Follow

Submissions from 2022

PDF

Blockchain technologies and forensic challenges: Emergent potential and diverging affordances, Chadi Aoun

PDF

Factors influencing the organizational decision to outsource IT security, Antra Arshad, Atif Ahmad, and Sean B. Maynard

PDF

Choose your words wisely! Understanding the strategic communication of differential privacy, Aycan Aslan, Maike Greve, and Till Ole Diesterhoeft

PDF

Too good for malware: Investigating effects of entitlement on cybersecurity threat assessment and piracy behavior, Andrew Bowman, Madhav Sharma, and David Biros

PDF

Will SOC telemetry data improve predictive models of user riskiness? A work in progress, Michael Curry, Byron Marshall, Forough Nasirpouri Shadbad, and Sanghyun Hong

PDF

Making sense of certification internalization: A process model for implementing information security and data protection certifications, Philipp Danylak, Sebastian Lins, Carol Hsu, and Ali Sunyaev

PDF

Introducing conversational explanations as a novel response strategy to data breach incidents in digital commerce, Till Ole Diesterhöft, Dennis Bener, and Benjamin Brauer

PDF

Risk compensation behaviors on cascaded security choices, Richard Henkenjohann and Manuel Trenz

PDF

A role theory perspective: Will shifting left become a pain for application developers?, Hwee-Joo Kam and John D'Arcy

PDF

Beyond economic and financial analyses: A revelatory study of IT security investment decision-making process, Rajiv Kohli, Suprateek Sarker, Mikko Siponen, and Mari Karjalainen

PDF

Configuration and management of security procedures with dedicated ‘spa-lang’ domain language in security engineering, Tomasz Krym, Aneta Poniszewska-Marańda, Łukasz Chomątek, and Jakub Chłapiński

PDF

Abstract Only: Progenitors and antagonists of shadow IT use: Results of a computational-driven approach using Reddit data, Animesh Kumar, Christoph Burtscher, and Andreas Eckhardt

PDF

Exploring the impact of data breaches and system malfunctions on users’ safety and privacy perceptions in the context of autonomous vehicles, Henrik Lechte and Jannes Heinrich Diedrich Menck

PDF

Do measures of security compliance intent equal non-compliance scenario agreement?, Byron Marshall, Forough Nasirpouri Shadbad, Michael Curry, and David Biros

PDF

The value relevance of an official press release of a security breach and complementarities between the content elements of the release, Nirup M. Menon, Brian Ngac, and Fatou Diouf

PDF

Network analysis of a darknet marketplace: Identifying themes and key users of illicit networks, Obi Ogbanufe, Fallon Baucum, and Jasmine Benjamin

PDF

Trading well-being for ISP compliance: An investigation of the positive and negative effects of SETA programs, Jalal Sarabadani, Robert E. Crossler, and John D'Arcy

PDF

Revisiting neutralization theory and its underlying assumptions to inspire future information security research, Wael Soliman and Hojat Mohammadnazar

PDF

Cybersecurity risk of interfirm cooperation: Alliance or joint venture?, Hüseyin Tanriverdi and Ghiyoung Im

PDF

Perceived privacy violations through information sharing with external parties – Diving into user perceptions and reactions, Christina Wagner, Manuel Trenz, Chee-Wee Tan, and Daniel Veit