Subscribe to RSS Feed (Opens in New Window)
2023 | ||
Thursday, August 10th | ||
12:00 AM |
A deep learning-based Cyber-risk Management framework for smart cities Kalpit Sharma, Indian Institute of Management Amritsar 12:00 AM |
|
---|---|---|
12:00 AM |
Tizian Matschak, University of Goettingen 12:00 AM |
|
12:00 AM |
A Qualitative Study on Acceptance Factors of Economic Approaches on IT Security Investment Decisions Laura Niedzela, Martin Luther University Halle-Wittenberg 12:00 AM |
|
12:00 AM |
Joseph Nwankpa, Miami University 12:00 AM |
|
12:00 AM |
Are Information Security Practices Driven by the Likelihood and potential Impact of Security Events? Gunjan Batra, Kennesaw State University 12:00 AM |
|
12:00 AM |
Benchmarking the Robustness of Phishing Email Detection Systems Benjamin Ampel, University of Arizona 12:00 AM |
|
12:00 AM |
Catastrophe Bond Trading Can Boost Security Improving Cyber (Re-)Insurance Markets Ranjan Pal, MIT 12:00 AM |
|
12:00 AM |
Cybersecurity Awareness and Adaptive Behavior: Does Prior Exposure Lead to Adaptive Behavior? Sarbottam Bhagat, Augusta University 12:00 AM |
|
12:00 AM |
DEFIYIELD: Exploitation of Open Blockchain Platforms Nakul Ravindra Padalkar, Georgetown University 12:00 AM |
|
12:00 AM |
Raja Hasnain Anwar, University of Arizona 12:00 AM |
|
12:00 AM |
Digital Forensics Use-Case of Blockchain Technology: A Review Md Bahauddin Badhon, Emporia State University Emporia 12:00 AM |
|
12:00 AM |
Exploring Post-Quantum Cryptographic Schemes for TLS in 5G Nb-IoT: Feasibility and Recommendations Kadir Sabanci, Marquette University 12:00 AM |
|
12:00 AM |
How Does Technological Entitlement Affect Cyberdeviance? The Role of Organizational Justice. Gabriel Owusu, University of Texas Rio Grande Valley 12:00 AM |
|
12:00 AM |
Oleksandra Klymenko, Technical University of Munich 12:00 AM |
|
12:00 AM |
Angelica Marotta, Massachusetts Institute of Technology 12:00 AM |
|
12:00 AM |
Phishing Susceptibility – a Cognitive Dissonance Persuasion View Wei Xie, Appalachian state university 12:00 AM |
|
12:00 AM |
Predicting Analysts' Needs for Explainable Artificial Intelligence (XAI) in Cybersecurity Analysis Chen Zhong, The University of Tampa 12:00 AM |
|
12:00 AM |
Re-Assessing Privacy in the Blockchain-based Metaverse Julia Schulmeyer, LMU Munich School of Management 12:00 AM |
|
12:00 AM |
Revisiting the Privacy Paradox: A Novel Framework for Privacy Calculus Sara Memarian Esfahani, University of North Texas 12:00 AM |
|
12:00 AM |
Risk Factors for Malicious Insider Threats – An Analysis of Attack Scenarios Manfred Hofmeier, Universität der Bundeswehr München 12:00 AM |
|
12:00 AM |
Princely Ifinedo, Brock University 12:00 AM |
|
12:00 AM |
Root Causes of Healthcare Data Breaches – A Text Analytic Approach Aindrila Chakraborty, Texas State University 12:00 AM |
|
12:00 AM |
Security Networks as an Effective Means to Reduce Spear Phishing Susceptibility Robert Lamprecht, University Innsbruck 12:00 AM |
|
12:00 AM |
The Effect of Neutralization: Before and After Employee Violating ISP Jack Hsu, National Sun Yat-sen University 12:00 AM |
|
12:00 AM |
Rebekah E. Austin, Missouri State University 12:00 AM |
|
12:00 AM |
Using a Nudge to Close the Intention–Behavior Gap for Information Privacy lijun chen, University of Kansas 12:00 AM |
|
12:00 AM |
Using stakes consciousness to better understand information security awareness Guy Alain Sylvanus Kouyo, Université Laval 12:00 AM |
|
12:00 AM |
Value-Driven Policy Agenda to Manage Online Privacy of Young Adults Simran Dhillon, Virginia State University 12:00 AM |
|
12:00 AM |
Vulnerability-based Cyber-Risk Management: A Text-mining Approach Swati Jain, Indian Institute of Management Lucknow 12:00 AM |
|
12:00 AM |
Workarounds from an Information Security Perspective: Literature Review Steve A. Essi, Virginia Commonwealth University 12:00 AM |