| 2025 | ||
| Sunday, December 14th | ||
|---|---|---|
|
Automated Privacy Policy Simplification through a GPT-Powered Chrome Extension Al Maha Al Jabor, Carnegie Mellon University
|
||
| 12:00 AM |
An Vu-Minh, National Economics University
|
|
| 12:00 AM |
Zhiqi Wang, city university of Hong Kong
|
|
| 12:00 AM |
Shaelijah Aryee, University of Texas Rio Grande Valley
|
|
| 12:00 AM |
Mohammad Mohsin, The University of North Carolina at Greensboro
|
|
| 12:00 AM |
Zhen Li, Albion College
|
|
| 12:00 AM |
Lirong Lu, Xi'an Jiaotong University
|
|
| 12:00 AM |
Encouraging Data Donations: An Experimental Analysis of Contextual Factors and Personal Antecedents Philipp Hartl, University of Regensburg
|
|
| 12:00 AM |
Enhancing IoT Security and Information Systems Resilience: An Extreme Value Machine Approach Ali Safari, University of North Texas
|
|
| 12:00 AM |
Improving Security Alerts through the Uncanny Valley: A Theoretical Framework Ming Xiao, University of North Texas
|
|
| 12:00 AM |
InfoSec Advice Persuasiveness: The Role of Content Characteristics and Advice Fatigue Marvin Adjei Kojo Lomo, UNC Greensboro
|
|
| 12:00 AM |
Maximilian Josef Frank, Technical University of Munich
|
|
| 12:00 AM |
Arindam Majumder, University of North Texas
|
|
| 12:00 AM |
Organizational Learning in Industry 4.0: Applying Crossan's 4I Framework with Double Loop Learning Nimra Akram, The University of Melbourne
|
|
| 12:00 AM |
Privacy Concerns in the Metaverse Context: An Examination of Real and Virtual Identity Hanna Roider, University of Passau
|
|
| 12:00 AM |
Xuan Gao, Georgia State University
|
|
| 12:00 AM |
Alexander Zieglmeier, Professur für Digitale Services und Sustainability
|
|
| 12:00 AM |
Shuyuan Mary Ho, Florida State University
|
|
| 12:00 AM |
The Effect of Ransomware Disclosure on Stock Prices Olga Biedova, College of Charleston
|
|
| 12:00 AM |
Threat Intelligence Driven IP Protection for Entrepreneurial Small-to-Medium Enterprises Sam Pitruzzello, University of Melbourne
|
|
| 12:00 AM |
Gilbert Georg Hoevel, Paderborn University
|
|
| 12:00 AM |
Meng (Leah) Li, Mississippi State University
|
|
| 12:00 AM |
Understanding the Critical Role of Expert Intuition in Cyber Incident Response Thierry Schaltegger, ZHAW
|
|
| 12:00 AM |
Xinyu Wei, University of Science and Technology of China
|
|
| 12:00 AM |
Mengyao Ma, University of Science and Technology of China
|
|
Track Co-Chairs
John D'Arcy, Ph.D., University of Delaware
Juhee Kwon, Ph.D., City University of Hong Kong
Hanna Krasnova, Ph.D., University of Potsdam
Track Description
At today’s digital world lies a high-stakes contest between cyber attackers and defenders. As technologies like cloud computing, artificial intelligence (AI), and digital payment systems evolve, so too do the tactics of adversaries—pushing the boundaries of cybersecurity and demanding innovative defenses to stay ahead. Attack strategies continually adapt to these innovations, such as exploiting poor password practices in cloud environments, highlighting the ever-present vulnerabilities organizations must manage. Defenders, in turn, must remain vigilant by securing their systems against these threats, placing them at the forefront of addressing new challenges driven by emerging technologies. These challenges include navigating evolving regulatory landscapes, refining organizational best practices, and tackling behavioral and privacy concerns.