Information Security and Privacy (SIG SEC)
Subscribe to RSS Feed (Opens in New Window)
2021 | ||
Monday, August 9th | ||
12:00 AM |
An Architecture for Federated Learning Enabled Collaborative Intrusion Detection System Caitlin L. McOsker, Kennesaw State University 12:00 AM |
|
---|---|---|
12:00 AM |
Cognitive Differences in Offensive and Defensive Cyber Work Tasks James N. Smith, Augusta University 12:00 AM |
|
12:00 AM |
Cybersecurity Awareness and Adaptive Responses Among College Students Sarbottam Bhagat, University of North Texas 12:00 AM |
|
12:00 AM |
Disclosure and Engagement on Social Media in Iranian Context Mehrdad Koohikamali, Cal Poly Pomona 12:00 AM |
|
12:00 AM |
Exploring Risk Perception and its Impact on Internet Access Selection Tyler M. Pieron, Nova Southeastern University 12:00 AM |
|
12:00 AM |
Grzegorz P. Strupczewski, Cracow University of Economics 12:00 AM |
|
12:00 AM |
Kibrom Tadesse Ejigu, Addis Ababa University 12:00 AM |
|
12:00 AM |
Investigating the Supervisor’s Role in Information Security Compliance Stephanie Maynard-Patrick, University of Illinois Springfield 12:00 AM |
|
12:00 AM |
Legal Challenges in Cloud Forensics Kaitlin Marshall, Western Michigan University 12:00 AM |
|
12:00 AM |
Mahdi Roghanizad, Ryerson University 12:00 AM |
|
12:00 AM |
Network Vulnerability and Enterprises’ Response: The Preliminary Analysis Hao Yang, Beijing Jiao Tong University 12:00 AM |
|
12:00 AM |
Privacy Behavior of the Elderly toward Caregiver Robots M A Shariful Amin, University of North Texas 12:00 AM |
|
12:00 AM |
Privacy calculus and intension to share confidential information JOTI KAUR, The University of North Carolina at Greensboro 12:00 AM |
|
12:00 AM |
Privacy Calculus: An Interaction of Technical and Social Factors on IoT Adoption Katia Guerra, University of North Texas 12:00 AM |
|
12:00 AM |
Marleen Voss, Ruhr-University Bochum 12:00 AM |
|
12:00 AM |
Security Concerns Influencing the Adoption of Cloud Computing of SMEs: A Literature Review Ruwan Nagahawatta, RMIT University 12:00 AM |
|
12:00 AM |
The Role of Risk Aversion in the Privacy Paradox on Internet Users Eduardo Mantilla, Universidad ESAN 12:00 AM |
|
12:00 AM |
Too Bored to Engage: An Exploratory Study of Information Security-related Boredom Shan Xiao, Gonzaga University 12:00 AM |
|
12:00 AM |
Towards Automated Policy Generation for Dynamic Access Control in the Internet of Things Kaushik Nagarajan Muthusamy Ragothaman, Dakota State University 12:00 AM |
|
12:00 AM |
Trusted Cyber Messengers: Spreading Awareness to Induce Actions M A Shariful Amin, University of North Texas 12:00 AM |
|
12:00 AM |
Uncovering Thematic Dimensions of Fraudulent Emails using Topic Modelling Debalina Bera, University of North Texas 12:00 AM |
|
12:00 AM |
Unintentional Insecure Behavior Jason Williams, Augusta University 12:00 AM |
|
12:00 AM |
Patricia Akello, The University of Texas 12:00 AM |
|
12:00 AM |
What Do I Do? Uncovering Fitness Tracker Users’ Privacy Coping Strategy Krutheeka Baskaran, Indian Institute of Technology Madras 12:00 AM |
|
12:00 AM |
Mena Angela Teebken, LMU Munich 12:00 AM |
|
12:00 AM |
When Extra-Role Behavior Leads to Employee Security Deviance: A Moral Licensing View Shizhen Jia, Washington state university 12:00 AM |