TRACK

TRACK

TRACK4

Information Systems Security and Privacy
As technologies continue to usher new developments and changes for the world, organizations and individuals are increasingly dependent on information technologies for critical decision making. Newly emerged IT artifacts, such as big data analytics, artificial intelligence, ubiquitous connectivity, blockchain, and virtual reality, to name a few, have substantially improved efficiency and effectiveness of human decision-making. Notwithstanding the technological advances, information security and privacy takes on ever increasing importance because organizations are faced with threats stemming from both internal and external attacks. Therefore, it is of paramount importance for IS researchers to further investigate the pressing issues existing in the paradigm of new technologies vis-à-vis security and privacy protection.

 

This track provides a forum for IS researchers to share and disseminate insights about information systems security and privacy. In essence, we are interested in understanding how organizations or individuals can harden and safeguard their information assets in the emerging IT environment. What are the dark sides of mis-practicing information technologies? How can organizational employees can play a role in protecting information properties? What are the proper strategies for organizations to tackle their information and security issues?
 

This track solicits research submissions about information systems security and privacy using scientific theories and/or methods as well as research contexts that can advance our understanding in the IS community. Submissions that focus on the interplay of technical, behavioral, economic and/or organizational perspectives on information security and privacy are especially welcome. Submitted research can be analytical, design-oriented or empirical in nature.
 

Topics of interest include, but are not limited to:
Computer crimes
Cross-cultural aspects of security and privacy
Cyber security
Design of security and privacy countermeasures
Development of security and privacy artifacts
Dark sides of information systems security
Dark web
Employee deviant behaviors in organizations
Emerging trends of information systems security and privacy
Ethical issues of IT misuse
Governance of security and privacy
Individual behaviors in security and privacy settings
Insider threats
Risk management and analysis
Security and privacy issues in new IT environment
Security and terrorism analytics
Strategies of IS security and privacy
Trust in security and privacy

 

Track Co-Chairs:
Dr. Michael Chau (University of Hong Kong, China, email: mchau@business.hku.hk)
Dr. Carol Hsu (Tongji University, China, email: carolhsu@tongji.edu.cn)
Dr. Xin (Robert) Luo (University of New Mexico, USA, email: xinluo@unm.edu)

 

Track AEs:
Yoris Au, University of Texas at San Antonio
Zhuolan Bao, University of Hong Kong
Rui Chen, Iowa State University
Robert Crossler, Washington State University
John D’Arcy, University of Delaware
Yulin Fang, City University of Hong Kong
Matthew Hashim, University of Arizona
Jack Hsu, National Sun Yat-Sen University
Kumar Mehta, George Mason University
Nirup Menon, George Mason University
Fujun Lai, Soochow University
Han Li, University of New Mexico
Huigang Liang, East Carolina University
Jiabao Lin, Southern China University of Agriculture
Chuan Luo, Southwestern University of Finance and Economics
Allen Johnston, University of Alabama
Clay Posey, University of Central Florida
Jordan Shropshire, University of South Alabama
Mincong Tang, Beijing Jiaotong University
Alan Wang, Virginia Tech
Jingguo Wang, University of Texas at Arlington
Robert Willison, Newcastle University
Andy Wu, University of North Texas
Heng Xu, Penn State University
Feng Xu, Xi’an Jiaotong University
Lisa Yeo, Loyola University Maryland
Jie Zhang, Midwestern State University
Xia Zhao, University of North Carolina – Greensboro

PACIS2019 MENUS