Follow

Submissions from 2020

PDF

A Zero-Trust Federated Identity and Access Management Framework for Cloud and Cloud-based Computing Environments, Monjur Ahmed and Krassie Petrova

PDF

The (Lacking) User Adoption of COVID-19 Contact Tracing Apps – Insights from Switzerland and Germany, Manus Bonner, Dana Naous, Christine Legner, and Joël Wagner

PDF

Unlocking Risk Perception of Japanese Mobile Payment Users, Wei-Lun Chang

PDF

Really, What Are They Offering? A Taxonomy of Companies' Actual Response Strategies after a Data Breach, Till Diesterhöft, Kristin Masuch, Maike Greve, and Simon Trang

PDF

Toward Conceptualizing Perplexity in Cybersecurity: An Exploratory Study, Malte Greulich, Sebastian Lins, Daniel Pienta, Jason Bennett Thatcher, and Ali Sunyaev

PDF

Towards Governance of Information Security Incident Response, Craig A. Horne, Sean B. Maynard, and Atif Ahmad

PDF

Deception against Deception: Toward A Deception Framework for Detection and Characterization of Covert Micro-targeting Campaigns on Online Social Networks, Jafar Haadi Jafarian, Ersin Dincelli, Keith Guzik, Matthew Michaelis, Farnoush Banaei-Kashani, and Ashis Biswas

PDF

Information Security Compliance regarding Security Culture, Job Satisfaction, and Perceived Organizational Support, Zhen Sui McKnight and Merrill Warkentin

PDF

Improving Cybersecurity Behaviors: A Proposal for Analyzing Four Types of Phishing Training, Alanah Mitchell

PDF

Key Security and Privacy Related Factors Influencing the Use of Cloud Computing in SMEs, Ruwan Nagahawatta and Matthew Warren

PDF

When Organizational Pressures Collide – Balancing Information Security Risk Management and Compliance, Darwin M. Rivera and Alvaro Arenas

PDF

THE BRIGHT AND DARK SIDE OF FINANCIAL SERVICES ECOSYSTEM, Paolo Spagnoletti, Federica Ceci, and Andrea Salvi

PDF

Factors Affecting the Performance of Web Application Firewall, Dainya Thomas-Reynolds and Sergey Butakov