2023 | ||
Thursday, August 10th | ||
---|---|---|
12:00 AM |
A deep learning-based Cyber-risk Management framework for smart cities Kalpit Sharma, Indian Institute of Management Amritsar 12:00 AM |
|
12:00 AM |
Tizian Matschak, University of Goettingen 12:00 AM |
|
12:00 AM |
A Qualitative Study on Acceptance Factors of Economic Approaches on IT Security Investment Decisions Laura Niedzela, Martin Luther University Halle-Wittenberg 12:00 AM |
|
12:00 AM |
Joseph Nwankpa, Miami University 12:00 AM |
|
12:00 AM |
Are Information Security Practices Driven by the Likelihood and potential Impact of Security Events? Gunjan Batra, Kennesaw State University 12:00 AM |
|
12:00 AM |
Benchmarking the Robustness of Phishing Email Detection Systems Benjamin Ampel, University of Arizona 12:00 AM |
|
12:00 AM |
Catastrophe Bond Trading Can Boost Security Improving Cyber (Re-)Insurance Markets Ranjan Pal, MIT 12:00 AM |
|
12:00 AM |
Cybersecurity Awareness and Adaptive Behavior: Does Prior Exposure Lead to Adaptive Behavior? Sarbottam Bhagat, Augusta University 12:00 AM |
|
12:00 AM |
DEFIYIELD: Exploitation of Open Blockchain Platforms Nakul Ravindra Padalkar, Georgetown University 12:00 AM |
|
12:00 AM |
Raja Hasnain Anwar, University of Arizona 12:00 AM |
|
12:00 AM |
Digital Forensics Use-Case of Blockchain Technology: A Review Md Bahauddin Badhon, Emporia State University Emporia 12:00 AM |
|
12:00 AM |
Exploring Post-Quantum Cryptographic Schemes for TLS in 5G Nb-IoT: Feasibility and Recommendations Kadir Sabanci, Marquette University 12:00 AM |
|
12:00 AM |
How Does Technological Entitlement Affect Cyberdeviance? The Role of Organizational Justice. Gabriel Owusu, University of Texas Rio Grande Valley 12:00 AM |
|
12:00 AM |
Oleksandra Klymenko, Technical University of Munich 12:00 AM |
|
12:00 AM |
Angelica Marotta, Massachusetts Institute of Technology 12:00 AM |
|
12:00 AM |
Phishing Susceptibility – a Cognitive Dissonance Persuasion View Wei Xie, Appalachian state university 12:00 AM |
|
12:00 AM |
Predicting Analysts' Needs for Explainable Artificial Intelligence (XAI) in Cybersecurity Analysis Chen Zhong, The University of Tampa 12:00 AM |
|
12:00 AM |
Re-Assessing Privacy in the Blockchain-based Metaverse Julia Schulmeyer, LMU Munich School of Management 12:00 AM |
|
12:00 AM |
Revisiting the Privacy Paradox: A Novel Framework for Privacy Calculus Sara Memarian Esfahani, University of North Texas 12:00 AM |
|
12:00 AM |
Risk Factors for Malicious Insider Threats – An Analysis of Attack Scenarios Manfred Hofmeier, Universität der Bundeswehr München 12:00 AM |
|
12:00 AM |
Princely Ifinedo, Brock University 12:00 AM |
|
12:00 AM |
Root Causes of Healthcare Data Breaches – A Text Analytic Approach Aindrila Chakraborty, Texas State University 12:00 AM |
|
12:00 AM |
Security Networks as an Effective Means to Reduce Spear Phishing Susceptibility Robert Lamprecht, University Innsbruck 12:00 AM |
|
12:00 AM |
The Effect of Neutralization: Before and After Employee Violating ISP Jack Hsu, National Sun Yat-sen University 12:00 AM |
|
12:00 AM |
Rebekah E. Austin, Missouri State University 12:00 AM |
|
12:00 AM |
Using a Nudge to Close the Intention–Behavior Gap for Information Privacy lijun chen, University of Kansas 12:00 AM |
|
12:00 AM |
Using stakes consciousness to better understand information security awareness Guy Alain Sylvanus Kouyo, Université Laval 12:00 AM |
|
12:00 AM |
Value-Driven Policy Agenda to Manage Online Privacy of Young Adults Simran Dhillon, Virginia State University 12:00 AM |
|
12:00 AM |
Vulnerability-based Cyber-Risk Management: A Text-mining Approach Swati Jain, Indian Institute of Management Lucknow 12:00 AM |
|
12:00 AM |
Workarounds from an Information Security Perspective: Literature Review Steve A. Essi, Virginia Commonwealth University 12:00 AM |
Cybersecurity remains a key challenge for organizations despite massive investments over the last two decades. While technological advancements have been made to improve cybersecurity, human vulnerabilities have become the weakest link in security. High-profile events such as defections, espionage, and massive data breaches have led the public to question their own expectations of privacy. While there is an abundance of practices and techniques for employing cybersecurity, many hard problems remain unanswered.
The purpose of this track is to provide a forum for theoretical developments, empirical research findings, case studies, methodologies, artifacts, and other high-quality manuscripts. Sponsored by SIGSEC, we seek to address important questions arising from emerging developments in information security, such as: security analytics, financial crimes, security analytics, and digital forensics? How do system defenders share information to mitigate vulnerabilities and exploits? Does pervasive data collection deter privacy-conscious individuals? Do regulations and policies influence employee security behaviors and organizational security postures?
Track Chairs
Obi Ogbanufe, University of North Texas, obi.ogbanufe@unt.edu
Michael Curry, Oregon State University, michael.curry@oregonstate.edu
Kane Smith, University of North Texas, kane.smith@unt.edu
Shuyuan Mary Metcalfe, Florida State University, smho@fsu.edu