Submissions from 2019
An expert assessment of corporate professional users to measure business email compromise detection skills and develop a knowledge and awareness training program, Shahar Aviv, Yair Levy, Ling Wang, and Nitza Geri
A theory on information security: A pilot study, Craig A. Horne, Sean B. Maynard, and Atif Ahmad
Burnout in cybersecurity professionals, Obi Ogbanufe and Janine Spears
Charged language on Twitter: A predictive model of cyberbullying to prevent victimization, Shuyuan Mary Ho, Dayu Kao, Ming-Jung Chiu-Huang, Wenyi Li, Chung-Jui Lai, and Bismark Ankamah
Cybersecurity and smart home devices: A resource governance model, Aurelia Mandani and Ronald Ramirez
Does it meet my expectations? Compensation and remorse as data breach recovery actions – An experimental scenario based investigation, Kristin Masuch, Maike Greve, and Simon Trang
Does privacy mean different things to different people: Can that explain privacy paradox?, Sanjay Goel, Kevin Williams, Jingyi Huang, and Alan Dennis
Effects of emotional appeals on phishing susceptibility, Chuan Annie Tian and Matthew L. Jensen
Honeykeys: deception mechanisms in single packet authorization, Sergey Butakov, Pavol Zavarsky, and Seyedmohammad Mirheydari
Identifying potentially risky insider on-compliance using machine learning to assess multiple protection motivation behaviors, Michael Curry, Byron Marshall, and Robert E. Crossler
Perceived risks toward mobile payment adoption: A three-country analysis, Wei-Lun Chang
Privacy violations in light of digital transformation: insights from data breaches in Norway, Leif Skiftenes Flak, Øystein Sæbø, and Paolo Spagnoletti
Reusability or disposability? A network analysis of reusable software vulnerabilities, Martin Kang, Anat Hovav, Sungyong Um, and Ted Lee
Rhetorical appeals and legitimacy perceptions: How to induce information security policy compliance, Carlos Ivan Torres and Robert Ernest Crossler
Social looks can be deceiving— How social cues affect information disclosure for high-trust users?, Lior Zalmanson, Gal Oestreicher-Singer, and Yael Ecker
The information disclosure trilemma: Privacy, attribution and dependency, Ping Fan Ke
The light side of passwords: Turning motivation from the extrinsic to the intrinsic research in progress, Naomi Woods
Trust-based content filtering: Investigating the association between assurance seals, source expertise, and topics of online product reviews, Bartlomiej Hanus and Benjamin George
What do you fear?: A study on user generated health data and privacy behavior, Krutheeka Baskaran and Saji K. Mathew