Schedule

Subscribe to RSS Feed

2016
Thursday, August 11th
12:00 AM

A Comparative Analysis of Univariate Time Series Methods for Estimating and Forecasting Daily Spam in United States

Jie Zhang, The University of Texas at Arlington
Gene Lee, The University of Texas at Arlington
Jingguo Wang, The University of Texas at Arlington

12:00 AM

A Distributed Security Model for Cloud Computing

Alan Litchfield, Auckland University of Technology
Monjur Ahmed, Auckland University of Technology
Chandan Sharma, Auckland University of Technology

12:00 AM

A Review of Measures of Disclosure Outcomes in the IS Privacy Literature

Tawfiq Alashoor, Georgia State University
Lisa Lambert, Georgia State University
Samira Farivar, McMaster University

12:00 AM

An Examination of the Calibration and Resolution Skills in Phishing Email Detection

Yuan Li, Columbia College
Jingguo Wang, The University of Texas at Arlington
Raghav Rao, SUNY-Buffalo

12:00 AM

An Exploratory Analysis in Android Malware Trends

Chelsea Hicks, University of Texas at San Antonio
Glenn Dietrich, University of Texas at San Antonio

12:00 AM

AVICS-Eco Framework: An Approach to Attack Prediction and Vulnerability Assessment in a Cyber Ecosystem

Baidyanath Biswas, Indian Institute of Management Lucknow
Shounak Pal, Indian Institute of Management Lucknow
Arunabha Mukhopadhyay, Indian Institute of Management Lucknow

12:00 AM

Can cross-listing mitigate the impact of an information security breach announcement on a firm’s values?

Yong Chen, Old Dominion University
Feng Dong, Old Dominion University
Hong Chen, Old Dominion University

12:00 AM

Collaborative Filtering on the Blockchain: A Secure Recommender System for e-Commerce

Remo Frey, Eidgenossische Technische Hochschule Zurich Departement Management Technologie und Okonomie
Dominic Wörner, Massachusetts Institute of Technology Media Lab
Alexander Ilic, University of St. Gallen

12:00 AM

Concern for Privacy of Self and Others: Sharing Behavior, and Engagement

Mehrdad Koohikamali, University of North Texas
Natalie Gerhart, University of North Texas

12:00 AM

Continuous Secure Behavior from Process Memory Model Perspective

Ali Vedadi, Mississippi State University

12:00 AM

Cybersecurity Skills: The Moderating Role in the Relationship between Cybersecurity Awareness and Compliance

Dinesh Reddy, UTSA
V. Rao, The University of Texas at San Antonio

12:00 AM

Cybersecurity: Role of Behavioral Training in Healthcare

Humayun Zafar, Kennesaw State University

12:00 AM

Effects of Information Privacy Policies on Customers’ Willingness to transact with Online Vendors

Joseph Mollick, Texas A&M University Corpus Christi College of Business

12:00 AM

Extending Web Mining to Digital Forensics Text Mining

Chelsea Hicks, University of Texas at San Antonio
Nicole Beebe, The University of Texas at San Antonio
Brandi Haliscak, University of Texas at San Antonio

12:00 AM

Factors Influencing Emotional Attachment to Social Network Apps

Mehrdad Koohikamali, University of North Texas
Dan Kim, University of North Texas

12:00 AM

Family Work Conflict and Information Security Policy Compliance—An Empirical Study

peng zhang, Florida International University
Jingguo Wang, The University of Texas at Arlington

12:00 AM

Formulating Methodology to Build a Trust Framework for Cloud Identity Management

brian cusack, AUT University
Eghbal Ghazizadeh, AUT University

12:00 AM

Identifying Multiple Categories of Cybersecurity Skills that Affect User Acceptance of Protective Information Technologies.

Dinesh Reddy, UTSA
Glenn Dietrich, University of Texas at San Antonio

12:00 AM

Information Privacy-Protection Practices and User Continuance

Ye Han, Louisiana Tech University
Selwyn Ellis, Louisiana Tech University

12:00 AM

Information Security Training Customized by Risk Profile

Shuting Xu, Georgia Gwinnett College
Peter Meso, Georgia Gwinnett College
Yi Ding, Georgia Gwinnett College

12:00 AM

Integrating Facial Cues of Threat into Security Warnings – An fMRI and Field Study

David Eargle, University of Pittsburgh
Dennis Galletta, University of Pittsburgh
Brock Kirwan, Brigham Young University
Anthony Vance, Georgia State University
Jeffrey Jenkins, Brigham Young University

12:00 AM

Interaction Effect of Gender and Neutralization Techniques on Information Security Policy Compliance: An Ethical Perspective

Gaurav Bansal, University of Wisconsin - Green Bay
Soo Il Shin, University of Wisconsin - Green Bay

12:00 AM

Investigating Continuous Security Compliance Behavior: Insights from Information Systems Continuance Model

Javad Abed, Virginia Commonwealth University
Gurpreet Dhillon, Virginia Commonwealth University
Sevgi Ozkan, Orta Dogu Teknik Universitesi

12:00 AM

IT GOVERNANCE FRAMEWORK: ONE SIZE FITS ALL?

Hwee-Joo Kam, Ferris State University
Pairin Katerattanakul, Western Michigan University
SoonGoo Hong, Dong-A University

12:00 AM

Management of Digital Evidence: Body Worn Camera Use by Law Enforcement Agents

Jaeung Lee, The State University of New York at buffalo
Jingguo Wang, The University of Texas at Arlington
Gerald Cliff, National White Collar Crime Center
H. Raghav Rao, The University of Texas at San Antonio

12:00 AM

Next Generation Aircraft Architecture and Digital Forensic

Dustin Mink, University of South Alabama
Alec Yasinsac, University of South Alabama
Kim-Kwang Raymond Choo, University of South Australia
William Glisson, University of South Alabama

12:00 AM

Priming Security Behavior: A Study Based on Self-Concept Maintenance Theory

Nic DePaula, University at Albany State University of New York
Sanjay Goel, University at Albany, SUNY

12:00 AM

Privacy Management Strategies: An Exploratory Cluster Analysis

Nancy Lankton, Marshall University
D. McKnight, Michigan State University
John Tripp, Baylor University

12:00 AM

Privacy Rules: Approach in the Label or Textual Format

Sergio Zorzo, Universidade Federal de São Carlos
Diego Pontes, Universidade Federal de Sao Carlos
Jose Mello, Universidade Federal de São Carlos
Diego Dias, Universidade Federal de São Carlos

12:00 AM

Proposing SETA Program Design Based on Employee Motivational Fit

Philip Menard, University of South Alabama

12:00 AM

Relationship between Knowledge Sharing Security and Organizational Context in the Public and Private Organizations

Azadeh Sarkheyli, Lund Universitet Ekonomihogskolan

12:00 AM

Response to the Office of Personnel Management Data Breaches: A Conceptual Exploration

Rui Chen, Ball State University
H. R. Rao, University of Texas at San Antonio
Roht Valecha, University of Texas at San Antonio

12:00 AM

Security Risks Related to Employee “Extra-Role” Creation of an “Online-persona”

Ruby Booth, University of Memphis
Sandra Richardson, University of Memphis
Judith Simon, University of Memphis

12:00 AM

Taxonomy of Malicious Insiders: A Proof of Concept Study

Nan(Peter) Liang, Oklahoma State University
David Biros, Oklahoma State University
Andy Luse, Oklahoma State University Stillwater

12:00 AM

The Effect of Using WLANs on Data Breaches: The Examination of the Moderating Role of Meaningful-Use Attestation

Dheyaaldin Alsalman, Dakota State University
Insu Park, Dakota State University

12:00 AM

Top Manager’s Perspectives on Cyberinsurance Risk Management for Reducing Cybersecurity Risks

Obi Ogbanufe, University of North Texas
Dan Kim, University of North Texas
Hassan Takabi, University of North Texas

12:00 AM

Understanding Bring Your Own Device (BYOD) and Employee Information Security Behaviors from A Work-Life Domain Perspective

Mohamed Alaskar, University of Wollongong in Dubai
Kathy Ning Shen, University of Wollongong in Dubai

12:00 AM

Understanding Cyber Security Perceptions Related to Information Risk in a Healthcare Setting

Derek Sedlack, South University / Nova Southeastern University

12:00 AM

Understanding the Privacy Issue in the Digital Age: An Expert Perspective

Tawfiq Alashoor, Georgia State University
Arun Aryal, California State University Los Angeles College of Business and Economics
Grace Kenny, Dublin City University

12:00 AM

Using Trace Ethnography to Compare Perceived Cyber-Threats of IT to Non-IT Professionals

Hsia-Ching Chang, University of North Texas
Susan Squires, University of North Texas
Chen-Ya Wang, National Open University, Taiwan

12:00 AM

What Interrupts Intention to Comply with IS-Security Policy?

Chris Merritt, Virginia Commonwealth University
Gurpreet Dhillon, Virginia Commonwealth University

12:00 AM