<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=us-ascii">
<meta name="Generator" content="Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
{font-family:Wingdings;
panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
{font-family:DengXian;
panose-1:2 1 6 0 3 1 1 1 1 1;}
@font-face
{font-family:Aptos;}
@font-face
{font-family:"\@DengXian";
panose-1:2 1 6 0 3 1 1 1 1 1;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin:0in;
font-size:12.0pt;
font-family:"Aptos",sans-serif;
mso-ligatures:standardcontextual;}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:#467886;
text-decoration:underline;}
.MsoChpDefault
{mso-style-type:export-only;
font-size:10.0pt;
mso-ligatures:none;}
@page WordSection1
{size:8.5in 11.0in;
margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
{page:WordSection1;}
/* List Definitions */
@list l0
{mso-list-id:148249743;
mso-list-type:hybrid;
mso-list-template-ids:337661866 -54079302 134807555 134807557 134807553 134807555 134807557 134807553 134807555 134807557;}
@list l0:level1
{mso-level-start-at:0;
mso-level-number-format:bullet;
mso-level-text:\2022;
mso-level-tab-stop:none;
mso-level-number-position:left;
margin-left:.75in;
text-indent:-.5in;
font-family:"Arial",sans-serif;
mso-fareast-font-family:Aptos;}
@list l0:level2
{mso-level-number-format:bullet;
mso-level-text:o;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:"Courier New";
mso-bidi-font-family:"Times New Roman";}
@list l0:level3
{mso-level-number-format:bullet;
mso-level-text:\F0A7;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:Wingdings;}
@list l0:level4
{mso-level-number-format:bullet;
mso-level-text:\F0B7;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:Symbol;}
@list l0:level5
{mso-level-number-format:bullet;
mso-level-text:o;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:"Courier New";
mso-bidi-font-family:"Times New Roman";}
@list l0:level6
{mso-level-number-format:bullet;
mso-level-text:\F0A7;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:Wingdings;}
@list l0:level7
{mso-level-number-format:bullet;
mso-level-text:\F0B7;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:Symbol;}
@list l0:level8
{mso-level-number-format:bullet;
mso-level-text:o;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:"Courier New";
mso-bidi-font-family:"Times New Roman";}
@list l0:level9
{mso-level-number-format:bullet;
mso-level-text:\F0A7;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:Wingdings;}
ol
{margin-bottom:0in;}
ul
{margin-bottom:0in;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang="EN-US" link="#467886" vlink="#96607D" style="word-wrap:break-word">
<div class="WordSection1">
<p class="MsoNormal"><b><span style="font-size:11.0pt">Call for Papers for security/privacy papers – 2026 Hawaii International Conference on System Sciences (HICSS)<o:p></o:p></span></b></p>
<p class="MsoNormal"><b><span style="font-size:11.0pt"><o:p> </o:p></span></b></p>
<p class="MsoNormal"><span style="font-size:11.0pt">This mini-track investigates behavioral aspects of IS security and privacy, focusing on human-centric risks, decision-making processes, and strategies to mitigate internal and external threats. Topics include
compliance, threat responses, and the influence of emerging technologies like AI and generative tools. The focus is on internal and external threats influenced by human behavior. This includes research on fear appeals and motivation in security compliance,
generative AI’s role in mitigating threats, cognitive heuristics and decision-making in phishing and cyber resilience, and behavioral (cognitive or affective) biases affecting IS security.<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt"><o:p> </o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">With that in mind, we are calling for papers taking a variety of approaches related to topics including,
<i>but not limited to</i>:<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt"><o:p> </o:p></span></p>
<p class="MsoNormal" style="margin-left:.75in;text-indent:-.5in;mso-list:l0 level1 lfo2">
<![if !supportLists]><span style="font-size:11.0pt;font-family:"Arial",sans-serif"><span style="mso-list:Ignore">•<span style="font:7.0pt "Times New Roman"">
</span></span></span><![endif]><span style="font-size:11.0pt">Creative rigorous investigations of actual user security behavior, both positive and negative<o:p></o:p></span></p>
<p class="MsoNormal" style="margin-left:.75in;text-indent:-.5in;mso-list:l0 level1 lfo2">
<![if !supportLists]><span style="font-size:11.0pt;font-family:"Arial",sans-serif"><span style="mso-list:Ignore">•<span style="font:7.0pt "Times New Roman"">
</span></span></span><![endif]><span style="font-size:11.0pt">Detecting and mitigating insider threats<o:p></o:p></span></p>
<p class="MsoNormal" style="margin-left:.75in;text-indent:-.5in;mso-list:l0 level1 lfo2">
<![if !supportLists]><span style="font-size:11.0pt;font-family:"Arial",sans-serif"><span style="mso-list:Ignore">•<span style="font:7.0pt "Times New Roman"">
</span></span></span><![endif]><span style="font-size:11.0pt">The impact of AI on personal data privacy and regulatory responses<o:p></o:p></span></p>
<p class="MsoNormal" style="margin-left:.75in;text-indent:-.5in;mso-list:l0 level1 lfo2">
<![if !supportLists]><span style="font-size:11.0pt;font-family:"Arial",sans-serif"><span style="mso-list:Ignore">•<span style="font:7.0pt "Times New Roman"">
</span></span></span><![endif]><span style="font-size:11.0pt">Security policy compliance research – motivations, antecedents, levers of influence<o:p></o:p></span></p>
<p class="MsoNormal" style="margin-left:.75in;text-indent:-.5in;mso-list:l0 level1 lfo2">
<![if !supportLists]><span style="font-size:11.0pt;font-family:"Arial",sans-serif"><span style="mso-list:Ignore">•<span style="font:7.0pt "Times New Roman"">
</span></span></span><![endif]><span style="font-size:11.0pt">Research contrasting policy compliance with actual secure behaviors<o:p></o:p></span></p>
<p class="MsoNormal" style="margin-left:.75in;text-indent:-.5in;mso-list:l0 level1 lfo2">
<![if !supportLists]><span style="font-size:11.0pt;font-family:"Arial",sans-serif"><span style="mso-list:Ignore">•<span style="font:7.0pt "Times New Roman"">
</span></span></span><![endif]><span style="font-size:11.0pt">Analysis of known and unknown modes and vectors of internal and external attack<o:p></o:p></span></p>
<p class="MsoNormal" style="margin-left:.75in;text-indent:-.5in;mso-list:l0 level1 lfo2">
<![if !supportLists]><span style="font-size:11.0pt;font-family:"Arial",sans-serif"><span style="mso-list:Ignore">•<span style="font:7.0pt "Times New Roman"">
</span></span></span><![endif]><span style="font-size:11.0pt">Explorations of the impact of generative AI and ML/LLM on security outcomes, for all stakeholders, including employees, citizens and organizations.<o:p></o:p></span></p>
<p class="MsoNormal" style="margin-left:.75in;text-indent:-.5in;mso-list:l0 level1 lfo2">
<![if !supportLists]><span style="font-size:11.0pt;font-family:"Arial",sans-serif"><span style="mso-list:Ignore">•<span style="font:7.0pt "Times New Roman"">
</span></span></span><![endif]><span style="font-size:11.0pt">SETA (security education, training, and awareness) programs<o:p></o:p></span></p>
<p class="MsoNormal" style="margin-left:.75in;text-indent:-.5in;mso-list:l0 level1 lfo2">
<![if !supportLists]><span style="font-size:11.0pt;font-family:"Arial",sans-serif"><span style="mso-list:Ignore">•<span style="font:7.0pt "Times New Roman"">
</span></span></span><![endif]><span style="font-size:11.0pt">Frameworks for assessing the effectiveness of interventions that intend to reduce organizational vulnerability to attacks<o:p></o:p></span></p>
<p class="MsoNormal" style="margin-left:.75in;text-indent:-.5in;mso-list:l0 level1 lfo2">
<![if !supportLists]><span style="font-size:11.0pt;font-family:"Arial",sans-serif"><span style="mso-list:Ignore">•<span style="font:7.0pt "Times New Roman"">
</span></span></span><![endif]><span style="font-size:11.0pt">Cyber security professionals harnessing AI to enhance defense<o:p></o:p></span></p>
<p class="MsoNormal" style="margin-left:.75in;text-indent:-.5in;mso-list:l0 level1 lfo2">
<![if !supportLists]><span style="font-size:11.0pt;font-family:"Arial",sans-serif"><span style="mso-list:Ignore">•<span style="font:7.0pt "Times New Roman"">
</span></span></span><![endif]><span style="font-size:11.0pt">Modeling of security and privacy behavioral phenomena and relationships<o:p></o:p></span></p>
<p class="MsoNormal" style="margin-left:.75in;text-indent:-.5in;mso-list:l0 level1 lfo2">
<![if !supportLists]><span style="font-size:11.0pt;font-family:"Arial",sans-serif"><span style="mso-list:Ignore">•<span style="font:7.0pt "Times New Roman"">
</span></span></span><![endif]><span style="font-size:11.0pt">Studies examining privacy-related behaviors from a “privacy paradox” perspective<o:p></o:p></span></p>
<p class="MsoNormal" style="margin-left:.75in;text-indent:-.5in;mso-list:l0 level1 lfo2">
<![if !supportLists]><span style="font-size:11.0pt;font-family:"Arial",sans-serif"><span style="mso-list:Ignore">•<span style="font:7.0pt "Times New Roman"">
</span></span></span><![endif]><span style="font-size:11.0pt">Merging methodological topics related to addressing research strategies in IS security<o:p></o:p></span></p>
<p class="MsoNormal" style="margin-left:.75in;text-indent:-.5in;mso-list:l0 level1 lfo2">
<![if !supportLists]><span style="font-size:11.0pt;font-family:"Arial",sans-serif"><span style="mso-list:Ignore">•<span style="font:7.0pt "Times New Roman"">
</span></span></span><![endif]><span style="font-size:11.0pt">Translational science perspectives and strategies for IS security/privacy research<o:p></o:p></span></p>
<p class="MsoNormal" style="margin-left:.75in;text-indent:-.5in;mso-list:l0 level1 lfo2">
<![if !supportLists]><span style="font-size:11.0pt;font-family:"Arial",sans-serif"><span style="mso-list:Ignore">•<span style="font:7.0pt "Times New Roman"">
</span></span></span><![endif]><span style="font-size:11.0pt">Theory development, theory building, and theory testing in information security<o:p></o:p></span></p>
<p class="MsoNormal" style="margin-left:.75in;text-indent:-.5in;mso-list:l0 level1 lfo2">
<![if !supportLists]><span style="font-size:11.0pt;font-family:"Arial",sans-serif"><span style="mso-list:Ignore">•<span style="font:7.0pt "Times New Roman"">
</span></span></span><![endif]><span style="font-size:11.0pt">Neurosecurity (NeuroIS) investigations of information security behavior<o:p></o:p></span></p>
<p class="MsoNormal" style="margin-left:.75in;text-indent:-.5in;mso-list:l0 level1 lfo2">
<![if !supportLists]><span style="font-size:11.0pt;font-family:"Arial",sans-serif"><span style="mso-list:Ignore">•<span style="font:7.0pt "Times New Roman"">
</span></span></span><![endif]><span style="font-size:11.0pt">Explorations of emerging issues related to the privacy and security of the “Internet of Things” (ioT)<o:p></o:p></span></p>
<p class="MsoNormal" style="margin-left:.75in;text-indent:-.5in;mso-list:l0 level1 lfo2">
<![if !supportLists]><span style="font-size:11.0pt;font-family:"Arial",sans-serif"><span style="mso-list:Ignore">•<span style="font:7.0pt "Times New Roman"">
</span></span></span><![endif]><span style="font-size:11.0pt">Role of AI in facilitating cybersecurity defenses<o:p></o:p></span></p>
<p class="MsoNormal" style="margin-left:.75in;text-indent:-.5in;mso-list:l0 level1 lfo2">
<![if !supportLists]><span style="font-size:11.0pt;font-family:"Arial",sans-serif"><span style="mso-list:Ignore">•<span style="font:7.0pt "Times New Roman"">
</span></span></span><![endif]><span style="font-size:11.0pt">Consumer perceptions of privacy and trust in digital platforms<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt"><o:p> </o:p></span></p>
<p class="MsoNormal"><b><span style="font-size:11.0pt">Important</span></b><span style="font-size:11.0pt">: each coauthor of a paper submitted to our mini-track is obligated to review at least one other paper for the mini-track. Failure of any one coauthor
to review for the mini-track may result in the rejection of the coauthor's paper from the mini-track.<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt"><o:p> </o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">**<b>Fast Track to Journal Publication</b>** (at the discretion of minitrack chairs):<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">Selected papers from this mini track will be invited to submit revised manuscripts to be fast tracked by the mini-track chairs to the
<i>Journal of Intellectual Capital</i> (Emerald Publishing) – <a href="https://emeraldgrouppublishing.com/journal/jic?id=jic">
https://emeraldgrouppublishing.com/journal/jic?id=jic</a> <o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt"><o:p> </o:p></span></p>
<p class="MsoNormal"><b><span style="font-size:11.0pt">Conference Website</span></b><span style="font-size:11.0pt">:
<a href="http://hicss.hawaii.edu/">http://hicss.hawaii.edu/</a> <o:p></o:p></span></p>
<p class="MsoNormal"><b><span style="font-size:11.0pt"><o:p> </o:p></span></b></p>
<p class="MsoNormal"><b><span style="font-size:11.0pt">Author Guidelines:</span></b><span style="font-size:11.0pt">
<a href="http://hicss.hawaii.edu/tracks-and-minitracks/authors/">http://hicss.hawaii.edu/tracks-and-minitracks/authors/</a>
<o:p></o:p></span></p>
<p class="MsoNormal"><b><span style="font-size:11.0pt"><o:p> </o:p></span></b></p>
<p class="MsoNormal"><b><span style="font-size:11.0pt">IMPORTANT DATES<o:p></o:p></span></b></p>
<p class="MsoNormal"><b><span style="font-size:11.0pt">• April 15:</span></b><span style="font-size:11.0pt"> Paper submission commences<o:p></o:p></span></p>
<p class="MsoNormal"><b><span style="font-size:11.0pt">• June 15:</span></b><span style="font-size:11.0pt"> Paper submission deadline<o:p></o:p></span></p>
<p class="MsoNormal"><b><span style="font-size:11.0pt">• August 17</span></b><span style="font-size:11.0pt">: Notification of Acceptance/Rejection<o:p></o:p></span></p>
<p class="MsoNormal"><b><span style="font-size:11.0pt">• September 22</span></b><span style="font-size:11.0pt">: Deadline for authors to submit final manuscript<o:p></o:p></span></p>
<p class="MsoNormal"><b><span style="font-size:11.0pt">• October 1</span></b><span style="font-size:11.0pt">: Deadline for at least one author to register for HICSS<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt"><o:p> </o:p></span></p>
<p class="MsoNormal"><b><span style="font-size:11.0pt">Minitrack Co-Chairs – Contact Info<o:p></o:p></span></b></p>
<p class="MsoNormal"><b><span style="font-size:11.0pt"><o:p> </o:p></span></b></p>
<p class="MsoNormal"><b><span style="font-size:11.0pt">Merrill Warkentin (Primary Contact)<o:p></o:p></span></b></p>
<p class="MsoNormal"><span style="font-size:11.0pt">Department of Management and Information Systems<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">College of Business<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">Mississippi State University<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt"><a href="mailto:m.warkentin@msstate.edu">m.warkentin@msstate.edu</a><u><o:p></o:p></u></span></p>
<p class="MsoNormal"><b><span style="font-size:11.0pt"><o:p> </o:p></span></b></p>
<p class="MsoNormal"><b><span style="font-size:11.0pt">Karen Renaud<o:p></o:p></span></b></p>
<p class="MsoNormal"><span style="font-size:11.0pt">Department of Computer and Information Sciences<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">Strathclyde University<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt"><a href="mailto:karen.renaud@strath.ac.uk">karen.renaud@strath.ac.uk</a><o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt"><o:p> </o:p></span></p>
<p class="MsoNormal"><b><span style="font-size:11.0pt">Allen C. Johnston<o:p></o:p></span></b></p>
<p class="MsoNormal"><span style="font-size:11.0pt">Department of Information Systems, Statistics and Management Science<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">Culverhouse College of Commerce<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">University of Alabama<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt"><a href="mailto:acjohnston5@ua.edu">acjohnston5@ua.edu</a><o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt"><o:p> </o:p></span></p>
<p class="MsoNormal"><b><span style="font-size:11.0pt">Anthony Vance<o:p></o:p></span></b></p>
<p class="MsoNormal"><span style="font-size:11.0pt">Department of Business Information Technology<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">Pamplin College of Business<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt"><a href="mailto:anthonyvance@vt.edu">anthonyvance@vt.edu</a>
<o:p></o:p></span></p>
<p class="MsoNormal"><b><span style="font-size:11.0pt"><o:p> </o:p></span></b></p>
<p class="MsoNormal"><span style="font-size:11.0pt"><o:p> </o:p></span></p>
</div>
</body>
</html>