At the same time, with increased online access and usage, a new set of illegal activities and morally questionable practices are now enabled by the Internet. Criminals are finding new ways online to conduct illegal activities like online fraud, identity theft, cyber terrorism, piracy, and transactions of illegal products/services (drugs, sexual solicitation, human trafficking, child pornography). With the democratization of content sharing and access in the online medium, harmful and inappropriate content have begun to fill the online space (e.g., online suicide content such as ‘Blue Whale’ game, live streaming of crimes on social media, hate motivated ideologies, revenge porn, cyberbullying, cyberthreats). More recently, we see the emergence of undesirable outcomes such as discrimination and the spread of fake news on the digital medium. Despite these trends, policies and regulations are not up to date in curbing these new issues. These worrying trends bring important questions to the MIS community: Should online content remain unregulated? Who should be responsible for the screening of inappropriate content online (site owners, user community, or third party government agencies)? What are core guidelines and policies with regards to content/information sharing on online avenues?
As a response to these challenges, this track seeks contributions that attempt to 1) provide a better understanding of the potential security/privacy/ethical issues that may arise from data usage, 2) consequences of these issues on business, social, legal, or political outcomes, 3) possible solutions to address the concerns of cyber-security, user privacy and ethical data usage, and balance these issues with corporate initiatives for enhancing value to users. Given the said challenges are underexplored in emerging online contexts (e.g., AI applications, blockchain technologies, Internet-Of-Things, crowdsourcing/crowdfunding platforms, sharing economy, smartphone apps, social media/networking), we highly encourage the submission of works that are based on these domains. At the same time, we are open towards works that deepen our knowledge of these issues in traditional contexts (e.g., health, finance, banking, ecommerce, online marketing). Submitted manuscripts can draw on any theoretical backgrounds (including but not limited to psychology, economics, sociology, criminology, or computational sciences) and methodological approaches (analytical work, experiments, qualitative studies, design science, and so forth).
Track Chairs:
Jason Chan
Seung Hyun Kim
Hanna Krasnova
Subscribe to RSS Feed (Opens in New Window)
Jia Wei, University of Arkansas |
|
Jaehyeon Ju, McGill University |
|
Can Conversational User Interfaces Be Harmful? The Undesirable Effects on Privacy Concern Stefanie Sohn, Technische Universität Braunschweig |
|
Does Cybersecurity Slow Down Digitization? A Quasi-experiment of Security Breach Notification Laws Tianjian Zhang, Oklahoma State University |
|
Leting Zhang, Temple University |
|
Empowering Users to Detect Data Analytics Discriminatory Recommendations Sepideh Ebrahimi, York University |
|
Fake News Flags, Cognitive Dissonance, and the Believability of Social Media Posts Kathrin Figl, University of Innsbruck |
|
Geo-Targeting, Privacy, and the Rise of Consumer Location Trajectories Meghanath M Y, Carnegie Mellon University |
|
How Much is Too Much: Employee Monitoring, Surveillance, and Strain Tripti Singh, The University of Alabama |
|
Information Disclosure in Location-based Services: An Extended Privacy Calculus Model Dana Naous, Faculty of Business and Economics (HEC), University of Lausanne |
|
Investigating Privacy Concerns Related to Mobile Augmented Reality Applications David Harborth, Goethe University Frankfurt am Main |
|
Learning to See the Hook: Comparing Phishing Training Approaches Andrew Harrison, University of Cincinnati |
|
On the Benefits of Senior Executives’ Information Security Awareness Christian Olt, Technische Universität Darmstadt |
|
Security-Related Cynicism: A Double-Edged Sword? Lennart Jaeger, German Graduate School of Management & Law |
|
Structural Complexity and Data Breach Risk Hüseyin Tanriverdi, The University of Texas at Austin |
|
The Application of Operant Conditioning Theory in Employees’ IS Security Behavioral Management Ning Yang, University of Alabama |
|
The Changing Tides of Investments and Strategies and Their Impacts on Security Breaches He Li, Clemson University |
|
The Impact of Anonymity on Piracy – Evidence from China Kayla Guangrui Li, HKUST |
|
Nora Wessels, Technische Universität Darmstadt |
|
Understanding Phishing Susceptibility: An Integrated Model of Cue-utilization and Habits Emmanuel Ayaburi, University of Texas, Rio Grande Valley |
|
Using Agent-Based Modelling to Address Malicious Behavior on Social Media Agnieszka Onuchowska, University of South Florida |
|
Validating a Control-Based Model of Information Security Policy Compliance – A Meta-Analysis Jing Liu, University of Science and Technology of China |