Submissions from 2025
When Fluency Misleads: Congruence, Absorption, and Truth Discernment in GenAI Image Creation, John Patrick Akinyemi, Sirkka L. Jarvenpaa, and Thushara Gunda
Engaging Americans to Advocate for Their Digital Privacy: A Cross-Cultural Study, Tomiko Ballard and Philip Menard
Analysis of Public and Underground Discourse for Cyber Threat Intelligence: A Routine Activity Theoretic Approach, Paras Bhatt, Rohit Valecha, and H Raghav Rao
Grounded Theory Investigation into Contemporary Digital Piracy Reasoning, Andy Bowman, Bryan Hammer, and Mikko Siponen
Executive Doxing and Organizational Image: How Attacks Directed at Executives Affect Perceptions of the Firm, Mattie Bryant and Jason Thatcher
Process Modeling How National Cybersecurity Policy Gets Made, Adam Caldwell, Sean Maynard, and Atif Ahmad
Malevolent or Benevolent, Utilitarian or Hedonic? Mapping Deepfake Perceptions through Ethical and Social Lenses, Shao Liam Chew and Huigang Liang
A Machine Learning Model of ISP Risk Profiles Using Intent and System Logs, Michael L. Curry, Byron Marshall, Forough Shadbad, and Hannah Le
Controlling the Release of Sensitive Information by Creating Integer Representations of Inferences, Graham Gal
Measuring Strategy Coherence in Security Operations Centers: A Goal-Metric Mapping Framework, Wellington Tatenda Gwavava and Andrew Morin
Credibility Signals in Ransomware Negotiation Chats: Implications for the Ransomware Payment-Decision, Gilbert G. Hoevel
Cyberterrorist Threat Hunting: Creating a Cyber-Physical Taxonomy in Higher Education Contexts, Deanna House, Michelle Black, and Sushmita Sengar
Balancing Value and Control: Understanding Privacy Disclosure to Autonomous AI Agents through an Integrated Theoretical Lens, Haisen Li and Philip Menard
The TikTok Ban: Triggering Four Personas about Data Privacy, Yanbing Long and Shaila Miranda
Between Confidence and Risk: Exploring Cybersecurity Behavior of Generation X Users, Annette M. Mills
The Role of Virtual Reality-Based Phishing Training in Mitigating Information Security Risks, Marshia Mim and Cris Souza
Pressure and the Financial Logic of Cybersecurity Disclosure, Mohammad Mohsin, Moez Farokhniahamedani, and Lakshmi Iyer
The Strategic Mix: Cybersecurity Resource Allocation, AI/ML Adoption, and Data Breach Risk in Healthcare, Mohammad Mohsin and Tashrif Uddin
The Dual-Fit Imperative: A Grounded Theory of CISO Effectiveness, Mazino Onibere, Atif Ahmad, and Sean B. Maynard
ETHOS Framework: A Human-in-the-Loop Approach to Responsible GenAI Deployment in Decision Support Systems, Hrishitva Patel, Philip Menard, and K.V. Abhishek
A Mixed-Method Case Study of Information Security Culture at an Energy Firm, Samantha Phillips, Sal Aurigemma, Bradley Brummel, and Tyler Moore
Impact of AI Slacking on Information Security Policy (ISP) Non-compliance: A Moderating Effect of Security Awareness, Md. Tuhinur Rahman, Moez Farokhnia Hamedani, Motahareh Pourbehzadi, and Hamid Nemati
Large Language Models for Infrastructure as Code Vulnerability Remediation, Raul Y. Reyes, Benjamin M. Ampel, and Hsinchun Chen
A Contextual Analysis Framework for Controlling Enterprise Knowledge Leakage, Jordan Shropshire and Andrew Cobb
Minors and Deepfake Risks: A Review of Exposure, Detection, and Regulation, Elisa Christina Simons
How do Cybersecurity Professionals Calibrate Trust and Justification with AI Under Infobesity, Raghvendra Singh and Pavankumar Mulgund
Learning Together: How Experiential Training and Social Interaction Drive Employee Phishing Reporting, Biju B. Varghese and Quang Neo Bui
Email Phishing Prevention: An Explainable Nudging Approach, Mason Wagner, Benjamin M. Ampel, Matthew Hashim, and Hsinchun Chen
Dimensionality Reduction of SOC Data to Efficiently Build Classifiers, Kyle Wright, Lakshika Vaishnav, and Sanjay Goel
Why Do Employees Disclose Sensitive Data to GenAI? A Personal "Environment" Technology Perspective, Feng Xu and Lanying Li
Pro-Social, Not Pro-Breach: Guilt Appeals Invoke Security Citizenship, Weijie Zhao and Yifeng Ruan
Ecosystem-Level Justice: SME Fairness Perception and Participation in Cybersecurity Compliance Ecosystems, Hallie Zimmerman and France Belanger