Information security is an arm-race between attackers and defenders. The attacks evolve with the development of technologies, such as cloud computing, artificial intelligence (AI), and payment methods. The ransomware attack is such an example, imposing disruptive risks to businesses and society. The defenders, in response, must secure their systems, which put them at the forefront of dealing with many emerging issues presented by the new technologies. These new emerging issues include responding to the changing regulatory landscape, advancing organizational best practices, and understanding the behavioral and ethical challenges.

Furthermore, many of the classical information security and privacy problems remain unsolved; effort and investment have not kept up with the information security risks. For example, millions of working passwords can still be found on the web, and organizations continue to use outdated security solutions that the recipes of breaking them are widely available. The COVID-19 pandemic intensifies cybercriminal opportunism, and cybercrime is thriving during the pandemic. One report suggests that phishing attacks rose 220% during COVID-19 peak and rekindles the urgency of managing information security problems.

Track Co-Chairs:
Jingguo Wang, Ph.D., The University of Texas at Arlington
Wei Thoo Yue, Ph.D., City University of Hong Kong
Mikko Siponen, Ph.D., University of Jyväskylä


Subscribe to RSS Feed

Monday, December 12th
12:00 AM

Artificial Intelligence for Cybersecurity: Towards Taxonomy-based Archetypes and Decision Support

Jana Gerlach, Information Systems Institute, Leibniz Universität Hannover
Oliver Werth, Leibniz Universität Hannover
Michael H. Breitner, Leibniz Universität Hannover

12:00 AM

Chief Privacy Officer Role and Organizational Transformation in the Digital Economy

Mazen Shawosh, King Fahd University of Petroleum & Minerals
May Bantan, Nova Southeastern University
France Belanger, Virginia Polytechnic Institute and State University

12:00 AM

Competencies of Cybersecurity Leaders: A Review and Research Agenda

Ashley Baines Anderson, University of Melbourne
Atif Ahmad, University of Melbourne
Shanton Chang, The University of Melbourne

12:00 AM

Do individual employees’ security compliance intentions relate to workgroup security effectiveness?

Chul Woo Yoo, Florida Atlantic University
Jahyun Goo, Florida Atlantic University
H. Raghav Rao, The University of Texas at San Antonio

12:00 AM

Ethical AI Research Untangled: Mapping Interdisciplinary Perspectives for Information Systems Research

Manoj Kahdan, RWTH Aachen University
Nicole Janine Hartwich, RWTH Aachen University
Oliver Salge, RWTH Aachen University

12:00 AM

Giving Users Control Over How Peers Handle Their Data: A Design Science Study

Anne Zöll, TU Darmstadt
Amina Wagner, Information Systems
Melanie Reuter-Oppermann, TU Darmstadt

12:00 AM

Investigating Employees’ Proactive Extra-Role Information Security Behaviors through Security Mindfulness

Bowen Guan, University of Sydney
Carol Hsu, University of Sydney

12:00 AM

Phish Finders: Improving Cybersecurity Training Tools Using Citizen Science

Vinod Kumar Ahuja, University of Nebraska Omaha
Holly K. Rosser, University of Nebraska Omaha
Andrea Grover, University of Nebraska at Omaha
Matthew Hale, University of Nebraska at Omaha

12:00 AM

Privacy Risks in Digital Markets: The Impact of Ambiguity Attitudes on Transparency Choices

Nikolai Sachs, University of Passau
Daniel Schnurr, University of Passau

12:00 AM

Taking a Seat at the Table: The Quest for CISO Legitimacy

Michelle René Lowry, Virginia Tech
Zeynep Sahin, Virginia Tech
Anthony Vance, Virginia Tech

12:00 AM

The Role of Psychological Ownership in Privacy Risk Compensation: A Moderated Mediation Model

Lijun Wang, University of Science and Technology of China
Jun Zhang, University of Science and Technology of China
Jingzhi Zhang, Beijing Normal University - Hong Kong Baptist University United International College
ZHENG Xiabing, University of Science and Technology of China

12:00 AM

The Role of Uncertainty in Data Breach Response Processes - A Reactance Theory Perspective

Till Ole Diesterhöft, University of Goettingen
Saskia Isabel Schweneker, University of Goettingen
Kristin Masuch, University of Goettingen
Aycan Aslan, Georg-August-Universität Goettingen
Marvin Braun, University of Goettingen

12:00 AM

Using Active Privacy Transparency to Mitigate the Tension Between Data Access and Consumer Privacy

da ma, School of Management
Matthew J. Hashim, Eller College of Management
Qiuzhen Wang, School of Management,Zhejiang University

12:00 AM

Weaponizing the GDPR: How Flawed Implementations Turn the Gold Standard for Privacy Laws into Fool's Gold

Alexander Gladis, RWTH Aachen University
Nicole Janine Hartwich, RWTH Aachen University
Oliver Salge, RWTH Aachen University

12:00 AM

Why Do Employees Report Cyber Threats? Comparing Utilitarian and Hedonic Motivations to Use Incident Reporting Tools

Anjuli Franz, Technical University of Darmstadt

12:00 AM