Track Co-Chairs
John D'Arcy, Ph.D., University of Delaware
Juhee Kwon, Ph.D., City University of Hong Kong
Hanna Krasnova, Ph.D., University of Potsdam

Track Description
At today’s digital world lies a high-stakes contest between cyber attackers and defenders. As technologies like cloud computing, artificial intelligence (AI), and digital payment systems evolve, so too do the tactics of adversaries—pushing the boundaries of cybersecurity and demanding innovative defenses to stay ahead. Attack strategies continually adapt to these innovations, such as exploiting poor password practices in cloud environments, highlighting the ever-present vulnerabilities organizations must manage. Defenders, in turn, must remain vigilant by securing their systems against these threats, placing them at the forefront of addressing new challenges driven by emerging technologies. These challenges include navigating evolving regulatory landscapes, refining organizational best practices, and tackling behavioral and privacy concerns.
Schedule

Subscribe to RSS Feed

2025
Sunday, December 14th

Automated Privacy Policy Simplification through a GPT-Powered Chrome Extension

Al Maha Al Jabor, Carnegie Mellon University
Shahad Adnan Astaneh, Carnegie Mellon University
Manoranjan Mohanty, Carnegie Mellon University
Chadi Aoun, Carnegie Mellon University

Benchmarking Evidence-Augmented Large Language Models for Misinformation Fact-Checking: An Information Systems Perspective on Scale and Augmentation

An Vu-Minh, National Economics University
Hoang Vo, University of Science, Vietnam National University
Duc-Viet Hoang, University of Science, Vietnam National University Ho Chi Minh City
Huan Hong Nguyen, Maharishi International University
Kaige Gao, Case Western Reserve University
Thi Tran, BInghamton University, SUNY

Can Gaze Responsiveness and Multimodal Emotion Expression Consistency Mitigate Privacy-Protective Behavior in the Digital Companion Context?

Zhiqi Wang, city university of Hong Kong
David (Jingjun) Xu, City University of Hong Kong

Cyber Threat Intelligence - Exploring Emerging Scammer Assets and Key Scammers for Proactive Information Security

Shaelijah Aryee, University of Texas Rio Grande Valley
Francis Kofi Andoh-Baidoo, University of Texas Rio Grande Valley
Emmanuel Ayaburi, Baylor University

Data Breach Risk of IT Heterogeneity and IT Centrality in Multi-Branch Corporations: The Moderating Role of IT Complexity

Mohammad Mohsin, The University of North Carolina at Greensboro
Moez Farokhnia Hamedani, University of North Carolina at Greensboro
Lakshmi Iyer, university of North Carolina Greensboro

Does AI Benefit Cyberattackers More? A Dynamic Game Theory Study of Ransomware Attacks in Cybersecurity

Zhen Li, Albion College
Qi Liao, Central Michigan University

Effects of Digitalization on Cybersecurity of U.S Hospitals: The Roles of Urban-Rural Divide and Religious-Secular Mission

Lirong Lu, Xi'an Jiaotong University
Hüseyin Tanriverdi, The University of Texas at Austin

Encouraging Data Donations: An Experimental Analysis of Contextual Factors and Personal Antecedents

Philipp Hartl, University of Regensburg
Daniel Schnurr, University of Regensburg

Enhancing IoT Security and Information Systems Resilience: An Extreme Value Machine Approach

Ali Safari, University of North Texas
Dan J. Kim, University of North Texas

Improving Security Alerts through the Uncanny Valley: A Theoretical Framework

Ming Xiao, University of North Texas
Gurpreet Dhillon, IT and Decision Sciences

InfoSec Advice Persuasiveness: The Role of Content Characteristics and Advice Fatigue

Marvin Adjei Kojo Lomo, UNC Greensboro
NIKHIL MEHTA, University of North Carolina Greensboro

Investigating Developer Preferences for the Documentation of Privacy Requirements: Perspectives from Germany

Maximilian Josef Frank, Technical University of Munich
Stephen Meisenbacher, Technical University of Munich
Alexandra Klymenko, Technical University of Munich
Florian Matthes, Technical University of Munich

It’s All About Timing: An Empirical Investigation of a Sequential Timeline Model of Response and Market Reaction to Data Breaches

Arindam Majumder, University of North Texas
Dan J. Kim, University of North Texas

Organizational Learning in Industry 4.0: Applying Crossan's 4I Framework with Double Loop Learning

Nimra Akram, The University of Melbourne

Privacy Concerns in the Metaverse Context: An Examination of Real and Virtual Identity

Hanna Roider, University of Passau
Thomas Widjaja, University of Passau

Regulatory Spillover and Privacy Rationalizations: Evidence from ChatGPT Discourse After the TikTok Ban

Xuan Gao, Georgia State University
Aaron Baird, Georgia State University
Yusen Xia, Georgia State University

Rewiring the Privacy Calculus: How AI Reciprocity Drives Usage Intentions by Boosting Benefits and Reducing Risks

Alexander Zieglmeier, Professur für Digitale Services und Sustainability
Johann Kranz, Ludwig-Maximilians-University Munich

Synthetic Lies, Digital Truths: A Systematic Review of Computer-Mediated Deception Research in the Era of AI and Deepfakes

Shuyuan Mary Ho, Florida State University
Yue Liu, Florida State University
Ghazal Manzoor Hussain, Florida State University
Giacomo Gori, Università di Bologna
Rasleen Kaur, Florida State University
Kelvis C. Gills, Florida State University

The Effect of Ransomware Disclosure on Stock Prices

Olga Biedova, College of Charleston

Threat Intelligence Driven IP Protection for Entrepreneurial Small-to-Medium Enterprises

Sam Pitruzzello, University of Melbourne

Trust Me If You Can! Examining the Role of Ransomware Darknet Platforms in Building Trust Between Hackers and Victims

Gilbert Georg Hoevel, Paderborn University
Tim Brinkmeier, Paderborn University
Simon Trang, Paderborn University

Understanding Effective Data Breach Response Strategies through the Lens of the Situational Crisis Communication Theory

Meng (Leah) Li, Mississippi State University
Suranjeet Chowdhury Avik, Mississippi State University
Merrill Warkentin, Mississippi State University
Caroline Lancelot-Miltgen, Audencia Business School
Michael Breazeale, Mississippi State University

Understanding the Critical Role of Expert Intuition in Cyber Incident Response

Thierry Schaltegger, ZHAW
Benjamin Ambuehl, ZHAW
Tim Geppert, ZHAW
Nico Ebert, ZHAW

Understanding the Economic Consequences of Information Security Incidents on Companies and Industry Peers: The Moderating Roles of Incident Attribution and Organizational Response

Xinyu Wei, University of Science and Technology of China
Hemin Jiang, University of Science and Technology of China
Li Zhang, University of Science and Technology of China
Jiuchang Wei, University of Science and Technology of China

When is AI Superior to Human? Unveiling the Effects of “Word-of-Machine” on Debt Collection Utilizing Different Types of Privacy

Mengyao Ma, University of Science and Technology of China
Ran Tan, University of Science and Technology of China
Jiahui Feng, Orange Energy Co.Ltd
Qian Huang, School of Management, University of Science and Technology of China
Jiahong Xu, Nanyang Technological University