A Culture of Cybersecurity at Banca Popolare di Sondrio Angelica Marotta, Massachusetts Institute of Technology |
||
A Dynamic Cyber-Based View of the Firm Tamara Schwartz, York College of Pennsylvania |
||
Dominik Huth, Technical University of Munich |
||
David Sikolia, Mississippi State University |
||
Cyber-physical Systems and Industrial IoT Cybersecurity: Issues and Solutions J.P. Shim, Georgia State University |
||
Cybersecurity: Current State of Governance Literature Aurelia Mandani, University of Colorado Denver |
||
Data Breach Risks and Resolutions: A Literature Synthesis Freeha S. Khan, Georgia State University |
||
Defining cloud identity security and privacy issues: A Delphi method Brian Cusack, AUT University |
||
Do legal systems affect the organizational consequences of IT innovation? Katia Guerra, University of North Texas |
||
Eating the Forbidden Fruit: Human Curiosity Entices Data Breaches Dustin Ormond, Creighton University |
||
Effect of Dynamic Text on Habituation to Polymorphic Warnings Pranith Abbaraju, Texas Tech University |
||
Effects of Evidence-Based Malware Cybersecurity Training on Employees Wu He, Old Dominion University |
||
Employee Acceptance of Employer Control Over Personal Devices Kevin R. Callies, Dakota State University |
||
Examining the influence of Government Cybersecurity Efforts on E-Services Use Victoria Kisekka, University at Albany |
||
Tim-Benjamin Lembcke, Chair of Information Management |
||
How much is your private information? Does Privacy Calculus Matter? Bao Duong, Louisiana Tech University |
||
Cong Cao, University of Wollongong |
||
Impact of Framing and Base Size of Computer Security Risk Information Xinhui Zhan, Missouri University of Science and Technology, Rolla MO, USA |
||
Important Issues for Preventing Cyberstalking in India Kane J. Smith, University of North Carolina at Greensboro |
||
Patricia Akello, University of Texas at San Antonio |
||
Obi Ogbanufe, Oklahoma State University |
||
Princely Ifinedo, Brock University |
||
Gregory Schymik, Grand Valley State University |
||
Privacy Control Patterns for Compliant Application of GDPR Daniel Rösch, Hochschule Pforzheim |
||
Privacy Everywhere: a mechanism for decision making and privacy assurance in IoT environments Leandro Prado de Andrade, Federal University of São Carlos |
||
Progressing from the SOC to the EOC Nathan Pike, Cal Poly Pomona |
||
Reporting Information Security Policy Violations – An Exploratory Study Tianjie Deng, University of Denver |
||
The Internet of Things: The Effects of Security Attitudes and Knowledge on Security Practices Zach Singer, Texas Christian University |
||
Joseph Manga, University of Texas Rio Grande Valley |
||
Understanding HIPAA Compliance Practice in Healthcare Organizations in a Cultural Context OSBORNE OBENG, Nova Southeastern University |
||
Unlocking the Mixed Results of the Effect of Self-Efficacy in Information Security on Compliance. Dinesh Reddy, Texas A&M University |
||
Users’ Preferences Concerning Privacy Properties of Assistant Systems on the Internet of Things Jan Zibuschka, Robert Bosch GmbH |
||
When Do Users Begin to Worry About Privacy? Kevin Kim, University of North Texas |
||
Why do I get phished? The role of persuasion, design authenticity and contextualization Baidyanath Biswas, International Management Institute |
Cybersecurity remains a key challenge for organizations despite massive investments over the last two decades. While technological advancements have been made to improve cybersecurity, human vulnerabilities have become the weakest link in security. High profile events such as defections, espionage, and massive data breaches have led the public to question their own expectations of privacy. While there is an abundance of practices and techniques for employing cybersecurity, many hard problems remain unanswered.
The purpose of this track is to provide a forum for theoretical developments, empirical research findings, case studies, methodologies, artifacts, and other high-quality manuscripts. Sponsored by SIGSEC, we seek to address important questions arising from emerging developments in information security, such as: security analytics, financial crimes, security analytics, and digital forensics? How do system defenders share information to mitigate vulnerabilities and exploits? Does pervasive data collection deter privacy-conscious individuals? Do regulations and policies influence employee security behaviors and organizational security postures?