FACETS Publications
2022
Kwak, D.H., S. Deng, J. Kuem, and S.S. Kim (2022), “How to Achieve Goals in Digital Games? An Empirical Test of a Goal-Oriented Model in Pokémon GO,” Journal of the Association for Information Systems*, 23, 2, pp. 553-588. (ABDC Journal Rankingi : A+)
Steven J. Pentland, Christie Fuller, Lee A. Spitzley, and Doug Twitchell. (2022). Does accuracy matter? Methodological considerations when using automated speech-to-text for social science research. International Journal of Social Research Methodology
Sharma, P. & Ramsamooj, D. & Liu, H (2022). A Data Centric Misbehavior Detection Model for Vehicle-to-Infrastructure Communication Using Deep Learning. IEEE Transactions on Intelligent Transportation Systems
Madeeha B. Khan, Sanjay Goel, Jaswant Katar Anandan, Jersey Zhao, Ramavath Rakesh Naik: Deepfake Audio Detection. AMCIS 2022
2020
Dolan, A., Ray, I., Majumdar, S. (2020). Proactively Extracting IoT Device Capabilities: An Application to Smart Homes. Springer in the Lecture Notes in Computer Science.
Goel, S. (2020). National Cyber Security Strategy and the Emergence of Strong Digital Borders. No. 19 (1), pp. 63-72. Garmisch-Partenkirchen, Germany: Connections: The Quarterly Journal.
Goel, S., Huang, J., Dennis, A., Williams, K. J. (2020). Is Privacy Really a Paradox? Laying the Groundwork to Study the Gap between Privacy Valuation and Behavior. Proceedings of the Americas Conference on Information Systems.
Goel, S., Huang, J., Williams, K. J., Warkentin, M. (2020). Understanding the Role of Incentives in Security Behavior. Hawaii: Proceedings of the 53rd Hawaii International Conference on System Science (HICSS).
Ibrahim, K. E., Majumdar, S., Bastos, D., Singhal, A. (2020). Poster: Defining Actionable Rules for Verifying IoT Security.
Kuem, J., Khansa, L., Kim, S. (2020). Prominence and Engagement: Different Mechanisms Regulating Continuance and Contribution in Online Communities. 37 (1), pp. 162-190. Journal of Management Information Systems.
Kuem, J., Ray, S., Hsu, P.-F., Khansa, L. (2020). Smartphone Addiction and Conflict: An Incentive-Sensitization Perspective of Addiction for Information Systems. European Journal of Information Systems.
Malik, A., Sinha, S. (2020). Victim’s response to fight, flight or suffer: Does social media come to the rescue? Hamburg: Proceedings of the European Group for Organizational Studies Colloquium.
Malik, A., Sinha, S. (2020). Workplace Deviance amidst Technological Advancements: A Conceptual Exploration. Birmingham: British Academy of Management.
Malik, A., Sinha, S., Goel, S. (2020). The ‘Screening of You and Me: Effects of COVID-19 on Counterproductive Work Behaviors. IEEE Engineering Management Review.
Ma, X., Kuem, J., Hou, J., Khansa, L. (2020). Are All Contributions Equal? Investigating the Role of Community Participation in Crowdwork. (forthcoming). Decision Sciences.
Twyman, N. W., Pentland, S. J., Spitzley, L. Design Principles for Signal Detection in Modern Job Application Systems: Identifying Fabricated Qualifications. Journal of Management Information Systems. Revised/Version Updated: 2020
2019
Bhattacharya, D. Evaluating Distributed Computing Infrastructures: An Empirical Study Comparing Hadoop Deployments on Cloud and Local System. Albany: IEEE Transactions of Cloud Computing (TCC). March 2019.
Goel, S. (2019). How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race. 19 (1), pp. 87-95. Garmisch-Partenkirchen: Connections: The Quarterly HJournal.
Goel, S., Williams, K. J., Huang, J., Dennis, a. (2019). Does Privacy Mean Different Things to Different People: Can That Explain Privacy Paradox? Munich: Proceedings of the Workshop on Information Security and Privacy (PRE-ICIS).
Kam, h.-J., Mattson, T., Goel, S. (2019). A Cross Industry Study of Institutional Pressures on Organizational Effort to Raise Information Security Awareness. No. pp. 1-24. Information Systems Frontiers.
Malik, A., Sinha, S., Goel, S. (2019). Workplace Deviance in Public and Private Organizations. Birmingham: Proceedings of the British Academy of Management.
Majumdar, S., Madi, T., Wang, Y., Tabiban, A., Oqaily, M., Alimohammadifar, A., Jarraya, Y., Pourzandi, M., Wang, L., Debbabi, M. (2019). Cloud Security Auditing. pp.166. Springer.
Majumdar, S., Tabiban, A., Jarraya, Y., Oqaily, M., Alimohammadifar, A., Pourzandi, M., Wang, L., Debbabi, M. (2019). In Dieter Gollmann and Simon Foley (Ed.). Learning Probabilistic Dependencies among Events for Proactive Security Auditing in Clouds. 27 (2), pp. 165-202. Amsterdam: Journal of Computer Security (JCS).
Majumdar, S., Tabiban, A., Mohammady, M., Oqaily, A., Jarraya, Y., Pourzandi, M., Wang, L., Debbabi, M. (2019). Proactivizer: Transforming Existing Verification Tools into Efficient Solutions for Runtime Security Enforcement. 24th European Symposium on Research in Computer Security (ESORICS), Springer.
Pentland, S. J., Spitzley, L., Fuller, C., Twitchell, D. (2019). Data Quality Relevance in Linguistic Analysis: The Impact of Transcription Errors on Multiple Methods of Linguistic Analysis. Proceedings of the Americas Conference on Information Systems (AMCIS). Association for Information Systems.
2018
Abdelhamid, M., Kisekka, V. N., Samonas, S. (2018) Mitigating E-Services Avoidance: The role of government cybersecurity preparedness in lessening security concerns and risk perceptions. Information and Computer Security Journal.
Alimohammadifar, A., Majumdar, S., Madi, T., Jarraya, Y., Pourzandi, M., Wang, L., Debbabi, M. (2018). Stealthy Probing-based Verification (SPV): An Active Approach to Defending Software Defined Networks against Topology Poisoning Attacks.
Goel, S., Hong, Y., Giboney, J., Atrey, P. (2018). In Donald Siegel (Arizona State University, USA) (Ed.). Innovation in Information Security. World Scientific Reference on Innovation. pp. 193-210. World Scientific.
Kisekka, V., Giboney, J. (2018). The Effectiveness of Health Care Information Technologies: Evaluation of Trust, Security Beliefs, and Privacy as Determinants of Health Care Outcomes. (107 ed.) 20 (4). Journal of Medical Internet Research.
Kuem, J., Khansa, L., Kim, S. S., Goel, S. (2018). Vulnerability to Multiple Phishing Attempts: Two Longitudinal Experiments on the Effects of Security-Awareness Announcements. Journal of Management Information Systems.
Madi, T., Jarraya, Y., Alimohammdifar, A., Majumdar, S., Pourzandi, M., Wang, L., Debbabi, M. (2018). ISOTOP: Auditing Virtual Networks Isolation Across Cloud Layers in OpenStack.
Majumdar, S., Madi, T., Jarraya, Y., Pourzandi, M., Wang, L., Debbabi, M. (2018). Cloud Security Auditing: Major Approaches and Existing Challenge.
Spitzley, L. (2018). Manager-Analyst Interactions in Fraudulent Earnings Calls. 13th Annual Symposium on Information Assurance.
Spitzley, L. (2018). Using Narrative Disclosures to Detect Financial Fraud. The University of Arizona.
Spitzley, L., Pentland, S. J., Dorn, B., Walls, B., Burgoon, J. K. (2018). Using Multimodal Data to Infer Group Dynamics in an Adversarial Group Game. IEEE International Carnahan Conference on Security Technology.
Twyman, N. W., Pentland, S. J., Spitzley, L. (2018). Deception Detection in Online Automated Job Interviews. HCI in Business, Government, and Organizations. pp. 206-216. Springer International Publishing.
2017
Baham, C., Hirschheim, R., Calderon, A., Kisekka, V. N. (2017). An Agile Methodology for the Disaster Recovery of Information Systems Under Catastrophic Scenarios. 34 (3), pp. 633-663. Journal of Management Information Systems.
Goel, S., Cagle, S., Cagle, S. (2017). How vulnerable are international financial markets to terrorism? An empirical study based on terrorist incidents worldwide.
Kisekka, V. N., Goel, S. (2017). Patient adoption of eHealth portals: Understanding the motivating factors. (Paper 13). 8th annual Workshop on Information Security and Privacy.
Kisekka, V. N., Goel, S., Williams, K. J. (2017). Adoption of e-health technologies: the role of privacy, security, and other determinants. Journal of the American Medical Informatics Association.
Kuem, J., Khansa, L., Kim, S. S., Goel, S. (2017). Vulnerability to Multiple Phishing Attempts: Two Longitudinal Experiments on the Effects of Security-Awareness Announcements. Journal of Management Information Systems.