Track Description

As companies attempt to enhance the value of their services to customers, a commonly used strategy involves using more user data to provide better targeting, personalization, and product recommendations. However, user data collection and storage come with heavy corporate responsibilities towards data security, user privacy, and ethical data usage. Companies increasingly face the non-trivial task of striking a balance between executing data analytics initiatives and ensuring sufficient security/privacy protection.

Since the first computer worm written by Robert Morris in 1989 and the first viruses in the 1990s, online attack vectors have grown in magnitude and sophistication. People, data, and things are targets: credit card attacks, data breaches in both private and public organizations, and instances of cybercrime have grown through the years. While there is general agreement over the need to secure systems and protect data, many current protective measures are ineffective, can reduce individual users and businesses’ productivity, and may systematically discriminate against some user groups.

This track aims to encourage papers that focus on bridging cybersecurity, privacy, and ethics research in IS. At the same time, consider cutting edge research in each of the three areas jointly or separately. Submitted manuscripts can draw on any theoretical background (including but not limited to psychology, economics, sociology, criminology, or computational sciences) and methodological approaches (analytical work, design science, econometric analysis, experiments, qualitative studies, and so forth).

Track Chairs:
Miguel Godinho de Matos, Catolica Lisbon School of Business and Economics
Matthew L. Jensen, University of Oklahoma
Seung Hyun Kim, Yonsei University
Juhee Kwon, City University of Hong Kong


Subscribe to RSS Feed

Sunday, December 12th

Device and Risk Aversion in the Context of Cyber Security Phishing Attacks

Naama Ilany-Tzur, Ben-Gurion University of the Negev
Noa Benjo, Ben-Gurion University of the Negev
Lihi Ohayon, Ben-Gurion University of the Negev
Lior Fink, Ben-Gurion University of the Negev

Digital and Physical Mechanisms of Financial Frauds and Identity Theft

Junjie (Henry) Qian, Univ. Texas at Austin
Hüseyin Tanriverdi, The University of Texas at Austin

Does EU-Consumer Privacy Harm Financing of US-App-Startups? Within-US Evidence of Cross-EU-Effects

Tobias Kircher, Technical University of Munich
Jens Förderer, Technical University of Munich

Falling for Phishing: An Empirical Investigation into People’s Email Response Behaviors

Asangi Jayatilaka, University of Adelaide
Nalin Asanka Gamagedara Arachchilage, The University of Auckland
M. Ali Babar, University of Adelaide

How Data Privacy Regulations Affect Competition: Empirical Evidence from Mobile Application Market

Xi Wu, Temple University
Min-Seok Pang, Temple University

On Security Guidelines and Policy Compliance: Considering Users’ Need for Autonomy

Christian M. Olt, Technical University of Darmstadt
Fenne große Deters, Weizenbaum Institute for the Networked Society

On the Effectiveness of Overt and Covert Interventions in Influencing Cookie Consent: Field Experimental Evidence

Stefan Mager, Ludwig-Maximilians-University
Johann Kranz, Ludwig-Maximilians-University Munich

Only If It Affects Me! The Influence of Privacy on Different Adoption Phases

Maximilian Haug, Neu-Ulm University of Applied Sciences
Jaro Lanza, Neu-Ulm University of Applied Sciences
Heiko Gewald, Neu-Ulm University of Applied Sciences

The Right to Be Forgotten: If I could restart my life, I would like to be able to erase …

Mark Keith, Brigham Young University
Jeffry Babb, West Texas A&M University
Robyn Raschke, University of Las Vegas-Nevada
Paul Steinbart, Arizona State University

The Role of Vulnerability Disclosure on Hacker Participation in Bug Bounty Programs

Ali Ahmed, University of Wisconsin Eau Claire
Brian Lee, Penn State
Amit V. Deokar, University of Massachusetts Lowell

Towards a Forward-Looking Conceptualization of Privacy

David Kallemeyn, Claremont Graduate University
Wallace Chipidza, Claremont Graduate University

Using Machine Learning Techniques to Explore Extra-Role Security Behavior

Muriel Frank, Institute for Information Systems
Lukas Manuel Ranft, Institute for Information Systems

Using the Expectancy-Value Theory of Motivation to Understand the Gaps in Mobile Identity Protection.

Yasser Alhelaly, Universidade NOVA de Lisboa |
Gurpreet Dhillon, IS and Supply Chain Management
Tiago Oliveira, NOVA Information Management School (NOVA IMS)

When Live Chats Make Us Disclose More

Stefanie Sohn, University of Southern Denmark
Dominik Siemon, LUT University
Stefan Morana, Saarland University