Track Description
Cybersecurity is an arms-race between attackers and defenders. The attacks evolve with the development of technologies, such as cloud computing, artificial intelligence (AI), and payment methods. Cloud security breaches caused by poor password security practices in cloud systems are a case in point. The defenders, in response, must secure their systems, which put them at the forefront of dealing with emerging issues presented by new technologies. These new emerging issues include responding to the changing regulatory landscape, advancing organizational best practices, and understanding the behavioral and privacy challenges.

The Covid-19 pandemic and the digital disruption that ensued has only heightened the cybersecurity concerns of organizations. This is because expanding digital infrastructures, such as those needed to facilitate remote work arrangements, create additional attack vectors for cybercriminals and other adversaries. More generally, modern digital innovation and transformation projects bring about increased cybersecurity and privacy risks for users and organizations. For example, companies increasingly face the non-trivial task of striking a balance between executing data analytics initiatives and ensuring sufficient security/privacy protection.

Further, as the modern economy is increasingly dependent on user-supplied data, privacy concerns remain an important topic on the research and policy agenda. Currently, scientific evidence on the impact of privacy concerns on users’ behavior remains mixed. It is still to be understood what value users attach to their privacy and what it depends on. Moreover, increasing calls for data donation put pressure on researchers to better understand individual decision-making in these highly complex scenarios.

Track Co-Chairs
John D’Arcy, Ph.D., University of Delaware
Hanna Krasnova, Ph.D., University of Potsdam
Juhee Kwon, Ph.D., City University of Hong Kong


Subscribe to RSS Feed (Opens in New Window)

Schedule
2023
Monday, December 11th
12:00 AM

An Economic Analysis of Third-Party Software Reliability Improvement using the Bug Bounty Program

Tianlu Zhou, Tianjin University
DAN MA, Singapore Management University
Nan Feng, Tianjin University

12:00 AM

12:00 AM

Beyond a Fistful of Tumblers: Toward a Taxonomy of Ethereum-based Mixers

Tom Barbereau, University of Luxembourg
Egor Ermolaev, University of Luxembourg
Martin Brennecke, University of Luxembourg
Eduard Hartwich, University of Luxembourg
Johannes Sedlmeir, University of Luxembourg

12:00 AM

12:00 AM

Citizens’ Support for AI Security Surveillance Systems: A Social Exchange Perspective

Mahdi Abouei, McMaster University
Yufei Yuan, McMaster University

12:00 AM

12:00 AM

Consumer Preferences for Privacy Management Systems

Björn Hanneke, Goethe University Frankfurt
Lorenz Baum, Goethe University Frankfurt
Christian Schlereth, WHU – Otto Beisheim School of Management
Oliver Hinz, Goethe University Frankfurt

12:00 AM

12:00 AM

Customer Cybersecurity and Supplier Cost Management Strategy

Xu Yang, Xi’an Jiaotong University
Peng Liang, University of Science and Technology of China
Nan Hu, Singapore Management University
Fujing Xue, Sun Yat-sen University

12:00 AM

12:00 AM

Designing Extended Zero Trust Maturity Model – From Technical to Socio-Technical

Simen Tokerud, Department of Information Systems
Jarand Nikolai Jansen, Department of Information Systems
Marko Niemimaa, University of Agder
Jonna Järveläinen, University of Turku, Turku School of Economics

12:00 AM

12:00 AM

Exploring Privacy Attitudes and Accurate Information Disclosure in Healthcare Contexts

Autumn Clark, Virginia Tech
Mark J. Keith, Brigham Young University
Tamara Masters, University of Utah

12:00 AM

12:00 AM

From Observing to Understanding: Empirical Insights on the Organizational Foundations of Security Chaos Engineering

Jacqueline Strobel, FIM Research Center for Information Management
Florian Weiß, FIM Research Center for Information Management
Michael Bitzer, FIM Research Center for Information Management

12:00 AM

12:00 AM

Identifying Data Breaches Timely: Boards’ Technology Committee Matters

Shan Xu, Xi'an Jiaotong University
Ben Liu, City University of Hong Kong
Jin Li, School of Management, Xi'an Jiaotong University

12:00 AM

12:00 AM

Learning Personalized Privacy Preference From Public Data

Wen Wang, University of Maryland
Beibei Li, Carnegie Mellon University

12:00 AM

12:00 AM

Organization Members Developing Information Security Policies: a Case Study

Hanna Paananen, University of Jyvaskyla
Mikko Siponen, University of Jyväskylä

12:00 AM

12:00 AM

Privacy Regulation and Its Unintended Consequence on Consumption Behaviors: Evidence From CCPA

Donghwa Bae, Paul Merage School of Business, University of California Irvine
Raveesh Mayya, New York University
Tingting Nian, UC Irvine

12:00 AM

12:00 AM

The Economic Implications of Privacy Dark Patterns (PDPs)

Dawei Chen, National University of Singapore
Jungpil Hahn, National University of Singapore

12:00 AM

12:00 AM

The Influence of Temporal Focus on Employee Preferences in Cybersecurity Training

Faheem Ahmed Shaikh, University of Jyväskylä

12:00 AM

12:00 AM

Towards a Theory to Explain Prosocial Data Disclosure - An Explorative Investigation of the Antecedents of Infection Disclosure

Abdul Muqeet Ghaffar, University of Passau
Thomas Widjaja, University of Passau

12:00 AM

12:00 AM

Towards a Theory to Explain the Effect of Uncertainty on Prosocial Data Disclosure

Abdul Muqeet Ghaffar, University of Passau
Thomas Widjaja, University of Passau
Hanna Roider, University of Passau

12:00 AM

12:00 AM

Triad or Error? Introducing Three Basic Dimensions of Competence as a Driving Force for Information Security Performance

Florian Rampold, University of Goettingen
Kristin Masuch, University of Goettingen
Julia Warwas, University of Stuttgart-Hohenheim
Simon Trang, University of Paderborn

12:00 AM

12:00 AM

Unsupervised Threat Hunting using Continuous Bag of Terms and Time (CBoTT)

Varol Kayhan, University of South Florida
Shivendu Shivendu, University of South Florida
Rouzbeh Behnia, University of South Florida
Clinton Daniel, University of South Florida
Manish Kumar Agrawal, University of South Florida

12:00 AM