Hosted by AIS SIGSEC
THE PROGRAM | PDF DOWNLOAD
WELCOME, SIGSEC President Phil Menard
8:20am—8:30am
KEYNOTE ADDRESS Dr. Juan (Jane) Feng, Professor, Tsinghua University | Co-Guest Editor, MISQ Special Issue on AI-IA
8:30am—9:15am
SESSION 1 Behavioral Cybersecurity 1 | Chair: Christina Wagner
9:15am—10:15am
- Contextual Factors as Moderators of Demographic Effects on Phishing Victimization, Lina Zhou, Zhe Fu and Dongsong Zhang
- Conceptualizing Mobile Security Mindfulness: A Mixed-Methods Research, Bowen Guan, Yangting Li and Carol Hsu
- Wait, Is This Dangerous For Me? Consumers’ Reactions to Data Breaches That Pose (No) Risk to Them, Frederic Schlackl and Florian Pethig
10:15am—10:30am, Coffee Break
SESSION 2 Behavioral Cybersecurity 2 | Chair: Adeline Frenzel-Piasentin
10:30am—11:30am
- Contextual Influences on Phishing Susceptibility: A Qualitative Comparative Analysis, Fabian Hable, Bart van den Hooff and Nina-Birte Schirrmacher
- The Spillover Effect of Workplace Cybersecurity Training on Home Cyber Hygiene, Weiyu Wang and Matthew Jensen
- Examining Accounting Employees Information Security Policy Stress: Insights from the Justice and Responsibility Rationalization, Randi Jiang
POSTER SLAM SESSION | Chair: Sebastian Schuetz
11:30am—12:00pm
LUNCH BREAK
12:00pm—1:00pm
AWARD CEREMONY, Co-Chairs: Phil Menard, Greg Bott, and Shuyuan Metcalfe
12:00pm—1:00pm
SESSION 3 Organizational and Systemic Cybersecurity Challenges | Chair: Jonna Järveläinen
1:00pm—3:00pm
- Corporate Governance and the Insider Threat: Investigating the Impact of Management Teams on Data Breaches, Miloslava Plachkinova and Prachi Gala
- Moral Dynamics in the Age of Remote Work: Exploring the Role of Generational Shifts in Information Security, Patricia Akello, David Firth and Shawn Clouse
- Boundary Uncertainty in Interorganizational Information Sharing, Christina Wagner, Manuel Trenz, Chee-Wee Tan and Daniel J. Veit
- Measurement of Cybercrime Severity: A Victims’ Perspective, Binod Kumar, Saji K. Mathew and Kandaswamy Paramasivan
- Between Habit and Control–Opening the Black Box of ISP Compliance Under Stress, Theresa Pfaff, Florian Rampold, Gilbert Hoevel and Jana Driller
- Bystanders’ Perceptions and Reporting Responses in Doxing Cases: The Influence of Online Social Dynamics,Yuan Fang
3:00pm—3:20pm, Coffee Break
SESSION 4 Generative AI and Emerging Cybersecurity Tools | Chair: Patricia Akello Perry
3:20pm—4:40pm
- Integrating Generative AI in Cybersecurity: A Sensemaking Perspective, Hwee-Joo Kam, Allen Johnston, Wael Soliman and Chen Zhong
- Using Generative AI for Cybersecurity Awareness Training in Healthcare, Dmitry Zhdanov, Thomas Caldera and Mary Elaine Califf
- Human-Computer Interaction in Multimodal Fake News Detection, Mateusz Walczak and Aneta Poniszewska-Maranda
- Experience and Efficiency in Vulnerability Resolution on Bug Bounty Platforms, Ali Ahmed, Brian Lee and Amit Deokar
POSTER SESSION | Chair: Sebastian Schuetz
exhibited during the entire workshop
- Categorizing Differences in Cyber Incident Definitions and The Impact on Regulatory Compliance, Stuart Madnick and Angelica Marotta
- Comprehensive Analysis of Data Breaches and Compromised Data Classes: Trends and Implications from ‘Have I Been Pwned’ Dataset, Abhishek Sharma and May Bantan
- How Human Behavior Can Mitigate AI-Generated Cybersecurity Threats , Abdul Rahman Noordeen
- Building a Foundation in Cyber Hygiene and Privacy: A Study of Existing Frameworks and the Development of a Model Cybersecurity Curriculum for Primary School Students, Srinivas Josyula and Abhishek Srivastava
- Bringing Ransomware to Light – Insights from the First Iteration of the Design of an Artifact to Collect Ransomware Real-World Data, Gilbert Hoevel, Tim Brinkmeier, Lukas Sestendrup and Florian Rampold
- MorphDet: Towards the Detection of Morphing Attacks, Jival Kapoor, Priyanka Singh and Manoranjan Mohanty
- Identifying Cybersecurity Threats Using Security Logs: A Review of SIEM Risk Estimates, Adam Solomon, Michael Curry, Forough Shadbad and Byron Marshall
WORKSHOP CO-CHAIRS
Philip Menard, The University of Texas at San Antonio
Greg Bott, The University of Alabama
Andy Green, Kennesaw State University
Shuyuan Mary Ho Metcalfe, Florida State University
THE PROGRAM COMMITTEE
May Bantan, Kennesaw State University
Yves Barlette, Montpellier Business School
Mahesh Boodraj, Boise State University
Michael Curry, Oregon State University
Gurpreet Dhillon, University of North Texas
Adeline Frenzel-Piasentin, University of Augsburg
Saurabh Gupta, Kennesaw State University
Matthew Jensen, University of Oklahoma
Anjali Kaushik, MDI Gurgaon
Herb Mattord, Kennesaw State University
Arunabha Mukhopadhyay, IIM Lucknow
DeJarvis Oliver, North Carolina Agricultural & Technical State University
Daniel Pienta, University of Tennessee, Knoxville
Jean-Loup Richet, Sorbonne business school
Mary B. Sumner, University of Oklahoma
Tawei (David) Wang, DePaul University
Gunjan Batra, Kennesaw State University
Steven Furnell, University of Nottingham
Hwee-Joo Kam, University of Tampa
Mark Keith, Brigham Young University
Kent Marett, Mississippi State University
Sean Maynard, The University of Melbourne
Charles McElroy, Cleveland State University
Gregory Moody, University of Nevada, Las Vegas
Trevor Moores, Baruch College/CUNY
Sumantra Sarkar, SUNY Binghamton
Paolo Spagnoletti, Luiss University
Carlos Torres, Baylor University
Christina Wagner, University of Augsburg
Tianjian Zhang, California State University Dominguez Hills
Lina Zhou, UNC Charlotte
VENUE
WISP will be held at Queen’s Park Marriott Marquis, Bangkok, Thailand, in conjunction with the International Conference on Information Systems (ICIS) 2024. Please register using the conference registration site (attendees may register for WISP alone).
THE PROGRAM | PDF DOWNLOAD