Submissions from 2015
Better Patient Privacy Protection with Better Patient Empowerment about Consent in Health Information Exchanges, Mohamed Abdelhamid, Raj Sharman, and Ram Bezawada
“Not Now:” Using fMRI and Eye Tracking to Improve the Timing of Security Messages, Bonnie Anderson, Anthony Vance, Brock Kirwan, and Jeffrey Jenkins
Improving User Authentication with Fingerprint Biometrics and Biometric Personal Identification Number (BIO-PINTM) as a Multi-Factor Authentication Mechanism, Robert Batie Jr., Yair Levy, Steven Furnell, and Peixiang Liu
The Cyber Education Project: Defining Educational Standards for an Emerging Discipline, Jean Blair, Scott Buck, Diana Burley, Allen Parrish, and Andrew Phillips
Social media is weakening passwords, Joseph Buckman, Justin Giboney, and Yuan Hong
Development of the MyCyberSkills™ iPad App: A Scenarios-Based, Hands-On Measure of Non-IT Professionals’ Cybersecurity Skills, Melissa Carlton, Yair Levy, Michelle Ramim, and Steven Terrell
Impact of Mobile Technologies on Patients’ Health Information Security, Isabelle Fagnot
Measuring Users’ Privacy Concerns in Social Networking Sites, Samira Farivar and Yufei Yuan
Integrating Social and Economic Models of Responding to Privacy Messages in Mobile Computing: A Research Agenda, Dennis Galletta, David Eargle, Shadi Janansefat, Dimitar Kunev, and Shivendu Pratap Singh
Why We Don’t Block 3rd Party Trackers: An Attributional Theory Perspective, Frank Goethals and Shamel Addas
When does One Weight Threats more? An Integration of Regulatory Focus Theory and Protection Motivation Theory, Jack Shih-Chieh Hsu and Sheng-Pao Shih
Business orientation in knowledge security risk management – a literature review, Ilona Ilvonen and Jari Jussila
Organizational Security Norms in the Banking Industry: The United States vs. South Korea, Hwee-Joo Kam, Sanjay Goel, Pairin Katertannakul, and Soo-Goo Hong
Development of an Artifact for Benchmarking Information Security Policy, Dae Youp Kang and Anat Hovav
Privacy dimensions in design of smart home systems for elderly people, Ella Kolkowska and Miranda Kajtazi
Bright Blue Cybersecurity (BBC) Project SIGSEC Research Initiative, Yair Levy and Herb Mattord
Sharing Patient Disease Data with Privacy Preservation, Xiaoping Liu, Xiao-Bai Li, Luvai Motiwalla, Wenjun Li, Hua Zheng, and Patricia Franklin
A Study on Resolution Skills in Phishing Detection, Yuan Li, Jingguo Wang, and Raghav Rao
Why Cooperate? Ethical Analysis of InfoSec Vulnerability Disclosure, Mark-David McLaughlin and Janis Gogan
Understanding the Role of Equity in Leveraging Privacy Concerns of Consumers in Ecommerce, Zareef Mohammed, Gurvirender Tejay, and Marcus Winkfield
The Role of Trust and Familiarity in Click-through Intention: A Perception Transfer Theory in a Cybersecurity Context, Obi Ogbanufe and Dan Kim
Investment in Information Security Measures: A Behavioral Investigation, Roozmehr Safi and Glenn Browne
Promoting the Use of Information Security Measures for Threat Prevention and Threat Detection, Roozmehr Safi and Glenn Browne
A New Approach to Mobile Device Authentication, Jordan Shropshire and Philip Menard
An Exploration of Phishing Information Sharing: A Heuristic-Systematic Approach, Rohit Valecha, Rui Chen, Teju Herath, Arun Vishwanath, Jingguo Wang, and Raghav Rao