Subscribe to RSS Feed (Opens in New Window)
2020 | ||
Monday, August 10th | ||
12:00 AM |
A Practical Guideline for Developing a Managerial Information Security Awareness Program Bettina Schneider, FHNW 12:00 AM |
|
---|---|---|
12:00 AM |
A Qualitative Approach to Understand Unintentional Information Security Misbehaviors Forough Nasirpouri Shadbad, Oklahoma State University 12:00 AM |
|
12:00 AM |
Dailin Zheng, University of Colorado Denver 12:00 AM |
|
12:00 AM |
Applying Text Analytics to Examination of End Users’ Mental Models of Cybersecurity Andreea Cotoranu, Pace University 12:00 AM |
|
12:00 AM |
Are You Coping or Copping Out? Wearable Users’ Information Privacy Perspective Krutheeka Baskaran, Indian Institute of Technology Madras 12:00 AM |
|
12:00 AM |
Assessing Cybersecurity Risk in the Extended Project Lifespan: A Pilot Study Steven Presley, University of South Alabama 12:00 AM |
|
12:00 AM |
Sarbottam Bhagat, University of North Texas 12:00 AM |
|
12:00 AM |
BYOD-Insure vs Existing Modalities for BYOD Security Assessment: A Comparison Study Melva M. Ratchford, University 12:00 AM |
|
12:00 AM |
Cloud Surfing: A General Comparison of Cloud Identity Guidelines Eghbal Ghazizadeh, Whitireia 12:00 AM |
|
12:00 AM |
Saravanan Thangavelu, University of Auckland 12:00 AM |
|
12:00 AM |
Compliance with IS-Security-Policies: A Socio-Material Perspective Towards Security Arman Falahati, McGill University 12:00 AM |
|
12:00 AM |
Cyber Risk Assessment and Mitigation Using Logit and Probit Models for DDoS attacks Kalpit Sharma, Indian Institute of Management Lucknow 12:00 AM |
|
12:00 AM |
Cybersecurity: A Definition across Europe and North America Katia Guerra, University of North Texas 12:00 AM |
|
12:00 AM |
Defining Roles, Relationships, and Value in Cybersecurity Operations Kenneth Shemroske, University of Southern Indiana 12:00 AM |
|
12:00 AM |
Evaluating the Usability of a Multilingual Passphrase Policy Pardon Blessings Maoneke, University of Mpumalanga 12:00 AM |
|
12:00 AM |
How do Habit and Privacy Awareness Shape Privacy Decisions? Christina Wagner, University of Augsburg 12:00 AM |
|
12:00 AM |
How do Leader Emotional Displays Influence Employees’ Information Security Effort? Feng Xu, Mississippi State University 12:00 AM |
|
12:00 AM |
Impact of Security-related Stress and Affective Distress on Information Security Policy Compliance Bao Duong, Louisiana Tech University 12:00 AM |
|
12:00 AM |
INDIVIDUAL PRIVACY EMPOWERMENT IN ELECTRONIC SERVICE Bright Frimpong, The University of Texas Rio Grande Valley 12:00 AM |
|
12:00 AM |
Chia-Ming Sun, National Yunlin University of Science and Technology 12:00 AM |
|
12:00 AM |
Alan Rea, Western Michigan University 12:00 AM |
|
12:00 AM |
Internet Privacy Concerns: A Replication and Parsimonious Extension Oscar Lopez, University of Massachusetts 12:00 AM |
|
12:00 AM |
Sanjay Goel, University at Albany, SUNY 12:00 AM |
|
12:00 AM |
Gaurav Bansal, UW-Green Bay 12:00 AM |
|
12:00 AM |
Moral Hazard in Compliance: The Impact of Moral Intensity and Competing Values Dailin Zheng, University of Colorado Denver 12:00 AM |
|
12:00 AM |
Narratives and Information Security Policy Compliance: A Narrative Policy Framework Perspective Abdullah Al Nuaim, University of Colorado Denver 12:00 AM |
|
12:00 AM |
Organizational Learning on Bug Bounty Platforms Ali Ahmed, University of Massachusetts Lowell 12:00 AM |
|
12:00 AM |
Persuasive Technology Designs for Affecting Usage Intention and Behavior of AdChoices Lijun Chen, University of Kansas 12:00 AM |
|
12:00 AM |
Privacy Concerns of Mobile App Users: An Empirical Study Anitha Chennamaneni, Texas A & M University Central Texas 12:00 AM |
|
12:00 AM |
Promoting Information Security Policy Compliance – An Empirical Study Lei Li, Kennesaw State University 12:00 AM |
|
12:00 AM |
Rationalizing Online Romance Fraud: In the Eyes of the Offender Jonathan Nii Barnor Barnor, University of Ghana Business School 12:00 AM |
|
12:00 AM |
Security Evaluation of Digital Libraries Nnatubemugo Innocent Ngwum, Towson University 12:00 AM |
|
12:00 AM |
Security in the Software Development Process: Role of Human Factors Tripti Singh, The University of Alabama 12:00 AM |
|
12:00 AM |
Toward Security Capitulation Theory Alexander McLeod, Texas State University 12:00 AM |
|
12:00 AM |
Understanding Employees’ ISP Compliance from The Perspective of Emotion-Focused Coping Approaches Yafang Li, Washington State University 12:00 AM |
|
12:00 AM |
Using the Design Thinking Empathy Phase as a Facilitator in Privacy Requirements Elicitation Edna Dias Canedo, University of Brasília (UnB) 12:00 AM |
|
12:00 AM |
VPN Usage in Higher Education: A Study to Mitigate Risk Related to Public Wi-Fi Usage Deanna House, University of Nebraska at Omaha 12:00 AM |
|
12:00 AM |
What’s next for blockchain-technology in IoT security? Kodey Crandall, Dakota State University 12:00 AM |
|
12:00 AM |
Why are some Internet users more prone to adopt prudent Cybersecurity practices than others? Ashish A. Kakar, Texas Tech University 12:00 AM |