2024 | ||
Friday, August 16th | ||
---|---|---|
A Risk-Based Approach for Prioritizing Cybersecurity Investments Swati Jain, Indian Institute of Management Lucknow
|
||
12:00 AM |
AI-Based Phishing: A Double-Edged Sword of Innovation and Deception Tiancong Fu, Queen's University
|
|
12:00 AM |
Alfred P. Ortiz, IE Business School
|
|
12:00 AM |
An Investigation of the Role of Cybersecurity Professionals in Shaping AI Integration and Strategy Raghvendra Singh, State University of New York at Buffalo
|
|
12:00 AM |
Analyzing Risks to Internal Developer Platforms Jordan Shropshire, University of South Alabama
|
|
12:00 AM |
Breaking Down Privacy by Design: A Threefold Perspective Alexandra Klymenko, Technical University of Munich
|
|
12:00 AM |
Can Mental Health Affect InfoSec Behavior? Naomi Woods, University of Jyväskylä
|
|
12:00 AM |
Construction and Analysis of a Large-Scale Firm-Level Cybersecurity Posture Dataset Abulfaz Hajizada, The University of Tulsa
|
|
12:00 AM |
Cybersecurity in the Age of Uncertainty: A Call for Resilient and Antifragile Systems Stephen V. Flowerday, University of Tulsa
|
|
12:00 AM |
CyTRI – Fostering Security Measures Against Emerging Cyber Threats Mana Azamat, OFFIS – Institute for Information Technology
|
|
12:00 AM |
Deploying model obfuscation: towards the privacy of decision-making models on shared platforms Payel Sadhukhan, The Neotia University
|
|
12:00 AM |
Arindam Majumder, University of North Texas
|
|
12:00 AM |
Employee Turnover Troubles: Unmasking Data Breaches in a Shifting Workforce Mohammad Mohsin, The University of North Carolina at Greensboro
|
|
12:00 AM |
Siwei Jiang, Mississippi State University
|
|
12:00 AM |
Harsha sammangi, Dakota state university
|
|
12:00 AM |
Divija Gadiraju, University of Nebraska at Omaha
|
|
12:00 AM |
Epidemiology Triad Analysis Guiding Malware Control Expenditure Stephen V. Flowerday, University of Tulsa
|
|
12:00 AM |
Exploring the Maturity of Privacy Patterns: A Case Study Lukas Waidelich, Pforzheim University
|
|
12:00 AM |
Lordt Becklines, Dakota State University
|
|
12:00 AM |
Formation of Cybersecurity Awareness: A Positive Psychological Perspective Yuxiang Hong, Hangzhou Dianzi University
|
|
12:00 AM |
Game On: Theorizing the Impacts of Gamification on Organizational Cybersecurity Training Efficacy Biju Varghese, Rochester Institute of Technology
|
|
12:00 AM |
Generative Adversarial Networks in Fraud Detection: A Systematic Literature Review Man Wang, Dakota State University
|
|
12:00 AM |
Joshua M. Davis, Missouri State University
|
|
12:00 AM |
Mohammad Mohsin, The University of North Carolina at Greensboro
|
|
12:00 AM |
Impact of organizations’ exposure in social media on the likelihood of a data breach Md. Tuhinur Rahman, University of North Carolina at Greensboro
|
|
12:00 AM |
Impact of security awareness on joining in vulnerability reward programs Md. Tuhinur Rahman, University of North Carolina at Greensboro
|
|
12:00 AM |
Balagopal N, IIT Madras
|
|
12:00 AM |
Weijie Zhao, University of Alabama
|
|
12:00 AM |
Matching Information Security Management with Organisational Agility Temitayo Eniola Adetona, Stockholm University
|
|
12:00 AM |
Meng (Leah) Li, Mississippi State University
|
|
12:00 AM |
Privacy Patterns Analysis: A Classification by Types, Strategies and Tactics of existing Patterns Lukas Waidelich, Hochschule Pforzheim
|
|
12:00 AM |
Routine, Situational, and Exceptional Security Violations in Organizations Clay Posey, Brigham Young University
|
|
12:00 AM |
Samira Taaibi, Fraunhofer Institute for Mechatronic Systems Design
|
|
12:00 AM |
Security Burnout Dilemma: A Test of the Job Demands - Resources Model Sumin Kim, Mississippi State University
|
|
12:00 AM |
Security Risk Assessment for the Internet of Medical Things - A Structured Literature Review Sharon Gumina, University of South Carolina
|
|
12:00 AM |
Strengthening Managerial Foresight to Defeat Cyber Threats sander zeijlemaker, Massachusetts Institute of Technology
|
|
12:00 AM |
The Impact of Cognitive Load on Belief in Fake News and Real News Sakshi Singh, State University of New York, University at Albany
|
|
12:00 AM |
The Impact of Cognitive Load on Responses to Security Alerts Lakshika Vaishnav, University at Albany, SUNY
|
|
12:00 AM |
The Role of Blockchain Technology Adoption on Data Breaches Kyungmyung Jang, Mississippi State University
|
|
12:00 AM |
Top Management Security Awareness, Board IT Governance, and Data Breach Niaz Mohammed, Florida Atlantic University
|
Track Chairs
Shuyuan Ho, smho@fsu.edu
Philip Menard, philip.menard@utsa.edu
Obi Ogbanufe, obi.ogbanufe@unt.edu
Andrew Green, agreen57@kennesaw.edu