media: A Manipulation of Disclosure Requests

John Drake, East Carolina University
Christopher Furner, East Carolina University

Securing Supervisory Control and Data Acquisition Systems: Factors and Research Direction

Emmanuel Ayaburi, The University of Texas at San Antonio
Lucia Sobrevinas, The University of Texas at San Antonio

Security Incident Response Criteria: A Practitioner's Perspective

George Grispos, University of Glasgow
William Glisson, University of South Alabama
Tim Storer, University of Glasgow

Societal Factors, Internet Privacy Concerns, and Self-Disclosure: The Case of Social Networking Sites in Saudi Arabia

Tawfiq Alashoor, Georgia State University
Mark Keil, Georgia State University
Mazen Shawosh, King Fahd University of Petroleum and Minerals

State Transgression on Electronic Expression: Is it for Real?

Anjali Kaushik, Management Development Institute
Argha Ray, Tata Consultancy Services

The Impact of Technostress on Users’ Responses to Security Warnings: A NeuroIS Study

Bonnie Anderson, Brigham Young University
David Eargle, University of Pittsburgh
Jeffrey Jenkins, Brigham Young University
Brock Kirwan, Brigham Young University
Tony Vance, Brigham Young University

The Information Privacy Concerns at the Organizational Level: An Exploratory Study in the Bank Sector

Gustavo Montesdioca, Universidade Federal do Rio Grande do Sul (UFRGS)
Marcia Hino, FGV/SP
Antonio Maçada, UFRGS

The Moderating Role of Espoused National Cultural Values on Perceptions of Privacy Assurance Mechanisms

Mirmahdi Darbanhosseiniamirkhiz, Kent State University
Shuyuan Deng, Dakota State University
Dong-Heon Kwak, Kent State University
Greta Polites, Kent State University

The Role of Cognitive Disposition in Deconstructing the Privacy Paradox: A Neuroscience Study

Zareef Mohammed, Nova Southeastern University
Gurvirender Tejay, Nova Southeastern University