Cyber-security, Privacy, Legal and Ethical Issues in IS

Track Description
The ubiquitous growth of the Internet, and advances in communications, networking, data gathering and storage technologies, have exacerbated the vulnerability of information systems. The extent, frequency, seriousness, and diversity of external attacks to computer systems are unprecedented. Meanwhile, internal attacks and abuse of proprietary information assets account for at least half of the serious security and privacy incidents worldwide. On another front, the personal data gathered and stored by companies is ever more frequently used for profiling and analysis, often without the knowledge or consent of the individuals or groups concerned. Mobile computing with location-aware capabilities further exacerbates these concerns. Furthermore, the fast-paced development of new artificial and augmented intelligence applications challenge existing legal, regulatory and ethical frameworks. Thus, it is imperative to better understand the laws, policies, strategies, technologies, and actions by societies, organizations, groups, and individuals that address these issues.

Accordingly, this track provides a forum for focused discussion on information security, privacy, legal and ethical issues. We seek to address important questions arising from the issues mentioned above, such as: How do online social networks or virtual worlds threaten the security and privacy of the individual participants? What are the underlying economic, behavioral, and societal implications of new security technologies? Should governments get involved in the process of creating a more secure environment and in safeguarding information privacy, and if so how? What are the benefits, costs, and implications of the latest security and privacy technologies? How should firms manage their businesses in view of possible security and privacy breaches? How should firms design and implement “best” security and privacy practices in their organizations and IT systems? What are the social, legal and ethical implications of new and emerging technologies?

Track Chairs
France Bélanger, Virginia Tech, belanger@vt.edu
Kai Lung Hui, Hong Kong University of Science and Technology, klhui@ust.hk
Sam Ransbotham, Boston College, sam.ransbotham@bc.edu
Sumit Sarkar, University of Texas at Dallas, sumit@utdallas.edu
Schedule

Subscribe to RSS Feed

2020
Monday, December 14th

Data Breaches in Multihospital Systems: Antecedents and Mitigation Mechanisms

Huseyin Tanriverdi, University of Texas at Austin
Juhee Kwon, City University of Hong Kong
Ghiyoung Im, U of Louisville

Disinformation as a strategic weapon: Roles of societal polarization, government’s cybersecurity capability, and the rule of law

Jithesh Arayankalam, Indian Institute of Management

Economics of Data Protection Policies

Ram D. Gopal, University of Warwick
Hooman Hidaji, University of Calgary
Sule Nur Kutlu, University of Connecticut
Raymond A. Patterson, University of Calgary
Niam Yaraghi, University of Connecticut School of Business

Information Security Governance: A Process Model and Pilot Case Study

Chee Kong Wong, University of Melbourne
Sean B. Maynard, University of Melbourne
Atif Ahmad, University of Melbourne
Humza Naseer, University of Melbourne

Is There a Privacy Paradox in the Workplace?

Ruth Stock, Technische Universität Darmstadt
Martin Hannig, Technische Universität Darmstadt

Please be Silent? Examining the Impact of Data Breach Response Strategies on the Stock Value

Kristin Masuch, University of Goettingen
Maike Greve, University of Goettingen
Simon Trang, University of Göttingen

Role of Feedback in Improving Novice Users’ Security Performance Using Construal Level and Valance Framing

Amir Fard Bahreini, University of British Columbia
Hasan Cavusoglu, University of British Columbia
Ron Cenfetelli, University of British Columbia

Situation-Awareness in Incident Response: An In-depth Case Study and Process Model

Atif Ahmad, University of Melbourne
Kevin Desouza, Queensland University of Technology
Sean B. Maynard, University of Melbourne
Monica Whitty, University of New South Wales
James Kotsias, Deakin University
Richard Baskerville, Georgia State University

The Impact of Power Imbalance on Cyberbullying: the Role of Bystanders Intervention

Zahra Aivazpour, University of Texas at San Antonio
Nicole L. Beebe, UTSA

The Value of Personal Data: An Experimental Analysis of Data Types and Personal Antecedents

Victoria Fast, University of Passau
Daniel Schnurr, University of Passau

Trading Privacy for Social Good: Did America Unite During COVID-19?

Anindya Ghose, New York University
Beibei Li, Carnegie Mellon University
Meghanath M Y, Carnegie Mellon University
Chenshuo Sun, New York University
Natasha Z. Foutz, University of Virginia
joshua anton, X-Mode Social, Inc

Using Calibration to Help Overcome Information Security Overconfidence

Muriel Frank, Institute for Information Systems

Your Money or Your Business: Decision-Making Processes in Ransomware Attacks

Lena Yuryna Connolly, University of Bradford
Hervé Borrion, University College London