Follow

Submissions from 2025

PDF

When Fluency Misleads: Congruence, Absorption, and Truth Discernment in GenAI Image Creation, John Patrick Akinyemi, Sirkka L. Jarvenpaa, and Thushara Gunda

PDF

Engaging Americans to Advocate for Their Digital Privacy: A Cross-Cultural Study, Tomiko Ballard and Philip Menard

PDF

Analysis of Public and Underground Discourse for Cyber Threat Intelligence: A Routine Activity Theoretic Approach, Paras Bhatt, Rohit Valecha, and H Raghav Rao

PDF

Grounded Theory Investigation into Contemporary Digital Piracy Reasoning, Andy Bowman, Bryan Hammer, and Mikko Siponen

PDF

Executive Doxing and Organizational Image: How Attacks Directed at Executives Affect Perceptions of the Firm, Mattie Bryant and Jason Thatcher

PDF

Process Modeling How National Cybersecurity Policy Gets Made, Adam Caldwell, Sean Maynard, and Atif Ahmad

PDF

Malevolent or Benevolent, Utilitarian or Hedonic? Mapping Deepfake Perceptions through Ethical and Social Lenses, Shao Liam Chew and Huigang Liang

PDF

A Machine Learning Model of ISP Risk Profiles Using Intent and System Logs, Michael L. Curry, Byron Marshall, Forough Shadbad, and Hannah Le

PDF

Controlling the Release of Sensitive Information by Creating Integer Representations of Inferences, Graham Gal

PDF

Measuring Strategy Coherence in Security Operations Centers: A Goal-Metric Mapping Framework, Wellington Tatenda Gwavava and Andrew Morin

PDF

Credibility Signals in Ransomware Negotiation Chats: Implications for the Ransomware Payment-Decision, Gilbert G. Hoevel

PDF

Cyberterrorist Threat Hunting: Creating a Cyber-Physical Taxonomy in Higher Education Contexts, Deanna House, Michelle Black, and Sushmita Sengar

PDF

Balancing Value and Control: Understanding Privacy Disclosure to Autonomous AI Agents through an Integrated Theoretical Lens, Haisen Li and Philip Menard

PDF

The TikTok Ban: Triggering Four Personas about Data Privacy, Yanbing Long and Shaila Miranda

PDF

Between Confidence and Risk: Exploring Cybersecurity Behavior of Generation X Users, Annette M. Mills

PDF

The Role of Virtual Reality-Based Phishing Training in Mitigating Information Security Risks, Marshia Mim and Cris Souza

PDF

Pressure and the Financial Logic of Cybersecurity Disclosure, Mohammad Mohsin, Moez Farokhniahamedani, and Lakshmi Iyer

PDF

The Strategic Mix: Cybersecurity Resource Allocation, AI/ML Adoption, and Data Breach Risk in Healthcare, Mohammad Mohsin and Tashrif Uddin

PDF

The Dual-Fit Imperative: A Grounded Theory of CISO Effectiveness, Mazino Onibere, Atif Ahmad, and Sean B. Maynard

PDF

ETHOS Framework: A Human-in-the-Loop Approach to Responsible GenAI Deployment in Decision Support Systems, Hrishitva Patel, Philip Menard, and K.V. Abhishek

PDF

A Mixed-Method Case Study of Information Security Culture at an Energy Firm, Samantha Phillips, Sal Aurigemma, Bradley Brummel, and Tyler Moore

PDF

Impact of AI Slacking on Information Security Policy (ISP) Non-compliance: A Moderating Effect of Security Awareness, Md. Tuhinur Rahman, Moez Farokhnia Hamedani, Motahareh Pourbehzadi, and Hamid Nemati

PDF

Large Language Models for Infrastructure as Code Vulnerability Remediation, Raul Y. Reyes, Benjamin M. Ampel, and Hsinchun Chen

PDF

A Contextual Analysis Framework for Controlling Enterprise Knowledge Leakage, Jordan Shropshire and Andrew Cobb

PDF

Minors and Deepfake Risks: A Review of Exposure, Detection, and Regulation, Elisa Christina Simons

PDF

How do Cybersecurity Professionals Calibrate Trust and Justification with AI Under Infobesity, Raghvendra Singh and Pavankumar Mulgund

PDF

Learning Together: How Experiential Training and Social Interaction Drive Employee Phishing Reporting, Biju B. Varghese and Quang Neo Bui

PDF

Email Phishing Prevention: An Explainable Nudging Approach, Mason Wagner, Benjamin M. Ampel, Matthew Hashim, and Hsinchun Chen

PDF

Dimensionality Reduction of SOC Data to Efficiently Build Classifiers, Kyle Wright, Lakshika Vaishnav, and Sanjay Goel

PDF

Why Do Employees Disclose Sensitive Data to GenAI? A Personal "Environment" Technology Perspective, Feng Xu and Lanying Li

PDF

Pro-Social, Not Pro-Breach: Guilt Appeals Invoke Security Citizenship, Weijie Zhao and Yifeng Ruan

PDF

Ecosystem-Level Justice: SME Fairness Perception and Participation in Cybersecurity Compliance Ecosystems, Hallie Zimmerman and France Belanger