Subscribe to RSS Feed (Opens in New Window)
A Culture of Cybersecurity at Banca Popolare di Sondrio Angelica Marotta, Massachusetts Institute of Technology |
|
A Dynamic Cyber-Based View of the Firm Tamara Schwartz, York College of Pennsylvania |
|
Dominik Huth, Technical University of Munich |
|
David Sikolia, Mississippi State University |
|
Cyber-physical Systems and Industrial IoT Cybersecurity: Issues and Solutions J.P. Shim, Georgia State University |
|
Cybersecurity: Current State of Governance Literature Aurelia Mandani, University of Colorado Denver |
|
Data Breach Risks and Resolutions: A Literature Synthesis Freeha S. Khan, Georgia State University |
|
Defining cloud identity security and privacy issues: A Delphi method Brian Cusack, AUT University |
|
Do legal systems affect the organizational consequences of IT innovation? Katia Guerra, University of North Texas |
|
Eating the Forbidden Fruit: Human Curiosity Entices Data Breaches Dustin Ormond, Creighton University |
|
Effect of Dynamic Text on Habituation to Polymorphic Warnings Pranith Abbaraju, Texas Tech University |
|
Effects of Evidence-Based Malware Cybersecurity Training on Employees Wu He, Old Dominion University |
|
Employee Acceptance of Employer Control Over Personal Devices Kevin R. Callies, Dakota State University |
|
Examining the influence of Government Cybersecurity Efforts on E-Services Use Victoria Kisekka, University at Albany |
|
Tim-Benjamin Lembcke, Chair of Information Management |
|
How much is your private information? Does Privacy Calculus Matter? Bao Duong, Louisiana Tech University |
|
Cong Cao, University of Wollongong |
|
Impact of Framing and Base Size of Computer Security Risk Information Xinhui Zhan, Missouri University of Science and Technology, Rolla MO, USA |
|
Important Issues for Preventing Cyberstalking in India Kane J. Smith, University of North Carolina at Greensboro |
|
Patricia Akello, University of Texas at San Antonio |
|
Obi Ogbanufe, Oklahoma State University |
|
Princely Ifinedo, Brock University |
|
Gregory Schymik, Grand Valley State University |
|
Privacy Control Patterns for Compliant Application of GDPR Daniel Rösch, Hochschule Pforzheim |
|
Privacy Everywhere: a mechanism for decision making and privacy assurance in IoT environments Leandro Prado de Andrade, Federal University of São Carlos |
|
Progressing from the SOC to the EOC Nathan Pike, Cal Poly Pomona |
|
Reporting Information Security Policy Violations – An Exploratory Study Tianjie Deng, University of Denver |
|
The Internet of Things: The Effects of Security Attitudes and Knowledge on Security Practices Zach Singer, Texas Christian University |
|
Joseph Manga, University of Texas Rio Grande Valley |
|
Understanding HIPAA Compliance Practice in Healthcare Organizations in a Cultural Context OSBORNE OBENG, Nova Southeastern University |
|
Unlocking the Mixed Results of the Effect of Self-Efficacy in Information Security on Compliance. Dinesh Reddy, Texas A&M University |
|
Users’ Preferences Concerning Privacy Properties of Assistant Systems on the Internet of Things Jan Zibuschka, Robert Bosch GmbH |
|
When Do Users Begin to Worry About Privacy? Kevin Kim, University of North Texas |
|
Why do I get phished? The role of persuasion, design authenticity and contextualization Baidyanath Biswas, International Management Institute |