Subscribe to RSS Feed (Opens in New Window)

Schedule

Empirical Analysis of Data Breach Litigation

Sasha Romanosky, Heinz College, Carnegie Mellon University, Pittsburgh, PA, United States.
David Hoffman, Beasley School of Law, Temple University, Philidelphia, PA, United States.
Alessandro Acquisti, Heinz College, Carnegie Mellon University, Pittsburgh, PA, United States.

Examining the Antecedents of Sarbanes-Oxley Section 404 IT Control Weaknesses: An Empirical Study

Basil Hamdan, Information Systems, Virginia Commonwealth University, Richmond, VA, United States.

Exploring Interpersonal Relationships in Security Information Sharing

Sigi Goode, School of Accounting and Business Information Systems, The Australian National University, Canberra, ACT, Australia.
David Lacey, School of Accounting and Business Information Systems, The Australian National University, Canberra, ACT, Australia.

Extending UTAUT to Predict the Use of Location-Based Services

Haejung Yun, Graduate School of Information, Yonsei University, Seoul, Korea, Republic of.
Dongho Han, Strategy and Planning, Woongjin Coway Co., Ltd., Seoul, Korea, Republic of.
Choong Lee, Graduate School of Information, Yonsei University, Seoul, Korea, Republic of.

Get a Cue on IS Security Training: Explaining the Difference between how Security Cues and Security Arguments Improve Secure Behavior

Jeffrey Jenkins, University of Arizona, Tucson, AZ, United States.
Alexandra Durcikova, University of Arizona, Tucson, AZ, United States.
Mary Burns, University of Arizona, Tucson, AZ, United States.

Optimal IS Security Investment: Cyber Terrorism vs. Common Hacking

Jian Hua, Marketing and Information Systems, University of the District of Columbia, Washington, DC, United States.
Sanjay Bapna, Information Science and Systems, Morgan State University, Baltimore, MD, United States.

Privacy Engineering: Personal Health Records in Cloud Computing Environments

Alexander Kaletsch, Department of Informatics, Technische Universität München, Munich, Germany.
Ali Sunyaev, Department of Information Systems, University of Cologne, Cologne, Germany.

Privacy in Online Social Networks

Nan Zhang, ISOM, School of Business and Management, Hong Kong University of Science and Technology, Kowloon, Hong Kong.
Chong Wang, ISOM, School of Business and Management, Hong Kong University of Science and Technology, Kowloon, Hong Kong.
Yan Xu, ISOM, School of Business and Management, Hong Kong University of Science and Technology, Kowloon, Hong Kong.

Security Concerns in the Nomological Network of Trust and Big 5: First Order Vs. Second Order

Gaurav Bansal, Austin E. Cofrin School of Business, Universtiy of Wisconsin - Green Bay, Green Bay, WI, United States.

The Impact of Security Practices on Regulatory Compliance and Security Performance

Kwon Juhee, Tuck School of Business, Dartmouth College, Hanover, NH, United States.
Johnson M.Eric, Tuck School of Business, Dartmouth College, Hanover, NH, United States.

The Role of Risk Perception, Trust, Innovativeness and Emotion in Developing Consumer’s Satisfaction in Electronic Mediated Environment (EME)

Hua Dai, Information Systems, University of Wisconsin-La Crosse, La Crosse, WI, United States.
Xin Luo, Anderson School of Management, University of New Mexico, Albuquerque, NM, United States.

Which Phish Get Caught? An Exploratory Study of Individual Susceptibility to Phishing

Gregory Moody, University of Pittsburgh, Pittsburgh, PA, United States.
Dennis Galletta, University of Pittsburgh, Pittsburgh, PA, United States.
Jon Walker, University of Pittsburgh, Pittsburgh, PA, United States.
Brian Dunn, University of Pittsburgh, Pittsburgh, PA, United States.