Cybersecurity remains a key challenge for organizations despite massive investments over the last two decades. While technological advancements have been made to improve cybersecurity, human vulnerabilities have become the weakest link in security. High-profile events such as defections, espionage, and massive data breaches have led the public to question their own expectations of privacy. While there is an abundance of practices and techniques for employing cybersecurity, many hard problems remain unanswered.

The purpose of this track is to provide a forum for theoretical developments, empirical research findings, case studies, methodologies, artifacts, and other high-quality manuscripts. Sponsored by SIGSEC, we seek to address important questions arising from emerging developments in information security, such as: security analytics, financial crimes, security analytics, and digital forensics? How do system defenders share information to mitigate vulnerabilities and exploits? Does pervasive data collection deter privacy-conscious individuals? Do regulations and policies influence employee security behaviors and organizational security postures?

Track Chairs
Obi Ogbanufe, University of North Texas, obi.ogbanufe@unt.edu
Michael Curry, Oregon State University, michael.curry@oregonstate.edu
Kane Smith, University of North Texas, kane.smith@unt.edu
Shuyuan Mary Metcalfe, Florida State University, smho@fsu.edu

Subscribe to RSS Feed (Opens in New Window)

Schedule
2023
Thursday, August 10th
12:00 AM

A deep learning-based Cyber-risk Management framework for smart cities

Kalpit Sharma, Indian Institute of Management Amritsar
Arunabha Mukhopadhyay, Indian Institute of Management Lucknow

12:00 AM

12:00 AM

A Process-Based Approach to Information Security Investment Evaluation: Design, Implementation, and Evaluation

Tizian Matschak, University of Goettingen
Ilja Nastjuk, Georg-August-Universität Göttingen
Laura Niedzela, Martin Luther University Halle-Wittenberg
Stephan Kuehnel, Martin Luther University Halle-Wittenberg
Simon Trang, University of Göttingen

12:00 AM

12:00 AM

A Qualitative Study on Acceptance Factors of Economic Approaches on IT Security Investment Decisions

Laura Niedzela, Martin Luther University Halle-Wittenberg
Stephan Kuehnel, Martin Luther University Halle-Wittenberg
Ilja Nastjuk, Georg-August-Universität Göttingen
Tizian Matschak, University of Goettingen
Stefan Sackmann, Martin Luther University
Simon Trang, University of Göttingen

12:00 AM

12:00 AM

A Social Engineering Research Partnership in Higher Education to Improve Information Security Education, Training, and Awareness (SETA) Programs

Joseph Nwankpa, Miami University
(Jay) Zhe Shan, Miami University
Jeffrey Merhout, Miami University
John Benamati, Miami University
Maria Weese, Miami University

12:00 AM

12:00 AM

Are Information Security Practices Driven by the Likelihood and potential Impact of Security Events?

Gunjan Batra, Kennesaw State University
Khawaja Saeed, Kennesaw State University
Humayun Zafar, Kennesaw State University

12:00 AM

12:00 AM

Benchmarking the Robustness of Phishing Email Detection Systems

Benjamin Ampel, University of Arizona
Yang Gao, Indiana University
James Hu, University of Arizona
Sagar Samtani, Indiana University
Hsinchun Chen, University of Arizona

12:00 AM

12:00 AM

Catastrophe Bond Trading Can Boost Security Improving Cyber (Re-)Insurance Markets

Ranjan Pal, MIT
Stuart Madnick, CAMS
Michael Siegel, Massachusetts Institute of Technology

12:00 AM

12:00 AM

Cybersecurity Awareness and Adaptive Behavior: Does Prior Exposure Lead to Adaptive Behavior?

Sarbottam Bhagat, Augusta University
Dipakkumar P. Pravin, UNT-University of North Texas

12:00 AM

12:00 AM

DEFIYIELD: Exploitation of Open Blockchain Platforms

Nakul Ravindra Padalkar, Georgetown University
Tegveer Singh Yashwinder Ghura, Georgetown University

12:00 AM

12:00 AM

Detecting Privacy Threats with Machine Learning: A Design Framework for Identifying Side-Channel Risks of Illegitimate User Profiling

Raja Hasnain Anwar, University of Arizona
Yi (Zoe) Zou, University of Western Ontario
Muhammad Taqi Raza, University of Arizona

12:00 AM

12:00 AM

Digital Forensics Use-Case of Blockchain Technology: A Review

Md Bahauddin Badhon, Emporia State University Emporia
Nicholas Carr, Emporia State University
Sazzad Hossain, Emporia State University
M R H Khan, Emporia State University
Asura Akter Sunna, Emporia State University
Mohammed Majbah Uddin, Emporia State University
Juan A. Chavarria, Emporia State University
Tahmina Sultana, University of North Texas

12:00 AM

12:00 AM

Exploring Post-Quantum Cryptographic Schemes for TLS in 5G Nb-IoT: Feasibility and Recommendations

Kadir Sabanci, Marquette University
mumin cebe, Marquette University

12:00 AM

12:00 AM

How Does Technological Entitlement Affect Cyberdeviance? The Role of Organizational Justice.

Gabriel Owusu, University of Texas Rio Grande Valley
Nan Xiao, University of Texas Rio Grande Valley

12:00 AM

12:00 AM

Identifying Practical Challenges in the Implementation of Technical Measures for Data Privacy Compliance

Oleksandra Klymenko, Technical University of Munich
Stephen Meisenbacher, Technical University of Munich
Florian Matthes, Technical University of Munich

12:00 AM

12:00 AM

Navigating the Wave of Cybersecurity Regulations: A Systematic Analysis of Emerging Regulatory Developments

Angelica Marotta, Massachusetts Institute of Technology
Benjamin F. Madnick, Tufts University
Stuart Madnick, CAMS

12:00 AM

12:00 AM

Phishing Susceptibility – a Cognitive Dissonance Persuasion View

Wei Xie, Appalachian state university
Lakshmi Iyer, University of North Carolina at Greensboro

12:00 AM

12:00 AM

Predicting Analysts' Needs for Explainable Artificial Intelligence (XAI) in Cybersecurity Analysis

Chen Zhong, The University of Tampa
Qinwei Ni, Purple Mountain Lab
Ping Chen, Fudan University

12:00 AM

12:00 AM

Re-Assessing Privacy in the Blockchain-based Metaverse

Julia Schulmeyer, LMU Munich School of Management
Thomas Hess, LMU Munich School of Management

12:00 AM

12:00 AM

Revisiting the Privacy Paradox: A Novel Framework for Privacy Calculus

Sara Memarian Esfahani, University of North Texas
Dan J. Kim, University of North Texas

12:00 AM

12:00 AM

Risk Factors for Malicious Insider Threats – An Analysis of Attack Scenarios

Manfred Hofmeier, Universität der Bundeswehr München
Karl Seidenfad, Universität der Bundeswehr München
Andreas Rieb, SAP Fioneer
Ulrike Lechner, Universität der Bundeswehr München

12:00 AM

12:00 AM

Roles of Peer Support and Perceived Organizational Support in Reducing Nonmalicious Information Security Violations: The Interacting Effect of Personal Goal Setting

Princely Ifinedo, Brock University

12:00 AM

12:00 AM

Root Causes of Healthcare Data Breaches – A Text Analytic Approach

Aindrila Chakraborty, Texas State University
Garry White, Texas State Univeristy

12:00 AM

12:00 AM

Security Networks as an Effective Means to Reduce Spear Phishing Susceptibility

Robert Lamprecht, University Innsbruck
Franziska Haid, University of Innsbruck
Andreas Eckhardt, University of Innsbruck

12:00 AM

12:00 AM

The Effect of Neutralization: Before and After Employee Violating ISP

Jack Hsu, National Sun Yat-sen University
Kuang-Ting Cheng, National United University
Yu-Ting Chang-Chien, National Sun Yat-sen University

12:00 AM

12:00 AM

The Interplay of InfoSec Mindfulness and Sanctions on Extra Role Security Behaviors: A Trait Activation Perspective

Rebekah E. Austin, Missouri State University

12:00 AM

12:00 AM

Using a Nudge to Close the Intention–Behavior Gap for Information Privacy

lijun chen, University of Kansas
Andrew Chen, University of Kansas

12:00 AM

12:00 AM

Using stakes consciousness to better understand information security awareness

Guy Alain Sylvanus Kouyo, Université Laval
Rohit Nishant, Université Laval
Hager Khechine, Laval University

12:00 AM

12:00 AM

Value-Driven Policy Agenda to Manage Online Privacy of Young Adults

Simran Dhillon, Virginia State University

12:00 AM

12:00 AM

Vulnerability-based Cyber-Risk Management: A Text-mining Approach

Swati Jain, Indian Institute of Management Lucknow
Arunabha Mukhopadhyay, Indian Institute of Management Lucknow

12:00 AM

12:00 AM

Workarounds from an Information Security Perspective: Literature Review

Steve A. Essi, Virginia Commonwealth University
Elizabeth White Baker, Virginia Commonwealth University

12:00 AM