Abstract is missing.
- Crowdsourcing IT Work: A Three-Fold Perspective from the Workers, Buyers, and Platform ProvidersJoseph Taylor. 1-2 [doi]
- The Impact of Positive Informal Behaviors on the Effectiveness of Information Systems DepartmentsHadi Karimikia, Harminder Singh, Karin Olesen. 3-4 [doi]
- Complexity Reduction in Information Security Risk AssessmentGlourise M. Haya. 5-6 [doi]
- Personal Information Sharing with Major User Concerns in the Online B2C Market: A Social Contract Theory PerspectiveJohn R. Magrane Jr.. 7-8 [doi]
- Youth, Information Quality, and Fitness Information within Social Media: A Brief Look at a Dissertation in ProgressKayla M. Booth. 9-10 [doi]
- Conceptualizing a Business Process Knowledge ConstructJose O. Angeles. 11-12 [doi]
- Focus Group: Developing a Resilient, Agile Cybersecurity Educational System (RACES)Diana L. Burley, Barbara Endicott-Popovsky. 13-14 [doi]
- Panel: Cybersecurity Workforce DevelopmentIndira R. Guzman, Thomas Hilton, Miguel (Mike) O. Villegas, Michelle Kaarst-Brown, Jason James, Ashraf Shirani, Shuyuan Mary Ho, Diane Lending. 15-17 [doi]
- Industry Cybersecurity Workforce DevelopmentJonathan Chow, Eric Crutchlow, Justin Cain. 19 [doi]
- Key Traits of Successful Cyber Security PractitionersMark G. Graff. 21 [doi]
- Video Games as a Training Tool to Prepare the Next Generation of Cyber WarriorsChristopher Herr, Dennis Allen. 23-29 [doi]
- A Vignette-based Method for Improving Cybersecurity Talent Management through Cyber Defense Competition DesignDavid H. Tobey. 31-39 [doi]
- Understanding Career Choice of African American Men Majoring in Information TechnologyKadeem Fuller, Lynette Kvasny, Eileen M. Trauth, Kshiti D. Joshi. 41-48 [doi]
- Does Competitor Grade Level Influence Perception of Cybersecurity Competition Design Gender Inclusiveness?Jason M. Pittman. 49-54 [doi]
- Characterizing the Traits of Top-Performing Security PersonnelJordan Shropshire, Art Gowan. 55-59 [doi]
- Lessons from the Strategic Corporal: Implications of Cyber Incident ResponseAntoine Lemay, Sylvain P. Leblanc, Tiago de Jesus. 61-66 [doi]
- What Skills do you Need to Work in Cyber Security?: A Look at the Australian MarketLeigh Ellen Potter, Gregory Vickers. 67-72 [doi]
- The Missing Circle of ISMS (LL-ISMS)Masoud Hayeri Khyavi, Mina Rahimi. 73-77 [doi]
- IT Surveillance and Social Implications in the WorkplaceMohammad Mohammad. 79-85 [doi]
- Exploring Green IT Awareness and Adoption among Indian StudentsRajendra K. Bandi, Anik Kumar Bose, Ashay Saxena. 87-96 [doi]
- Is Managing IT Security a Mirage?Conrad Shayo, Javier Torner, Frank Lin, Jake Zhu, Joon Son. 97-98 [doi]
- Cybersecurity Competitions in Education: Engaging Learners through Improved Game BalanceDavid H. Tobey, Portia Pusey, Josh Chin. 99-100 [doi]
- Insider Threat: Language-action Cues in Group DynamicsShuyuan Mary Ho, Hengyi Fu, Shashanka Surya Timmarajus, Cheryl Booth, Jung Hoon Baeg, Muye Liu. 101-104 [doi]
- An Efficient Approach to Develop an Intrusion Detection System Based on Multi Layer Backpropagation Neural Network Algorithm: IDS using BPNN AlgorithmRinku Sen, Manojit Chattopadhyay, Nilanjan Sen. 105-108 [doi]
- The Cybersecurity Competition FederationDaniel Manson, Portia Pusey, Mark J. Hufe, James Jones, Daniel Likarish, Jason Pittman, David Tobey. 109-112 [doi]
- Privacy Issues and Techniques in E-Health SystemsTina Francis, Muthiya Madiajagan, Vijay Kumar. 113-115 [doi]
- Professional Obsolescence in IT: The Relationships between the Threat of Professional Obsolescence, Coping and Psychological StrainTenace Kwaku Setor, Damien Joseph, Shirish C. Srivastava. 117-122 [doi]
- Extending Moore's Exhaustion Model: Including Further Dimensions of Burnout and Investigating Their Influence on Turnover Intention Among IT ProfessionalsChristoph Weinert, Christian Maier, Sven Laumer, Tim Weitzel. 123-131 [doi]
- Panel: Preparing the Next Generation of Computer PersonnelLeigh Ellen Potter, Diane Lending, Michelle L. Kaarst-Brown. 133-134 [doi]
- Factors Affecting Individual Information Security PracticesSantos M. Galvez, Joshua D. Shackman, Indira R. Guzman, Shuyuan M. Ho. 135-144 [doi]
- Cracks in the Security Foundation: Employee Judgments about Information SensitivityMichelle L. Kaarst-Brown, E. Dale Thompson. 145-151 [doi]
- Using Stakeholder Knowledge for Data Quality Assessment in IS Security Risk Management ProcessesChristian Sillaber, Ruth Breu. 153-159 [doi]
- Maintaining Cyber Security: Implications, Cost and ReturnsNishtha Kesswani, Sanjay Kumar. 161-164 [doi]