This event has ended. Visit the official site or create your own event on Sched.
Welcome to AMCIS 2016 in sunny San Diego! 

Please note, it is recommended that you build your Sched agenda in advance using the web app. Sched offers multiple calendar linking options via .ics. To view and use these options, please ensure you are logged into your account, and, on a desktop machine. Full details on exporting your Sched calendar can be found here.

Sign up or log in to bookmark your favorites and sync them to your phone or calendar.

Information Systems Security Assurance and Privacy (SIGSEC) [clear filter]
Friday, August 12

8:30am PDT

Emerging Issues in InfoSec I (SIGSEC)
Chair: William Glisson - University of South Alabama

Formulating Methodology to Build a Trust Framework for Cloud Identity Management
Brian Cusack, Eghbal Ghazizadeh - AUT University
Taxonomy of Malicious Insiders: A Proof of Concept Study
Nan (Peter) Liang, David Biros, Andy Luse - Oklahoma State University Stillwater
An Exploratory Analysis in Android Malware Trends
Chelsea Hicks, Glenn Dietrich - University of Texas at San Antonio

Friday August 12, 2016 8:30am - 10:00am PDT
Marina 1

1:30pm PDT

Emerging Issues in InfoSec II (SIGSEC)
Chair: Nan(Peter) Liang - Oklahoma State University

A Comparative Analysis of Univariate Time Series Methods for Estimating and Forecasting Daily Spam in United States
Jie Zhang, Gene Lee, Jingguo Wang - The University of Texas at Arlington
AVICS-Eco Framework: An Approach to Attack Prediction and Vulnerability Assessment in a Cyber Ecosystem
Baidyanath Biswas, Shounak Pal, Arunabha Mukhopadhyay - Indian Institute of Management Lucknow
Emerging Trends in Smart Home Security, Privacy, and Digital Forensics
Miloslava Plachkinova - University of Tampa; Au Vo, Ala Alluhaidan - Claremont Graduate University

Friday August 12, 2016 1:30pm - 3:00pm PDT
Marina 1

3:30pm PDT

ERF Slam Session 7: Information Systems Security and Privacy (SIGSEC)
Chair: Javad Abed - Virginia Commonwealth University

Collaborative Filtering on the Blockchain: A Secure Recommender System for e-Commerce
Remo Frey - Eidgenossische Technische Hochschule Zurich Departement Management Technologie und Okonomie; Dominic Wörner - Massachusetts Institute of Technology Media Lab; Alexander Ilic - University of St. Gallen
Factors Influencing Emotional Attachment to Social Network Apps
Mehrdad Koohikamali, Dan Kim - University of North Texas
Understanding the Privacy Issue in the Digital Age: An Expert Perspective
Tawfiq Alashoor - Georgia State University; Arun Aryal - California State University Los Angeles College of Business and Economics; Grace Kenny - Dublin City University
Information Security Training Customized by Risk Profile
Shuting Xu, Peter Meso, Yi Ding - Georgia Gwinnett College
Family Work Conflict and Information Security Policy Compliance—An Empirical Study
Peng Zhang - Florida International University; Jingguo Wang - The University of Texas at Arlington
Identifying Multiple Categories of Cybersecurity Skills that Affect User Acceptance of Protective Information Technologies
Dinesh Reddy, Glenn Dietrich - University of Texas at San Antonio
Priming Security Behavior: A Study Based on Self-Concept Maintenance Theory
Nic DePaula, Sanjay Goel - University at Albany, SUNY
Proposing SETA Program Design Based on Employee Motivational Fit
Philip Menard - University of South Alabama
Continuous Secure Behavior from Process Memory Model Perspective
Ali Vedadi - Mississippi State University
Integrating Facial Cues of Threat into Security Warnings – An fMRI and Field Study
David Eargle, Dennis Galletta - University of Pittsburgh; Brock Kirwan - Brigham Young University; Anthony Vance - Georgia State University; Jeffrey Jenkins - Brigham Young University
A Review of Measures of Disclosure Outcomes in the IS Privacy Literature
Tawfiq Alashoor, Lisa Lambert - Georgia State University; Samira Farivar - McMaster University
Management of Digital Evidence: Body Worn Camera Use by Law Enforcement Agents
Jaeung Lee - The State University of New York at Buffalo; Jingguo Wang - The University of Texas at Arlington; Gerald Cliff - National White Collar Crime Center; H. Raghav Rao - The University of Texas at San Antonio
Concern for Privacy of Self and Others: Sharing Behavior, and Engagement
Mehrdad Koohikamali, Natalie Gerhart - University of North Texas

Friday August 12, 2016 3:30pm - 5:00pm PDT
Seabreeze 1

3:30pm PDT

ERF Slam Session 8: Information Systems Security and Privacy (SIGSEC) & Social Computing
Chair: Haiyan Huang - Flagler College

Enterprise Social Networking Sites and Knowledge Sharing Intentions in Virtual Teams
Jeffrey Cummings - UNCW; Alan Dennis - Indiana University
An Examination of the Joint Impacts of Review Content and Reviewer Characteristics on Review Usefulness—the Case of Yelp.com
JING LI, Xin Xu, E.W.T. Ngai - The Hong Kong Polytechnic University
Top Manager’s Perspectives on Cyberinsurance Risk Management for Reducing Cybersecurity Risks
Obi Ogbanufe, Dan Kim, Hassan Takabi - University of North Texas
Information Privacy-Protection Practices and User Continuance
Ye Han, Selwyn Ellis - Louisiana Tech University
Cybersecurity: Role of Behavioral Training in Healthcare
Humayun Zafar - Kennesaw State University
Responding to Negative Social Media Content: an Organizational Identification Perspective
Quynh Nguyen, Anna Sidorova - University of North Texas
Cybersecurity Skills: The Moderating Role in the Relationship between Cybersecurity Awareness and Compliance
Dinesh Reddy, V. Rao - The University of Texas at San Antonio
Extending Web Mining to Digital Forensics Text Mining
Chelsea Hicks, Nicole Beebe, Brandi Haliscak - University of Texas at San Antonio
Relationship between Knowledge Sharing Security and Organizational Context in the Public and Private Organizations
Azadeh Sarkheyli - Lund Universitet Ekonomihogskolan
The Effect of Using WLANs on Data Breaches: The Examination of the Moderating Role of Meaningful-Use Attestation
Dheyaaldin Alsalman, Insu Park - Dakota State University
Response to the Office of Personnel Management Data Breaches: A Conceptual Exploration
Rui Chen - Ball State University; H. R. Rao, Roht Valecha - University of Texas at San Antonio
Security Risks Related to Employee “Extra-Role” Creation of an “Online-persona”
Ruby Booth, Sandra Richardson, Judith Simon - University of Memphis
Please Share! Online Word of Mouth and Charitable Crowdfunding
Mahdi Moqri, Subhajyoti Bandyopadhyay - University of Florida
Individual Use of Mobile Apps for Social Networking
Leigh Jin - San Francisco State University; Xiaodong Deng - Oakland University
Brother, Can You Spare a Pizza
Zachary Sheffler,  Mani Subramani - University of Minnesota

Friday August 12, 2016 3:30pm - 5:00pm PDT
Seabreeze 2

3:30pm PDT

Emerging Issues in InfoSec III (SIGSEC)
Chair: Punkush Kalgota - Oklahoma State University

A Distributed Security Model for Cloud Computing
Alan Litchfield, Monjur Ahmed, Chandan Sharma - Auckland University of Technology
Next Generation Aircraft Architecture and Digital Forensic
Dustin Mink, Alec Yasinsac - University of South Alabama; Kim-Kwang Raymond Choo - University of South Australia; William Glisson - University of South Alabama
Understanding Cyber Security Perceptions Related to Information Risk in a Healthcare Setting
Derek Sedlack - Nova Southeastern University 

Friday August 12, 2016 3:30pm - 5:00pm PDT
Marina 1
Saturday, August 13

8:30am PDT

Behavioral Issues in InfoSec I (SIGSEC)
Chair: Philip Menard - University of South Alabama

Understand Bring Your Own Device (BYOD) and Employees’ Information Security Behaviors from Work-Life Domain Perspective
Mohamed Alaskar, Kathy Ning Shen - University of Wollongong in Dubai
Investigating Continuous Security Compliance Behavior: Insights from Information Systems Continuance Model
Javad Abed, Gurpreet Dhillon - Virginia Commonwealth University; Sevgi Ozkan - Orta Dogu Teknik Universitesi
An Examination of the Calibration and Resolution Skills in Phishing Email Detection
Yuan Li - Columbia College; Jingguo Wang - The University of Texas at Arlington; Raghav Rao - SUNY-Buffalo

Saturday August 13, 2016 8:30am - 10:00am PDT
Marina 1

10:30am PDT

Behavioral Issues in InfoSec II (SIGSEC)
Effects of Information Privacy Policies on Customers’ Willingness to transact with Online Vendors
Joseph Mollick - Texas A&M University Corpus Christi College of Business
Chris Merritt, Gurpreet Dhillon - Virginia Commonwealth University
Interaction Effect of Gender and Neutralization Techniques on Information Security Policy Compliance: An Ethical Perspective
Gaurav Bansal, Soo Il Shin - University of Wisconsin - Green Bay

Saturday August 13, 2016 10:30am - 12:00pm PDT
Marina 1

1:30pm PDT

Contemporary Privacy Threats (SIGSEC)
Chair: Nic DePaula - University at Albany State University of New York

Privacy Management Strategies: An Exploratory Cluster Analysis
Nancy Lankton - Marshall University; D. McKnight - Michigan State University; John Tripp - Baylor University
Using Trace Ethnography to Compare Perceived Cyber-Threats of IT to Non-IT Professionals
Hsia-Ching Chang, Susan Squires - University of North Texas; Chen-Ya Wang - National Open University, Taiwan
Privacy Rules: Approach in the Label or Textual Format
Sergio Zorzo, Diego Pontes, Jose Mello, Diego Dias - Universidade Federal de São Carlos

Saturday August 13, 2016 1:30pm - 3:00pm PDT
Marina 1

3:30pm PDT

Organizational Issues in InfoSec (SIGSEC)
Chair: Amir Hassan Zadeh - Wright State University

It Governance Framework: One Size Fits All?
Hwee-Joo Kam - Ferris State University; Pairin Katerattanakul - Western Michigan University; SoonGoo Hong - Dong-A University
Can Cross-listing Mitigate the Impact of an Information Security Breach Announcement on a Firm’s Values?
Yong Chen, Feng Dong, Hong Chen - Old Dominion University

Saturday August 13, 2016 3:30pm - 5:00pm PDT
Marina 1