Information Security and Privacy (SIG SEC)

Cybersecurity remains a key challenge for organizations despite massive investments over the last two decades. While technological advancements have been made to improve cybersecurity, human vulnerabilities have become the weakest link in security. High profile events such as defections, espionage, and massive data breaches have led the public to question their own expectations of privacy. While there is an abundance of practices and techniques for employing cybersecurity, many hard problems remain unanswered.

Track Chairs:
Kane J. Smith, University of North Caroline at Greensboro kjsmith9@uncg.edu
Robert E.Crossler, Washington State University rob.crossler@wsu.edu
Schedule

Subscribe to RSS Feed

2021
Monday, August 9th
12:00 AM

An Architecture for Federated Learning Enabled Collaborative Intrusion Detection System

Caitlin L. McOsker, Kennesaw State University
Michael Steven Handlin, Kennesaw State University
Lei Li, Kennesaw State University
Hossain Shahriar, Kennesaw State University
Liang Zhao, Kennesaw State University

12:00 AM

Cognitive Differences in Offensive and Defensive Cyber Work Tasks

James N. Smith, Augusta University
Jason Williams, Augusta University
Tyler M. Pieron, Nova Southeastern University

12:00 AM

Cybersecurity Awareness and Adaptive Responses Among College Students

Sarbottam Bhagat, University of North Texas
Dipakkumar P. Pravin, UNT-University of North Texas

12:00 AM

Disclosure and Engagement on Social Media in Iranian Context

Mehrdad Koohikamali, Cal Poly Pomona
Hossein Kermani, University of Tehran
Hamidreza Rabiei-Dastjerdi, University College Dublin

12:00 AM

Exploring Risk Perception and its Impact on Internet Access Selection

Tyler M. Pieron, Nova Southeastern University
James N. Smith, Augusta University
Jason Williams, Augusta University

12:00 AM

"How do behavioral factors influence the purchase of cyber insurance? Empirical evidence from Polish companies"

Grzegorz P. Strupczewski, Cracow University of Economics
Michal Thlon, Cracow University of Economics

12:00 AM

Investigating the Impact of Organizational Culture on Information Security Policy Compliance: The Case of Ethiopia.

Kibrom Tadesse Ejigu, Addis Ababa University
Mikko Siponen, University of Jyväskylä
Tilahun Muluneh Arage, Addis Ababa University

12:00 AM

Investigating the Supervisor’s Role in Information Security Compliance

Stephanie Maynard-Patrick, University of Illinois Springfield
Sahar Farshadkhah, University of Illinois Springfield

12:00 AM

Legal Challenges in Cloud Forensics

Kaitlin Marshall, Western Michigan University
Alan Rea, Western Michigan University

12:00 AM

Mindfulness and Cybersecurity Behavior: A comparative analysis of rational and intuitive cybersecurity decisions

Mahdi Roghanizad, Ryerson University
Ellen Choi, Ryerson University
Atefeh (Atty) Mashatan, Ryerson University
Ozgur Turetken, Ryerson University

12:00 AM

Network Vulnerability and Enterprises’ Response: The Preliminary Analysis

Hao Yang, Beijing Jiao Tong University
Jinfeng Zhang, Nankai University
Xiong Zhang, Beijing Jiao Tong University

12:00 AM

Privacy Behavior of the Elderly toward Caregiver Robots

M A Shariful Amin, University of North Texas
Chang Koh, University of North Texas
Abhijeet Kumar, University of North Texas

12:00 AM

Privacy calculus and intension to share confidential information

JOTI KAUR, The University of North Carolina at Greensboro
Simran Dhillon, Roanoke College

12:00 AM

Privacy Calculus: An Interaction of Technical and Social Factors on IoT Adoption

Katia Guerra, University of North Texas
Vess L. Johnson, University of North Texas

12:00 AM

Privacy-Centered Design Principles for Employee-Determined Data Collection and Use in Personalized Assistance Systems

Marleen Voss, Ruhr-University Bochum
Mark Hoebertz, Ruhr-Universitaet Bochum
Olga Bosak, University of Bremen
Felix Mohsenzadeh, University of Bremen
Maximilian Schnebbe, Institut für Informations-, Gesundheits- und Medizinrecht
Jens Poeppelbuss, Ruhr-Universität Bochum
Maik Eisenbeiss, University of Bremen

12:00 AM

Security Concerns Influencing the Adoption of Cloud Computing of SMEs: A Literature Review

Ruwan Nagahawatta, RMIT University
Matthew Warren, RMIT University
Sachithra Lokuge, RMIT University
Scott Salzman, Deakin University

12:00 AM

The Role of Risk Aversion in the Privacy Paradox on Internet Users

Eduardo Mantilla, Universidad ESAN
Jose Antonio Robles-Flores, Universidad ESAN

12:00 AM

Too Bored to Engage: An Exploratory Study of Information Security-related Boredom

Shan Xiao, Gonzaga University
Merrill Warkentin, Mississippi State University

12:00 AM

Towards Automated Policy Generation for Dynamic Access Control in the Internet of Things

Kaushik Nagarajan Muthusamy Ragothaman, Dakota State University
Yong Wang, Dakota State University
Srinivasulu Vuggumudi, Dakota State University

12:00 AM

Trusted Cyber Messengers: Spreading Awareness to Induce Actions

M A Shariful Amin, University of North Texas
Dr. Dipakkumar P Pravin, University of North Texas

12:00 AM

Uncovering Thematic Dimensions of Fraudulent Emails using Topic Modelling

Debalina Bera, University of North Texas
Dan J. Kim, University of North Texas

12:00 AM

Unintentional Insecure Behavior

Jason Williams, Augusta University
Saurabh Gupta, Kennesaw State University

12:00 AM

Volitional Non-Malicious Insider Threats: At The Intersection of COVID-19, WFH and Cloud-Facilitated Shadow-Apps

Patricia Akello, The University of Texas

12:00 AM

What Do I Do? Uncovering Fitness Tracker Users’ Privacy Coping Strategy

Krutheeka Baskaran, Indian Institute of Technology Madras
Vijayan Sugumaran, Oakland University
Saji K Mathew, Indian Institute of Technology Madras

12:00 AM

What Makes Workplace Privacy Special? An Investigation of Determinants of Privacy Concerns in the Digital Workplace

Mena Angela Teebken, LMU Munich

12:00 AM

When Extra-Role Behavior Leads to Employee Security Deviance: A Moral Licensing View

Shizhen Jia, Washington state university
Feng Xu, Mississippi State University

12:00 AM