Track Chairs
Shuyuan Ho, smho@fsu.edu
Philip Menard, philip.menard@utsa.edu
Obi Ogbanufe, obi.ogbanufe@unt.edu
Andrew Green, agreen57@kennesaw.edu
Schedule

Subscribe to RSS Feed

2024
Friday, August 16th

A Risk-Based Approach for Prioritizing Cybersecurity Investments

Swati Jain, Indian Institute of Management Lucknow
Arunabha Mukhopadhyay, Indian Institute of Management Lucknow

AI-Based Phishing: A Double-Edged Sword of Innovation and Deception

Tiancong Fu, Queen's University
Kathryn Brohman, Queen's University

An Analysis of Data Breach Notifications in the Educational Sector: A Situational Crisis Communication Theory Perspective

Alfred P. Ortiz, IE Business School
Alvaro E. Arenas, IE University

An Investigation of the Role of Cybersecurity Professionals in Shaping AI Integration and Strategy

Raghvendra Singh, State University of New York at Buffalo
Dominic Sellitto, University at Buffalo
Sanjukta Das Smith, University at Buffalo, The State University of New York

Analyzing Risks to Internal Developer Platforms

Jordan Shropshire, University of South Alabama
Maureen S. van Devender, University of South Alabama

Breaking Down Privacy by Design: A Threefold Perspective

Alexandra Klymenko, Technical University of Munich
Stephen Meisenbacher, Technical University of Munich
Ali Asaf Polat, Technical University of Munich
Florian Matthes, Technical University of Munich

Can Mental Health Affect InfoSec Behavior?

Naomi Woods, University of Jyväskylä
Hanna Paananen, University of Jyvaskyla

Construction and Analysis of a Large-Scale Firm-Level Cybersecurity Posture Dataset

Abulfaz Hajizada, The University of Tulsa
Matthew Adams, The University of Tulsa
Tyler Moore, The University of Tulsa

Cybersecurity in the Age of Uncertainty: A Call for Resilient and Antifragile Systems

Stephen V. Flowerday, University of Tulsa
Jack Laurie Tilbury, The University of Tulsa
James Higgs, The University of Tulsa

CyTRI – Fostering Security Measures Against Emerging Cyber Threats

Mana Azamat, OFFIS – Institute for Information Technology
Oliver Werth, OFFIS e. V. - Institute for Information Technology
Mathias Uslar, OFFIS - Institute for Information Technology

Deploying model obfuscation: towards the privacy of decision-making models on shared platforms

Payel Sadhukhan, The Neotia University
Tanujit Chakraborty, Sorbonne University
Kausik Sengupta, TCG CREST

Effect of Computer Usage Pattern and its Interaction with Personal Characteristics on User-Induced System Vulnerability

Arindam Majumder, University of North Texas
Debalina Bera, Indian Institute of Management Sirmaur
Dan J. Kim, University of North Texas

Employee Turnover Troubles: Unmasking Data Breaches in a Shifting Workforce

Mohammad Mohsin, The University of North Carolina at Greensboro
Franck Loic Soh Noume, University of North Carolina at Greensboro
Lakshmi Iyer, university of North Carolina Greensboro
Moez Farokhnia Hamedani, University of North Carolina at Greensboro

Employees’ Post–Breach Information Security Policy Non-Compliance: An Organizational Legitimacy Perspective

Siwei Jiang, Mississippi State University
Alaa Nehme, Mississippi State University

Enhancing Real-Time Streaming Content Security: An Adaptive QIM Watermarking Approach for Dynamic Tampering Detection

Harsha sammangi, Dakota state university
Giridhar Reddy Bojja, Dakota State University
Loknath Sai Ambati, Dakota State University
Md Jabir Rahman, Oklahoma City University
Jun Liu, Dakota State University

Enhancing Supply Chains with Blockchain-Driven Reinforcement Learning for Dynamic Inventory Management- Taxonomy and Comparative Analysis

Divija Gadiraju, University of Nebraska at Omaha
Deepak Khazanchi, University of Nebraska at Omaha

Epidemiology Triad Analysis Guiding Malware Control Expenditure

Stephen V. Flowerday, University of Tulsa
James Higgs, The University of Tulsa
Ethan Flowerday, University of Tulsa
Jack Laurie Tilbury, The University of Tulsa

Exploring the Maturity of Privacy Patterns: A Case Study

Lukas Waidelich, Pforzheim University
Thomas Schuster, Hochschule Pforzheim

FAIDS: Artificial Intelligence Developmental Systems Framework for Predicting and Preventing Cyberattacks in Supply Chain Networks

Lordt Becklines, Dakota State University

Formation of Cybersecurity Awareness: A Positive Psychological Perspective

Yuxiang Hong, Hangzhou Dianzi University
Da Wang, Renmin University of China
Majid Mohammad Shafiee, University of Isfahan
Merrill Warkentin, Mississippi State University

Game On: Theorizing the Impacts of Gamification on Organizational Cybersecurity Training Efficacy

Biju Varghese, Rochester Institute of Technology
Rajendran Murthy, Rochester Institute of Technology
Sean William Hansen, Rochester Institute of Technology

Generative Adversarial Networks in Fraud Detection: A Systematic Literature Review

Man Wang, Dakota State University
Omar El-Gayar, Dakota State University

Hardening the ‘Human Firewall’ Through Security Role Identity Activation: A Social Information Processing Perspective

Joshua M. Davis, Missouri State University

Impact of Data Breach Disclosure Sentiment on Market Reactions: Role of News Pressure and Breach Source Type

Mohammad Mohsin, The University of North Carolina at Greensboro
Hamid R. Nemati, UNCG
Moez Farokhnia Hamedani, University of North Carolina at Greensboro

Impact of organizations’ exposure in social media on the likelihood of a data breach

Md. Tuhinur Rahman, University of North Carolina at Greensboro
Hamid R. Nemati, UNCG

Impact of security awareness on joining in vulnerability reward programs

Md. Tuhinur Rahman, University of North Carolina at Greensboro
Indika Dissanayake, The University Of North Carolina At Greensboro

Impact of SETA Communications on Information Security Policy Violations in Remote and Hybrid Working Environments

Balagopal N, IIT Madras
Saji K Mathew, Indian Institute of Technology Madras
Vijayan Sugumaran, Oakland University

Intuition or Analysis? Investigation of Employees’ Cognitive Mode of Information Security Policy Compliance

Weijie Zhao, University of Alabama
Allen Johnston, University of Alabama
Mikko Siponen, University of Alabama

Matching Information Security Management with Organisational Agility

Temitayo Eniola Adetona, Stockholm University
Gideon Mekonnen Jonathan, Stockholm University
Parisa Aasi, Texas A & M

Navigating Information Security Communication Fatigue: Understanding Its Impact on Employee Policy Noncompliance

Meng (Leah) Li, Mississippi State University
Alaa Nehme, Mississippi State University

Privacy Patterns Analysis: A Classification by Types, Strategies and Tactics of existing Patterns

Lukas Waidelich, Hochschule Pforzheim
Thomas Schuster, Hochschule Pforzheim

Routine, Situational, and Exceptional Security Violations in Organizations

Clay Posey, Brigham Young University
Mitchell McCoard, Brigham Young University
AJ Burns, Louisiana State University
Tom L. Roberts, University of Texas at Tyler

Security Belts: A Maturity Model for DevOps Teams to Increase the Software Security of their Product - An Experience Report

Samira Taaibi, Fraunhofer Institute for Mechatronic Systems Design
Stefan Dziwok, Fraunhofer IEM
Lars Hermerschmidt, Rewe Group
Thorsten Koch, Fraunhofer Institute for Mechatronic Systems Design
Sven Merschjohann, Fraunhofer Institute for Mechatronic Systems Design
Mark Vollmary, AXA Konzern AG

Security Burnout Dilemma: A Test of the Job Demands - Resources Model

Sumin Kim, Mississippi State University
Kent Marett, Mississippi State University

Security Risk Assessment for the Internet of Medical Things - A Structured Literature Review

Sharon Gumina, University of South Carolina
John Gerdes, University of South Carolina

Strengthening Managerial Foresight to Defeat Cyber Threats

sander zeijlemaker, Massachusetts Institute of Technology
Ranjan Pal, MIT
Michael Siegel, Massachusetts Institute of Technology

The Impact of Cognitive Load on Belief in Fake News and Real News

Sakshi Singh, State University of New York, University at Albany
Sanjay Goel, University at Albany, SUNY

The Impact of Cognitive Load on Responses to Security Alerts

Lakshika Vaishnav, University at Albany, SUNY
Sanjay Goel, University at Albany, SUNY

The Role of Blockchain Technology Adoption on Data Breaches

Kyungmyung Jang, Mississippi State University
Merrill Warkentin, Mississippi State University

Top Management Security Awareness, Board IT Governance, and Data Breach

Niaz Mohammed, Florida Atlantic University
Chul Woo Yoo, FAU