Subscribe to RSS Feed (Opens in New Window)
2017 | ||
Thursday, August 10th | ||
12:00 AM |
A Systematic Review of Vulnerabilities in Hypervisors and Their Detection Negotiating the tension between traditio SIGPhil, Auckland University of Technology 12:00 AM |
|
---|---|---|
12:00 AM |
Yuan Li, University of Illinois at Springfield 12:00 AM |
|
12:00 AM |
V S Prakash Attili, Infosys 12:00 AM |
|
12:00 AM |
App Information Privacy Concerns Christoph Buck, University Bayreuth 12:00 AM |
|
12:00 AM |
Christian Janze, Goethe University Frankfurt 12:00 AM |
|
12:00 AM |
Behavioral Approach to Information Security Policy Compliance Ashraf Mady, University of North Georgia 12:00 AM |
|
12:00 AM |
Beyond Compliance: Empowering Employees’ Extra-Role Security Behaviors in Dynamic Environments Yaojie Li, Louisiana Tech University 12:00 AM |
|
12:00 AM |
Blockchain for Digital Crime Prevention: The Case of Health Informatics Kane Smith, Virginia Commonwealth University 12:00 AM |
|
12:00 AM |
Hwee-Joo Kam, University of Tampa 12:00 AM |
|
12:00 AM |
Developing Measurement Scales for Passwords Uniqueness and Secrecy Ali Vedadi, Mississippi State University 12:00 AM |
|
12:00 AM |
Hong Chen, Old Dominion University 12:00 AM |
|
12:00 AM |
Vasiliki Diamantopoulou, University of Brighton 12:00 AM |
|
12:00 AM |
Evaluation of IT Security Perception nur sena tanrıverdi, Bogazici Universitesi 12:00 AM |
|
12:00 AM |
Diego Roberto Gonçalves Pontes, Pontifical Catholic University of Minas Gerais 12:00 AM |
|
12:00 AM |
Examining self-disclosure on wearable devices: The roles of benefit structure and privacy calculus Ersin Dincelli, University at Albany, SUNY 12:00 AM |
|
12:00 AM |
Princely Ifinedo, Cape Breton University 12:00 AM |
|
12:00 AM |
Frequently Using Passwords Increases Their Memorability – A False Assumption or Reality? Naomi Woods, Jyvaskylan Yliopisto 12:00 AM |
|
12:00 AM |
Hackers Delight: Knowledge Sharing Motives Obi Ogbanufe, University of North Texas 12:00 AM |
|
12:00 AM |
Plamen Petkov, Dublin City University School of Computing 12:00 AM |
|
12:00 AM |
Impacts of Generational Work Experience on Users’ Perceptions of Information Security Jeffrey Cummings, UNCW 12:00 AM |
|
12:00 AM |
Influence of Information Overload on IT Security Behavior: A Theoretical Framework Tridib Bandyopadhyay, Kennesaw State University 12:00 AM |
|
12:00 AM |
Information Security Policy Quality and Enforcement: Is Compliance a Solution to Fraud Dennis Brown, Kennesaw State University 12:00 AM |
|
12:00 AM |
Babita Gupta, California State University Monterey Bay 12:00 AM |
|
12:00 AM |
IoT Security Adoption into Business Processes: A Socio-Technical View Kavyashree Gollahalli Chandrashekhar, Lancaster University Management School 12:00 AM |
|
12:00 AM |
Dinesh Reddy, UTSA 12:00 AM |
|
12:00 AM |
Let Machines Unlearn – Machine Unlearning and the Right to be Forgotten Chanhee Kwak, KAIST College of Busienss 12:00 AM |
|
12:00 AM |
Mobile Cloud-Computing Applications: A Privacy Cost-Benefit Model Hamid Reza Nikkhah, Univeristy of Arkansas 12:00 AM |
|
12:00 AM |
Mobile Privacy: Users’ Expectations About the Behavior of Mobile Apps Jose Santiago Moreira Mello, Universidade Federal de São Carlos 12:00 AM |
|
12:00 AM |
Modeling Public Response to Data Breaches Eric Bachura, University of Texas at San Antonio 12:00 AM |
|
12:00 AM |
Personal Motivation Measures for Personal IT Security Behavior Byron Marshall, Oregon State University 12:00 AM |
|
12:00 AM |
Resiliency as an Outcome of Security Training and Awareness Programs Angela D. Landress, Nova Southeastern University 12:00 AM |
|
12:00 AM |
Security Incident Recognition and Reporting (SIRR): An Industrial Perspective George Grispos, Lero - The Irish Software Research Centre, University of Limerick 12:00 AM |
|
12:00 AM |
SELECTION OF PRIVACY ENHANCED COMMUNICATION: AN EXTENSION OF THE UTAUT2 THEORY Tyler M. Pieron, Nova Southeastern University 12:00 AM |
|
12:00 AM |
Sense-making in Cyber Security – Examining Responder Behaviors in Cyber-Attacks Tommi Tapanainen, University of Liege 12:00 AM |
|
12:00 AM |
Seven C’s of Information Security Mark-David McLaughlin, Bentley University 12:00 AM |
|
12:00 AM |
Strength of Ties as an Antecedent of Privacy Concerns: A Qualitative Research Study Jakob Wirth, University of Bamberg 12:00 AM |
|
12:00 AM |
Studying the Tension Between Digital Innovation and Cybersecurity Natasha Nelson, Schneider Electric US 12:00 AM |
|
12:00 AM |
TD-CHAIN: A System to Enhance Transparency in Data Flows Wei Chen, Department of Management Information Systems, The University of Arizona 12:00 AM |
|
12:00 AM |
The Iterative Effect of IT Identity on Employee Cybersecurity Compliance Behaviors Yao Shi, University of Memphis 12:00 AM |
|
12:00 AM |
Understanding Digital Crime, Trust, and Control in Blockchain Technologies Joseph B. Walton, Virginia Commonwealth University College of Humanities and Sciences 12:00 AM |
|
12:00 AM |
Understanding Nuances of Privacy and Security in the Context of Information Systems Ersin Dincelli, University at Albany, SUNY 12:00 AM |
|
12:00 AM |
Unpacking Privacy Paradox: A Dual Process Theory Approach Zahra Aivazpour, University of Texas Health Science Center at San Antonio 12:00 AM |
|
12:00 AM |
Using Active Probes to Detect Insiders Before They Steal Data Sanjay Goel, University at Albany, SUNY 12:00 AM |