Cybersecurity is an arms-race between attackers and defenders. The attacks evolve with the development of technologies, such as cloud computing, artificial intelligence (AI), and payment methods. Cloud security breaches caused by poor password security practices in cloud systems are a case in point. The defenders, in response, must secure their systems, which put them at the forefront of dealing with emerging issues presented by new technologies. These new emerging issues include responding to the changing regulatory landscape, advancing organizational best practices, and understanding the behavioral and privacy challenges.
The Covid-19 pandemic and the digital disruption that ensued has only heightened the cybersecurity concerns of organizations. This is because expanding digital infrastructures, such as those needed to facilitate remote work arrangements, create additional attack vectors for cybercriminals and other adversaries. More generally, modern digital innovation and transformation projects bring about increased cybersecurity and privacy risks for users and organizations. For example, companies increasingly face the non-trivial task of striking a balance between executing data analytics initiatives and ensuring sufficient security/privacy protection.
Further, as the modern economy is increasingly dependent on user-supplied data, privacy concerns remain an important topic on the research and policy agenda. Currently, scientific evidence on the impact of privacy concerns on users’ behavior remains mixed. It is still to be understood what value users attach to their privacy and what it depends on. Moreover, increasing calls for data donation put pressure on researchers to better understand individual decision-making in these highly complex scenarios.
Track Co-Chairs
John D’Arcy, Ph.D., University of Delaware
Hanna Krasnova, Ph.D., University of Potsdam
Juhee Kwon, Ph.D., City University of Hong Kong
Subscribe to RSS Feed (Opens in New Window)
2023 | ||
Monday, December 11th | ||
12:00 AM |
An Economic Analysis of Third-Party Software Reliability Improvement using the Bug Bounty Program Tianlu Zhou, Tianjin University 12:00 AM |
|
---|---|---|
12:00 AM |
Beyond a Fistful of Tumblers: Toward a Taxonomy of Ethereum-based Mixers Tom Barbereau, University of Luxembourg 12:00 AM |
|
12:00 AM |
Citizens’ Support for AI Security Surveillance Systems: A Social Exchange Perspective Mahdi Abouei, McMaster University 12:00 AM |
|
12:00 AM |
Consumer Preferences for Privacy Management Systems Björn Hanneke, Goethe University Frankfurt 12:00 AM |
|
12:00 AM |
Customer Cybersecurity and Supplier Cost Management Strategy Xu Yang, Xi’an Jiaotong University 12:00 AM |
|
12:00 AM |
Designing Extended Zero Trust Maturity Model – From Technical to Socio-Technical Simen Tokerud, Department of Information Systems 12:00 AM |
|
12:00 AM |
Exploring Privacy Attitudes and Accurate Information Disclosure in Healthcare Contexts Autumn Clark, Virginia Tech 12:00 AM |
|
12:00 AM |
Jacqueline Strobel, FIM Research Center for Information Management 12:00 AM |
|
12:00 AM |
Identifying Data Breaches Timely: Boards’ Technology Committee Matters Shan Xu, Xi'an Jiaotong University 12:00 AM |
|
12:00 AM |
Learning Personalized Privacy Preference From Public Data Wen Wang, University of Maryland 12:00 AM |
|
12:00 AM |
Organization Members Developing Information Security Policies: a Case Study Hanna Paananen, University of Jyvaskyla 12:00 AM |
|
12:00 AM |
Privacy Regulation and Its Unintended Consequence on Consumption Behaviors: Evidence From CCPA Donghwa Bae, Paul Merage School of Business, University of California Irvine 12:00 AM |
|
12:00 AM |
The Economic Implications of Privacy Dark Patterns (PDPs) Dawei Chen, National University of Singapore 12:00 AM |
|
12:00 AM |
The Influence of Temporal Focus on Employee Preferences in Cybersecurity Training Faheem Ahmed Shaikh, University of Jyväskylä 12:00 AM |
|
12:00 AM |
Abdul Muqeet Ghaffar, University of Passau 12:00 AM |
|
12:00 AM |
Towards a Theory to Explain the Effect of Uncertainty on Prosocial Data Disclosure Abdul Muqeet Ghaffar, University of Passau 12:00 AM |
|
12:00 AM |
Florian Rampold, University of Goettingen 12:00 AM |
|
12:00 AM |
Unsupervised Threat Hunting using Continuous Bag of Terms and Time (CBoTT) Varol Kayhan, University of South Florida 12:00 AM |