Follow

Submissions from 2018

PDF

Organizational culture and information privacy assimilation: An empirical study, V S Prakash Attili, Saji Mathew, and Vijayan Sugumaran

PDF

Ethical Considerations of Online Identities, Atiya Avery and Dream Gomez

PDF

The Role of Privacy-Preserving Technologies in the Age of Big Data, Daniel Bachlechner, Karolina La Fors, and Alan M. Sears

PDF

The misty crystal ball: Efficient concealment of privacy-sensitive attributes in predictive analytics, Nicolas Banholzer and Stefan Feuerriegel

PDF

Reviewing Technological Solutions of Source Address Validation, Jongbok Byun, Christopher P. Paolini, and Bongsik Shin

PDF

Abstract Only: FEAR APPEALS VERSUS PRIMING IN RANSOMWARE TRAINING, Michael Curry, Byron Marshall, Robert E. Crossler, and John Correia

PDF

Investigation on Willingness of Employees to Share Information Security Advice, Sahar Farshadkhah, Michele Maasberg, and T. Selwyn Ellis

PDF

Abstract Only: Social Influence and Visual Attention in the Personalization Privacy Paradox for Social Advertising: An Eye Tracking Study, Thomas W. Frick, Ting Li, and Paul Pavlou

PDF

SNS Use, Risk, and Executive Behavior, Andrew Green, James Parrish, James Smith, and jason B. Thatcher

PDF

Mitigating Cyber Warfare through Deterrence and Diplomacy, Annika Heffter and Sanjay Goel

PDF

Abstract Only: Security-Related Cynicism: Construct Development and Measurement, Lennart Jaeger, Gabriela Labres Mallmann, and Andreas Eckhardt

PDF

Does Privacy Really Matter? An Extended Perspective on Individual Information System Continuance Use, Shizhen Jia and Robert E. Crossler

PDF

Apollo: A System for Tracking Internet Censorship, Eric Joyce, Matthew Goldeck, Christopher S. Leberknight, and Anna Feldman

PDF

State-of-the-Art in Security Thinking for the Internet of Things (IoT), Miranda Kajtazi, Bahtijar Vogel, Joseph Bugeja, and Rimpu Varshney

PDF

Anonymity, Privacy, and Disclosure (APD) Triad on Social Networking Applications, Mehrdad Koohikamali, Dan J. Kim, and Aaron M. French

PDF

EXPLORATIVE STUDY ON THE CYBER-ATTACK SOURCE TRACEBACK TECHNOLOGIES FOR BRIGHT INTERNET, Gyoo Gun Lim, Hyun Gil Nam, and Il Woo Park

PDF

Collective Deviance in IS, Gabriela Labres Mallmann, Andreas Eckhardt, and Antônio Carlos Gastaud Maçada

PDF

Cyber insurance for correlated risks from phishing attacks: A decision-theoretic approach, Arunabha Mukhopadhyay, Baidyanath Biswas, and Gaurav Gupta

PDF

Cloud Users’ Privacy Concerns in the Indian Healthcare Industry, Saman Nihal, Saji Mathew, and R.K. Amit

PDF

Why Do Users Continue to Use Mobile Cloud Computing Applications? A Security-Privacy, Hamid Reza Nikkhah, Varun Grover, and Rajiv Sabherwal

PDF

AGREEMENTS FRAMEWORK FOR DATA MARKET ECOSYSTEM, Aman Sabrina Nwatchock A Koul and Jean-henry Morin

PDF

An Examination of Resilience in Healthcare Information Systems in the Context of Natural Disasters, Insu Park, Jeewon Cho, and H.R. Rao

PDF

Securing Serverless Computing, Ravi Patnayakuni and Nainika Patnayakuni

PDF

A Taxonomy of Phishing: Attack Types Spanning Economic, Temporal, Breadth, and Target Boundaries, Daniel Pienta, Jason Bennett Thatcher, and Allen C. Johnston

PDF

Non-Malicious Information Exposure Through Personal Device Usage, Tyler M. Pieron and James N. Smith

PDF

CHALLENGES AND BARRIERS TO DIGITAL FORENSICS IN THE CLOUD, Miloslava Plachkinova

PDF

Enhancing Cybersecurity Content in Undergraduate Information Systems Programs: A Way Forward, Rajendra K. Raj, Jean R.S. Blair, Edward Sobiesk, and Allen Parrish

PDF

Natural Language Processing as a Weapon, Jordan Shropshire

PDF

An investigation on the generative mechanisms of Dark Net markets, Paolo Spagnoletti, Federica Ceci, and Bendik Bygstad

PDF

Phishing Susceptibility across Industries: The Differential Impact of Influence Techniques, Chuan Tian, Matthew L. Jensen, and Alexandra Durcikova

PDF

Regulate Privacy in SNS: Privacy Control on the Self-Ego Boundary and Dyadic-Boundary, Chuang Wang and Jun Zhang

PDF

Critical role of ethical leadership on information security climate and employee ISP violation behavior, Botong Xue, Feng Xu, and Merrill Warkentin

PDF

THE DYNAMICS OF INFORMATION SECURITY POLICY ADOPTION, Alper Yayla and Sumantra Sarkar

PDF

Over-claiming as a Predictor of Insider Threat Activities in Individuals, Stan Zavoyskiy, Nicholas Rizzo, Sanjay Goel, and Kevin Williams