Submissions from 2020
A Zero-Trust Federated Identity and Access Management Framework for Cloud and Cloud-based Computing Environments, Monjur Ahmed and Krassie Petrova
The (Lacking) User Adoption of COVID-19 Contact Tracing Apps – Insights from Switzerland and Germany, Manus Bonner, Dana Naous, Christine Legner, and Joël Wagner
Unlocking Risk Perception of Japanese Mobile Payment Users, Wei-Lun Chang
Really, What Are They Offering? A Taxonomy of Companies' Actual Response Strategies after a Data Breach, Till Diesterhöft, Kristin Masuch, Maike Greve, and Simon Trang
Toward Conceptualizing Perplexity in Cybersecurity: An Exploratory Study, Malte Greulich, Sebastian Lins, Daniel Pienta, Jason Bennett Thatcher, and Ali Sunyaev
Towards Governance of Information Security Incident Response, Craig A. Horne, Sean B. Maynard, and Atif Ahmad
Deception against Deception: Toward A Deception Framework for Detection and Characterization of Covert Micro-targeting Campaigns on Online Social Networks, Jafar Haadi Jafarian, Ersin Dincelli, Keith Guzik, Matthew Michaelis, Farnoush Banaei-Kashani, and Ashis Biswas
Information Security Compliance regarding Security Culture, Job Satisfaction, and Perceived Organizational Support, Zhen Sui McKnight and Merrill Warkentin
Improving Cybersecurity Behaviors: A Proposal for Analyzing Four Types of Phishing Training, Alanah Mitchell
Key Security and Privacy Related Factors Influencing the Use of Cloud Computing in SMEs, Ruwan Nagahawatta and Matthew Warren
When Organizational Pressures Collide – Balancing Information Security Risk Management and Compliance, Darwin M. Rivera and Alvaro Arenas
THE BRIGHT AND DARK SIDE OF FINANCIAL SERVICES ECOSYSTEM, Paolo Spagnoletti, Federica Ceci, and Andrea Salvi
Factors Affecting the Performance of Web Application Firewall, Dainya Thomas-Reynolds and Sergey Butakov