Submissions from 2024
Experience and Efficiency in Vulnerability Resolution on Bug Bounty Platforms, Ali Ahmed, Brian Lee, and Amit Deokar
Moral Dynamics in the Age of Remote Work: Exploring the Role of Generational Shifts in Information Security, Patricia Akello, David Firth, and Shawn Clouse
Conceptualizing Mobile Security Mindfulness: A Mixed-Methods Research, Bowen Guan, Yangting Li, and Carol Hsu
Contextual Influences on Phishing Susceptibility: A Qualitative Comparative Analysis, Fabian Hable, Bart van den Hooff, and Nina-Birte Schirrmacher
Integrating Generative AI in Cybersecurity: A Sensemaking Perspective, Hwee-Joo Kam, Allen Johnston, Wael Soliman, and Chen Zhong
Measurement of Cybercrime Severity: A Victims’ Perspective, Binod Kumar, Saji K. Mathew, and Kandaswamy Paramasivan
Between Habit and Control–Opening the Black Box of ISP Compliance Under Stress, Theresa Pfaff, Florian Rampold, Gilbert Hoevel, and Jana Driller
Corporate Governance and the Insider Threat: Investigating the Impact of Management Teams on Data Breaches, Miloslava Plachkinova and Prachi Gala
Wait, Is This Dangerous For Me? Consumers’ Reactions to Data Breaches That Pose (No) Risk to Them, Frederic Schlackl and Florian Pethig
Boundary Uncertainty in Interorganizational Information Sharing, Christina Wagner, Manuel Tranz, Chee-Wee Tan, and Daniel J. Veit
Human-Computer Interaction in Multimodal Fake News Detection, Mateusz Walczak and Aneta Poniszewska-Maranda
The Spillover Effect of Workplace Cybersecurity Training on Home Cyber Hygiene, Weiyu Wang and Matthew Jensen
Using Generative AI for Cybersecurity Awareness Training in Healthcare, Dmitry Zhdanov, Thomas Caldera, and Mary Elaine Califf
Contextual Factors as Moderators of Demographic Effects on Phishing Victimization, Lina Zhou, Zhe Fu, and Dongsong Zhang