Submissions from 2018
Organizational culture and information privacy assimilation: An empirical study, V S Prakash Attili, Saji Mathew, and Vijayan Sugumaran
Ethical Considerations of Online Identities, Atiya Avery and Dream Gomez
The Role of Privacy-Preserving Technologies in the Age of Big Data, Daniel Bachlechner, Karolina La Fors, and Alan M. Sears
The misty crystal ball: Efficient concealment of privacy-sensitive attributes in predictive analytics, Nicolas Banholzer and Stefan Feuerriegel
Reviewing Technological Solutions of Source Address Validation, Jongbok Byun, Christopher P. Paolini, and Bongsik Shin
Abstract Only: FEAR APPEALS VERSUS PRIMING IN RANSOMWARE TRAINING, Michael Curry, Byron Marshall, Robert E. Crossler, and John Correia
Investigation on Willingness of Employees to Share Information Security Advice, Sahar Farshadkhah, Michele Maasberg, and T. Selwyn Ellis
Abstract Only: Social Influence and Visual Attention in the Personalization Privacy Paradox for Social Advertising: An Eye Tracking Study, Thomas W. Frick, Ting Li, and Paul Pavlou
SNS Use, Risk, and Executive Behavior, Andrew Green, James Parrish, James Smith, and jason B. Thatcher
Mitigating Cyber Warfare through Deterrence and Diplomacy, Annika Heffter and Sanjay Goel
Abstract Only: Security-Related Cynicism: Construct Development and Measurement, Lennart Jaeger, Gabriela Labres Mallmann, and Andreas Eckhardt
Does Privacy Really Matter? An Extended Perspective on Individual Information System Continuance Use, Shizhen Jia and Robert E. Crossler
Apollo: A System for Tracking Internet Censorship, Eric Joyce, Matthew Goldeck, Christopher S. Leberknight, and Anna Feldman
State-of-the-Art in Security Thinking for the Internet of Things (IoT), Miranda Kajtazi, Bahtijar Vogel, Joseph Bugeja, and Rimpu Varshney
Anonymity, Privacy, and Disclosure (APD) Triad on Social Networking Applications, Mehrdad Koohikamali, Dan J. Kim, and Aaron M. French
EXPLORATIVE STUDY ON THE CYBER-ATTACK SOURCE TRACEBACK TECHNOLOGIES FOR BRIGHT INTERNET, Gyoo Gun Lim, Hyun Gil Nam, and Il Woo Park
Collective Deviance in IS, Gabriela Labres Mallmann, Andreas Eckhardt, and Antônio Carlos Gastaud Maçada
Cyber insurance for correlated risks from phishing attacks: A decision-theoretic approach, Arunabha Mukhopadhyay, Baidyanath Biswas, and Gaurav Gupta
Cloud Users’ Privacy Concerns in the Indian Healthcare Industry, Saman Nihal, Saji Mathew, and R.K. Amit
Why Do Users Continue to Use Mobile Cloud Computing Applications? A Security-Privacy, Hamid Reza Nikkhah, Varun Grover, and Rajiv Sabherwal
AGREEMENTS FRAMEWORK FOR DATA MARKET ECOSYSTEM, Aman Sabrina Nwatchock A Koul and Jean-henry Morin
An Examination of Resilience in Healthcare Information Systems in the Context of Natural Disasters, Insu Park, Jeewon Cho, and H.R. Rao
Securing Serverless Computing, Ravi Patnayakuni and Nainika Patnayakuni
A Taxonomy of Phishing: Attack Types Spanning Economic, Temporal, Breadth, and Target Boundaries, Daniel Pienta, Jason Bennett Thatcher, and Allen C. Johnston
Non-Malicious Information Exposure Through Personal Device Usage, Tyler M. Pieron and James N. Smith
CHALLENGES AND BARRIERS TO DIGITAL FORENSICS IN THE CLOUD, Miloslava Plachkinova
Enhancing Cybersecurity Content in Undergraduate Information Systems Programs: A Way Forward, Rajendra K. Raj, Jean R.S. Blair, Edward Sobiesk, and Allen Parrish
Natural Language Processing as a Weapon, Jordan Shropshire
An investigation on the generative mechanisms of Dark Net markets, Paolo Spagnoletti, Federica Ceci, and Bendik Bygstad
Phishing Susceptibility across Industries: The Differential Impact of Influence Techniques, Chuan Tian, Matthew L. Jensen, and Alexandra Durcikova
Regulate Privacy in SNS: Privacy Control on the Self-Ego Boundary and Dyadic-Boundary, Chuang Wang and Jun Zhang
Critical role of ethical leadership on information security climate and employee ISP violation behavior, Botong Xue, Feng Xu, and Merrill Warkentin
THE DYNAMICS OF INFORMATION SECURITY POLICY ADOPTION, Alper Yayla and Sumantra Sarkar
Over-claiming as a Predictor of Insider Threat Activities in Individuals, Stan Zavoyskiy, Nicholas Rizzo, Sanjay Goel, and Kevin Williams