Cybersecurity remains a key challenge for organizations despite massive investments over the last two decades. While technological advancements have been made to improve cybersecurity, human vulnerabilities have become the weakest link in security. High profile events such as defections, espionage, and massive data breaches have led the public to question their own expectations of privacy. While there is an abundance of practices and techniques for employing cybersecurity, many hard problems remain unanswered. The purpose of this track is to provide a forum for theoretical developments, empirical research findings, case studies, methodologies, artifacts, and other high-quality manuscripts. Sponsored by SIGSEC, we seek to address important questions arising from emerging developments in information security, such as: security analytics, financial crimes, security analytics, and digital forensics? How do system defenders share information to mitigate vulnerabilities and exploits? Does pervasive data collection deter privacy-conscious individuals? Do regulations and policies influence employee security behaviors and organizational security postures?

Track Chairs:
Robert Crossler, Washington State University, rob.crossler@wsu.edu
Kane Smith, University of North Carolina Greensboro, kjsmith9@uncg.edu
Obi Ogbanufe, University of North Texas, obi.ogbanufe@unt.edu
Philip Menard, University of Texas at San Antonio, philip.menard@utsa.edu
Schedule

Subscribe to RSS Feed

2022
Wednesday, August 10th
12:00 AM

A Review of Cyberattack Research using Latent Dirichlet Allocation

Ming Xiao, UNC Greensboro
Gurpreet Dhillon, IT and Decision Sciences
Kane J. Smith, University of North Carolina at Greensboro

12:00 AM

A Theoretical Discussion of Consumers’ Willingness to Disclose Personal Information Despite Privacy Concerns

Burcu Bulgurcu, Toronto Metropolitan University

12:00 AM

Agile Software Development Vulnerabilities and Challenges: An Empirical Study

Wei Xie, Appalachian state university
Lakshmi Iyer, Appalachian State University
Scott J. Simpson, Veracode

12:00 AM

Assessing the Impact of Virtual Health Communities and Environmental Characteristics of Chronic Pain Mobile Health Apps on Users’ Privacy Decisions: A Multilevel Perspective

May Bantan, Saudi Electronic University
Doaa Alrefaei, WPI
Raed Alharbi, Saudi electronic university

12:00 AM

Beyond Rational Information Security Decisions: An Alternate View

Alaa Nehme, Mississippi State University
Merrill Warkentin, Mississippi State University
Kyungmyung Jang, Mississippi State University
Sumin Kim, Mississippi State University

12:00 AM

Care to Share Your Personal Information?

Kevin Kim, University of Louisiana - Monroe
Sarbottam Bhagat, Augusta University

12:00 AM

Cyber-risk assessment and mitigation of DDoS attacks using semi-structured data models

Kalpit Sharma, Indian Institute of Management Amritsar
Arunabha Mukhopadhyay, Indian Institute of Management Lucknow

12:00 AM

Deepfake Audio Detection

Madeeha B. Khan, University at Albany
Sanjay Goel, University at Albany, SUNY
Jaswant Katar Anandan, University at Albany - SUNY
Jersey Zhao, Albany university
Ramavath Rakesh Naik, University at Albany

12:00 AM

Designing a Messaging Strategy to Improve Information Security Policy Compliance

Federico Giovannetti, University of South Florida
Alan Hevner, University of South Florida
Gert-Jan de Vreede, University of South Florida

12:00 AM

Examining the Role of Privacy Policy on Host Information Disclosure on Accommodation Sharing Platforms

JIANG HU, University of Texas at Arlington
Jie Zhang, University of Texas Arlington
Huigang Liang, University of Memphis

12:00 AM

Exploring the Characteristics and Needs of the Chief Privacy Officer in Organizations

John G. Fehr III, Dakota State University
Aaron M. French, Kennesaw State University

12:00 AM

Firms Data Breach and Ransomware Exposure and Recovery Through the Analysis of Post Factum Remedial Actions

Jordan E. F. Bernot, UNT
Dan J. Kim, University of North Texas

12:00 AM

How does organizational justice work across national culture? Effects of procedural and distributive justice on information security policy compliance across national culture

Maliha Alam, University of Texas Rio Grande Valley
Nan Xiao, University of Texas Rio Grande Valley

12:00 AM

How to Increase InfoSec Compliance by Matching the Messaging to the Right Users?

Leigh A. Mutchler, James Madison University
Amy J. Connolly, James Madison University

12:00 AM

Impact of User Experience and Comprehension on Awareness Training

Jonathan Keirre Adams, Marymount University
Michelle Liu, Marymount University

12:00 AM

INFORMATION SECURITY RISK AND BOUNDARY CHANGING BEHAVIOR

Hilal Pataci, Rensselaer Polytechnic Institute
T. Ravichandran, Rensselaer Polytechnic Institute

12:00 AM

Perceptions of Risk and Security Concerns with Mobile Devices using Biometric vs Traditional Authentication Methods

Sinjini Mitra, California State University, Fullerton
Jordan B. Barlow, University of St. Thomas

12:00 AM

Privacy Boundaries: What is the Line?

Matt Heinrich, Rockhurst University
Natalie Gerhart, Creighton University

12:00 AM

Professional Environment Matters – National Characteristics of Information Security Overconfidence

Lukas Manuel Ranft, Institute for Information Systems

12:00 AM

Reconceptualizing Knowledge Based Authentication for Augmented and Virtual Reality Contexts

christopher kreider, Christopher Newport University
Omar El-Gayar, Dakota State University

12:00 AM

Self-endorsed Cybersecurity Capability Improvement for SMEs

Samuel A. Fricker, Fachhochschule Nordwestschweiz FHNW
Alireza Shojaifar, Utrecht University

12:00 AM

The collective information privacy on social networking sites

Sara Memarian Esfahani, University of North Texas
Dan J. Kim, University of North Texas

12:00 AM

The Impact of Data Breach Announcements on Online Consumers Behavior

Mohamed Hussein ELDOH, Grenoble Ecole de Management
Federico Pigni, Grenoble Ecole de Management

12:00 AM

The impact of privacy concern regarding online behavioral advertising in the context of social networking sites

M A Shariful Amin, University of North Texas
Abhijeet Kumar, University of North Texas
Vess L. Johnson, University of North Texas

12:00 AM

The Impact of Social Influence on Fake News Participation in Social Media

Zahra Aivazpour, California Polytechnic State University

12:00 AM

The Interplay of Information Processing, Mindfulness, and Affective State in Phishing Detection

Debalina Bera, University of North Texas
Dan J. Kim, University of North Texas

12:00 AM

The Role of Cybersecurity Risk Disclosures in Influencing Stakeholder Intentions and the Moderating Role of Privacy Concern

Zhuoli Axelton, University of Wisconsin - Green Bay
Gaurav Bansal, University of Wisconsin - Green Bay

12:00 AM

Too Close to Home: The Drivers of Perceived Risk of Home Automation

Sameh Al-Natour, Ryerson University
Hasan Cavusoglu, University of British Columbia
Arash Saghafi, Tilburg University
Natalia Wiercinska, Signify

12:00 AM

Understanding the Cyber Safety Impacts of Digital Transformation on Vulnerable Businesses and Populations

Burcu Bulgurcu, Toronto Metropolitan University

12:00 AM