Track: IS Security and Privacy

Track Co-chairs:

Sheng-Pao SHIH, Tamkang University,

Yang BAO, Shanghai Jiao Tong University,

Kaiquan XU, Nanjing University,

Description and Topics of Interest:

Information security and privacy becomes increasingly important in today’s networked and global business environment. Organizations are threatened by both internal and external attacks that have become more diversified and sophisticated than ever. Both individuals and organizations are under a greater risk of privacy breaches as their personal information and valuable data might be collected by unidentified automated programs. The latest innovations such as artificial intelligence, big data, mobile technologies, and cloud computing further pose an unprecedented challenge for information security and privacy protection. Thus, it is imperative to better understand government policies, business strategies, technological solutions, and sound practices that can address security and privacy issues.

This track provides a forum for scholars to discuss and exchange ideas on information security and privacy research. We seek to address important questions on security and privacy arising from the aforementioned issues, such as: What are the implications of latest technologies for information security and privacy? How can organizations better protect security and privacy in the artificial intelligence or big data business context? What government interventions can improve the current state of information security and privacy? How should organizations manage employees to prevent computer misuse, security incidents, and privacy breaches? What are the impacts of latest policies and technologies concerning security and privacy on various business outcomes? How should firms design and implement “best” security and privacy practices in their IT systems?

The track welcomes both empirical and theoretical submissions using behavioral, data science, economic, and managerial methodologies. The topics of interests include, but are not limited to:

  • Accountability mechanisms of IS security
  • Computer abuse and employee deviant behaviors
  • Corporate governance of IS security and privacy
  • Cross-cultural issues in IS security and privacy
  • Cyberwarfare and cybersecurity
  • Deception in the context of online trust and security
  • Design and development of security and privacy systems or applications
  • Economics of information security and privacy
  • Emerging trends in IS security and privacy practice
  • Individual motivations for, and inhibitors of, computer crime by employees
  • Insider threat behaviors and antecedents
  • Intrusion detection/prevention
  • IS security and privacy in the context of artificial intelligence
  • IS security and privacy in the context of big data and/or open data
  • IS security and privacy in the context of cloud computing
  • IS security and privacy in the context of social media and social networking
  • IS security risk assessment and management
  • IS security education and training
  • IT audit and controls
  • Governance of IS security and privacy
  • Legal and ethical issues in IS security and privacy
  • Organizational strategies for securing information and privacy
  • Risk analysis and management, risk and fraud assessment
  • Secure software development
  • Security policy compliance and violations
  • Spyware / malware
  • Trust in security and privacy