Submissions from 2022
Blockchain technologies and forensic challenges: Emergent potential and diverging affordances, Chadi Aoun
Factors influencing the organizational decision to outsource IT security, Antra Arshad, Atif Ahmad, and Sean B. Maynard
Choose your words wisely! Understanding the strategic communication of differential privacy, Aycan Aslan, Maike Greve, and Till Ole Diesterhoeft
Too good for malware: Investigating effects of entitlement on cybersecurity threat assessment and piracy behavior, Andrew Bowman, Madhav Sharma, and David Biros
Will SOC telemetry data improve predictive models of user riskiness? A work in progress, Michael Curry, Byron Marshall, Forough Nasirpouri Shadbad, and Sanghyun Hong
Making sense of certification internalization: A process model for implementing information security and data protection certifications, Philipp Danylak, Sebastian Lins, Carol Hsu, and Ali Sunyaev
Introducing conversational explanations as a novel response strategy to data breach incidents in digital commerce, Till Ole Diesterhöft, Dennis Bener, and Benjamin Brauer
Risk compensation behaviors on cascaded security choices, Richard Henkenjohann and Manuel Trenz
A role theory perspective: Will shifting left become a pain for application developers?, Hwee-Joo Kam and John D'Arcy
Beyond economic and financial analyses: A revelatory study of IT security investment decision-making process, Rajiv Kohli, Suprateek Sarker, Mikko Siponen, and Mari Karjalainen
Configuration and management of security procedures with dedicated ‘spa-lang’ domain language in security engineering, Tomasz Krym, Aneta Poniszewska-Marańda, Łukasz Chomątek, and Jakub Chłapiński
Abstract Only: Progenitors and antagonists of shadow IT use: Results of a computational-driven approach using Reddit data, Animesh Kumar, Christoph Burtscher, and Andreas Eckhardt
Exploring the impact of data breaches and system malfunctions on users’ safety and privacy perceptions in the context of autonomous vehicles, Henrik Lechte and Jannes Heinrich Diedrich Menck
Do measures of security compliance intent equal non-compliance scenario agreement?, Byron Marshall, Forough Nasirpouri Shadbad, Michael Curry, and David Biros
The value relevance of an official press release of a security breach and complementarities between the content elements of the release, Nirup M. Menon, Brian Ngac, and Fatou Diouf
Network analysis of a darknet marketplace: Identifying themes and key users of illicit networks, Obi Ogbanufe, Fallon Baucum, and Jasmine Benjamin
Trading well-being for ISP compliance: An investigation of the positive and negative effects of SETA programs, Jalal Sarabadani, Robert E. Crossler, and John D'Arcy
Revisiting neutralization theory and its underlying assumptions to inspire future information security research, Wael Soliman and Hojat Mohammadnazar
Cybersecurity risk of interfirm cooperation: Alliance or joint venture?, Hüseyin Tanriverdi and Ghiyoung Im
Perceived privacy violations through information sharing with external parties – Diving into user perceptions and reactions, Christina Wagner, Manuel Trenz, Chee-Wee Tan, and Daniel Veit