Track Description
Cybersecurity is an arms-race between attackers and defenders. The attacks evolve with the development of technologies, such as cloud computing, artificial intelligence (AI), and payment methods. Cloud security breaches caused by poor password security practices in cloud systems are a case in point. The defenders, in response, must secure their systems, which put them at the forefront of dealing with emerging issues presented by new technologies. These new emerging issues include responding to the changing regulatory landscape, advancing organizational best practices, and understanding the behavioral and privacy challenges.
The Covid-19 pandemic and the digital disruption that ensued has only heightened the cybersecurity concerns of organizations. This is because expanding digital infrastructures, such as those needed to facilitate remote work arrangements, create additional attack vectors for cybercriminals and other adversaries. More generally, modern digital innovation and transformation projects bring about increased cybersecurity and privacy risks for users and organizations. For example, companies increasingly face the non-trivial task of striking a balance between executing data analytics initiatives and ensuring sufficient security/privacy protection.
Further, as the modern economy is increasingly dependent on user-supplied data, privacy concerns remain an important topic on the research and policy agenda. Currently, scientific evidence on the impact of privacy concerns on users’ behavior remains mixed. It is still to be understood what value users attach to their privacy and what it depends on. Moreover, increasing calls for data donation put pressure on researchers to better understand individual decision-making in these highly complex scenarios.
Track Co-Chairs
John D’Arcy, Ph.D., University of Delaware
Hanna Krasnova, Ph.D., University of Potsdam
Juhee Kwon, Ph.D., City University of Hong Kong
Schedule
2023 |
Monday, December 11th |
12:00 AM
|
An Economic Analysis of Third-Party Software Reliability Improvement using the Bug Bounty Program
Tianlu Zhou, Tianjin University
DAN MA, Singapore Management University
Nan Feng, Tianjin University
12:00 AM
|
12:00 AM |
Beyond a Fistful of Tumblers: Toward a Taxonomy of Ethereum-based Mixers
Tom Barbereau, University of Luxembourg
Egor Ermolaev, University of Luxembourg
Martin Brennecke, University of Luxembourg
Eduard Hartwich, University of Luxembourg
Johannes Sedlmeir, University of Luxembourg
12:00 AM
|
12:00 AM |
Citizens’ Support for AI Security Surveillance Systems: A Social Exchange Perspective
Mahdi Abouei, McMaster University
Yufei Yuan, McMaster University
12:00 AM
|
12:00 AM |
Consumer Preferences for Privacy Management Systems
Björn Hanneke, Goethe University Frankfurt
Lorenz Baum, Goethe University Frankfurt
Christian Schlereth, WHU – Otto Beisheim School of Management
Oliver Hinz, Goethe University Frankfurt
12:00 AM
|
12:00 AM |
Customer Cybersecurity and Supplier Cost Management Strategy
Xu Yang, Xi’an Jiaotong University
Peng Liang, University of Science and Technology of China
Nan Hu, Singapore Management University
Fujing Xue, Sun Yat-sen University
12:00 AM
|
12:00 AM |
Designing Extended Zero Trust Maturity Model – From Technical to Socio-Technical
Simen Tokerud, Department of Information Systems
Jarand Nikolai Jansen, Department of Information Systems
Marko Niemimaa, University of Agder
Jonna Järveläinen, University of Turku, Turku School of Economics
12:00 AM
|
12:00 AM |
Exploring Privacy Attitudes and Accurate Information Disclosure in Healthcare Contexts
Autumn Clark, Virginia Tech
Mark J. Keith, Brigham Young University
Tamara Masters, University of Utah
12:00 AM
|
12:00 AM |
From Observing to Understanding: Empirical Insights on the Organizational Foundations of Security Chaos Engineering
Jacqueline Strobel, FIM Research Center for Information Management
Florian Weiß, FIM Research Center for Information Management
Michael Bitzer, FIM Research Center for Information Management
12:00 AM
|
12:00 AM |
Identifying Data Breaches Timely: Boards’ Technology Committee Matters
Shan Xu, Xi'an Jiaotong University
Ben Liu, City University of Hong Kong
Jin Li, School of Management, Xi'an Jiaotong University
12:00 AM
|
12:00 AM |
Learning Personalized Privacy Preference From Public Data
Wen Wang, University of Maryland
Beibei Li, Carnegie Mellon University
12:00 AM
|
12:00 AM |
Organization Members Developing Information Security Policies: a Case Study
Hanna Paananen, University of Jyvaskyla
Mikko Siponen, University of Jyväskylä
12:00 AM
|
12:00 AM |
Privacy Regulation and Its Unintended Consequence on Consumption Behaviors: Evidence From CCPA
Donghwa Bae, Paul Merage School of Business, University of California Irvine
Raveesh Mayya, New York University
Tingting Nian, UC Irvine
12:00 AM
|
12:00 AM |
The Economic Implications of Privacy Dark Patterns (PDPs)
Dawei Chen, National University of Singapore
Jungpil Hahn, National University of Singapore
12:00 AM
|
12:00 AM |
The Influence of Temporal Focus on Employee Preferences in Cybersecurity Training
Faheem Ahmed Shaikh, University of Jyväskylä
12:00 AM
|
12:00 AM |
Towards a Theory to Explain Prosocial Data Disclosure - An Explorative Investigation of the Antecedents of Infection Disclosure
Abdul Muqeet Ghaffar, University of Passau
Thomas Widjaja, University of Passau
12:00 AM
|
12:00 AM |
Towards a Theory to Explain the Effect of Uncertainty on Prosocial Data Disclosure
Abdul Muqeet Ghaffar, University of Passau
Thomas Widjaja, University of Passau
Hanna Roider, University of Passau
12:00 AM
|
12:00 AM |
Triad or Error? Introducing Three Basic Dimensions of Competence as a Driving Force for Information Security Performance
Florian Rampold, University of Goettingen
Kristin Masuch, University of Goettingen
Julia Warwas, University of Stuttgart-Hohenheim
Simon Trang, University of Paderborn
12:00 AM
|
12:00 AM |
Unsupervised Threat Hunting using Continuous Bag of Terms and Time (CBoTT)
Varol Kayhan, University of South Florida
Shivendu Shivendu, University of South Florida
Rouzbeh Behnia, University of South Florida
Clinton Daniel, University of South Florida
Manish Kumar Agrawal, University of South Florida
12:00 AM
|