Cybersecurity remains a key challenge for organizations despite massive investments over the last two decades. While technological advancements have been made to improve cybersecurity, human vulnerabilities have become the weakest link in security. High profile events such as defections, espionage, and massive data breaches have led the public to question their own expectations of privacy. While there is an abundance of practices and techniques for employing cybersecurity, many hard problems remain unanswered. The purpose of this track is to provide a forum for theoretical developments, empirical research findings, case studies, methodologies, artifacts, and other high-quality manuscripts. Sponsored by SIGSEC, we seek to address important questions arising from emerging developments in information security, such as security analytics, financial crimes, security analytics, and digital ,forensics? How do system defenders share information to mitigate vulnerabilities and exploits? Does pervasive data collection deter privacy-conscious individuals? Do regulations and policies influence employee security behaviors and organizational security postures?
Schedule

Subscribe to RSS Feed

2020
Monday, August 10th
12:00 AM

A Practical Guideline for Developing a Managerial Information Security Awareness Program

Bettina Schneider, FHNW
Petra Maria Asprion, University of Applied Sciences and Arts Northwestern Switzerland (FHNW)
Simona Androvicsova, FHNW
Wilfrid Azan, University of Lyon

12:00 AM

A Qualitative Approach to Understand Unintentional Information Security Misbehaviors

Forough Nasirpouri Shadbad, Oklahoma State University
Corey Baham, Oklahoma State University
David Biros, Oklahoma State University

12:00 AM

A Skills Based Approach to Tackle Failure of Cybersecurity Awareness Programs in Organizations

Dinesh Reddy, Texas A&M University
Glenn Dietrich, The University of Texas at San Antonio

12:00 AM

An Analysis of Differential Impacts of Neutralization Techniques on Perceived Social Norms and Compliance

Dailin Zheng, University of Colorado Denver
Zhiping D. Walter, University of Colorado Denver

12:00 AM

Applying Text Analytics to Examination of End Users’ Mental Models of Cybersecurity

Andreea Cotoranu, Pace University
Li-Chiou Chen, Pace University

12:00 AM

Are You Coping or Copping Out? Wearable Users’ Information Privacy Perspective

Krutheeka Baskaran, Indian Institute of Technology Madras
Saji K Mathew, Indian Institute of Technology Madras
Vijayan Sugumaran, Oakland University

12:00 AM

Assessing Cybersecurity Risk in the Extended Project Lifespan: A Pilot Study

Steven Presley, University of South Alabama
Jordan Shropshire, University of South Alabama
Jeffrey P. Landry, University of South Alabama

12:00 AM

BYOD Security Policy Compliance: Role of Policy Awareness, Organizational Culture and Social Controls

Sarbottam Bhagat, University of North Texas
Kevin Kim, University of North Texas
Katia Guerra, University of North Texas

12:00 AM

BYOD-Insure vs Existing Modalities for BYOD Security Assessment: A Comparison Study

Melva M. Ratchford, University
Yong Wang, Dakota State University
Cherie Bakker Noteboom, Dakota State University
Omar El-Gayar, Dakota State University

12:00 AM

Cloud Surfing: A General Comparison of Cloud Identity Guidelines

Eghbal Ghazizadeh, Whitireia
Hanif Deylami, AUT
Abid Shahzad, ICL Education Group
Brian Cusack, AUT University

12:00 AM

Commercial Drones: Peeping Tom or Precision Operator? A Governance, Risk and Compliance Framework for a Secure Drone Eco-system

Saravanan Thangavelu, University of Auckland
Lech Janczewski, University of Auckland
Gabrielle Peko, University of Auckland
David Sundaram, University of Auckland

12:00 AM

Compliance with IS-Security-Policies: A Socio-Material Perspective Towards Security

Arman Falahati, McGill University
Liette Lapointe, McGill University

12:00 AM

Cyber Risk Assessment and Mitigation Using Logit and Probit Models for DDoS attacks

Kalpit Sharma, Indian Institute of Management Lucknow
Arunabha Mukhopadhyay, Indian Institute of Management Lucknow

12:00 AM

Cybersecurity: A Definition across Europe and North America

Katia Guerra, University of North Texas
Dan J. Kim, University of North Texas

12:00 AM

Defining Roles, Relationships, and Value in Cybersecurity Operations

Kenneth Shemroske, University of Southern Indiana

12:00 AM

Evaluating the Usability of a Multilingual Passphrase Policy

Pardon Blessings Maoneke, University of Mpumalanga
Stephen V. Flowerday, Rhodes University
Merrill Warkentin, Mississippi State University

12:00 AM

How do Habit and Privacy Awareness Shape Privacy Decisions?

Christina Wagner, University of Augsburg
Manuel Trenz, University of Goettingen
Daniel Veit, University of Augsburg

12:00 AM

How do Leader Emotional Displays Influence Employees’ Information Security Effort?

Feng Xu, Mississippi State University
Botong Xue, Mississippi State University
Merrill Warkentin, Mississippi State University

12:00 AM

Impact of Security-related Stress and Affective Distress on Information Security Policy Compliance

Bao Duong, Louisiana Tech University

12:00 AM

INDIVIDUAL PRIVACY EMPOWERMENT IN ELECTRONIC SERVICE

Bright Frimpong, The University of Texas Rio Grande Valley
Jun Sun, The University of Texas Rio Grande Valley

12:00 AM

Information Security Assurance and the Role of Security Configuration Management from Substantive and Symbolic Perspectives

Chia-Ming Sun, Yunlin University of Science & Technology
Yen-Yao Wang, Auburn University
Chen-Bin Yang, BANK

12:00 AM

Information Security Research within the Information Systems Discipline: Analyzing, Categorizing, and Classifying the Historical Underpinnings and Theoretical Assumptions

Alan Rea, Western Michigan University
Kaitlin Marshall, Western Michigan University

12:00 AM

Internet Privacy Concerns: A Replication and Parsimonious Extension

Oscar Lopez, University of Massachusetts
Traci J. Hess, UMass Amherst

12:00 AM

Is Privacy Really a Paradox? Laying the Groundwork to Study the Gap between Privacy Valuation and Behavior

Sanjay Goel, University at Albany, SUNY
Jingyi Huang, University at Albany, SUNY
Alan Dennis, Indiana University
Kevin J. Williams, University at Albany, SUNY

12:00 AM

Measuring Privacy Concerns with Government Surveillance and Right-to-be-Forgotten in Nomological Net of Trust and Willingness-to-Share

Gaurav Bansal, UW-Green Bay
Fiona Nah, Missouri U of Science and Technology

12:00 AM

Moral Hazard in Compliance: The Impact of Moral Intensity and Competing Values

Dailin Zheng, University of Colorado Denver
Zhiping D. Walter, University of Colorado Denver

12:00 AM

Narratives and Information Security Policy Compliance: A Narrative Policy Framework Perspective

Abdullah Al Nuaim, University of Colorado Denver
Ronald Ramirez, University of Colorado Denver
Ersin Dincelli, University of Colorado Denver

12:00 AM

Organizational Learning on Bug Bounty Platforms

Ali Ahmed, University of Massachusetts Lowell
Brian Lee, University of Massachusetts Lowell

12:00 AM

Persuasive Technology Designs for Affecting Usage Intention and Behavior of AdChoices

Lijun Chen, University of Kansas
Andrew Chen, University of Kansas

12:00 AM

Privacy Concerns of Mobile App Users: An Empirical Study

Anitha Chennamaneni, Texas A & M University Central Texas
Babita Gupta, California State University Monterey Bay

12:00 AM

Promoting Information Security Policy Compliance – An Empirical Study

Lei Li, Kennesaw State University
Meng Han, Kennesaw State University

12:00 AM

Rationalizing Online Romance Fraud: In the Eyes of the Offender

Jonathan Nii Barnor Barnor, University of Ghana Business School
Richard Boateng, University of Ghana Business School
Emmanuel Awuni Kolog, University of Ghana Business School
Anthony Afful-Dadzie, University of Ghana Business School

12:00 AM

Security Evaluation of Digital Libraries

Nnatubemugo Innocent Ngwum, Towson University
Sagar Raina, Mount Saint Mary College
Gerald Onwujekwe, Virginia Commonwealth University
Blair Taylor, Towson University
Siddharth Kaza, Towson University

12:00 AM

Security in the Software Development Process: Role of Human Factors

Tripti Singh, The University of Alabama
Allen Johnston, University of Alabama

12:00 AM

Toward Security Capitulation Theory

Alexander McLeod, Texas State University
Diane Dolezel, Texas State University

12:00 AM

Understanding Employees’ ISP Compliance from The Perspective of Emotion-Focused Coping Approaches

Yafang Li, Washington State University
Xuemei Huang, Washington State University

12:00 AM

Using the Design Thinking Empathy Phase as a Facilitator in Privacy Requirements Elicitation

Edna Dias Canedo, University of Brasília (UnB)
Angelica Toffano Seidel Calazans, University center -- UniCEUB
Anderson Jefferson Cerqueira, UnB
Pedro Henrique Teixeira Costa, Unb
Eloisa Toffano Seidel Masson, University center -- UniCEUB

12:00 AM

VPN Usage in Higher Education: A Study to Mitigate Risk Related to Public Wi-Fi Usage

Deanna House, University of Nebraska at Omaha
Emil Radu, University of Tampa

12:00 AM

What’s next for blockchain-technology in IoT security?

Kodey Crandall, Dakota State University
Matt North, Utah Valley University

12:00 AM

Why are some Internet users more prone to adopt prudent Cybersecurity practices than others?

Ashish A. Kakar, Texas Tech University
Bismita Choudhury, Assam Down Town University
Akshay Kakar, University of Houston

12:00 AM