As companies attempt to enhance the value of their services to customers, a commonly used strategy involves using more user data to provide better targeting, personalization, and product recommendations. However, user data collection and storage come with heavy corporate responsibilities towards data security, user privacy, and ethical data usage. Companies increasingly face the non-trivial task of striking a balance between executing data analytics initiatives and ensuring sufficient security/privacy protection. Since the first computer worm written by Robert Morris in 1989 and the first viruses in the 1990s, online attack vectors have grown in magnitude and sophistication. People, data, and things are targets: credit card attacks, data breaches in both private and public organizations, and instances of cybercrime have grown through the years. While there is general agreement over the need to secure systems and protect data, many current protective measures are ineffective, can reduce individual users and businesses’ productivity, and may systematically discriminate against some user groups. This track aims to encourage papers that focus on bridging cybersecurity, privacy, and ethics research in IS. At the same time, consider cutting edge research in each of the three areas jointly or separately. Submitted manuscripts can draw on any theoretical background (including but not limited to psychology, economics, sociology, criminology, or computational sciences) and methodological approaches (analytical work, design science, econometric analysis, experiments, qualitative studies, and so forth). Track Chairs: Miguel Godinho de Matos, Catolica Lisbon School of Business and Economics Matthew L. Jensen, University of Oklahoma Seung Hyun Kim, Yonsei University Juhee Kwon, City University of Hong Kong
2021 | ||
Sunday, December 12th | ||
---|---|---|
Device and Risk Aversion in the Context of Cyber Security Phishing Attacks Naama Ilany-Tzur, Ben-Gurion University of the Negev
|
||
12:00 AM |
Digital and Physical Mechanisms of Financial Frauds and Identity Theft Junjie (Henry) Qian, Univ. Texas at Austin
|
|
12:00 AM |
Does EU-Consumer Privacy Harm Financing of US-App-Startups? Within-US Evidence of Cross-EU-Effects Tobias Kircher, Technical University of Munich
|
|
12:00 AM |
Falling for Phishing: An Empirical Investigation into People’s Email Response Behaviors Asangi Jayatilaka, University of Adelaide
|
|
12:00 AM |
How Data Privacy Regulations Affect Competition: Empirical Evidence from Mobile Application Market Xi Wu, Temple University
|
|
12:00 AM |
On Security Guidelines and Policy Compliance: Considering Users’ Need for Autonomy Christian M. Olt, Technical University of Darmstadt
|
|
12:00 AM |
Stefan Mager, Ludwig-Maximilians-University
|
|
12:00 AM |
Only If It Affects Me! The Influence of Privacy on Different Adoption Phases Maximilian Haug, Neu-Ulm University of Applied Sciences
|
|
12:00 AM |
The Right to Be Forgotten: If I could restart my life, I would like to be able to erase … Mark Keith, Brigham Young University
|
|
12:00 AM |
The Role of Vulnerability Disclosure on Hacker Participation in Bug Bounty Programs Ali Ahmed, University of Wisconsin Eau Claire
|
|
12:00 AM |
Towards a Forward-Looking Conceptualization of Privacy David Kallemeyn, Claremont Graduate University
|
|
12:00 AM |
Using Machine Learning Techniques to Explore Extra-Role Security Behavior Muriel Frank, Institute for Information Systems
|
|
12:00 AM |
Yasser Alhelaly, Universidade NOVA de Lisboa |
|
|
12:00 AM |
When Live Chats Make Us Disclose More Stefanie Sohn, University of Southern Denmark
|