Follow

Submissions from 2019

PDF

An expert assessment of corporate professional users to measure business email compromise detection skills and develop a knowledge and awareness training program, Shahar Aviv, Yair Levy, Ling Wang, and Nitza Geri

PDF

A theory on information security: A pilot study, Craig A. Horne, Sean B. Maynard, and Atif Ahmad

PDF

Burnout in cybersecurity professionals, Obi Ogbanufe and Janine Spears

PDF

Charged language on Twitter: A predictive model of cyberbullying to prevent victimization, Shuyuan Mary Ho, Dayu Kao, Ming-Jung Chiu-Huang, Wenyi Li, Chung-Jui Lai, and Bismark Ankamah

PDF

Cybersecurity and smart home devices: A resource governance model, Aurelia Mandani and Ronald Ramirez

PDF

Does it meet my expectations? Compensation and remorse as data breach recovery actions – An experimental scenario based investigation, Kristin Masuch, Maike Greve, and Simon Trang

PDF

Does privacy mean different things to different people: Can that explain privacy paradox?, Sanjay Goel, Kevin Williams, Jingyi Huang, and Alan Dennis

PDF

Effects of emotional appeals on phishing susceptibility, Chuan Annie Tian and Matthew L. Jensen

PDF

Honeykeys: deception mechanisms in single packet authorization, Sergey Butakov, Pavol Zavarsky, and Seyedmohammad Mirheydari

PDF

Identifying potentially risky insider on-compliance using machine learning to assess multiple protection motivation behaviors, Michael Curry, Byron Marshall, and Robert E. Crossler

PDF

Perceived risks toward mobile payment adoption: A three-country analysis, Wei-Lun Chang

PDF

Privacy violations in light of digital transformation: insights from data breaches in Norway, Leif Skiftenes Flak, Øystein Sæbø, and Paolo Spagnoletti

PDF

Reusability or disposability? A network analysis of reusable software vulnerabilities, Martin Kang, Anat Hovav, Sungyong Um, and Ted Lee

PDF

Rhetorical appeals and legitimacy perceptions: How to induce information security policy compliance, Carlos Ivan Torres and Robert Ernest Crossler

PDF

Social looks can be deceiving— How social cues affect information disclosure for high-trust users?, Lior Zalmanson, Gal Oestreicher-Singer, and Yael Ecker

PDF

The information disclosure trilemma: Privacy, attribution and dependency, Ping Fan Ke

PDF

The light side of passwords: Turning motivation from the extrinsic to the intrinsic research in progress, Naomi Woods

PDF

Trust-based content filtering: Investigating the association between assurance seals, source expertise, and topics of online product reviews, Bartlomiej Hanus and Benjamin George

PDF

What do you fear?: A study on user generated health data and privacy behavior, Krutheeka Baskaran and Saji K. Mathew