2020 | ||
Monday, August 10th | ||
---|---|---|
12:00 AM |
A Practical Guideline for Developing a Managerial Information Security Awareness Program Bettina Schneider, FHNW 12:00 AM |
|
12:00 AM |
A Qualitative Approach to Understand Unintentional Information Security Misbehaviors Forough Nasirpouri Shadbad, Oklahoma State University 12:00 AM |
|
12:00 AM |
Dailin Zheng, University of Colorado Denver 12:00 AM |
|
12:00 AM |
Applying Text Analytics to Examination of End Users’ Mental Models of Cybersecurity Andreea Cotoranu, Pace University 12:00 AM |
|
12:00 AM |
Are You Coping or Copping Out? Wearable Users’ Information Privacy Perspective Krutheeka Baskaran, Indian Institute of Technology Madras 12:00 AM |
|
12:00 AM |
Assessing Cybersecurity Risk in the Extended Project Lifespan: A Pilot Study Steven Presley, University of South Alabama 12:00 AM |
|
12:00 AM |
Sarbottam Bhagat, University of North Texas 12:00 AM |
|
12:00 AM |
BYOD-Insure vs Existing Modalities for BYOD Security Assessment: A Comparison Study Melva M. Ratchford, University 12:00 AM |
|
12:00 AM |
Cloud Surfing: A General Comparison of Cloud Identity Guidelines Eghbal Ghazizadeh, Whitireia 12:00 AM |
|
12:00 AM |
Saravanan Thangavelu, University of Auckland 12:00 AM |
|
12:00 AM |
Compliance with IS-Security-Policies: A Socio-Material Perspective Towards Security Arman Falahati, McGill University 12:00 AM |
|
12:00 AM |
Cyber Risk Assessment and Mitigation Using Logit and Probit Models for DDoS attacks Kalpit Sharma, Indian Institute of Management Lucknow 12:00 AM |
|
12:00 AM |
Cybersecurity: A Definition across Europe and North America Katia Guerra, University of North Texas 12:00 AM |
|
12:00 AM |
Defining Roles, Relationships, and Value in Cybersecurity Operations Kenneth Shemroske, University of Southern Indiana 12:00 AM |
|
12:00 AM |
Evaluating the Usability of a Multilingual Passphrase Policy Pardon Blessings Maoneke, University of Mpumalanga 12:00 AM |
|
12:00 AM |
How do Habit and Privacy Awareness Shape Privacy Decisions? Christina Wagner, University of Augsburg 12:00 AM |
|
12:00 AM |
How do Leader Emotional Displays Influence Employees’ Information Security Effort? Feng Xu, Mississippi State University 12:00 AM |
|
12:00 AM |
Impact of Security-related Stress and Affective Distress on Information Security Policy Compliance Bao Duong, Louisiana Tech University 12:00 AM |
|
12:00 AM |
INDIVIDUAL PRIVACY EMPOWERMENT IN ELECTRONIC SERVICE Bright Frimpong, The University of Texas Rio Grande Valley 12:00 AM |
|
12:00 AM |
Chia-Ming Sun, National Yunlin University of Science and Technology 12:00 AM |
|
12:00 AM |
Alan Rea, Western Michigan University 12:00 AM |
|
12:00 AM |
Internet Privacy Concerns: A Replication and Parsimonious Extension Oscar Lopez, University of Massachusetts 12:00 AM |
|
12:00 AM |
Sanjay Goel, University at Albany, SUNY 12:00 AM |
|
12:00 AM |
Gaurav Bansal, UW-Green Bay 12:00 AM |
|
12:00 AM |
Moral Hazard in Compliance: The Impact of Moral Intensity and Competing Values Dailin Zheng, University of Colorado Denver 12:00 AM |
|
12:00 AM |
Narratives and Information Security Policy Compliance: A Narrative Policy Framework Perspective Abdullah Al Nuaim, University of Colorado Denver 12:00 AM |
|
12:00 AM |
Organizational Learning on Bug Bounty Platforms Ali Ahmed, University of Massachusetts Lowell 12:00 AM |
|
12:00 AM |
Persuasive Technology Designs for Affecting Usage Intention and Behavior of AdChoices Lijun Chen, University of Kansas 12:00 AM |
|
12:00 AM |
Privacy Concerns of Mobile App Users: An Empirical Study Anitha Chennamaneni, Texas A & M University Central Texas 12:00 AM |
|
12:00 AM |
Promoting Information Security Policy Compliance – An Empirical Study Lei Li, Kennesaw State University 12:00 AM |
|
12:00 AM |
Rationalizing Online Romance Fraud: In the Eyes of the Offender Jonathan Nii Barnor Barnor, University of Ghana Business School 12:00 AM |
|
12:00 AM |
Security Evaluation of Digital Libraries Nnatubemugo Innocent Ngwum, Towson University 12:00 AM |
|
12:00 AM |
Security in the Software Development Process: Role of Human Factors Tripti Singh, The University of Alabama 12:00 AM |
|
12:00 AM |
Toward Security Capitulation Theory Alexander McLeod, Texas State University 12:00 AM |
|
12:00 AM |
Understanding Employees’ ISP Compliance from The Perspective of Emotion-Focused Coping Approaches Yafang Li, Washington State University 12:00 AM |
|
12:00 AM |
Using the Design Thinking Empathy Phase as a Facilitator in Privacy Requirements Elicitation Edna Dias Canedo, University of Brasília (UnB) 12:00 AM |
|
12:00 AM |
VPN Usage in Higher Education: A Study to Mitigate Risk Related to Public Wi-Fi Usage Deanna House, University of Nebraska at Omaha 12:00 AM |
|
12:00 AM |
What’s next for blockchain-technology in IoT security? Kodey Crandall, Dakota State University 12:00 AM |
|
12:00 AM |
Why are some Internet users more prone to adopt prudent Cybersecurity practices than others? Ashish A. Kakar, Texas Tech University 12:00 AM |
Cybersecurity remains a key challenge for organizations despite massive investments over the last two decades. While technological advancements have been made to improve cybersecurity, human vulnerabilities have become the weakest link in security. High profile events such as defections, espionage, and massive data breaches have led the public to question their own expectations of privacy. While there is an abundance of practices and techniques for employing cybersecurity, many hard problems remain unanswered.
The purpose of this track is to provide a forum for theoretical developments, empirical research findings, case studies, methodologies, artifacts, and other high-quality manuscripts. Sponsored by SIGSEC, we seek to address important questions arising from emerging developments in information security, such as security analytics, financial crimes, security analytics, and digital ,forensics? How do system defenders share information to mitigate vulnerabilities and exploits? Does pervasive data collection deter privacy-conscious individuals? Do regulations and policies influence employee security behaviors and organizational security postures?