Home / Annual Information Institute Conference Proceedings


Peer reviewed papers presented at the 2017 Information Institute Las Vegas Conference
Cite as: Author, A. (year). Title of paper. In Proceedings of the Annual Information Institute Conference, Eds. G. Dhillon and S. Samonas, April, 18-20, 2017. Las Vegas, NV. USA
ISBN: 978-1-935160-18-2

Yoshuam Alicea: Cybersecurity Competitions as Effective Cybersecurity Teaching Tools

Majedah Alkharji, Mayyada Al Hammoshi, Chunqiang Hu, Hang Liu: Genetic Algorithm based key Generation for Fully Homomorphic EncryptionSlides.

Salvatore Aurigemma, Thomas Mattson, and Lori Leonard: Enhancing End-User Psychological Capital to Motivate Voluntary Security Actions

Salvatore Aurigemma, Preston Ackerman, Thomas Mattson, and Lori Leonard: Motivating Multifactor Authentication Use Among Millennial End-UsersSlides

William Byrnes: How May the United States Leverage Its FATCA IGA Bilateral Process to Incentivize Good Tax Administrations Among the World of Black Hat and Grey Hat Governments?
A Carrot & Stick Policy Proposal

Juyun Cho: Mobile Readiness of the U.S. State Government Website

Nathan Clarke, Fudong Li, M. Al-Fahdi, D. Joy, Saad Alqahtany, G. Alotibi, and H. Mohammed: The Next Generation of Digital Forensic Capability

Jesualdo Fernandes: An Agile Approach for IS/IT Benefits ManagementSlides

Nicky Fournier and Mahesh Raisinghani: Quality Management in a Research and Development Environment

Bo Han: User’s Information Security Awareness in BYOD Programs: A Theoretical Model

Ram Herkanaidu, Steven Furnell and Maria Papadaki: Online Risk Awareness and Exposure of Young People in ThailandSlides

William Jackson, Noah Anglin, Ian Hurley, Conner West, Jeremiah Scott, Kenneth Redeemer, and Partha Sengupta: Web Design Security: Foundation Not Feature

Nicholas Lennox and Bertram Haskins: Guidelines to Improve the Security and Privacy Consciousness among Online Gamers

Najem Mahmoud, Steven Furnell, and Paul Haskell-Dowland: Towards Targeted Security Awareness Raising

Pardon Blessings Maoneke, Stephen Flowerday, Naomi Isabirye: A model for usable and secure passphrases by multilingual user groups

Alfred Musarurwa, Stephen Flowerday, and Liezel Cilliers: Individual traits that determine the Bring Your Own Device information security culture: A case study of the banking sector in ZimbabweSlides

Dien Phan, and Kim Phan: Analytic Methods to Analyze and Predict Causes of Security Failures in Power GridSlides

Noel Richards: NIAP: Critical Role of Protection Profiles & Product Evaluations

Maha Sabir, James Jones, and Hang Liu: A Non-Algorithmic File-Type Independent Method for Hiding Persistent Data in FilesSlides

Bongsik Shin and Dan Kim: Reengineering cybersecurity: A simulation studySlides

Tawicha Trakulyingyong and Jirapon Sunkpho: An Examination of Thai Government Approach in Cybersecurity

Carlos Velez and Alfredo Cruz: Implementation of Active Learning Techniques in an Online Information Security Graduate Laboratory Course

Yunhui Zhuang, Yun-Sik Choi, Alvin Chung Man Leung, Gene Moo Lee, Shu He, and Andrew Whinston: Towards A Better Measure of Cybersecurity Awareness: An Exploratory Study of Online Scams in Pan-AsiaSlides

Peer reviewed papers presented at the 2016 Information Institute Las Vegas Conference
Cite as: Author, A. (year). Title of paper. In Proceedings of the Annual Information Institute Conference, Eds. G. Dhillon and S. Samonas, March, 29-30, 2016. Las Vegas, NV. USA
ISBN: 978-1-935160-17-5 1-935160-17-6

Pooria Assadi and Andrew von Nordenflycht: Ethics of Sorting Talent on Wall Street

Allen D. Benusa, Shajive S. Jeganathan and Mark B. Schmidt: Forensic Analysis Challenges: Shift from HDD to SSD Storage

Tom Brill: Identity Theft Victims: Critical Influencers for Customer Loyalty Restoration

Yoram Golandsky: Cyber Crisis Management, Survival or Extinction

Mark Harris, Joey Beasley and Karen Patten: Factors That Influence the Adoption of Mobile Payment Systems

Jorge Hernandez: Analysis of Current University Student Password Habits

Gabriel Kaptchuk and Aviel Rubin: A Practical Implementation of a Multi-Device Split Application for Protecting Online Poker

Saikal Kushubekova and Egemen Deniz Bahar: American big data companies’ compliance and enforcement of the Patriot Act

Javad Abed and Gurpreet Dhillon: A Review of the Compliance Behavior Studies in Information Systems Security Field: Current Trends and Future Directions

Asanda Christopher Miya and Reinhardt A. Botha: Facebook Mobile Interfaces: A Heuristic Evaluation of Privacy Features

Osama Rabie and Chandrashekar Challa: Cyberterrorism: Developing Conceptual Understanding for Policy Decisions

Michael Ryan and Sandra Ryan: A Pedagogical Approach to Practical Ethical Decision Making

Nadia Samara: Evaluation of Information Security within the e-Government Programme in Jordan: the connecting role of Citizens’ Online Trust

Jorge Silvestrini: Learning Cryptography by Interaction

Steven Simon and Robert Perkins: Analysis of Data Breach Induced Trauma: An Exploratory Study

Bradley Strawser: Ethical Responsibility for Cyber Security: Changing Norms

Luzuko Tekeni, Reinhardt A Botha and Kerry-Lynn Thomson: An Overview of Access Control Practices: Guidance from ITIL, COBIT 5 and ISO/IEC 27002

Jonathan Vargas and Alfredo Cruz: Unified Risk List for Electronically-Stored Information Subject to eDiscovery in the Cloud

Michael T. Virnig and Mark B. Schmidt: Improving Cyber Awareness through Community Outreach

Zhifeng Xiao, Jeffrey Knapp and Robert Steiner: An Empirical Study of Cookie Theft Vulnerability for Modern Websites

Peer reviewed papers presented at the 2015 Information Institute Las Vegas Conference
Cite as: Author, A. (year). Title of paper. In proceedings of the Annual Information Institute Conference, May, 19-21, 2015. Las Vegas, NV. USA
ISBN: 978-1-935160-16-8 1-935160-16-8

Salvatore Aurigemma, Lori Leonard and Ray Panko:Are your employees committed to following your Information Security Policies? Let’s hope.

Nathan Clarke and Fudong Li:Active Authentication: The Panacea of Access Control?

Mostafa El-Said, Alexander Arendsen and Samah Mansour:Detect and Defend System On a Stick (D2S2) Against GPS Spoofing Attack

Ted Harrington:IoT: Hackers, Attack Anatomy & Security Trends

Mark A. Harris:Google Play’s Top App Developers: Are They Really Safer than Other Apps in Regard to Consumer Privacy and In-app Purchases?

Vess Johnson, Russell Torres and Arash Negahban:The Impact of Privacy Risk on M-payment Service Adoption

Christopher Leberknight:A Longitudinal Study Investigating Pressure Related Characteristics for Keystroke Analysis

Kevin Lehnert, Jana Craft, Nitish Singh and Yung-Hwal Park:Meta-review And Critique of Qualitative Ethical Decision Making Research: 2004-2014

Brajendra Panda and Qussai Yaseen:Defending Integrity against Insiders in Cloud Relational Databases

Donna Schaeffer and Michelle Liu:An Inquiry-based Learning Approach to Promote Cyber-ethics in Cybersecurity Education

Peer reviewed papers presented at the 2014 Information Institute Las Vegas Conference
Cite as: Author, A. (year). Title of paper. In proceedings of the Annual Information Institute Conference, May, 22-24, 2014. Las Vegas, NV. USA
ISBN: 978-1-935160-15-1 1-935160-15-X

Sanjeev Mitra, Indira Guzman, Gurpreet Dhillon and Kiet Tran: A Quantitative Investigation of the Security Factors Affecting the Use of IT/IS Systems in Public Networks

Ibrahim Elbeltagi and Hamdi Alomiri: The impact of servant leadership on e-services implementation in Saudi Arabia

Richard Thomchick and Tonia San Nicolas-Rocca: Application Level Security: A Case Study of a Public Library

Stefan Bauer and Edward W.N. Bernroider: An Analysis of the Combined Influences of Neutralization and Planned Behavior on Desirable Information Security Behavior

Natalie Gerhart, Vess Johnson and Russell Torres: The Impact of Privacy Concerns on Mobile Banking: Adaptation of the IS Continuance Model

William Mee: Protecting Values in a Socially Connected World

Khandaker Rahman, Danielle Dierich and Ryan Moormann: Proposing a Novel Defense Mechanism to Spoof Attacks Targeting Keystroke Dynamics based Cyber-behavioral Biometric Systems

Yulia Wati and Dan J. Kim: Uncertainty in Online Environment: Examining the Mediating Effect of Trust and Relative Advantage in E-Commerce

Mohammed Atoum: A Comparative Study of Combination with Different LSB Techniques in MP3 Steganography

Steven Furnell and Liam Moore: End-user security: No longer a matter of choice?

Beverly Medlin, Sandra Vannoy and Elaine Winston: Health Care Workers: A Possible Insider Threat

Timothy Perez and Benjamin Perez: Municipal E-Government Security: Trends and Opportunities for Improvement

Daniel Roberts, Nathan Clarke and Fudong Li: Data Carving using Artificial Headers

Hua Dai, Al Salam and Yan Chen: Service Quality, Service Consumption Experience and Relational Exchange in Electronic Mediated Environment

Mohammed Alnatheer: Developing an Information Security Culture Model

Celedonio Arroyo-Serrano and Alfredo Cruz: Interactive Learning Tool for Cryptography

Zuleika Lopez: Mobile Security Threat and Countermeasures

Meral Binbasioglu: Understanding Performance Measures and Resource Relationships: A Qualitative System Dynamics Approach

Mark Harris and Robert Brookshire: Mobile Application Installation Influences: Have Mobile Device Users Become Desensitized to Excessive Permission Requests?

Mark Harris and Karen Patten: Mobile Device Security Issues Within the U.S. Disadvantaged Business Enterprises Program

Jason Levy: Online Cybersecurity Service Learning at Virginia Commonwealth University


Share This