Subscribe to RSS Feed (Opens in New Window)
2016 | ||
Thursday, August 11th | ||
12:00 AM |
Jie Zhang, The University of Texas at Arlington 12:00 AM |
|
---|---|---|
12:00 AM |
A Distributed Security Model for Cloud Computing Alan Litchfield, Auckland University of Technology 12:00 AM |
|
12:00 AM |
A Review of Measures of Disclosure Outcomes in the IS Privacy Literature Tawfiq Alashoor, Georgia State University 12:00 AM |
|
12:00 AM |
An Examination of the Calibration and Resolution Skills in Phishing Email Detection Yuan Li, Columbia College 12:00 AM |
|
12:00 AM |
An Exploratory Analysis in Android Malware Trends Chelsea Hicks, University of Texas at San Antonio 12:00 AM |
|
12:00 AM |
Baidyanath Biswas, Indian Institute of Management Lucknow 12:00 AM |
|
12:00 AM |
Yong Chen, Old Dominion University 12:00 AM |
|
12:00 AM |
Collaborative Filtering on the Blockchain: A Secure Recommender System for e-Commerce Remo Frey, Eidgenossische Technische Hochschule Zurich Departement Management Technologie und Okonomie 12:00 AM |
|
12:00 AM |
Concern for Privacy of Self and Others: Sharing Behavior, and Engagement Mehrdad Koohikamali, University of North Texas 12:00 AM |
|
12:00 AM |
Continuous Secure Behavior from Process Memory Model Perspective Ali Vedadi, Mississippi State University 12:00 AM |
|
12:00 AM |
Dinesh Reddy, UTSA 12:00 AM |
|
12:00 AM |
Cybersecurity: Role of Behavioral Training in Healthcare Humayun Zafar, Kennesaw State University 12:00 AM |
|
12:00 AM |
Effects of Information Privacy Policies on Customers’ Willingness to transact with Online Vendors Joseph Mollick, Texas A&M University Corpus Christi College of Business 12:00 AM |
|
12:00 AM |
Extending Web Mining to Digital Forensics Text Mining Chelsea Hicks, University of Texas at San Antonio 12:00 AM |
|
12:00 AM |
Factors Influencing Emotional Attachment to Social Network Apps Mehrdad Koohikamali, University of North Texas 12:00 AM |
|
12:00 AM |
Family Work Conflict and Information Security Policy Compliance—An Empirical Study peng zhang, Florida International University 12:00 AM |
|
12:00 AM |
Formulating Methodology to Build a Trust Framework for Cloud Identity Management brian cusack, AUT University 12:00 AM |
|
12:00 AM |
Dinesh Reddy, UTSA 12:00 AM |
|
12:00 AM |
Information Privacy-Protection Practices and User Continuance Ye Han, Louisiana Tech University 12:00 AM |
|
12:00 AM |
Information Security Training Customized by Risk Profile Shuting Xu, Georgia Gwinnett College 12:00 AM |
|
12:00 AM |
Integrating Facial Cues of Threat into Security Warnings – An fMRI and Field Study David Eargle, University of Pittsburgh 12:00 AM |
|
12:00 AM |
Gaurav Bansal, University of Wisconsin - Green Bay 12:00 AM |
|
12:00 AM |
Javad Abed, Virginia Commonwealth University 12:00 AM |
|
12:00 AM |
IT GOVERNANCE FRAMEWORK: ONE SIZE FITS ALL? Hwee-Joo Kam, Ferris State University 12:00 AM |
|
12:00 AM |
Management of Digital Evidence: Body Worn Camera Use by Law Enforcement Agents Jaeung Lee, The State University of New York at buffalo 12:00 AM |
|
12:00 AM |
Next Generation Aircraft Architecture and Digital Forensic Dustin Mink, University of South Alabama 12:00 AM |
|
12:00 AM |
Priming Security Behavior: A Study Based on Self-Concept Maintenance Theory Nic DePaula, University at Albany State University of New York 12:00 AM |
|
12:00 AM |
Privacy Management Strategies: An Exploratory Cluster Analysis Nancy Lankton, Marshall University 12:00 AM |
|
12:00 AM |
Privacy Rules: Approach in the Label or Textual Format Sergio Zorzo, Universidade Federal de São Carlos 12:00 AM |
|
12:00 AM |
Proposing SETA Program Design Based on Employee Motivational Fit Philip Menard, University of South Alabama 12:00 AM |
|
12:00 AM |
Azadeh Sarkheyli, Lund Universitet Ekonomihogskolan 12:00 AM |
|
12:00 AM |
Response to the Office of Personnel Management Data Breaches: A Conceptual Exploration Rui Chen, Ball State University 12:00 AM |
|
12:00 AM |
Security Risks Related to Employee “Extra-Role” Creation of an “Online-persona” Ruby Booth, University of Memphis 12:00 AM |
|
12:00 AM |
Taxonomy of Malicious Insiders: A Proof of Concept Study Nan(Peter) Liang, Oklahoma State University 12:00 AM |
|
12:00 AM |
Dheyaaldin Alsalman, Dakota State University 12:00 AM |
|
12:00 AM |
Top Manager’s Perspectives on Cyberinsurance Risk Management for Reducing Cybersecurity Risks Obi Ogbanufe, University of North Texas 12:00 AM |
|
12:00 AM |
Mohamed Alaskar, University of Wollongong in Dubai 12:00 AM |
|
12:00 AM |
Understanding Cyber Security Perceptions Related to Information Risk in a Healthcare Setting Derek Sedlack, South University / Nova Southeastern University 12:00 AM |
|
12:00 AM |
Understanding the Privacy Issue in the Digital Age: An Expert Perspective Tawfiq Alashoor, Georgia State University 12:00 AM |
|
12:00 AM |
Using Trace Ethnography to Compare Perceived Cyber-Threats of IT to Non-IT Professionals Hsia-Ching Chang, University of North Texas 12:00 AM |
|
12:00 AM |
What Interrupts Intention to Comply with IS-Security Policy? Chris Merritt, Virginia Commonwealth University 12:00 AM |