2022 | ||
Wednesday, August 10th | ||
---|---|---|
12:00 AM |
A Review of Cyberattack Research using Latent Dirichlet Allocation Ming Xiao, UNC Greensboro 12:00 AM |
|
12:00 AM |
Burcu Bulgurcu, Toronto Metropolitan University 12:00 AM |
|
12:00 AM |
Agile Software Development Vulnerabilities and Challenges: An Empirical Study Wei Xie, Appalachian state university 12:00 AM |
|
12:00 AM |
May Bantan, Saudi Electronic University 12:00 AM |
|
12:00 AM |
Beyond Rational Information Security Decisions: An Alternate View Alaa Nehme, Mississippi State University 12:00 AM |
|
12:00 AM |
Care to Share Your Personal Information? Kevin Kim, University of Louisiana - Monroe 12:00 AM |
|
12:00 AM |
Cyber-risk assessment and mitigation of DDoS attacks using semi-structured data models Kalpit Sharma, Indian Institute of Management Amritsar 12:00 AM |
|
12:00 AM |
Madeeha B. Khan, University at Albany 12:00 AM |
|
12:00 AM |
Designing a Messaging Strategy to Improve Information Security Policy Compliance Federico Giovannetti, University of South Florida 12:00 AM |
|
12:00 AM |
JIANG HU, University of Texas at Arlington 12:00 AM |
|
12:00 AM |
Exploring the Characteristics and Needs of the Chief Privacy Officer in Organizations John G. Fehr III, Dakota State University 12:00 AM |
|
12:00 AM |
Jordan E. F. Bernot, UNT 12:00 AM |
|
12:00 AM |
Maliha Alam, University of Texas Rio Grande Valley 12:00 AM |
|
12:00 AM |
How to Increase InfoSec Compliance by Matching the Messaging to the Right Users? Leigh A. Mutchler, James Madison University 12:00 AM |
|
12:00 AM |
Impact of User Experience and Comprehension on Awareness Training Jonathan Keirre Adams, Marymount University 12:00 AM |
|
12:00 AM |
INFORMATION SECURITY RISK AND BOUNDARY CHANGING BEHAVIOR Hilal Pataci, Rensselaer Polytechnic Institute 12:00 AM |
|
12:00 AM |
Sinjini Mitra, California State University, Fullerton 12:00 AM |
|
12:00 AM |
Privacy Boundaries: What is the Line? Matt Heinrich, Rockhurst University 12:00 AM |
|
12:00 AM |
Professional Environment Matters – National Characteristics of Information Security Overconfidence Lukas Manuel Ranft, Institute for Information Systems 12:00 AM |
|
12:00 AM |
Reconceptualizing Knowledge Based Authentication for Augmented and Virtual Reality Contexts christopher kreider, Christopher Newport University 12:00 AM |
|
12:00 AM |
Self-endorsed Cybersecurity Capability Improvement for SMEs Samuel A. Fricker, Fachhochschule Nordwestschweiz FHNW 12:00 AM |
|
12:00 AM |
The collective information privacy on social networking sites Sara Memarian Esfahani, University of North Texas 12:00 AM |
|
12:00 AM |
The Impact of Data Breach Announcements on Online Consumers Behavior Mohamed Hussein ELDOH, Grenoble Ecole de Management 12:00 AM |
|
12:00 AM |
M A Shariful Amin, University of North Texas 12:00 AM |
|
12:00 AM |
The Impact of Social Influence on Fake News Participation in Social Media Zahra Aivazpour, California Polytechnic State University 12:00 AM |
|
12:00 AM |
The Interplay of Information Processing, Mindfulness, and Affective State in Phishing Detection Debalina Bera, University of North Texas 12:00 AM |
|
12:00 AM |
Zhuoli Axelton, University of Wisconsin - Green Bay 12:00 AM |
|
12:00 AM |
Too Close to Home: The Drivers of Perceived Risk of Home Automation Sameh Al-Natour, Ryerson University 12:00 AM |
|
12:00 AM |
Burcu Bulgurcu, Toronto Metropolitan University 12:00 AM |
Cybersecurity remains a key challenge for organizations despite massive investments over the last two decades. While technological advancements have been made to improve cybersecurity, human vulnerabilities have become the weakest link in security. High profile events such as defections, espionage, and massive data breaches have led the public to question their own expectations of privacy. While there is an abundance of practices and techniques for employing cybersecurity, many hard problems remain unanswered. The purpose of this track is to provide a forum for theoretical developments, empirical research findings, case studies, methodologies, artifacts, and other high-quality manuscripts. Sponsored by SIGSEC, we seek to address important questions arising from emerging developments in information security, such as: security analytics, financial crimes, security analytics, and digital forensics? How do system defenders share information to mitigate vulnerabilities and exploits? Does pervasive data collection deter privacy-conscious individuals? Do regulations and policies influence employee security behaviors and organizational security postures?
Track Chairs:
Robert Crossler, Washington State University, rob.crossler@wsu.edu
Kane Smith, University of North Carolina Greensboro, kjsmith9@uncg.edu
Obi Ogbanufe, University of North Texas, obi.ogbanufe@unt.edu
Philip Menard, University of Texas at San Antonio, philip.menard@utsa.edu