Subscribe to RSS Feed (Opens in New Window)
2025 | ||
Friday, August 15th | ||
12:00 AM |
Angelica Marotta, Massachusetts Institute of Technology 12:00 AM |
|
---|---|---|
12:00 AM |
Advancing Cyber Risk by Reducing Strategic Control Gaps sander zeijlemaker, Massachusetts Institute of Technology 12:00 AM |
|
12:00 AM |
Christian Chung, Paris Dauphine University 12:00 AM |
|
12:00 AM |
An Affordance Perspective on Artificial Intelligence’s Role in Data Protection Guy Alain Sylvanus Kouyo, Université Laval 12:00 AM |
|
12:00 AM |
An AI-Driven Framework for Autonomous Network Vulnerability Management Shadi Esnaashari, Johns Hokins University 12:00 AM |
|
12:00 AM |
An Analysis of Executive Managers Acceptance of Cyber Security Risk Management – A Systematic Review Lordt Becklines, Dakota State University 12:00 AM |
|
12:00 AM |
An Integrative Model of Phishing Susceptibility Yuxiao Luo, Appalachian State University 12:00 AM |
|
12:00 AM |
An Organizational Field Experiment on Phishing and Cybersecurity Risk Homeostasis Theory Katharina Hobbensiefken, Carl von Osietzky University of Oldenburg 12:00 AM |
|
12:00 AM |
Antecedents of Trust in Deepfakes: Insights from the Elaboration Likelihood Model Steven Gal, Toronto Metropolitan University 12:00 AM |
|
12:00 AM |
Balancing Risk and Reward in Cybersecurity Investment Decisions Goeun Kim, Massachusetts Institute of Technology 12:00 AM |
|
12:00 AM |
Beyond Expectations: Relative Deprivation in Post-Breach Compensation Jacob Chun Cheng, Department of Operations Management & Information Systems 12:00 AM |
|
12:00 AM |
Big Data and Personal Information Privacy in Developing Countries: A Case of Kenya JOHNSON MASINDE, Kenyatta University 12:00 AM |
|
12:00 AM |
Bridging Research and Standards: A Mapping of Social Engineering Countermeasures Anita Neumannova, WU Vienna University of Economics and Business 12:00 AM |
|
12:00 AM |
But I Trusted You: An Experiment on Digital Piracy and Platform Trust Andy Bowman, East Carolina University 12:00 AM |
|
12:00 AM |
Cognitive Dissonance and Persuasion for Smishing (CDP-S): A Conceptual Framework Wei Xie, Appalachian state university 12:00 AM |
|
12:00 AM |
Cognitive Load and Its Influence on Fake and Real News Perception Sakshi Singh, State University of New York, University at Albany 12:00 AM |
|
12:00 AM |
Cyber Risk Challenges in UPI and CBDC Anuj S.S Mishra, Indian Institute of Management Lucknow 12:00 AM |
|
12:00 AM |
Samiran Das, The University of Texas Rio Grande Valley 12:00 AM |
|
12:00 AM |
Cybersecurity Knowledge Resources and Capabilities: Strategic Determinants of Data Breach Mohammad Mohsin, The University of North Carolina at Greensboro 12:00 AM |
|
12:00 AM |
Biju Varghese, Rochester Institute of Technology 12:00 AM |
|
12:00 AM |
Deepfakes Threats and the Deterrence of Aspiring Content Creators Ghazal Abdolhossein Khani, Oklahoma State University 12:00 AM |
|
12:00 AM |
Janne Joonas Vepsäläinen, Tampere University 12:00 AM |
|
12:00 AM |
Motahareh Pourbehzadi, University of North Carolina Greensboro 12:00 AM |
|
12:00 AM |
Halima Maghraoui, Institut MinesTélecom Business School 12:00 AM |
|
12:00 AM |
Factors Influencing Individual’s Privacy-Protective Behavior in the Age of Surveillance Capitalism Jurgen Geitner, University of Cape Town 12:00 AM |
|
12:00 AM |
FairPrivacy: A Robust Q&A System for Enhancing Transparency in IoT Turquoise H. Richardson, University of Texas at San Antonio 12:00 AM |
|
12:00 AM |
Far Enough to Share: Impact of Psychological Distance on GenAI Disclosure Muriel Frank, Interdisciplinary Centre for Security, Reliability and Trust (SnT) 12:00 AM |
|
12:00 AM |
Fear Appeal and Psychological Distance in InfoSec Advice Marvin Adjei Kojo Lomo, UNC Greensboro 12:00 AM |
|
12:00 AM |
Tiancong Fu, Queen's University 12:00 AM |
|
12:00 AM |
GAMIFICATION-BASED SPEAR PHISHING AWARENESS TRAINING SYSTEM: FOUR NOVEL DESIGN ARTIFACTS Lina Zhou, UNC Charlotte 12:00 AM |
|
12:00 AM |
Generative AI Privacy Concerns. What does Generation Z think? Simran Dhillon, Virginia State University 12:00 AM |
|
12:00 AM |
Guidelines for Longitudinal Information Security Policy Compliance Research Fredrik Karlsson, Örebro University 12:00 AM |
|
12:00 AM |
Idiographic Approach to Fatigue in Cybersecurity Behavior: The Role of Security Communication Mohammad Mohsin, The University of North Carolina at Greensboro 12:00 AM |
|
12:00 AM |
Information Security Compliance Intentions: Role of Contingent Employees Joseph Kwame ADJEI, Ashesi University 12:00 AM |
|
12:00 AM |
Investigating User Inaction in Post-Breach Situations Arman Falahati, University at Buffalo 12:00 AM |
|
12:00 AM |
Niaz Mohammed, Florida Atlantic University 12:00 AM |
|
12:00 AM |
Misinformation Detection on Social Media: A Theory-Driven Feature Generation Approach Hui Rao, The University of Melbourne 12:00 AM |
|
12:00 AM |
Arindam Majumder, University of North Texas 12:00 AM |
|
12:00 AM |
Norms as Shields: A Global Analysis of Cultural Tightness’ Impact on DDoS Attacks Xinzhe Niu, University of Memphis 12:00 AM |
|
12:00 AM |
Phishing Attacks in Context: Organizational Factors Shaping Phishing Susceptibility Fabian Hable, Vrije Universiteit Amsterdam 12:00 AM |
|
12:00 AM |
Privacy Compliance in Small-sized Enterprises: An Investigation in the German E-commerce Sector Alexandra Klymenko, Technical University of Munich 12:00 AM |
|
12:00 AM |
Risk Classification and Compliance of AI Systems under the EU AI Act Thomas Schuster, Pforzheim University 12:00 AM |
|
12:00 AM |
FREDERICK AKWESI ADRAH, UNIVERSITY OF NORTH CAROLINA GREENSBORO 12:00 AM |
|
12:00 AM |
Wael Soliman, University of Agder 12:00 AM |
|
12:00 AM |
Security Risk Factors of Blockchain-based Applications and Propositions for Future Research Wilfried Nzabandora Bazomanza, Université Laval 12:00 AM |
|
12:00 AM |
Shaping Secure Behavior through Social Support Structures: An Empirical Examination Joshua M. Davis, Missouri State University 12:00 AM |
|
12:00 AM |
The Cyber-Storm: NLP Adoption and the Escalating Risk of Cyberattacks Issack Shama Guyo, University of Texas Rio Grande Valley 12:00 AM |
|
12:00 AM |
The Emergence Process of Collective Perceptions of Digital Privacy in Organizations Maryam B. Farahani, McGill Desautels Faculty of Management 12:00 AM |
|
12:00 AM |
The Impact of Cognitive Load on Responses to Security Alerts: Investigating Human Errors Lakshika Vaishnav, University at Albany, SUNY 12:00 AM |
|
12:00 AM |
The Impact of Phishing Susceptibility on Different Individual Outcomes Oluwatosin Esther Adeleke, Queen's University 12:00 AM |
|
12:00 AM |
The Influence of Moral Values on Information Security Policy Compliance in AI-Monitored Environments Junyi Yang, McMaster University 12:00 AM |
|
12:00 AM |
Toward a Theory of Passive Sanctions in Cybersecurity Mikko Siponen, University of Alabama 12:00 AM |
|
12:00 AM |
Buddhi Pathak, University of the West of England, Bristol 12:00 AM |
|
12:00 AM |
Trust Dynamics in Inter-Organizational Cybersecurity Governance Ana-Maria Florescu, CERGAM, FEG 12:00 AM |
|
12:00 AM |
Understanding Gen Z's Vulnerability to Romance Scams Deepti Agrawal, California State Polytechnic University Pomona 12:00 AM |
|
12:00 AM |
Understanding the antecedents of repeat data breach incidents for firms Joseph Nwankpa, Miami University 12:00 AM |
|
12:00 AM |
Unraveling The Link Between Sociodemographics and Cybersecurity Giacomo Gori, Università di Bologna 12:00 AM |
|
12:00 AM |
What Does the Google Play Store Tell Us About Information Privacy? An Examination of EdTech Apps Mark Keith, Brigham Young Universify 12:00 AM |