2024
Peer-reviewed papers presented at the 2024 Information Institute Las Vegas Conference
Cite as: Author, A. (year). Title of paper. In Proceedings of the Annual Information Institute Conference, Eds. Dhillon, G.; Furnell, S.; Demetis, D.; and Srivastava, S. April 3 – April 4, 2024. Las Vegas, NV. USA [ISBN: 978-1-935160-35-9]
Idensohn, C. J. & Flowerday, S. (2024). Malicious Insider Behaviour in Cybersecurity Informed by the Fraud Triangle . 23rd Annual Security Conference, April 3 – April 4, 2024, Las Vegas, NV. [link]
Proudfoot, J. & Madnick, S. (2024). Cybersecurity regulation development and dissemination deficiencies harming organizational cybersecurity outcomes. 23rd Annual Security Conference, April 3 – April 4, 2024, Las Vegas, NV. [link]
Furnell, S., Bada, M. & Kaberuka, J. (2024). A Self-Assessment Method for Organizational Awareness of Digital Security by Design. 23rd Annual Security Conference, April 3 – April 4, 2024, Las Vegas, NV. [link]
Abdelhamid, M. & Vo, D. (2024). Generative AI Tools in Addressing Personal Healthcare Questions: An Empirical Study. 23rd Annual Security Conference, April 3 – April 4, 2024, Las Vegas, NV. [link]
Diaz, R., Smith, K., Zamponi, V., Diaz, W. M., & Ehungwe, M. (2024). An AI-enabled Cyber Risk Management Model for Determining Ripple Effects from Cybersecurity and Other Supply Chain Disruptions. 23rd Annual Security Conference, April 3 – April 4, 2024, Las Vegas, NV. [link]
Karahan, S. & Duvall, T. (2024). Cybersecurity Internship Clinic Design. 23rd Annual Security Conference, April 3 – April 4, 2024, Las Vegas, NV. [link]
Payne, B. K. & Payne, C. F. (2024). Cybersecurity Internships in NSA-CAE Programs: An Overview. 23rd Annual Security Conference, April 3 – April 4, 2024, Las Vegas, NV. [link]
Abed, J. & Das, S. (2024). Quantitative Analysis of Factors Impacting Organizational Readiness for Cyber security Threats: Relationships and Inter-relationships Assessment. 23rd Annual Security Conference, April 3 – April 4, 2024, Las Vegas, NV. [link]
Murphy, A., Raynor, D., Redd, L., & Payne, B. (2024). Internship Experiences of Cybersecurity, Computing, and STEM Students: Differences Across and Between Disciplines. 23rd Annual Security Conference, April 3 – April 4, 2024, Las Vegas, NV. [link]
Furnell, S., Khan, N., Bada, M. & Nurse, J. R. C. (2024). Evaluating Online Cybersecurity Guidance and Support for Small Businesses. 23rd Annual Security Conference, April 3 – April 4, 2024, Las Vegas, NV. [link]
Xie, W., Melia, S. & Zhao, V. (2024). Persuasion Techniques in Smishing. 23rd Annual Security Conference, April 3 – April 4, 2024, Las Vegas, NV. [link]
Yarasani, H., Hewarathna, A. U. & Akula, P. (2024). Artificial intelligence (AI) and machine learning (ML) in data protection. 23rd Annual Security Conference, April 3 – April 4, 2024, Las Vegas, NV. [link]
Jennex, M. E. & Babb, J. (2024). Observations and Learnings from Cybersecurity Audits of SMEs. 23rd Annual Security Conference, April 3 – April 4, 2024, Las Vegas, NV. [link]
Mohottalalage, T. & Mailewa, A. (2024). An Analysis of Security Risk Factors in IoT and Defensive Measures to Mitigate Data Breaches. 23rd Annual Security Conference, April 3 – April 4, 2024, Las Vegas, NV. [link]
Noble, B., Chen, J. & Schmidt, M. (2024). Large Language Model (LLM) Limitations when Used on a Limited Dataset. 23rd Annual Security Conference, April 3 – April 4, 2024, Las Vegas, NV. [link]
Parrish, J., Johnson, V. & Dhillon, G. (2024). Exploring the Lack of Diversity in Cybersecurity. 23rd Annual Security Conference, April 3 – April 4, 2024, Las Vegas, NV. [link]
Kanamugire, J. (2024). A Case Study: Real Estate Wealth Network Data Breach. 23rd Annual Security Conference, April 3 – April 4, 2024, Las Vegas, NV. [link]
Abed, J. (2024). Comparative Analysis of Security-Based Precautionary Behaviors: Home vs. Office Work Environments. 23rd Annual Security Conference, April 3 – April 4, 2024, Las Vegas, NV. [link]
Wang, J., Schmidt, M. & Kuikel, R. (2024). User trust and credibility of conversational agents. 23rd Annual Security Conference, April 3 – April 4, 2024, Las Vegas, NV. [link]
Sill, J. & Hale, J. (2024). A Hegelian Dialectic: Data Sovereignty in the views of Goldsmith vs. Johnson & Post. 23rd Annual Security Conference, April 3 – April 4, 2024, Las Vegas, NV. [link]
Delgado-Martí, H. J. & Cruz, A. (2024). Examination of crossover features in a Genetic Algorithm towards applications in cybersecurity. 23rd Annual Security Conference, April 3 – April 4, 2024, Las Vegas, NV. [link]
Delgado, M. A. R. & Collazo, X. N. G. (2024). The Relevance of Cloud Computing for Cybersecurity Education. 23rd Annual Security Conference, April 3 – April 4, 2024, Las Vegas, NV. [link]
Clarke, N., Alotibi, G., Joy, D., Li, F., Furnell, S., Alshumrani, A. & Mohammed, H. (2024). An Identity and Interaction-Based Approach to Network Forensic Analysis. 23rd Annual Security Conference, April 3 – April 4, 2024, Las Vegas, NV. [link]
Lombard, A. & Flowerday, S. (2024). Exploring the Risks of AI on Human Worth. 23rd Annual Security Conference, April 3 – April 4, 2024, Las Vegas, NV. [link]
Duffany, J. L. (2024). Security of Artificial Intelligence Technologies. 23rd Annual Security Conference, April 3 – April 4, 2024, Las Vegas, NV. [link]
Enaholo, E. & Martey, M. (2024). Ransomware Taxonomy. 23rd Annual Security Conference, April 3 – April 4, 2024, Las Vegas, NV. [link]
Alyammahi, A. & Khamayseh, Y. (2024). Ransomware Detection Using Behavioural-Based Analysis. 23rd Annual Security Conference, April 3 – April 4, 2024, Las Vegas, NV. [link]
González, R., Vivas, R., Chaar, E.M. & Cruz, A. (2024). The Impact of Machine Learning on Credit Card Fraud Detection. 23rd Annual Security Conference, April 3 – April 4, 2024, Las Vegas, NV. [link]
Stavrum, P. N., Schmidt, M. & Rice, P. E. (2024). Section 230: Social Media’s Cultural Influence and Associated Negative Effects. 23rd Annual Security Conference, April 3 – April 4, 2024, Las Vegas, NV. [link]
Hofmeier, M. & Lechner, U. (2024). Game-Based Identification of Potential Malicious Insider Threats. 23rd Annual Security Conference, April 3 – April 4, 2024, Las Vegas, NV. [link]
2023
Peer-reviewed papers presented at the 2023 Information Institute Las Vegas Conference
Cite as: Author, A. (year). Title of paper. In Proceedings of the Annual Information Institute Conference, Eds. Dhillon, G.; Furnell, S.; Demetis, D; and Srivastava, S. May 9 – May 10, 2023. Las Vegas, NV. USA [ISBN: 978-1-935160-33-5]
McLeod, A., & Dolezel, D. (2023). Security Analytics: Evaluating Antecedents to Non-Compliance Behaviors. 22nd Annual Security Conference, May 9-May 10, 2023, Las Vegas, NV. [link]
Abdelhamid, M., Isaac, R., & Crusius, K. (2023). Trust me, I am Accountable: Factors Influencing Perceived Benefits of Blockchain Technology. 22nd Annual Security Conference, May 9-May 10, 2023, Las Vegas, NV. [link]
Schwartz, T., Parada, J. I., Cohn, F., Wrenn, G., & Pearlson, K. (2023). Cybersecurity as a competitive advantage is the next big strategic play. 22nd Annual Security Conference, May 9-May 10, 2023, Las Vegas, NV. [link]
Lapke, S. (2023). Transformational Leadership as an Avenue to Securing Accounting Information Systems. 22nd Annual Security Conference, May 9-May 10, 2023, Las Vegas, NV. [link]
Harris, M. (2023). A synthesis of theoretical investigations into the adoption of Internet of Medical Things (IoMT). 22nd Annual Security Conference, May 9-May 10, 2023, Las Vegas, NV. [link]
Vedadi, A., & Farshadkhah, S. (2023). Cyber-complacency and the Security Downfall: An Empirical Analysis. 22nd Annual Security Conference, May 9-May 10, 2023, Las Vegas, NV. [link]
Karahan, S., Oesteraas, I., Pinto, C. A., & Kovak, H. (2023). An overview of factors affecting online content moderation. 22nd Annual Security Conference, May 9-May 10, 2023, Las Vegas, NV. [link]
Matos, W. (2023). Dissecting ATM Malware as a Digital Forensics Investigator. 22nd Annual Security Conference, May 9-May 10, 2023, Las Vegas, NV. [link]
Bandara, N., Marques, L., Martey, M., & Mailewa, A. (2023). Analysis of Recent Ransomware Attacks and Preventable Measures. 22nd Annual Security Conference, May 9-May 10, 2023, Las Vegas, NV. [link]
Chaar, E., Jordan, Z., & Cruz, A. (2023). Comparing Security in Contactless Payments: NFC vs. QR Code. 22nd Annual Security Conference, May 9-May 10, 2023, Las Vegas, NV. [link]
Walker, J., & Lapke, M. (2023). An Intrusion Detection and Dataset Creation Tool for Ransomware Attacks within IoT Networks. 22nd Annual Security Conference, May 9-May 10, 2023, Las Vegas, NV. [link]
Bolger, C., Brummel, B., Aurigemma, S., Moore, T., & Baskin, M. (2023). Information Security Awareness: Identifying Gaps in Current Measurement Tools. 22nd Annual Security Conference, May 9-May 10, 2023, Las Vegas, NV. [link]
Tilbury, J. & Flowerday, S. (2023). The Rationality of Automation Bias in Security Operation Centers. 22nd Annual Security Conference, May 9-May 10, 2023, Las Vegas, NV. [link]
Dzimiela, C., & Jennex, M. (2023). An Inside View of a Ransomware Attack Response and Recovery. 22nd Annual Security Conference, May 9-May 10, 2023, Las Vegas, NV. [link]
Phillips, S., Brummel, B., Aurigemma, S., & Moore, T. (2023). Information Security Culture: A look Ahead at Measurement Methods. 22nd Annual Security Conference, May 9-May 10, 2023, Las Vegas, NV. [link]
Higgs, J., & Flowerday, S. (2023). Online Video Games: Cyberlaundering Vulnerabilities and Controls. 22nd Annual Security Conference, May 9-May 10, 2023, Las Vegas, NV. [link]
Meighan, S., & Demetis, D. (2023). Fighting crypto-laundering: the case of Ireland’s Financial Intelligence Unit. 22nd Annual Security Conference, May 9-May 10, 2023, Las Vegas, NV. [link]
Furnell, S., Bada, M., & Kaberuka, J. (2023). Assessing Organizational Awareness and Acceptance of Digital Security by Design. 22nd Annual Security Conference, May 9-May 10, 2023, Las Vegas, NV. [link]
Hastings, S., Moore, T., Aurigemma, S., & Brummel, B. (2023) Predicting Authentication Performance with Psychological Constructs. 22nd Annual Security Conference, May 9-May 10, 2023, Las Vegas, NV. [link]
Collen, S., Noble, B., Overboe, C., & Mailewa, A. (2023). Risks, Privacy and Responsibility of Social Media use in the Workplace: A Review. 22nd Annual Security Conference, May 9-May 10, 2023, Las Vegas, NV. [link]
Duffany, J. (2023). Security of Artificially-Intelligent Self-Driving Vehicles. 22nd Annual Security Conference, May 9-May 10, 2023, Las Vegas, NV. [link]
Alshammari, M. M., & Demetis, D. (2023). House of Cards: developing KPIs for monitoring cybersecurity awareness (CSA). 22nd Annual Security Conference, May 9-May 10, 2023, Las Vegas, NV. [link]
Vazquez-Ferrer, R., Garcia-Romero, F., Sosa-Lugo, J.R., Ramos-Flores, E., Gonzalez-Rodriguez, D., Cruz, A., & Duffany, J. (2023). Android Ransomware Recognition with Feature Extraction for Improved Security System Detection. 22nd Annual Security Conference, May 9-May 10, 2023, Las Vegas, NV. [link]
Vidal, A., Vazquez-Ferrer, R., & Cruz, A. (2023). Real-Time Classification and Object Detection to provide Mass Shootings a faster response. 22nd Annual Security Conference, May 9-May 10, 2023, Las Vegas, NV. [link]
Delgado-Martí, H. J. & Alfredo Cruz (2023). Quantum Computation and post-quantum cryptography relevance for cybersecurity education. 22nd Annual Security Conference, May 9-May 10, 2023, Las Vegas, NV. [link]
Pravin, D. & Amin, M.S. (2023). Talk to me, and take care: Unleashing the power of word of mouth to increase cyber safety. 22nd Annual Security Conference, May 9-May 10, 2023, Las Vegas, NV. [link]
Shumway, P., Brummel, B., Moore, T., Aurigemma, S. & Hastings, S. (2023). Naturalistic observations of login attempts: Do security implementations and demands effect employee job behaviors and perceptions? 22nd Annual Security Conference, May 9-May 10, 2023, Las Vegas, NV. [link]
Diaz, R., Kang, L. & Wilson, G. (2023). An Experiential Learning Approach to Building a Cyber Range: A Maritime Supply Chain Focus. 22nd Annual Security Conference, May 9-May 10, 2023, Las Vegas, NV. [link]
Kim, Y. & Ayyagari, R. (2023). Changes in Users’ Attitudes to Security Breaches: A Study of T-Mobile Breaches. 22nd Annual Security Conference, May 9-May 10, 2023, Las Vegas, NV. [link]
Payne, B. (2023). Patterns surrounding salary expectations among cybersecurity students. 22nd Annual Security Conference, May 9-May 10, 2023, Las Vegas, NV. [link]
Brown, D. (2023). Experiential learning and cloud resource education DevOps. 22nd Annual Security Conference, May 9-May 10, 2023, Las Vegas, NV. [link]
Adhikari, A., Sharma, R. & Mailewa, A. (2023). Recent advances of security in IoT: a survey. 22nd Annual Security Conference, May 9-May 10, 2023, Las Vegas, NV. [link]
2022
Peer-reviewed papers presented at the 2022 Information Institute Las Vegas Conference
Cite as: Author, A. (year). Title of paper. In Proceedings of the Annual Information Institute Conference, Eds. Dhillon, G.; Demetis, D; and Furnell, S. May 26 – May 27, 2022. Las Vegas, NV. USA [ISBN: 978-1-935160-31-1]
Vidal, A., Ferrer, R. V., & Cruz, A. (2022). Real-Time Acoustic Firearm Classification and Detection System. 21st Annual Security Conference, May 26-May 27, 2022, Las Vegas, NV. [link]
Delgado-Martí, H. J., Ferrer, R. V., & Cruz, A. (2022). Exploration of Heuristic and Probabilistic Tools in Quantum Computing with Applications to Cryptography. 21st Annual Security Conference, May 26-May 27, 2022, Las Vegas, NV. [link]
Torres, I. L., & Cruz, A. (2022). Exploring Distributed Machine Learning System on Raspberry Pi Computer Cluster. 21st Annual Security Conference, May 26-May 27, 2022, Las Vegas, NV. [link]
Chaar Santana, E. M., & Duffany, J. (2022). Efficient IoT Attack Detection in The Fog Layer. 21st Annual Security Conference, May 26-May 27, 2022, Las Vegas, NV. [link]
Varela-Rosa, C. A., & Duffany, J. (2022). The Impact of Segmentation and Overlapping in Feature Extraction for Biometric Human Authentication Systems. 21st Annual Security Conference, May 26-May 27, 2022, Las Vegas, NV. [link]
Martinez Ojeda, N. S., & Duffany, J. (2022). Design of an Emergency MANET Based on Cellular Phone Technology. 21st Annual Security Conference, May 26-May 27, 2022, Las Vegas, NV. [link]
Ferrer, R. V., Duffany, J., & Cruz, A. (2022). Efficient Biometric Gait Authentication by Using an Accelerometer Sensor. 21st Annual Security Conference, May 26-May 27, 2022, Las Vegas, NV. [link]
Abdelhamid, M., & Pingale, S. (2022). Detecting Phishing URLs Using Machine Learning Algorithm. 21st Annual Security Conference, May 26-May 27, 2022, Las Vegas, NV. [link]
Jennex, M. E. (2022). Mitigating The Risk of Losing Critical Knowledge in Businesses/Organizations: Lessons from COVID-19. 21st Annual Security Conference, May 26-May 27, 2022, Las Vegas, NV. [link]
Harris, M., Martin, R. & Chin, A. (2022). Telemedicine Adoption: An Empirical Review of Theoretical Model Usage. 21st Annual Security Conference, May 26-May 27, 2022, Las Vegas, NV. [link]
Xie, W. & Chen, C. (2022). Understanding Switching Intention to E-Commerce Drone Delivery: A Privacy Risk Hedging View. 21st Annual Security Conference, May 26-May 27, 2022, Las Vegas, NV. [link]
Adesemowo, A. K. (2022). Critical Realism in the Fabric of Cybersecurity. 21st Annual Security Conference, May 26-May 27, 2022, Las Vegas, NV. [link]
Rensburg, N. V., Madnick, S., Proudfoot, J., & Rezek, C. (2022). Insights Gained While Exploring Regulation and Cybersecurity Maturity. 21st Annual Security Conference, May 26-May 27, 2022, Las Vegas, NV. [link]
Jason, X., Taylor, C., & Hunsinger, S. (2022). Benchmarking Cybersecurity Programs in Higher Education: The Current Landscape and Path Forward. 21st Annual Security Conference, May 26-May 27, 2022, Las Vegas, NV. [link]
2021
No proceedings because of COVID
2020
Peer-reviewed papers presented at the 2020 Information Institute Las Vegas Conference
Cite as: Author, A. (year). Title of paper. In Proceedings of the Annual Information Institute Conference, Eds. Dhillon, G.; Demeits, D; and Furnell, S. March 29 – April 1, 2020. Las Vegas, NV (conducted virtually because of COVID-19). USA [ISBN: 978-1-935160-25-0]
Marotta, A., & Madnick, S. (2020). Analyzing the Interplay between Regulatory Compliance and Cybersecurity. 19th Annual Security Conference, March 30-April 1, 2020, Las Vegas, NV. [link]
Demetis, D. S., & Dhillon, G. (2020). A systems theoretical synthesis for cybersecurity. 19th Annual Security Conference, March 30-April 1, 2020, Las Vegas, NV. [link]
Chin, A. G., Onwujekwe, G., & Harris, M. A. (2020). Consumer Trust in Mobile Payments: An Initial Review and Synthesis. 19th Annual Security Conference, March 30-April 1, 2020, Las Vegas, NV. [link]
Huang, K., & Madnick, S. (2020). Cyber Securing Cross-border Financial Services: Calling for a Financial Cybersecurity Action Task Force. 19th Annual Security Conference, March 30-April 1, 2020, Las Vegas, NV. [link]
Novaes Neto, N., Madnick, S., de Paula, A. M. G., & Malara Borges, N. (2020). A Case Study of the Capital One Data Breach. 19th Annual Security Conference, March 30-April 1, 2020, Las Vegas, NV. [link]
Abdelhamid, M., Vij, A., Ingle, M., & Cervantes, R. (2020). Text-mining and Visualizations of Phishing Attacks in the Education Sector. 19th Annual Security Conference, March 30-April 1, 2020, Las Vegas, NV. [link]
Farook, M. R. M. (2020). Historical Overview of Ethical Concerns in Artificial Intelligence. 19th Annual Security Conference, March 30-April 1, 2020, Las Vegas, NV. [link]
Rashidibajgan, S., & Hupperich, T. (2020). A Secure and Reliable Structure in Opportunistic Networks. 19th Annual Security Conference, March 30-April 1, 2020, Las Vegas, NV. [link]
Sharma, K., & Mukhopadhyay, A. (2020). Cyber risk assessment and mitigation strategy for DDoS attacks in BFSI segment. 19th Annual Security Conference, March 30-April 1, 2020, Las Vegas, NV. [link]
Khan, S., & Madnick, S. (2020). Cybersafety Analysis of Industrial Control Systems: Chiller Systems. 19th Annual Security Conference, March 30-April 1, 2020, Las Vegas, NV. [link]
Xie, W., Dhillon, G., Mehta, N., & Smith, K. (2020). User Generated Content and Participatory Healthcare. 19th Annual Security Conference, March 30-April 1, 2020, Las Vegas, NV. [link]
Furnell, S., & Haskell-Dowland, P. (2020). Good guidance or mistaken misdirection: Assessing the quality of password advice. 19th Annual Security Conference, March 30-April 1, 2020, Las Vegas, NV. [link]
Alzahrani, B. A. (2020). Efficient and secure lightweight Routing mechanism in Information Centric Network. 19th Annual Security Conference, March 30-April 1, 2020, Las Vegas, NV. [link]
Posey, C., & Folger, R. (2020). Assessing Organizational Insiders’ Descriptive and Normative Perceptions of Cyber-relevant Responsibilities. 19th Annual Security Conference, March 30-April 1, 2020, Las Vegas, NV. [link]
Dickie, N., Aurigemma, S., & Brummel, B. (2020). Exploring the Impact of Individual Differences on Information Security Awareness. 19th Annual Security Conference, March 30-April 1, 2020, Las Vegas, NV. [link]
2019
Peer-reviewed papers presented at the 2019 Information Institute Las Vegas Conference
Cite as: Author, A. (year). Title of paper. In Proceedings of the Annual Information Institute Conference, Eds. G. Dhillon and S. Samonas, April 29 – May 1, 2019. Las Vegas, NV. USA
ISBN: 978-1-935160-20-5
Andrew Urbaczewski, Kellie Keeling: Chasing the Next Fad: The Changing Role of the IS Discipline in Higher Education
David Green: Motivation for Shadow IT Use: Insider Threat or Employee-Driven Innovation? (Extended Abstract)
Alfred Musarurwa, Stephen Flowerday: Information Privacy in the BYOD
Osama Rabie, Gurpreet Dhillon, Romilla Syed: Value-Focused Thinking to Bare Strategic Measures and Alternatives for Preventing Cyberterrorism
Saad Alqahtany, Nathan, Clarke and Steven Furnell: An Evaluation of a Cloud-based Forensic Acquisition and Analysis System (Cloud FAAS)
Cescily Metzgar, Dr. B. Dawn Medlin, Dr. Sandra A. Vannoy: A Security Analysis of RFID-Enabled E-Passports
Jennifer L. Broderick, Dr. B. Dawn Medlin, Dr. Sandra A. Vannoy: Generational Adoption of Social Media: Security and Privacy Concerns
Muawya Naser ,Noura Salem, Fatima Aljneibi and Marwa Almenhali: Controlar-Freeze: A New Approach in Visual Screen Security
Saud Alotaibi, Steven Furnell and Nathan Clarke: Transparent and Continuous Identity Verification for Mobile Applications Security
Moneerah Alotaibi, Steven Furnell,Maria Papadaki and Shirley Atkinson: A risk assessment model for children’s Internet use
Mohamed Abdelhamid, Spiro Samonas: Phish Me If You Can: Improving Employees’ Resistance to Phishing Attacks through Experimental Phishing Simulations (Short Paper)
Bertrand Muhire, Ramakrishna Ayyagari: Information Security Compliance in a Retail Setting
Eva Söderström, Rose-Mharie Åhlfeldt,Marcus Nohlberg: Method Development for information security GAP analysis in municipalities
Eya Mahouachi, Michael Lapke: Security Policy in Emerging Economics
Sal Aurigemma, Nicole Dicki, Bradley Brummel: Extending the human Aspects of Information Security- Questionnaire (HAIS-Q)
Jeffrey L. Duffany: Information Warfare and the 2016 US Presidential Election
Grace Thompson, Sabaht Khurshid, David Tanner, Abu Hasan, Mehdi Mekni: An Assessment of Drone Attacks, Vulnerabilities, and Protections
Jeffrey L. Duffany: Cyber Warfare in the 21st Century
Raymond M. Henry: Examining the Impact of Decision Rights Accountability “Gaps” for Top Management in IT Decision-making
Murray E. Jennex: Towards Understanding Knowledge Management Strategy
Ernestina Larbi-Ansah, Joseph Budu: Managing Social Media Employees to achieve Organizational Objectives
Amaris Vélez, Alfredo Cruz: Identifying and Executing Procedure to Evaluate E-Discovery Tools
Amaris Vélez, Alfredo Cruz, Adriana Vázquez, Luis Pla, Jeff Duffany: Obtaining the Center of Academic Excellence in Cyber Defense Education (CAE-CDE) Designation atPolytechnic University of Puerto Rico’s (PUPR) for 2020
Pedro Agosto-Vázquez, Alfredo Cruz, Yusef Yassin-Morales, Jeff Duffany: Learning CyberSecurity through CTF Competitions
Ricardo A. Fernandez-Lopez, Isaac Torres, Yusef Yassin, Zayira Jordan: Web Application Based CTF Toolset
2018
Peer-reviewed papers presented at the 2017 Information Institute Las Vegas Conference
Cite as: Author, A. (year). Title of paper. In Proceedings of the Annual Information Institute Conference, Eds. G. Dhillon and S. Samonas, March 26-28, 2018. Las Vegas, NV. USA
ISBN: 978-1-935160-19-9
Jeffrey L. Duffany: Internet of Things: Security and Privacy
Keirsten Henson, Beverly Medlin, Sandra Vannoy: Malicious QR Codes: Unexpected and Unwanted
Kwesi Byrd, Hiba Al-Kawaz, Nathan Clarke, Steven Furnell: Facial Recognition in Low-Light
Najem Mahmoud, Steven Furnell, Paul Haskell-Dowland: Design Principles and Guidelines for Targeted Security Awareness
Rajneesh Sharma, Michael Angelina: Teaching Note: Introduction to Financial Impact of Data Breaches and Insurance
Sandra Vannoy, Beverly Medlin, Victoria Fowler: Commercial Drones: Security and Privacy Concerns
Erik Bergström, Fredrik Anteryd , Rose-Mharie Åhlfeldt: Information Classification Policies: An Exploratory Investigation
Jennifer Carson, Unit Karabiyik, Eduardo de Luna, Khaled Rabieh: Voteproject: Smart Democracy – A Blockchain Voting System Proof of Concept
Rose-Mharie Åhlfeldt, Marcus Nohlberg, Eva Söderström, Christian Lennerholt, Joeri van Laere: Current Situation Analysis of Information Security Level in Municipalities
Eli Weintraub, Yuval Cohen: Adding Network Exposure to Environmental Measures in Security Risk Scoring Models
Andrew Schwarz: Going Dark: An investigation into willing non-disclosure on social platforms
John Morales, Jeffrey Duffany, David Mascareñas: Blockchain for Nuclear facilities
Salvatore Aurigemma, Thomas Mattson, Lori Leonard: Does an individual’s ethical preference impact their decision to take voluntary security actions?
Bongsik Shin, Matthew Levy: Towards the Elucidation of Organizational Cyber Threat Intelligence
Jeffrey Duffany, Carlos Velez: A Machine-Learning Based Wireless Intrusion Detection System
Hongjiang Xu: A research model for information quality in social media
Alfredo Cruz: Cyber Security Programs and Certificates at a Premier Hispanic Serving Institution
Nidhi Rastogi: Exploring Information Centrality for Intrusion Detection in Large Networks
Jirapon Sunkpho, Sarawut Ramjan, Chaiwat Ottamakorn: Cybersecurity Policy in ASEAN Countries
Carlos Velez, Alfredo Cruz, Jeffrey Duffany, Yoshuam Alicea, Steven Bennett: Lessons Learned from Premier Capture the Flag Competitions
Mohammed Alshammari: Exploring Information Security Awareness in The Context of a Case Study
Ricardo Fernandez: Know Before You Click: A Study in Social Engineering
Jadiel Colon, Alfredo Cruz, Naileen Berrios: CTF Framework and Virtual Environment for Cybersecurity Education
Padmavathi Ganapathi, S.Rama Mercy: Attacks and Security Mechanisms in Cyber Physical Systems
Sabitha Banu, Padmavathi Ganapathi: A Review of Man in the Middle Attacks in M2M Communications and Attack Handling Mechanisms
Swathy Akshyaya, Padmavathi Ganapathi : Performance Efficient Methods to handle Zero-Day attacks in Cloud Environment
N Vanitha, Padmavathi Ganapathi: Enhanced Security Mechanisms for the selected cyber attacks in UAV networks
Noemi Tambe: A 2nd order cybernetics approach to anti-money laundering risk: the case study of a Financial Intelligence Unit
Mohamed Abdelhamid, Spiro Samonas: PHR and M-health Privacy: What Makes Patients Adopt or Avoid PHR?
Nadia Samara: Evaluation of Information Security within the eGovernment Programme in Jordan: the connecting role of Citizens’ Online Trust
2017
Peer-reviewed papers presented at the 2017 Information Institute Las Vegas Conference
Cite as: Author, A. (year). Title of paper. In Proceedings of the Annual Information Institute Conference, Eds. G. Dhillon and S. Samonas, April 18-20, 2017. Las Vegas, NV. USA
ISBN: 978-1-935160-18-2
Yoshuam Alicea: Cybersecurity Competitions as Effective Cybersecurity Teaching Tools
Majedah Alkharji, Mayyada Al Hammoshi, Chunqiang Hu, Hang Liu: Genetic Algorithm based key Generation for Fully Homomorphic Encryption – Slides.
Salvatore Aurigemma, Thomas Mattson, and Lori Leonard: Enhancing End-User Psychological Capital to Motivate Voluntary Security Actions
Salvatore Aurigemma, Preston Ackerman, Thomas Mattson, and Lori Leonard: Motivating Multifactor Authentication Use Among Millennial End-Users – Slides
William Byrnes: How May the United States Leverage Its FATCA IGA Bilateral Process to Incentivize Good Tax Administrations Among the World of Black Hat and Grey Hat Governments?
A Carrot & Stick Policy Proposal – Slides
Juyun Cho: Mobile Readiness of the U.S. State Government Website
Nathan Clarke, Fudong Li, M. Al-Fahdi, D. Joy, Saad Alqahtany, G. Alotibi, and H. Mohammed: The Next Generation of Digital Forensic Capability
Simran Dhillon: Developing an understanding of individual values for teenage Internet Privacy.
Jesualdo Fernandes: An Agile Approach for IS/IT Benefits Management – Slides
Nicky Fournier and Mahesh Raisinghani: Quality Management in a Research and Development Environment
Bo Han: User’s Information Security Awareness in BYOD Programs: A Theoretical Model
Ram Herkanaidu, Steven Furnell and Maria Papadaki: Online Risk Awareness and Exposure of Young People in Thailand – Slides
William Jackson, Noah Anglin, Ian Hurley, Conner West, Jeremiah Scott, Kenneth Redeemer, and Partha Sengupta: Web Design Security: Foundation Not Feature
Nicholas Lennox and Bertram Haskins: Guidelines to Improve the Security and Privacy Consciousness among Online Gamers
Najem Mahmoud, Steven Furnell, and Paul Haskell-Dowland: Towards Targeted Security Awareness Raising
Pardon Blessings Maoneke, Stephen Flowerday, Naomi Isabirye: A model for usable and secure passphrases by multilingual user groups
Alfred Musarurwa, Stephen Flowerday, and Liezel Cilliers: Individual traits that determine the Bring Your Own Device information security culture: A case study of the banking sector in Zimbabwe – Slides
Dien Phan, and Kim Phan: Analytic Methods to Analyze and Predict Causes of Security Failures in Power Grid – Slides
Noel Richards: NIAP: Critical Role of Protection Profiles & Product Evaluations
Maha Sabir, James Jones, and Hang Liu: A Non-Algorithmic File-Type Independent Method for Hiding Persistent Data in Files – Slides
Bongsik Shin and Dan Kim: Reengineering cybersecurity: A simulation study – Slides
Tawicha Trakulyingyong and Jirapon Sunkpho: An Examination of Thai Government Approach in Cybersecurity
Carlos Velez and Alfredo Cruz: Implementation of Active Learning Techniques in an Online Information Security Graduate Laboratory Course
Yunhui Zhuang, Yun-Sik Choi, Alvin Chung Man Leung, Gene Moo Lee, Shu He, and Andrew Whinston: Towards A Better Measure of Cybersecurity Awareness: An Exploratory Study of Online Scams in Pan-Asia – Slides
2016
Peer reviewed papers presented at the 2016 Information Institute Las Vegas Conference
Cite as: Author, A. (year). Title of paper. In Proceedings of the Annual Information Institute Conference, Eds. G. Dhillon and S. Samonas, March, 29-30, 2016. Las Vegas, NV. USA
ISBN: 978-1-935160-17-5 1-935160-17-6
Pooria Assadi and Andrew von Nordenflycht: Ethics of Sorting Talent on Wall Street
Allen D. Benusa, Shajive S. Jeganathan and Mark B. Schmidt: Forensic Analysis Challenges: Shift from HDD to SSD Storage
Tom Brill: Identity Theft Victims: Critical Influencers for Customer Loyalty Restoration
Yoram Golandsky: Cyber Crisis Management, Survival or Extinction
Mark Harris, Joey Beasley and Karen Patten: Factors That Influence the Adoption of Mobile Payment Systems
Jorge Hernandez: Analysis of Current University Student Password Habits
Gabriel Kaptchuk and Aviel Rubin: A Practical Implementation of a Multi-Device Split Application for Protecting Online Poker
Saikal Kushubekova and Egemen Deniz Bahar: American big data companies’ compliance and enforcement of the Patriot Act
Javad Abed and Gurpreet Dhillon: A Review of the Compliance Behavior Studies in Information Systems Security Field: Current Trends and Future Directions
Asanda Christopher Miya and Reinhardt A. Botha: Facebook Mobile Interfaces: A Heuristic Evaluation of Privacy Features
Osama Rabie and Chandrashekar Challa: Cyberterrorism: Developing Conceptual Understanding for Policy Decisions
Michael Ryan and Sandra Ryan: A Pedagogical Approach to Practical Ethical Decision Making
Nadia Samara: Evaluation of Information Security within the e-Government Programme in Jordan: the connecting role of Citizens’ Online Trust
Jorge Silvestrini: Learning Cryptography by Interaction
Steven Simon and Robert Perkins: Analysis of Data Breach Induced Trauma: An Exploratory Study
Bradley Strawser: Ethical Responsibility for Cyber Security: Changing Norms
Luzuko Tekeni, Reinhardt A Botha and Kerry-Lynn Thomson: An Overview of Access Control Practices: Guidance from ITIL, COBIT 5 and ISO/IEC 27002
Jonathan Vargas and Alfredo Cruz: Unified Risk List for Electronically-Stored Information Subject to eDiscovery in the Cloud
Michael T. Virnig and Mark B. Schmidt: Improving Cyber Awareness through Community Outreach
Zhifeng Xiao, Jeffrey Knapp and Robert Steiner: An Empirical Study of Cookie Theft Vulnerability for Modern Websites
2015
Peer reviewed papers presented at the 2015 Information Institute Las Vegas Conference
Cite as: Author, A. (year). Title of paper. In proceedings of the Annual Information Institute Conference, May, 19-21, 2015. Las Vegas, NV. USA
ISBN: 978-1-935160-16-8 1-935160-16-8
Salvatore Aurigemma, Lori Leonard and Ray Panko:Are your employees committed to following your Information Security Policies? Let’s hope.
Nathan Clarke and Fudong Li:Active Authentication: The Panacea of Access Control?
Mostafa El-Said, Alexander Arendsen and Samah Mansour:Detect and Defend System On a Stick (D2S2) Against GPS Spoofing Attack
Ted Harrington:IoT: Hackers, Attack Anatomy & Security Trends
Mark A. Harris:Google Play’s Top App Developers: Are They Really Safer than Other Apps in Regard to Consumer Privacy and In-app Purchases?
Vess Johnson, Russell Torres and Arash Negahban:The Impact of Privacy Risk on M-payment Service Adoption
Christopher Leberknight:A Longitudinal Study Investigating Pressure Related Characteristics for Keystroke Analysis
Kevin Lehnert, Jana Craft, Nitish Singh and Yung-Hwal Park:Meta-review And Critique of Qualitative Ethical Decision Making Research: 2004-2014
Brajendra Panda and Qussai Yaseen:Defending Integrity against Insiders in Cloud Relational Databases
Donna Schaeffer and Michelle Liu:An Inquiry-based Learning Approach to Promote Cyber-ethics in Cybersecurity Education
2014
Peer reviewed papers presented at the 2014 Information Institute Las Vegas Conference
Cite as: Author, A. (year). Title of paper. In proceedings of the Annual Information Institute Conference, May, 22-24, 2014. Las Vegas, NV. USA
ISBN: 978-1-935160-15-1 1-935160-15-X
Sanjeev Mitra, Indira Guzman, Gurpreet Dhillon and Kiet Tran: A Quantitative Investigation of the Security Factors Affecting the Use of IT/IS Systems in Public Networks
Ibrahim Elbeltagi and Hamdi Alomiri: The impact of servant leadership on e-services implementation in Saudi Arabia
Richard Thomchick and Tonia San Nicolas-Rocca: Application Level Security: A Case Study of a Public Library
Stefan Bauer and Edward W.N. Bernroider: An Analysis of the Combined Influences of Neutralization and Planned Behavior on Desirable Information Security Behavior
Natalie Gerhart, Vess Johnson and Russell Torres: The Impact of Privacy Concerns on Mobile Banking: Adaptation of the IS Continuance Model
William Mee: Protecting Values in a Socially Connected World
Khandaker Rahman, Danielle Dierich and Ryan Moormann: Proposing a Novel Defense Mechanism to Spoof Attacks Targeting Keystroke Dynamics based Cyber-behavioral Biometric Systems
Yulia Wati and Dan J. Kim: Uncertainty in Online Environment: Examining the Mediating Effect of Trust and Relative Advantage in E-Commerce
Mohammed Atoum: A Comparative Study of Combination with Different LSB Techniques in MP3 Steganography
Steven Furnell and Liam Moore: End-user security: No longer a matter of choice?
Beverly Medlin, Sandra Vannoy and Elaine Winston: Health Care Workers: A Possible Insider Threat
Timothy Perez and Benjamin Perez: Municipal E-Government Security: Trends and Opportunities for Improvement
Daniel Roberts, Nathan Clarke and Fudong Li: Data Carving using Artificial Headers
Hua Dai, Al Salam and Yan Chen: Service Quality, Service Consumption Experience and Relational Exchange in Electronic Mediated Environment
Mohammed Alnatheer: Developing an Information Security Culture Model
Celedonio Arroyo-Serrano and Alfredo Cruz: Interactive Learning Tool for Cryptography
Zuleika Lopez: Mobile Security Threat and Countermeasures
Meral Binbasioglu: Understanding Performance Measures and Resource Relationships: A Qualitative System Dynamics Approach
Mark Harris and Robert Brookshire: Mobile Application Installation Influences: Have Mobile Device Users Become Desensitized to Excessive Permission Requests?
Mark Harris and Karen Patten: Mobile Device Security Issues Within the U.S. Disadvantaged Business Enterprises Program
Jason Levy: Online Cybersecurity Service Learning at Virginia Commonwealth University
Share This