Track Co-Chairs
Xi Chen, Zhejiang University
Xin Xu, Hong Kong Polytechnic University
Wei Thoo Yue, City University of Hong Kong

Subscribe to RSS Feed

Tuesday, July 2nd

Analysis of attacks on SMS OTP-based authentication process

Maciej Bartłomiejczyk, West Pomeranian University of Technology
Imed El Fray, Warsaw University of Live Sciences

Cyber Situational Awareness in Security Operation Centres

Burkan Hawash, Universiti Kebangsaan Malaysia
Umi Asma' Mokhtar, Universiti Kebangsaan Malaysia
Jongkil Jay Jeong, University of Melbourne
Sean B. Maynard, University of Melbourne
Zarina Shukur, Universiti Kebangsaan Malaysia
Siti Norul Huda Sheikh Abdullah, Universiti Kebangsaan Malaysia
Rozilawati Razali, Universiti Kebangsaan Malaysia
Lim Joo Soon, Universiti Kebangsaan Malaysia

Detecting Misinformation in Multimedia Content through Cross-Modal Entity Consistency: A Dual Learning Approach

Zhe Fu, University of North Carolina at Charlotte
Kanlun Wang, University of North Carolina at Charlotte
Wangjiaxuan Xin, The University of Norht Carolina at Charlotte
Lina Zhou, University of North Carolina at Charlotte
Shi Chen, The University of Norht Carolina at Charlotte
Yaorong Ge, The University of Norht Carolina at Charlotte
Daniel Janies, The University of Norht Carolina at Charlotte
Dongsong Zhang, University of North Carolina at Charlotte


Masoud Afshari Mofrad, Macquarie University
Babak Abedin, Macquarie University
Alireza Amrollahi, Macquarie Business School

Effect of Cybercuriosity on Goal-Directed Behavior in Cybersecurity Training

Guisen Xue, Kent State University
Shihe Pan, Tianjin University
Dong-Heon Kwak, Kent State University
Jose Benitez, Kent State University
Rouzbeh Razavi, Kent State University

Effects of Stress and Self-Efficacy on Information Security Policy Compliance

Hsieh-Hong Huang, Nationatl Taitung University
Jian-Wei Lin, Shih Chien University
Jack Hsu, NSYSU

Information Security Behavior of Healthcare Professionals when There is Poor Health Information Security Policy

Puspita Kencana Sari, Telkom University
Juliana Sutanto, Monash University
Putu Wuri Handayani, Universitas Indonesia
Achmad Nizar Hidayanto, Universitas Indonesia

Is Paying a High Price Always Beneficial? A configurational investigation of crisis communication and IT security investment following data breaches

Huan Tao, Huazhong University of Science and Technology
Ling Zhao, Huazhong University of Science & Technology

Leadership modes and employees' job performance: from the perspective of coping with security-related stress

Hao Tong, University of Nottingham Ningbo China
Yitong Zhou, Zhejiang University of Finance and Economics
Jie (Joseph) Yu, University of Nottingham Ningbo China
Furong Jia, Nottingham University Business School China, University of Nottingham Ningbo China
Minghuan Shou, University of Nottingham Ningbo China

The Impacts of Layoffs Announcement on Cybersecurity Breaches

Thi Tran, BInghamton University, SUNY
Bao Gia Do, University of Information Technology, Vietnam National University, Ho Chi Minh City
Anh Ngo, Liverpool John Moores University
Sathwik Krishtipati, Binghamton University
Nhat Anh Dang, Texas Woman’s University
Sumantra Sarkar, SUNY - BInghamton

The Moral Compass of Applicants: Ethical Decision Making Amidst AI-Driven Recruitment

Eduard Anton, University of Osnabrück
Markus Aptyka, University of Osnabrück
Thuy Duong Oesterreich, Osnabrück University
Frank Teuteberg, Osnabrück University

Unveiling Formations and Outcomes of Digital Consumer Frauds: An Expanded Routine Activity Theory Perspective

Cheuk Hang Au, Edith Cowan University
Chih-Yuan Chou, National Chengchi University
Kevin K.W. Ho, University of Tsukuba