Home / Annual Information Institute Conference Proceedings

 

2024
Peer-reviewed papers presented at the 2024 Information Institute Las Vegas Conference
Cite as: Author, A. (year). Title of paper. In Proceedings of the Annual Information Institute Conference, Eds. Dhillon, G.; Furnell, S.; Demetis, D.; and Srivastava, S. April 3 – April 4, 2024. Las Vegas, NV. USA [ISBN: 978-1-935160-35-9]

Idensohn, C. J. & Flowerday, S. (2024). Malicious Insider Behaviour in Cybersecurity Informed by the Fraud Triangle . 23rd Annual Security Conference, April 3 – April 4, 2024, Las Vegas, NV. [link]

Proudfoot, J. & Madnick, S. (2024). Cybersecurity regulation development and dissemination deficiencies harming organizational cybersecurity outcomes. 23rd Annual Security Conference, April 3 – April 4, 2024, Las Vegas, NV. [link]

Furnell, S., Bada, M. & Kaberuka, J. (2024). A Self-Assessment Method for Organizational Awareness of Digital Security by Design. 23rd Annual Security Conference, April 3 – April 4, 2024, Las Vegas, NV. [link]

Abdelhamid, M. & Vo, D. (2024). Generative AI Tools in Addressing Personal Healthcare Questions: An Empirical Study. 23rd Annual Security Conference, April 3 – April 4, 2024, Las Vegas, NV. [link]

Diaz, R., Smith, K., Zamponi, V., Diaz, W. M., & Ehungwe, M. (2024). An AI-enabled Cyber Risk Management Model for Determining Ripple Effects from Cybersecurity and Other Supply Chain Disruptions. 23rd Annual Security Conference, April 3 – April 4, 2024, Las Vegas, NV. [link]

Karahan, S. & Duvall, T. (2024). Cybersecurity Internship Clinic Design. 23rd Annual Security Conference, April 3 – April 4, 2024, Las Vegas, NV. [link]

Payne, B. K. & Payne, C. F. (2024). Cybersecurity Internships in NSA-CAE Programs: An Overview. 23rd Annual Security Conference, April 3 – April 4, 2024, Las Vegas, NV. [link]

Abed, J. & Das, S. (2024). Quantitative Analysis of Factors Impacting Organizational Readiness for Cyber security Threats: Relationships and Inter-relationships Assessment. 23rd Annual Security Conference, April 3 – April 4, 2024, Las Vegas, NV. [link]

Murphy, A., Raynor, D., Redd, L., & Payne, B. (2024). Internship Experiences of Cybersecurity, Computing, and STEM Students: Differences Across and Between Disciplines. 23rd Annual Security Conference, April 3 – April 4, 2024, Las Vegas, NV. [link]

Furnell, S., Khan, N., Bada, M. & Nurse, J. R. C. (2024). Evaluating Online Cybersecurity Guidance and Support for Small Businesses. 23rd Annual Security Conference, April 3 – April 4, 2024, Las Vegas, NV. [link]

Xie, W., Melia, S. & Zhao, V. (2024). Persuasion Techniques in Smishing. 23rd Annual Security Conference, April 3 – April 4, 2024, Las Vegas, NV. [link]

Yarasani, H., Hewarathna, A. U. & Akula, P. (2024). Artificial intelligence (AI) and machine learning (ML) in data protection. 23rd Annual Security Conference, April 3 – April 4, 2024, Las Vegas, NV. [link]

Jennex, M. E. & Babb, J. (2024). Observations and Learnings from Cybersecurity Audits of SMEs. 23rd Annual Security Conference, April 3 – April 4, 2024, Las Vegas, NV. [link]

Mohottalalage, T. & Mailewa, A. (2024). An Analysis of Security Risk Factors in IoT and Defensive Measures to Mitigate Data Breaches. 23rd Annual Security Conference, April 3 – April 4, 2024, Las Vegas, NV. [link]

Noble, B., Chen, J. & Schmidt, M. (2024). Large Language Model (LLM) Limitations when Used on a Limited Dataset. 23rd Annual Security Conference, April 3 – April 4, 2024, Las Vegas, NV. [link]

Parrish, J., Johnson, V. & Dhillon, G. (2024). Exploring the Lack of Diversity in Cybersecurity. 23rd Annual Security Conference, April 3 – April 4, 2024, Las Vegas, NV. [link]

Kanamugire, J. (2024). A Case Study: Real Estate Wealth Network Data Breach. 23rd Annual Security Conference, April 3 – April 4, 2024, Las Vegas, NV. [link]

Abed, J. (2024). Comparative Analysis of Security-Based Precautionary Behaviors: Home vs. Office Work Environments. 23rd Annual Security Conference, April 3 – April 4, 2024, Las Vegas, NV. [link]

Wang, J., Schmidt, M. & Kuikel, R. (2024). User trust and credibility of conversational agents. 23rd Annual Security Conference, April 3 – April 4, 2024, Las Vegas, NV. [link]

Sill, J. & Hale, J. (2024). A Hegelian Dialectic: Data Sovereignty in the views of Goldsmith vs. Johnson & Post. 23rd Annual Security Conference, April 3 – April 4, 2024, Las Vegas, NV. [link]

Delgado-Martí, H. J. & Cruz, A. (2024). Examination of crossover features in a Genetic Algorithm towards applications in cybersecurity. 23rd Annual Security Conference, April 3 – April 4, 2024, Las Vegas, NV. [link]

Delgado, M. A. R. & Collazo, X. N. G. (2024). The Relevance of Cloud Computing for Cybersecurity Education. 23rd Annual Security Conference, April 3 – April 4, 2024, Las Vegas, NV. [link]

Clarke, N., Alotibi, G., Joy, D., Li, F., Furnell, S., Alshumrani, A. & Mohammed, H. (2024). An Identity and Interaction-Based Approach to Network Forensic Analysis. 23rd Annual Security Conference, April 3 – April 4, 2024, Las Vegas, NV. [link]

Lombard, A. & Flowerday, S. (2024). Exploring the Risks of AI on Human Worth. 23rd Annual Security Conference, April 3 – April 4, 2024, Las Vegas, NV. [link]

Duffany, J. L. (2024). Security of Artificial Intelligence Technologies. 23rd Annual Security Conference, April 3 – April 4, 2024, Las Vegas, NV. [link]

Enaholo, E. & Martey, M. (2024). Ransomware Taxonomy. 23rd Annual Security Conference, April 3 – April 4, 2024, Las Vegas, NV. [link]

Alyammahi, A. & Khamayseh, Y. (2024). Ransomware Detection Using Behavioural-Based Analysis. 23rd Annual Security Conference, April 3 – April 4, 2024, Las Vegas, NV. [link]

González, R., Vivas, R., Chaar, E.M. & Cruz, A. (2024). The Impact of Machine Learning on Credit Card Fraud Detection. 23rd Annual Security Conference, April 3 – April 4, 2024, Las Vegas, NV. [link]

Stavrum, P. N., Schmidt, M. & Rice, P. E. (2024). Section 230: Social Media’s Cultural Influence and Associated Negative Effects. 23rd Annual Security Conference, April 3 – April 4, 2024, Las Vegas, NV. [link]

Hofmeier, M. & Lechner, U. (2024). Game-Based Identification of Potential Malicious Insider Threats. 23rd Annual Security Conference, April 3 – April 4, 2024, Las Vegas, NV. [link]

2023
Peer-reviewed papers presented at the 2023 Information Institute Las Vegas Conference
Cite as: Author, A. (year). Title of paper. In Proceedings of the Annual Information Institute Conference, Eds. Dhillon, G.; Furnell, S.; Demetis, D; and Srivastava, S. May 9 – May 10, 2023. Las Vegas, NV. USA [ISBN: 978-1-935160-33-5]

McLeod, A., & Dolezel, D. (2023). Security Analytics: Evaluating Antecedents to Non-Compliance Behaviors. 22nd Annual Security Conference, May 9-May 10, 2023, Las Vegas, NV. [link]

Abdelhamid, M., Isaac, R., & Crusius, K. (2023). Trust me, I am Accountable: Factors Influencing Perceived Benefits of Blockchain Technology. 22nd Annual Security Conference, May 9-May 10, 2023, Las Vegas, NV. [link]

Schwartz, T., Parada, J. I., Cohn, F., Wrenn, G., & Pearlson, K. (2023). Cybersecurity as a competitive advantage is the next big strategic play. 22nd Annual Security Conference, May 9-May 10, 2023, Las Vegas, NV. [link]

Lapke, S. (2023). Transformational Leadership as an Avenue to Securing Accounting Information Systems. 22nd Annual Security Conference, May 9-May 10, 2023, Las Vegas, NV. [link]

Harris, M. (2023). A synthesis of theoretical investigations into the adoption of Internet of Medical Things (IoMT). 22nd Annual Security Conference, May 9-May 10, 2023, Las Vegas, NV. [link]

Vedadi, A., & Farshadkhah, S. (2023). Cyber-complacency and the Security Downfall: An Empirical Analysis. 22nd Annual Security Conference, May 9-May 10, 2023, Las Vegas, NV. [link]

Karahan, S., Oesteraas, I., Pinto, C. A., & Kovak, H. (2023). An overview of factors affecting online content moderation. 22nd Annual Security Conference, May 9-May 10, 2023, Las Vegas, NV. [link]

Matos, W. (2023). Dissecting ATM Malware as a Digital Forensics Investigator. 22nd Annual Security Conference, May 9-May 10, 2023, Las Vegas, NV. [link]

Bandara, N., Marques, L., Martey, M., & Mailewa, A. (2023). Analysis of Recent Ransomware Attacks and Preventable Measures. 22nd Annual Security Conference, May 9-May 10, 2023, Las Vegas, NV. [link]

Chaar, E., Jordan, Z., & Cruz, A. (2023). Comparing Security in Contactless Payments: NFC vs. QR Code. 22nd Annual Security Conference, May 9-May 10, 2023, Las Vegas, NV. [link]

Walker, J., & Lapke, M. (2023). An Intrusion Detection and Dataset Creation Tool for Ransomware Attacks within IoT Networks. 22nd Annual Security Conference, May 9-May 10, 2023, Las Vegas, NV. [link]

Bolger, C., Brummel, B., Aurigemma, S., Moore, T., & Baskin, M. (2023). Information Security Awareness: Identifying Gaps in Current Measurement Tools. 22nd Annual Security Conference, May 9-May 10, 2023, Las Vegas, NV. [link]

Tilbury, J. & Flowerday, S. (2023). The Rationality of Automation Bias in Security Operation Centers. 22nd Annual Security Conference, May 9-May 10, 2023, Las Vegas, NV. [link]

Dzimiela, C., & Jennex, M. (2023). An Inside View of a Ransomware Attack Response and Recovery. 22nd Annual Security Conference, May 9-May 10, 2023, Las Vegas, NV. [link]

Phillips, S., Brummel, B., Aurigemma, S., & Moore, T. (2023). Information Security Culture: A look Ahead at Measurement Methods. 22nd Annual Security Conference, May 9-May 10, 2023, Las Vegas, NV. [link]

Higgs, J., & Flowerday, S. (2023). Online Video Games: Cyberlaundering Vulnerabilities and Controls. 22nd Annual Security Conference, May 9-May 10, 2023, Las Vegas, NV. [link]

Meighan, S., & Demetis, D. (2023). Fighting crypto-laundering: the case of Ireland’s Financial Intelligence Unit. 22nd Annual Security Conference, May 9-May 10, 2023, Las Vegas, NV. [link]

Furnell, S., Bada, M., & Kaberuka, J. (2023). Assessing Organizational Awareness and Acceptance of Digital Security by Design. 22nd Annual Security Conference, May 9-May 10, 2023, Las Vegas, NV. [link]

Hastings, S., Moore, T., Aurigemma, S., & Brummel, B. (2023) Predicting Authentication Performance with Psychological Constructs. 22nd Annual Security Conference, May 9-May 10, 2023, Las Vegas, NV. [link]

Collen, S., Noble, B., Overboe, C., & Mailewa, A. (2023). Risks, Privacy and Responsibility of Social Media use in the Workplace: A Review. 22nd Annual Security Conference, May 9-May 10, 2023, Las Vegas, NV. [link]

Duffany, J. (2023). Security of Artificially-Intelligent Self-Driving Vehicles. 22nd Annual Security Conference, May 9-May 10, 2023, Las Vegas, NV. [link]

Alshammari, M. M., & Demetis, D. (2023). House of Cards: developing KPIs for monitoring cybersecurity awareness (CSA). 22nd Annual Security Conference, May 9-May 10, 2023, Las Vegas, NV. [link]

Vazquez-Ferrer, R., Garcia-Romero, F., Sosa-Lugo, J.R., Ramos-Flores, E., Gonzalez-Rodriguez, D., Cruz, A., & Duffany, J. (2023). Android Ransomware Recognition with Feature Extraction for Improved Security System Detection. 22nd Annual Security Conference, May 9-May 10, 2023, Las Vegas, NV. [link]

Vidal, A., Vazquez-Ferrer, R., & Cruz, A. (2023). Real-Time Classification and Object Detection to provide Mass Shootings a faster response. 22nd Annual Security Conference, May 9-May 10, 2023, Las Vegas, NV. [link]

Delgado-Martí, H. J. & Alfredo Cruz (2023). Quantum Computation and post-quantum cryptography relevance for cybersecurity education. 22nd Annual Security Conference, May 9-May 10, 2023, Las Vegas, NV. [link]

Pravin, D. & Amin, M.S. (2023). Talk to me, and take care: Unleashing the power of word of mouth to increase cyber safety. 22nd Annual Security Conference, May 9-May 10, 2023, Las Vegas, NV. [link]

Shumway, P., Brummel, B., Moore, T., Aurigemma, S. & Hastings, S. (2023). Naturalistic observations of login attempts: Do security implementations and demands effect employee job behaviors and perceptions? 22nd Annual Security Conference, May 9-May 10, 2023, Las Vegas, NV. [link]

Diaz, R., Kang, L. & Wilson, G. (2023). An Experiential Learning Approach to Building a Cyber Range: A Maritime Supply Chain Focus. 22nd Annual Security Conference, May 9-May 10, 2023, Las Vegas, NV. [link]

Kim, Y. & Ayyagari, R. (2023). Changes in Users’ Attitudes to Security Breaches: A Study of T-Mobile Breaches. 22nd Annual Security Conference, May 9-May 10, 2023, Las Vegas, NV. [link]

Payne, B. (2023). Patterns surrounding salary expectations among cybersecurity students. 22nd Annual Security Conference, May 9-May 10, 2023, Las Vegas, NV. [link]

Brown, D. (2023). Experiential learning and cloud resource education DevOps. 22nd Annual Security Conference, May 9-May 10, 2023, Las Vegas, NV. [link]

Adhikari, A., Sharma, R. & Mailewa, A. (2023). Recent advances of security in IoT: a survey. 22nd Annual Security Conference, May 9-May 10, 2023, Las Vegas, NV. [link]

 

2022
Peer-reviewed papers presented at the 2022 Information Institute Las Vegas Conference
Cite as: Author, A. (year). Title of paper. In Proceedings of the Annual Information Institute Conference, Eds. Dhillon, G.; Demetis, D; and Furnell, S. May 26 – May 27, 2022. Las Vegas, NV. USA [ISBN: 978-1-935160-31-1]

Vidal, A., Ferrer, R. V., & Cruz, A. (2022). Real-Time Acoustic Firearm Classification and Detection System. 21st Annual Security Conference, May 26-May 27, 2022, Las Vegas, NV. [link]

Delgado-Martí, H. J., Ferrer, R. V., & Cruz, A. (2022). Exploration of Heuristic and Probabilistic Tools in Quantum Computing with Applications to Cryptography. 21st Annual Security Conference, May 26-May 27, 2022, Las Vegas, NV. [link]

Torres, I. L., & Cruz, A. (2022). Exploring Distributed Machine Learning System on Raspberry Pi Computer Cluster. 21st Annual Security Conference, May 26-May 27, 2022, Las Vegas, NV. [link]

Chaar Santana, E. M., & Duffany, J. (2022). Efficient IoT Attack Detection in The Fog Layer. 21st Annual Security Conference, May 26-May 27, 2022, Las Vegas, NV. [link]

Varela-Rosa, C. A., & Duffany, J. (2022). The Impact of Segmentation and Overlapping in Feature Extraction for Biometric Human Authentication Systems. 21st Annual Security Conference, May 26-May 27, 2022, Las Vegas, NV. [link]

Martinez Ojeda, N. S., & Duffany, J. (2022). Design of an Emergency MANET Based on Cellular Phone Technology. 21st Annual Security Conference, May 26-May 27, 2022, Las Vegas, NV. [link]

Ferrer, R. V., Duffany, J., & Cruz, A. (2022). Efficient Biometric Gait Authentication by Using an Accelerometer Sensor. 21st Annual Security Conference, May 26-May 27, 2022, Las Vegas, NV. [link]

Abdelhamid, M., & Pingale, S. (2022). Detecting Phishing URLs Using Machine Learning Algorithm. 21st Annual Security Conference, May 26-May 27, 2022, Las Vegas, NV. [link]

Jennex, M. E. (2022). Mitigating The Risk of Losing Critical Knowledge in Businesses/Organizations: Lessons from COVID-19. 21st Annual Security Conference, May 26-May 27, 2022, Las Vegas, NV. [link]

Harris, M., Martin, R. & Chin, A. (2022). Telemedicine Adoption: An Empirical Review of Theoretical Model Usage. 21st Annual Security Conference, May 26-May 27, 2022, Las Vegas, NV. [link]

Xie, W. & Chen, C. (2022). Understanding Switching Intention to E-Commerce Drone Delivery: A Privacy Risk Hedging View. 21st Annual Security Conference, May 26-May 27, 2022, Las Vegas, NV. [link]

Adesemowo, A. K. (2022). Critical Realism in the Fabric of Cybersecurity. 21st Annual Security Conference, May 26-May 27, 2022, Las Vegas, NV. [link]

Rensburg, N. V., Madnick, S., Proudfoot, J., & Rezek, C. (2022). Insights Gained While Exploring Regulation and Cybersecurity Maturity. 21st Annual Security Conference, May 26-May 27, 2022, Las Vegas, NV. [link]

Jason, X., Taylor, C., & Hunsinger, S. (2022). Benchmarking Cybersecurity Programs in Higher Education: The Current Landscape and Path Forward. 21st Annual Security Conference, May 26-May 27, 2022, Las Vegas, NV. [link]

 

2021
No proceedings because of COVID

2020
Peer-reviewed papers presented at the 2020 Information Institute Las Vegas Conference
Cite as: Author, A. (year). Title of paper. In Proceedings of the Annual Information Institute Conference, Eds. Dhillon, G.; Demeits, D; and Furnell, S. March 29 – April 1, 2020. Las Vegas, NV (conducted virtually because of COVID-19). USA [ISBN: 978-1-935160-25-0]

Marotta, A., & Madnick, S. (2020). Analyzing the Interplay between Regulatory Compliance and Cybersecurity. 19th Annual Security Conference, March 30-April 1, 2020, Las Vegas, NV. [link]

Demetis, D. S., & Dhillon, G. (2020). A systems theoretical synthesis for cybersecurity. 19th Annual Security Conference, March 30-April 1, 2020, Las Vegas, NV. [link]

Chin, A. G., Onwujekwe, G., & Harris, M. A. (2020). Consumer Trust in Mobile Payments: An Initial Review and Synthesis. 19th Annual Security Conference, March 30-April 1, 2020, Las Vegas, NV. [link]

Huang, K., & Madnick, S. (2020). Cyber Securing Cross-border Financial Services: Calling for a Financial Cybersecurity Action Task Force. 19th Annual Security Conference, March 30-April 1, 2020, Las Vegas, NV. [link]

Novaes Neto, N., Madnick, S., de Paula, A. M. G., & Malara Borges, N. (2020). A Case Study of the Capital One Data Breach. 19th Annual Security Conference, March 30-April 1, 2020, Las Vegas, NV. [link]

Abdelhamid, M., Vij, A., Ingle, M., & Cervantes, R. (2020). Text-mining and Visualizations of Phishing Attacks in the Education Sector. 19th Annual Security Conference, March 30-April 1, 2020, Las Vegas, NV. [link]

Farook, M. R. M. (2020). Historical Overview of Ethical Concerns in Artificial Intelligence. 19th Annual Security Conference, March 30-April 1, 2020, Las Vegas, NV. [link]

Rashidibajgan, S., & Hupperich, T. (2020). A Secure and Reliable Structure in Opportunistic Networks. 19th Annual Security Conference, March 30-April 1, 2020, Las Vegas, NV. [link]

Sharma, K., & Mukhopadhyay, A. (2020). Cyber risk assessment and mitigation strategy for DDoS attacks in BFSI segment. 19th Annual Security Conference, March 30-April 1, 2020, Las Vegas, NV. [link]

Khan, S., & Madnick, S. (2020). Cybersafety Analysis of Industrial Control Systems: Chiller Systems. 19th Annual Security Conference, March 30-April 1, 2020, Las Vegas, NV. [link]

Xie, W., Dhillon, G., Mehta, N., & Smith, K. (2020). User Generated Content and Participatory Healthcare. 19th Annual Security Conference, March 30-April 1, 2020, Las Vegas, NV. [link]

Furnell, S., & Haskell-Dowland, P. (2020). Good guidance or mistaken misdirection: Assessing the quality of password advice. 19th Annual Security Conference, March 30-April 1, 2020, Las Vegas, NV. [link]

Alzahrani, B. A. (2020). Efficient and secure lightweight Routing mechanism in Information Centric Network. 19th Annual Security Conference, March 30-April 1, 2020, Las Vegas, NV. [link]

Posey, C., & Folger, R. (2020). Assessing Organizational Insiders’ Descriptive and Normative Perceptions of Cyber-relevant Responsibilities. 19th Annual Security Conference, March 30-April 1, 2020, Las Vegas, NV. [link]

Dickie, N., Aurigemma, S., & Brummel, B. (2020). Exploring the Impact of Individual Differences on Information Security Awareness. 19th Annual Security Conference, March 30-April 1, 2020, Las Vegas, NV. [link]

 

2019
Peer-reviewed papers presented at the 2019 Information Institute Las Vegas Conference
Cite as: Author, A. (year). Title of paper. In Proceedings of the Annual Information Institute Conference, Eds. G. Dhillon and S. Samonas, April 29 – May 1, 2019. Las Vegas, NV. USA
ISBN: 978-1-935160-20-5

Andrew Urbaczewski, Kellie Keeling: Chasing the Next Fad: The Changing Role of the IS Discipline in Higher Education

David Green: Motivation for Shadow IT Use: Insider Threat or Employee-Driven Innovation? (Extended Abstract)

Alfred Musarurwa, Stephen Flowerday: Information Privacy in the BYOD

Osama Rabie, Gurpreet Dhillon, Romilla Syed: Value-Focused Thinking to Bare Strategic Measures and Alternatives for Preventing Cyberterrorism

Saad Alqahtany, Nathan, Clarke and Steven Furnell: An Evaluation of a Cloud-based Forensic Acquisition and Analysis System (Cloud FAAS)

Cescily Metzgar, Dr. B. Dawn Medlin, Dr. Sandra A. Vannoy: A Security Analysis of RFID-Enabled E-Passports

Jennifer L. Broderick, Dr. B. Dawn Medlin, Dr. Sandra A. Vannoy: Generational Adoption of Social Media: Security and Privacy Concerns

Muawya Naser ,Noura Salem, Fatima Aljneibi and Marwa Almenhali: Controlar-Freeze: A New Approach in Visual Screen Security

Saud Alotaibi, Steven Furnell and Nathan Clarke: Transparent and Continuous Identity Verification for Mobile Applications Security

Moneerah Alotaibi, Steven Furnell,Maria Papadaki and Shirley Atkinson: A risk assessment model for children’s Internet use

Mohamed Abdelhamid, Spiro Samonas: Phish Me If You Can: Improving Employees’ Resistance to Phishing Attacks through Experimental Phishing Simulations (Short Paper)

Bertrand Muhire, Ramakrishna Ayyagari: Information Security Compliance in a Retail Setting

Eva Söderström, Rose-Mharie Åhlfeldt,Marcus Nohlberg: Method Development for information security GAP analysis in municipalities

Eya Mahouachi, Michael Lapke: Security Policy in Emerging Economics

Sal Aurigemma, Nicole Dicki, Bradley Brummel: Extending the human Aspects of Information Security- Questionnaire (HAIS-Q)

Jeffrey L. Duffany: Information Warfare and the 2016 US Presidential Election

Grace Thompson, Sabaht Khurshid, David Tanner, Abu Hasan, Mehdi Mekni: An Assessment of Drone Attacks, Vulnerabilities, and Protections

Jeffrey L. Duffany: Cyber Warfare in the 21st Century

Raymond M. Henry: Examining the Impact of Decision Rights Accountability “Gaps” for Top Management in IT Decision-making

Murray E. Jennex: Towards Understanding Knowledge Management Strategy

Ernestina Larbi-Ansah, Joseph Budu: Managing Social Media Employees to achieve Organizational Objectives

Amaris Vélez, Alfredo Cruz: Identifying and Executing Procedure to Evaluate E-Discovery Tools

Amaris Vélez, Alfredo Cruz, Adriana Vázquez, Luis Pla, Jeff Duffany: Obtaining the Center of Academic Excellence in Cyber Defense Education (CAE-CDE) Designation atPolytechnic University of Puerto Rico’s (PUPR) for 2020

Pedro Agosto-Vázquez, Alfredo Cruz, Yusef Yassin-Morales, Jeff Duffany: Learning CyberSecurity through CTF Competitions

Ricardo A. Fernandez-Lopez, Isaac Torres, Yusef Yassin, Zayira Jordan: Web Application Based CTF Toolset

2018
Peer-reviewed papers presented at the 2017 Information Institute Las Vegas Conference
Cite as: Author, A. (year). Title of paper. In Proceedings of the Annual Information Institute Conference, Eds. G. Dhillon and S. Samonas, March 26-28, 2018. Las Vegas, NV. USA
ISBN: 978-1-935160-19-9

Jeffrey L. Duffany: Internet of Things: Security and Privacy

Keirsten Henson, Beverly Medlin, Sandra Vannoy: Malicious QR Codes: Unexpected and Unwanted

Kwesi Byrd, Hiba Al-Kawaz, Nathan Clarke, Steven Furnell: Facial Recognition in Low-Light

Najem Mahmoud, Steven Furnell, Paul Haskell-Dowland: Design Principles and Guidelines for Targeted Security Awareness

Rajneesh Sharma, Michael Angelina: Teaching Note: Introduction to Financial Impact of Data Breaches and Insurance

Sandra Vannoy, Beverly Medlin, Victoria Fowler: Commercial Drones: Security and Privacy Concerns

Erik Bergström, Fredrik Anteryd , Rose-Mharie Åhlfeldt: Information Classification Policies: An Exploratory Investigation

Jennifer Carson, Unit Karabiyik, Eduardo de Luna, Khaled Rabieh: Voteproject: Smart Democracy – A Blockchain Voting System Proof of Concept

Rose-Mharie Åhlfeldt, Marcus Nohlberg, Eva Söderström, Christian Lennerholt, Joeri van Laere: Current Situation Analysis of Information Security Level in Municipalities

Eli Weintraub, Yuval Cohen: Adding Network Exposure to Environmental Measures in Security Risk Scoring Models

Andrew Schwarz: Going Dark: An investigation into willing non-disclosure on social platforms

John Morales, Jeffrey Duffany, David Mascareñas: Blockchain for Nuclear facilities

Salvatore Aurigemma, Thomas Mattson, Lori Leonard: Does an individual’s ethical preference impact their decision to take voluntary security actions?

Bongsik Shin, Matthew Levy: Towards the Elucidation of Organizational Cyber Threat Intelligence

Jeffrey Duffany, Carlos Velez:  A Machine-Learning Based Wireless Intrusion Detection System

Hongjiang Xu: A research model for information quality in social media

Alfredo Cruz: Cyber Security Programs and Certificates at a Premier Hispanic Serving Institution

Nidhi Rastogi: Exploring Information Centrality for Intrusion Detection in Large Networks

Jirapon Sunkpho, Sarawut Ramjan, Chaiwat Ottamakorn: Cybersecurity Policy in ASEAN Countries

Carlos Velez, Alfredo Cruz, Jeffrey Duffany, Yoshuam Alicea, Steven Bennett: Lessons Learned from Premier Capture the Flag Competitions

Mohammed Alshammari: Exploring Information Security Awareness in The Context of a Case Study

Ricardo Fernandez: Know Before You Click: A Study in Social Engineering

Jadiel Colon, Alfredo Cruz, Naileen Berrios: CTF Framework and Virtual Environment for Cybersecurity Education

Padmavathi Ganapathi, S.Rama Mercy: Attacks and Security Mechanisms in Cyber Physical Systems

Sabitha Banu, Padmavathi Ganapathi: A Review of Man in the Middle Attacks in M2M Communications and Attack Handling Mechanisms

Swathy Akshyaya, Padmavathi Ganapathi : Performance Efficient Methods to handle Zero-Day attacks in Cloud Environment

N Vanitha, Padmavathi Ganapathi: Enhanced Security Mechanisms for the selected cyber attacks in UAV networks

Noemi Tambe: A 2nd order cybernetics approach to anti-money laundering risk: the case study of a Financial Intelligence Unit

Mohamed Abdelhamid, Spiro Samonas: PHR and M-health Privacy: What Makes Patients Adopt or Avoid PHR?

Nadia Samara: Evaluation of Information Security within the eGovernment Programme in Jordan: the connecting role of Citizens’ Online Trust

2017

Peer-reviewed papers presented at the 2017 Information Institute Las Vegas Conference
Cite as: Author, A. (year). Title of paper. In Proceedings of the Annual Information Institute Conference, Eds. G. Dhillon and S. Samonas, April 18-20, 2017. Las Vegas, NV. USA
ISBN: 978-1-935160-18-2

Yoshuam Alicea: Cybersecurity Competitions as Effective Cybersecurity Teaching Tools

Majedah Alkharji, Mayyada Al Hammoshi, Chunqiang Hu, Hang Liu: Genetic Algorithm based key Generation for Fully Homomorphic EncryptionSlides.

Salvatore Aurigemma, Thomas Mattson, and Lori Leonard: Enhancing End-User Psychological Capital to Motivate Voluntary Security Actions

Salvatore Aurigemma, Preston Ackerman, Thomas Mattson, and Lori Leonard: Motivating Multifactor Authentication Use Among Millennial End-UsersSlides

William Byrnes: How May the United States Leverage Its FATCA IGA Bilateral Process to Incentivize Good Tax Administrations Among the World of Black Hat and Grey Hat Governments?
A Carrot & Stick Policy Proposal
Slides

Juyun Cho: Mobile Readiness of the U.S. State Government Website

Nathan Clarke, Fudong Li, M. Al-Fahdi, D. Joy, Saad Alqahtany, G. Alotibi, and H. Mohammed: The Next Generation of Digital Forensic Capability

Simran Dhillon: Developing an understanding of individual values for teenage Internet Privacy.

Jesualdo Fernandes: An Agile Approach for IS/IT Benefits ManagementSlides

Nicky Fournier and Mahesh Raisinghani: Quality Management in a Research and Development Environment

Bo Han: User’s Information Security Awareness in BYOD Programs: A Theoretical Model

Ram Herkanaidu, Steven Furnell and Maria Papadaki: Online Risk Awareness and Exposure of Young People in ThailandSlides

William Jackson, Noah Anglin, Ian Hurley, Conner West, Jeremiah Scott, Kenneth Redeemer, and Partha Sengupta: Web Design Security: Foundation Not Feature

Nicholas Lennox and Bertram Haskins: Guidelines to Improve the Security and Privacy Consciousness among Online Gamers

Najem Mahmoud, Steven Furnell, and Paul Haskell-Dowland: Towards Targeted Security Awareness Raising

Pardon Blessings Maoneke, Stephen Flowerday, Naomi Isabirye: A model for usable and secure passphrases by multilingual user groups

Alfred Musarurwa, Stephen Flowerday, and Liezel Cilliers: Individual traits that determine the Bring Your Own Device information security culture: A case study of the banking sector in ZimbabweSlides

Dien Phan, and Kim Phan: Analytic Methods to Analyze and Predict Causes of Security Failures in Power GridSlides

Noel Richards: NIAP: Critical Role of Protection Profiles & Product Evaluations

Maha Sabir, James Jones, and Hang Liu: A Non-Algorithmic File-Type Independent Method for Hiding Persistent Data in FilesSlides

Bongsik Shin and Dan Kim: Reengineering cybersecurity: A simulation studySlides

Tawicha Trakulyingyong and Jirapon Sunkpho: An Examination of Thai Government Approach in Cybersecurity

Carlos Velez and Alfredo Cruz: Implementation of Active Learning Techniques in an Online Information Security Graduate Laboratory Course

Yunhui Zhuang, Yun-Sik Choi, Alvin Chung Man Leung, Gene Moo Lee, Shu He, and Andrew Whinston: Towards A Better Measure of Cybersecurity Awareness: An Exploratory Study of Online Scams in Pan-AsiaSlides

2016
Peer reviewed papers presented at the 2016 Information Institute Las Vegas Conference
Cite as: Author, A. (year). Title of paper. In Proceedings of the Annual Information Institute Conference, Eds. G. Dhillon and S. Samonas, March, 29-30, 2016. Las Vegas, NV. USA
ISBN: 978-1-935160-17-5 1-935160-17-6

Pooria Assadi and Andrew von Nordenflycht: Ethics of Sorting Talent on Wall Street

Allen D. Benusa, Shajive S. Jeganathan and Mark B. Schmidt: Forensic Analysis Challenges: Shift from HDD to SSD Storage

Tom Brill: Identity Theft Victims: Critical Influencers for Customer Loyalty Restoration

Yoram Golandsky: Cyber Crisis Management, Survival or Extinction

Mark Harris, Joey Beasley and Karen Patten: Factors That Influence the Adoption of Mobile Payment Systems

Jorge Hernandez: Analysis of Current University Student Password Habits

Gabriel Kaptchuk and Aviel Rubin: A Practical Implementation of a Multi-Device Split Application for Protecting Online Poker

Saikal Kushubekova and Egemen Deniz Bahar: American big data companies’ compliance and enforcement of the Patriot Act

Javad Abed and Gurpreet Dhillon: A Review of the Compliance Behavior Studies in Information Systems Security Field: Current Trends and Future Directions

Asanda Christopher Miya and Reinhardt A. Botha: Facebook Mobile Interfaces: A Heuristic Evaluation of Privacy Features

Osama Rabie and Chandrashekar Challa: Cyberterrorism: Developing Conceptual Understanding for Policy Decisions

Michael Ryan and Sandra Ryan: A Pedagogical Approach to Practical Ethical Decision Making

Nadia Samara: Evaluation of Information Security within the e-Government Programme in Jordan: the connecting role of Citizens’ Online Trust

Jorge Silvestrini: Learning Cryptography by Interaction

Steven Simon and Robert Perkins: Analysis of Data Breach Induced Trauma: An Exploratory Study

Bradley Strawser: Ethical Responsibility for Cyber Security: Changing Norms

Luzuko Tekeni, Reinhardt A Botha and Kerry-Lynn Thomson: An Overview of Access Control Practices: Guidance from ITIL, COBIT 5 and ISO/IEC 27002

Jonathan Vargas and Alfredo Cruz: Unified Risk List for Electronically-Stored Information Subject to eDiscovery in the Cloud

Michael T. Virnig and Mark B. Schmidt: Improving Cyber Awareness through Community Outreach

Zhifeng Xiao, Jeffrey Knapp and Robert Steiner: An Empirical Study of Cookie Theft Vulnerability for Modern Websites

2015
Peer reviewed papers presented at the 2015 Information Institute Las Vegas Conference
Cite as: Author, A. (year). Title of paper. In proceedings of the Annual Information Institute Conference, May, 19-21, 2015. Las Vegas, NV. USA
ISBN: 978-1-935160-16-8 1-935160-16-8

Salvatore Aurigemma, Lori Leonard and Ray Panko:Are your employees committed to following your Information Security Policies? Let’s hope.

Nathan Clarke and Fudong Li:Active Authentication: The Panacea of Access Control?

Mostafa El-Said, Alexander Arendsen and Samah Mansour:Detect and Defend System On a Stick (D2S2) Against GPS Spoofing Attack

Ted Harrington:IoT: Hackers, Attack Anatomy & Security Trends

Mark A. Harris:Google Play’s Top App Developers: Are They Really Safer than Other Apps in Regard to Consumer Privacy and In-app Purchases?

Vess Johnson, Russell Torres and Arash Negahban:The Impact of Privacy Risk on M-payment Service Adoption

Christopher Leberknight:A Longitudinal Study Investigating Pressure Related Characteristics for Keystroke Analysis

Kevin Lehnert, Jana Craft, Nitish Singh and Yung-Hwal Park:Meta-review And Critique of Qualitative Ethical Decision Making Research: 2004-2014

Brajendra Panda and Qussai Yaseen:Defending Integrity against Insiders in Cloud Relational Databases

Donna Schaeffer and Michelle Liu:An Inquiry-based Learning Approach to Promote Cyber-ethics in Cybersecurity Education

2014
Peer reviewed papers presented at the 2014 Information Institute Las Vegas Conference
Cite as: Author, A. (year). Title of paper. In proceedings of the Annual Information Institute Conference, May, 22-24, 2014. Las Vegas, NV. USA
ISBN: 978-1-935160-15-1 1-935160-15-X

Sanjeev Mitra, Indira Guzman, Gurpreet Dhillon and Kiet Tran: A Quantitative Investigation of the Security Factors Affecting the Use of IT/IS Systems in Public Networks

Ibrahim Elbeltagi and Hamdi Alomiri: The impact of servant leadership on e-services implementation in Saudi Arabia

Richard Thomchick and Tonia San Nicolas-Rocca: Application Level Security: A Case Study of a Public Library

Stefan Bauer and Edward W.N. Bernroider: An Analysis of the Combined Influences of Neutralization and Planned Behavior on Desirable Information Security Behavior

Natalie Gerhart, Vess Johnson and Russell Torres: The Impact of Privacy Concerns on Mobile Banking: Adaptation of the IS Continuance Model

William Mee: Protecting Values in a Socially Connected World

Khandaker Rahman, Danielle Dierich and Ryan Moormann: Proposing a Novel Defense Mechanism to Spoof Attacks Targeting Keystroke Dynamics based Cyber-behavioral Biometric Systems

Yulia Wati and Dan J. Kim: Uncertainty in Online Environment: Examining the Mediating Effect of Trust and Relative Advantage in E-Commerce

Mohammed Atoum: A Comparative Study of Combination with Different LSB Techniques in MP3 Steganography

Steven Furnell and Liam Moore: End-user security: No longer a matter of choice?

Beverly Medlin, Sandra Vannoy and Elaine Winston: Health Care Workers: A Possible Insider Threat

Timothy Perez and Benjamin Perez: Municipal E-Government Security: Trends and Opportunities for Improvement

Daniel Roberts, Nathan Clarke and Fudong Li: Data Carving using Artificial Headers

Hua Dai, Al Salam and Yan Chen: Service Quality, Service Consumption Experience and Relational Exchange in Electronic Mediated Environment

Mohammed Alnatheer: Developing an Information Security Culture Model

Celedonio Arroyo-Serrano and Alfredo Cruz: Interactive Learning Tool for Cryptography

Zuleika Lopez: Mobile Security Threat and Countermeasures

Meral Binbasioglu: Understanding Performance Measures and Resource Relationships: A Qualitative System Dynamics Approach

Mark Harris and Robert Brookshire: Mobile Application Installation Influences: Have Mobile Device Users Become Desensitized to Excessive Permission Requests?

Mark Harris and Karen Patten: Mobile Device Security Issues Within the U.S. Disadvantaged Business Enterprises Program

Jason Levy: Online Cybersecurity Service Learning at Virginia Commonwealth University

 

Share This