Information Systems Security Research
The aim of the working group is the creation, dissemination, and preservation of well-formed research about information systems security. While relevant for advanced practical development, our primary audience consists of researchers in this area. We value research products with highly reliable and validated theory, empirical data, or quantitative/qualitative social scientific methodology. The group's activities will be workshop-based, and intended to nurture individual journal articles for submission to a wide variety of journals. Our workshops will produce notebooks that consist of formative working papers. We mainly target final publication venues in the management research journal communication system.
Anchoring to information systems means our research will attend and extend the social, organizational, and managerial literature in this area. While we assume an effective foundation in information security technology, we regard information systems risks broadly, for example crime, employee misconduct, warfare, terrorism, error, accident, natural events, etc. We also address information systems security broadly, for example, privacy, awareness, policies, strategy, audit, planning and control.
Dewald Roode Workshop
The IFIP Working Group 8.11/11.13 holds The Dewald Roode Information Security Workshop annually. Click here for the 2016 call for papers at the University of New Mexico, USA.
Conferences proceedings for 2009, 2010, 2011, 2012,
and 2015 are available for download.
Chair: Raghav Rao, State University of New York at Buffalo, US
Vice Chair: Allen Johnston, University of Alabama Birmingham, US
Editor: Anthony Vance, Brigham Young University, US
Secretary: Tejaswini ("Teju") Herath, Brock University, CA
IFIP 8.11/11.13 Papers Subsequently Published in Refereed Journals
Jenkins, J., Anderson, B., Vance, A., Kirwan, B., Eargle, D. "More Harm than Good? How Security Messages that Interrupt Make Us Vulnerable," Information Systems Research, forthcoming.
Johnston, A.C., Warkentin, M., McBride, M., Carter, L. 2016. "Dispositional and Situational Factors: Influences on IS Security Policy Violations," European Journal of Information Systems, 25, forthcoming.
Lee Jr., J., Warkentin, M., Johnston, A.C. 2016. "A Broader View of Information Risk during Internet Transactions," Communications of the AIS, 38, Article 8.
Anderson, B.B., Kirwan, C.B., Eargle, D., Jensen, S., and Vance, A. 2015. "Neural Correlates of Gender Differences and Color in Distinguishing Security Warnings and Legitimate Websites: A Neurosecurity Study," Journal of Cybersecurity, 1 (1), pp. 109-120.
Posey, C., Roberts, T., Lowry, P.B. 2015. "The Impact of Organizational Commitment on Insiders' Motivation to Protect Organizational Information Assets," Journal of Management Information Systems, 32(4), pp. 179-214.
James, Tabitha L., Merrill Warkentin, and Stéphane E. Collignon. 2015. "A Dual Privacy Decision Model for Online Social Networks," Information & Management, 52(8), pp. 893-908.
Lowry, P.B. and Moody, G.D. "Proposing the control-reactance compliance model (CRCM) to explain opposing motivations to comply with organizational information security policies," Information Systems Journal, 25(5), pp. 433-463.
Vance, A., Lowry, P.B., Eggett, D. 2015. "Increasing Accountability through User-Interface Design Artifacts: A New Approach to Addressing the Problem of Access-Policy Violations," MIS Quarterly, 39 (2), pp. 345-366.
D'Arcy, J., Herath, T., Shoss, M. 2014. "Understanding Employee Responses to Stressful Information Security Requirements: A Coping Perspective," Journal of Management Information Systems, 31 (2), pp. 285-318.
Baskerville, R., Park, E., and Kim, J. 2014. "An Emote Opportunity Model of Computer Abuse," Information Technology & People, 27 (2), pp. 155-181.
Barlow, J.B., Warkentin, M., Ormond, D., and Dennis, A.R. 2013. "Don't Make Excuses!: Discouraging Neutralization to Reduce IT Policy Violation," Computers & Security, 39, pp. 145-159.
Vance, A., Lowry, P.B., Eggett, D. 2013. "Using Accountability to Reduce Access Policy Violations in Information Systems," Journal of Management Information Systems, 29 (4), pp. 263-289.
Luo, X., Zhang, W., Burd, S., and Seazzu, A. 2013. "Investigating Phishing Victimization with the Heuristic-Systematic Model: A Theoretical Framework and an Exploration," Computers & Security, 38, pp. 28-38.
Posey, C., Roberts, T.L., Lowry, P.B., Bennett, R., and Courtney, J. 2013. "Insiders' Protection of Organizational Information Assets: Development of a Systematics-based Taxonomy and Theory of Diversity for Protection-motivated Behaviors," MIS Quarterly, 37 (4), pp. 1189-1210.
Crossler, R.E., Johnston, A.C., Lowry, P.B., Hu, Q., Warkentin, M. and Baskerville, R. "Future Directions for Behavioral Information Security Research," Computers & Security, 32, 1, 2013, pp. 90-101.
Xu, Z., Hu, Q., Zhang, C. 2013. "Why Do Computer Talents Become Computer Hackers? A Framework for Understanding and Managing the Hacking Epidemic," Communications of the ACM, 56, 4, pp. 64-74.
Willison, R. and Warkentin, M. 2013. "Beyond Deterrence: An Expanded View of Employee Computer Abuse," MIS Quarterly, 37, 1, pp. 1-20.
Bélanger, F., Crossler, R. E., Hiller, J. S., Hsiao, M., and Park, J-P. 2013. POCKET: A Tool for Protecting Children's Privacy Online, Decision Support Systems, 54, 2, pp. 1161-1173.
Njenga, K. and Brown, I. "Conceptualising Improvisation in Information Systems Security." European Journal of Information Systems, 21, 6, p. 592-607.
Hu, Q., Xu, Z., Dinev, T., and Ling, H. 2011. "Does Deterrence Work in Reducing Information Security Policy Abuse by Employees?," Communications of the ACM, 54-60, 6, pp. 54.
Furnell, S., von Solms, R., & Phippen, A. 2011. "Preventative Actions for Enhancing Online Protection and Privacy," International Journal of Information Technologies and Systems Approach, 4, 2, pp. 1-11.
Bonnie Anderson, Brigham Young University, US
Salvatore Aurigemma, University of Tulsa, US
Manish Agrawal, University of South Florida, US
Jordan Barlow, Cal State-Fullerton, US
Richard Baskerville, Georgia State University, US
France Bélanger, Virginia Tech, US
Scott Boss, Bentley University, US
Irwin Brown, University of Cape Town, ZA
Sean Browne, National University of Ireland, IE
Burcu Bulgurcu, Boston College, CA
Mary Burns, Augusta State University, US
Lemuria Carter, Virginia Commonwealth University, US
Rajarshi Chakraborty, University at Buffalo, US
Rui Chen, Ball State University, US
Rachel Chung, Chatham University, US
Stephane Collignon, Virginia Tech, US
James Courtney, Louisiana Tech University, US
Robert Crossler, Mississippi State University, US
John D'Arcy, University of Delaware, US
Alan Dennis, Indiana University, US
Paul Di Gangi, University of Alabama Birmingham, US
Ersin Dincelli, University at Albany (SUNY), US
Marc Dupuis, University of Washington, US
Alexandra Durcikova, University of Oklahoma, US
David Eargle, University of Pittsburgh, US
Kathy Enget, Virginia Tech, US
Steven Furnell, University of Plymouth , GB
Dennis Galletta, University of Pittsburgh, US
Paul Di Gangi, University of Alabama Birmingham, US
Justin Giboney, University at Albany (SUNY), US
Sanjay Goel, University at Albany (SUNY), US
Chen Guo, James Madison University, US
Matthew Hashim, University of Arizona, US
Teju Herath, Brock University, CA
Shuyuan Mary Ho, Florida State University, US
Anat Hovav, Korea University, KR
Qing Hu, City University of New York (CUNY), US
Tabitha James, Virginia Tech, US
Jeff Jenkins, Brigham Young University, US
Allen Johnston, University of Alabama Birmingham, US
Hwee-Joo Kam, Ferris State University, US
Mari Karjalainen, Oulu University, FI
George Kasper, Virginia Commonwealth University, US
Mala Kaul, University of Nevada, Reno, US
Mark Keith, Brigham Young University, US
Bart Knijnenburg, Clemson University, US
Jong Woo (Jonathan) Kim, University of Massachusetts Boston, US
Stewart Kowalski, Gjøvik University College, Norway
Fujun Lai, University of Southern Mississippi, US
Jae Kyu Lee, Korea Advanced Institute of Science and Technology, KR
Allen Lee, Virginia Commonwealth University, US
Jim Lee, United State Marine Corps, US
Paul Lowry, City University of Hong Kong, HK
Robert Luo, University of New Mexico, US
Michele Maasberg, The University of Texas at San Antonio, US
Kal Malimage, University of Wisconsin-Whitewater, US
Maranda McBride, North Carolina A & T, US
Phil Menard, University of South Alabama, US
Leigh Mutchler, University of Tennessee, US
Eric Negangard, Virginia Tech, US
Kennedy Njenga, University of Johannesburg, ZA
Jacques Ophoff, University of Cape Town, ZA
Dustin Ormond, Creighton University, US
Robert Otondo, Mississippi State University, US
Rachida Parks, University of Arkansas at Little Rock, US
Clay Posey, The University of Alabama, US
Kai Rannenberg, Goethe University, DE
Sam Ransbotham, Boston College, US
Raghav Rao, University at Buffalo, US
Tom Roberts, University of Texas at Tyler, US
Jordan Shropshire, University of South Alabama, US
Mikko Siponen, University of Jyvaskyla, FI
Paul Steinbart, Arizona State University, US
Carl Stucke, Georgia State University, US
Detmar Straub, Temple University and Korea University Business School, US
Teodor Sommestad, Swedish Defence Research Agency, SE
Nirmalee Summers, University of Wisconsin-La Crosse, US
Gurvirender Tejay, Nova Southeastern University, US
Samuel Thompson, University of Alabama Birmingham, US
Rohit Valecha, Middle Tennessee State, US
Anthony Vance, Brigham Young University, US
Rossouw von Solms, Nelson Mandela Metropolitan University, ZA
Gunnar Wahlgren, Stockholm University, SE
Jeffrey Wall, Michigan Tech University, US
Jingguo Wang, University of Texas Arlington, US
Merrill Warkentin, Mississippi State University, US
John Warren, University of Texas, US
Robert Willison, Newcastle University Business School, UK
David Wilson, University of Oklahoma, US
Heng Xu, Pennsylvania State University, US
Chul Woo Yoo, University at Buffalo, US
Wei Zhang, University of Massachusetts Boston, US
Nan Zhang, University of Jyvaskyla, FI