Security and Privacy of Information and IS

 

Track Chairs

France Bélanger, Virginia Tech, This email address is being protected from spambots. You need JavaScript enabled to view it.
Tero Vartiainen, University of Vaasa, Finland, This email address is being protected from spambots. You need JavaScript enabled to view it.
Paul Benjamin Lowry, City University of Hong Kong, China, This email address is being protected from spambots. You need JavaScript enabled to view it.

 

Belanger-167x250   Vartiainen-167x250 Lowry-167x250
     

 

In today’s era of globally connected organizations, economies, and societies, the ubiquitous growth of the Internet and significant advances in communications, networking and data gathering and storage technologies have exacerbated the vulnerability of information systems. The extent, frequency, seriousness, and diversity of external attacks to computer systems are unprecedented. Meanwhile, internal attacks and abuse of propriety information assets account for at least half of the serious security and privacy incidents worldwide. Additionally, the personal data gathered and stored by companies is ever more frequently used for profiling and analysis, often without the knowledge or consent of the individuals or groups concerned. Mobile computing with location-aware capabilities has further exacerbated these concerns. It is, thus, imperative to better understand the laws, policies, strategies, technologies, and actions by societies, organizations, groups, and individuals that address security and privacy issues.

Accordingly, this track provides a forum for focused discussion and exchange on information security and privacy research. We seek to address important questions arising from the issues mentioned above, such as: How do online social networks or virtual worlds threaten the security and privacy of the individual participants? What are the underlying economics or societal implications of new security technologies? What are the social and ethical implications related to the uses of new security and privacy practices? How should governments get involved in the process of creating a more secure environment and in safeguarding information privacy? What are the benefits, costs, and implications of the latest security and privacy enhancing technologies? How should firms manage their businesses in view of possible security and privacy breaches? How should firms design and implement "best" security and privacy practices in their IT systems?

The track welcomes design science, empirical, economic, managerial, behavioral, and theoretical submissions across a diverse range of topics—from technical aspects to broader social and managerial issues at the individual, organizational, or societal levels. We invite theoretical perspectives from behavioral, organizational, cognitive, cultural, socio-technical, or other lenses for analysis of these issues.

Topics include, but are not limited to, the following aspects of IS security and privacy:

  • Adoption, use, and continuance of information security technologies and policies
  • Computer abuse and employee deviant behaviors
  • Corporate governance and compliance of security and privacy
  • Costs and benefits of information security and privacy
  • Cross-cultural issues in IS security and privacy
  • Cyberwarfare and cybersecurity
  • Deception and deception intention in the context of online trust and security
  • Design and development of information security and privacy enhancing technologies
  • Deterrence of security policy violations
  • Digital forensics
  • Electronic commerce security and privacy
  • Employee accountability
  • Employee security policy compliance and noncompliance
  • Forensic analysis of security breaches and computer crimes
  • Hacking and cracking, white hat and black hat research issues
  • Investigations of computer crime and security violations
  • IT audit and controls
  • Identity theft and risk assessment
  • Individual motivators and inhibitors of employee computer crime
  • Insider threat behaviors and antecedents
  • Intrusion detection/prevention
  • Legal, societal, and ethical issues in IS security and privacy
  • Mental welfare (e.g., stress) and mental capacities (e.g., remembering) with respect of security and privacy issues
  • Risk analysis and management, risk and fraud assessment
  • Security and privacy concerning social media and social networking
  • Security and privacy metrics
  • Security and privacy of mobile devices
  • Security and privacy strategies
  • Security, Education, Training, and Awareness (SETA) programs and campaigns
  • Social and business security and privacy policies
  • Socio-technical mechanisms for countering cyber threats
  • Spyware / malware
  • Theoretical and empirical analyses of information security behaviors
  • Trust in security and privacy enhancing systems

 

Associate Editors

Manish Agrawal, University of South Florida, This email address is being protected from spambots. You need JavaScript enabled to view it.
Jeff Babb, Texas A&M Western University, This email address is being protected from spambots. You need JavaScript enabled to view it.
Burgu Bulgurcu, Boston College, This email address is being protected from spambots. You need JavaScript enabled to view it.
Hasan Cavusoglu, University of British Columbia, This email address is being protected from spambots. You need JavaScript enabled to view it.
Pei-yu Chen, Temple University, This email address is being protected from spambots. You need JavaScript enabled to view it.
Rob Crossler, Mississippi State University, This email address is being protected from spambots. You need JavaScript enabled to view it.
John D'Arcy, University of Delaware, This email address is being protected from spambots. You need JavaScript enabled to view it.
Alex Durcikova, University of Oklahoma, This email address is being protected from spambots. You need JavaScript enabled to view it.
Sigi Goode, Australian National University, This email address is being protected from spambots. You need JavaScript enabled to view it.
Teju Herath, Brock University, This email address is being protected from spambots. You need JavaScript enabled to view it.
Hannakaisa Isomäki, University of Jyväskylä, This email address is being protected from spambots. You need JavaScript enabled to view it.
Tabitha James, Virginia Tech, This email address is being protected from spambots. You need JavaScript enabled to view it.
Allen Johnston, University of Alabama - Birmingham, This email address is being protected from spambots. You need JavaScript enabled to view it.
Karthik Kannan, Purdue University, This email address is being protected from spambots. You need JavaScript enabled to view it.
Mari Karjalainen, University of Oulu, This email address is being protected from spambots. You need JavaScript enabled to view it.
Flavius Kehr, University of St Gallen, This email address is being protected from spambots. You need JavaScript enabled to view it.
Mark Keith, Brigham Young University, This email address is being protected from spambots. You need JavaScript enabled to view it.
Xin "Robert" Luo, University of New Mexico, This email address is being protected from spambots. You need JavaScript enabled to view it.
Seppo Pahnila, University of Oulu, This email address is being protected from spambots. You need JavaScript enabled to view it.
Rachida Parks, University of Arkansas - Little Rock, This email address is being protected from spambots. You need JavaScript enabled to view it.
Clay Posey, University of Alabama, This email address is being protected from spambots. You need JavaScript enabled to view it.
Sam Ransbotham, Boston College, This email address is being protected from spambots. You need JavaScript enabled to view it.
Tom Roberts, Lousiana Tech University, This email address is being protected from spambots. You need JavaScript enabled to view it.
Benjamin Shao, Arizona State University, This email address is being protected from spambots. You need JavaScript enabled to view it.
Sheng-Pao Shih, Tamkang University, This email address is being protected from spambots. You need JavaScript enabled to view it.
Jeanine Spears, DePaul University, This email address is being protected from spambots. You need JavaScript enabled to view it.
Tony Vance, Brigham Young University, This email address is being protected from spambots. You need JavaScript enabled to view it.
Mark Weiser, Oklahoma State University, This email address is being protected from spambots. You need JavaScript enabled to view it.
Pamela Wisnieski, Penn State University, This email address is being protected from spambots. You need JavaScript enabled to view it.
Heng Xu, Penn State University, This email address is being protected from spambots. You need JavaScript enabled to view it.
Wei Thoo Yue, City University of Hong Kong, This email address is being protected from spambots. You need JavaScript enabled to view it.
Nan Zhang, University of Jyväskylä, This email address is being protected from spambots. You need JavaScript enabled to view it.
 

 

Back to List of Tracks