School of Accounting and Computer Information Systems Helmerich Hall 313C 918-631-3698
Sal Aurigemma teaches Telecommunications, Information Security, and Business Programming Concepts for the Collins College of Business School of Accounting and Computer Information Systems. A Navy veteran of 20+ years and with over a decade of experience in the Information Technology field, his research explores employee information security policy compliance, improving end-user and small business information security practices, and end-user computing focusing on business spreadsheet error detection . He has published in Computers & Security, Information and Computer Security,Decision Support Systems, the Journal of Organizational and End User Computing, and the Journal of Information Systems Security and was awarded the Collins College of Business Mayo Teaching Excellence Award for 2015-2016.
Ph.D., University of Hawaii-Manoa
M.S., Hawaii Pacific University
B.S., University of Florida
Employee Behavioral Information Security Compliance
Improving End-User and Small Business Information Security Practices
End-User Computing (SpreadSheet Error Detection)
Telecommunications (computer and data networks)
The following may be selected publications rather than a comprehensive list.
Aurigemma, S. and T. Mattson (2017). "Privilege or procedure: Evaluating the effect of employee status on intent to comply with socially interactive information security threats and controls." Computers & Security, 66: 218-234.
Aurigemma, S., & Leonard, L. (2015). The Influence of Employee Affective Organizational Commitment on Security Policy Attitudes and Compliance Intentions. Journal of Information Systems Security (JISSec), 11(3), 201-222.
Aurigemma, S., Panko, R. (2014). Evaluating the Effectiveness of Static Analysis Programs Versus Manual Inspection in the Detection of Natural Spreadsheet Errors. Journal of Organizational and End User Computing, 26(1), 47-65.
Aurigemma, S. (2013). A Composite Framework for Behavioral Compliance with Information Security Policies. Journal of Organizational and End User Computing, 25(3), 32-51.
Panko, R., Aurigemma, S. (2010). Revising the Panko-Halverson taxonomy of spreadsheet errors. Decision Support Systems, 49(2), 235-244.
Mattson, T., & Aurigemma, S. (2018 forthcoming). Running with the Pack: The Impact of Middle-Status Conformity on the Post-Adoption Organizational Use of Twitter. Journal of Organizational and End User Computing, 30(1).
Aurigemma, S. and T. Mattson (2017). "Deterrence and Punishment Experience Impacts on ISP Compliance Attitudes." Information and Computer Security, 25(4) .
Aurigemma, S., Mattson, T., Leonard, L. (2017) “Enhancing End-user Psychological Capital to Motivate Voluntary Security Actions” 16th Annual Security Conference, Las Vegas, NV, April 2017.
Aurigemma, S., Mattson, T., Leonard, L., Ackerman, P. (2017) “Motivating Multifactor Authentication Use Among Millennial End-Users” 16th Annual Security Conference, Las Vegas, NV, April 2017.
Aurigemma, S., Mattson, T., Leonard, L. (2017). So Much Promise, So Little Use: What is Stopping Home End-Users from Using Password Manager Applications? HICSS 50, Computer Society Press.
Aurigemma, S., Leonard, L., Mattson, T. (2016). Exploring the Gap Between Intent and Actual Security Behavior by Evaluating the Use of Password Manager Applications Among Home End-Users. IFIP WG 8.11/11.13 Information Systems Security Research, Santa Fe, NM: Dewald Roode Working Group
Aurigemma, S., Leonard, L., & Mattson, T. (2015) "Research Study to Understand and Improve Fundamental Information Security Practices in Very Small Enterprises" 2015 International Conference on Information Systems. Dallas, TX. December 2015.
Aurigemma, S., Panko, R. (2015). Generally Speaking, Context Matters: Making the Case for Increased Emphasis on Specific Security Threat Contexts in Security Behavior Research. IFIP WG 8.11/11.13 Information Systems Security Research, Newark, DE: Dewald Roode Working Group
Aurigemma, S., Leonard, L.N.K., and Panko, R.,(2015) “Are Your Employees Committed to Following Your Information Security Policies? Let’s Hope,” 14th Annual Security Conference, Las Vegas, NV, May 2015.
Aurigemma, S., Mattson, T. (2015). The Role of Social Status and Controllability on Employee Intent to Follow Organizational Information Security Requirements. 48th Hawaii International Conference on System Sciences (HICSS).
Aurigemma, S., Mattson, T. (2014). Do it OR ELSE! Exploring the Effectiveness of Deterrence on Employee Compliance with Information Security Policies. Savannah. GA: AMCIS 2014.
Mattson, T., Aurigemma, S. (2014). Re-tweeting and the Theory of Middle-Status Conformity in the Post-Adoption Use of Twitter. HICSS 47, Computer Society Press.
Aurigemma, S., Panko, R. (2012). A Composite Framework for Behavioral Compliance with Information Security Policies. HICSS 45, Computer Society Press.
Association for Information Systems
Information Systems Security Association
International Federation for Information Processing (IFIP) WG 8.11/WG11.13
MIS 3043 Telecommunications
MIS 4073 Information Security