IS Security and Privacy

Track Chairs

Tamara
Dinev
Florida Atlantic University, USA
Shih-Chieh “Jack” Hsu
National Sun Yat-sen University, Taiwan
Robert
Willison
Newcastle University,
UK

Description

In today’s era of globally connected organizations, economies, and societies, the ubiquitous growth of the Internet and significant advances in communications, networking and data gathering and storage technologies have exacerbated the vulnerability of information systems. The extent, frequency, seriousness, and diversity of external attacks to computer systems are unprecedented. Meanwhile, internal attacks and abuse of proprietary information assets account for at least half of the serious security and privacy incidents worldwide. Additionally, the personal data gathered and stored by companies is ever more frequently used for profiling and analysis, often without the knowledge or consent of the individuals or groups concerned. Mobile computing with location-aware capabilities has further exacerbated these concerns. It is, thus, imperative to better understand the laws, policies, strategies, technologies, and actions by societies, organizations, groups, and individuals that address security and privacy issues.

Accordingly, this track provides a forum for focused discussion and exchange on information security and privacy research. We seek to address important questions arising from the issues mentioned above, such as: How do online social networks or virtual worlds threaten the security and privacy of the individual participants? What are the underlying economics or societal implications of new security technologies? What are the social and ethical implications related to the uses of new security and privacy practices? How should governments get involved in the process of creating a more secure environment and in safeguarding information privacy? What are the benefits, costs, and implications of the latest security and privacy enhancing technologies? How should firms manage their businesses in view of possible security and privacy breaches? How should firms design and implement “best” security and privacy practices in their IT systems?

The track welcomes design science, empirical, economic, managerial, behavioral, and theoretical submissions across a diverse range of topics—from technical aspects to broader social and managerial issues at the individual, organizational, or societal levels. We invite theoretical perspectives from behavioral, organizational, cognitive, cultural, socio-technical, or other lenses for analysis of these issues.

Topics of Interests

Topics include, but are not limited to, the following aspects of IS security and privacy:

  • Adoption, use, and continuance of information security technologies and policies
  • Computer abuse and employee deviant behaviors
  • Corporate governance and compliance of security and privacy
  • Costs and benefits of information security and privacy
  • Cross-cultural issues in IS security and privacy
  • Cyberwarfare and cybersecurity
  • Deception and deception intention in the context of online trust and security
  • Design and development of information security and privacy enhancing technologies
  • Deterrence of security policy violations
  • Digital forensics
  • Electronic commerce security and privacy
  • Employee accountability
  • Employee security policy compliance and noncompliance
  • Forensic analysis of security breaches and computer crimes
  • Hacking and cracking, white hat and black hat research issues
  • Investigations of computer crime and security violations
  • IT audit and controls
  • Identity theft and risk assessment
  • Individual motivators and inhibitors of employee computer crime
  • Information breach management
  • Insider threat behaviors and antecedents
  • Intrusion detection/prevention
  • Legal, societal, and ethical issues in IS security and privacy
  • Mental welfare (e.g., stress) and mental capacities (e.g., remembering) with respect of security and privacy issues
  • Risk analysis and management, risk and fraud assessment
  • Security and privacy concerning social media and social networking
  • Security and privacy metrics
  • Security and privacy of mobile devices
  • Security and privacy issues related to big data
  • Security and privacy issues related to the Internet of things
  • Security and privacy strategies
  • Security, Education, Training, and Awareness (SETA) programs and campaigns
  • Social and business security and privacy policies
  • Socio-technical mechanisms for countering cyber threats
  • Spyware / malware
  • Theoretical and empirical analyses of information security behaviors
  • Trust in security and privacy enhancing systems

Associate Editors

  • Manish Agrawal, University of South Florida
  • Jeff Babb, West Texas A&M Western University
  • Burcu Bulgurcu, Boston College
  • Peter Buxmann, Professor of IS, Germany
  • Hasan Cavusoglu, University of British Columbia
  • Rob Crossler, Mississippi State University
  • John D’Arcy, University of Delaware
  • Marc J. Dupuis, University of Washington Tacoma
  • Alex Durcikova, University of Oklahoma
  • Sigi Goode, Australian National University
  • Tejaswini “Teju” Herath, Brock University
  • Shuyuan “Mary” Ho, Florida State University
  • Tabitha James, Virginia Tech
  • Allen Johnston, University of Alabama – Birmingham
  • Mark Keith, Brigham Young University
  • Jongwoo “Jonathan” Kim, UMass Boston
  • Hanna Krasnova, Universität Bern
  • Juhee Kwon, City University of Hong Kong
  • Yuzhu “Julia” Li, UMass Dartmouth
  • Xin “Robert” Luo, University of New Mexico
  • Seppo Pahnila, University of Oulu
  • Rachida Parks, University of Arkansas – Little Rock
  • Clay Posey, University of Alabama
  • Sam Ransbotham, Boston College
  • Tom Roberts, University of Texas at Tyler
  • Benjamin Shao, Arizona State University
  • Sheng-Pao Shih, Tamkang University
  • Anthony Vance, Brigham Young University
  • Mark Weiser, Oklahoma State University
  • Yu “Andy” Wu, University of North Texas
  • Wei Thoo Yue, City University of Hong Kong
  • Nan Zhang, University of Jyväskylä