Follow

Submissions from 2015

PDF

Better Patient Privacy Protection with Better Patient Empowerment about Consent in Health Information Exchanges, Mohamed Abdelhamid, Raj Sharman, and Ram Bezawada

PDF

“Not Now:” Using fMRI and Eye Tracking to Improve the Timing of Security Messages, Bonnie Anderson, Anthony Vance, Brock Kirwan, and Jeffrey Jenkins

PDF

Improving User Authentication with Fingerprint Biometrics and Biometric Personal Identification Number (BIO-PINTM) as a Multi-Factor Authentication Mechanism, Robert Batie Jr., Yair Levy, Steven Furnell, and Peixiang Liu

PDF

The Cyber Education Project: Defining Educational Standards for an Emerging Discipline, Jean Blair, Scott Buck, Diana Burley, Allen Parrish, and Andrew Phillips

PDF

Social media is weakening passwords, Joseph Buckman, Justin Giboney, and Yuan Hong

PDF

Development of the MyCyberSkills™ iPad App: A Scenarios-Based, Hands-On Measure of Non-IT Professionals’ Cybersecurity Skills, Melissa Carlton, Yair Levy, Michelle Ramim, and Steven Terrell

PDF

Impact of Mobile Technologies on Patients’ Health Information Security, Isabelle Fagnot

PDF

Measuring Users’ Privacy Concerns in Social Networking Sites, Samira Farivar and Yufei Yuan

PDF

Integrating Social and Economic Models of Responding to Privacy Messages in Mobile Computing: A Research Agenda, Dennis Galletta, David Eargle, Shadi Janansefat, Dimitar Kunev, and Shivendu Pratap Singh

PDF

Why We Don’t Block 3rd Party Trackers: An Attributional Theory Perspective, Frank Goethals and Shamel Addas

PDF

When does One Weight Threats more? An Integration of Regulatory Focus Theory and Protection Motivation Theory, Jack Shih-Chieh Hsu and Sheng-Pao Shih

PDF

Business orientation in knowledge security risk management – a literature review, Ilona Ilvonen and Jari Jussila

PDF

Organizational Security Norms in the Banking Industry: The United States vs. South Korea, Hwee-Joo Kam, Sanjay Goel, Pairin Katertannakul, and Soo-Goo Hong

PDF

Development of an Artifact for Benchmarking Information Security Policy, Dae Youp Kang and Anat Hovav

PDF

Privacy dimensions in design of smart home systems for elderly people, Ella Kolkowska and Miranda Kajtazi

PDF

Bright Blue Cybersecurity (BBC) Project SIGSEC Research Initiative, Yair Levy and Herb Mattord

PDF

Sharing Patient Disease Data with Privacy Preservation, Xiaoping Liu, Xiao-Bai Li, Luvai Motiwalla, Wenjun Li, Hua Zheng, and Patricia Franklin

PDF

A Study on Resolution Skills in Phishing Detection, Yuan Li, Jingguo Wang, and Raghav Rao

PDF

Why Cooperate? Ethical Analysis of InfoSec Vulnerability Disclosure, Mark-David McLaughlin and Janis Gogan

PDF

Understanding the Role of Equity in Leveraging Privacy Concerns of Consumers in Ecommerce, Zareef Mohammed, Gurvirender Tejay, and Marcus Winkfield

PDF

The Role of Trust and Familiarity in Click-through Intention: A Perception Transfer Theory in a Cybersecurity Context, Obi Ogbanufe and Dan Kim

PDF

Investment in Information Security Measures: A Behavioral Investigation, Roozmehr Safi and Glenn Browne

PDF

Promoting the Use of Information Security Measures for Threat Prevention and Threat Detection, Roozmehr Safi and Glenn Browne

PDF

A New Approach to Mobile Device Authentication, Jordan Shropshire and Philip Menard

PDF

An Exploration of Phishing Information Sharing: A Heuristic-Systematic Approach, Rohit Valecha, Rui Chen, Teju Herath, Arun Vishwanath, Jingguo Wang, and Raghav Rao