Subscribe to RSS Feed (Opens in New Window)
Empirical Analysis of Data Breach Litigation Sasha Romanosky, Heinz College, Carnegie Mellon University, Pittsburgh, PA, United States. |
|
Examining the Antecedents of Sarbanes-Oxley Section 404 IT Control Weaknesses: An Empirical Study Basil Hamdan, Information Systems, Virginia Commonwealth University, Richmond, VA, United States. |
|
Exploring Interpersonal Relationships in Security Information Sharing Sigi Goode, School of Accounting and Business Information Systems, The Australian National University, Canberra, ACT, Australia. |
|
Extending UTAUT to Predict the Use of Location-Based Services Haejung Yun, Graduate School of Information, Yonsei University, Seoul, Korea, Republic of. |
|
Jeffrey Jenkins, University of Arizona, Tucson, AZ, United States. |
|
Optimal IS Security Investment: Cyber Terrorism vs. Common Hacking Jian Hua, Marketing and Information Systems, University of the District of Columbia, Washington, DC, United States. |
|
Privacy Engineering: Personal Health Records in Cloud Computing Environments Alexander Kaletsch, Department of Informatics, Technische Universität München, Munich, Germany. |
|
Privacy in Online Social Networks Nan Zhang, ISOM, School of Business and Management, Hong Kong University of Science and Technology, Kowloon, Hong Kong. |
|
Security Concerns in the Nomological Network of Trust and Big 5: First Order Vs. Second Order Gaurav Bansal, Austin E. Cofrin School of Business, Universtiy of Wisconsin - Green Bay, Green Bay, WI, United States. |
|
The Impact of Security Practices on Regulatory Compliance and Security Performance Kwon Juhee, Tuck School of Business, Dartmouth College, Hanover, NH, United States. |
|
Hua Dai, Information Systems, University of Wisconsin-La Crosse, La Crosse, WI, United States. |
|
Which Phish Get Caught? An Exploratory Study of Individual Susceptibility to Phishing Gregory Moody, University of Pittsburgh, Pittsburgh, PA, United States. |