Program (2023)

Hosted by AIS SIGSEC

THE PROGRAM | PDF DOWNLOAD

WELCOME, SIGSEC President Shuyuan Mary Ho Metcalfe
8:50am—9:00am (Room MR 1.01)

KEYNOTE ADDRESS N. Rajendran, Chief Digital Officer, Multi Commodity Exchange of India
9:00am—9:30am

PANEL DISCUSSION “Topic: Challenges of securing public digital infrastructure in India and beyond” | Moderator: Gurpreet Dhillon
9:30am—10:00am

Panelists include:

  • N Rajendran, Chief Digital Officer, Multi Commodity Exchange of India
  • Sates Palagiri, Chief of Mobility Solutions at National Payments Corporation Of India (NPCI)
  • Krishna Sastry Pendyala, Partner, Cybersecurity, Ernst & Young (EY) LLP
  • Prof. G Geethakumari, BITS Pilani

10:00am—10:15am, Coffee Break

SESSION 1 Organizational Cybersecurity Considerations | Chair: Laura Georg Schaffner
10:15am—11:45am

  • Effectiveness of organizational mitigations for cybersecurity, privacy, and IT failure risks of artificial intelligence, Huseyin Tanriverdi and John-Patrick Akinyemi
  • Optimization of investments in cybersecurity: A linear programming approach, Swati Jain and Arunabha Mukhopadhyay
  • Cybersecurity in contemporary organizations: A leadership challenge, Gurpreet Dhillon and Rajiv Kohli
  • Cyber security and risk disclosure: A literature review for theory and practice, Laura Georg Schaffner, Patrizia Tettamanzi and Michael Murgolo

POSTER SLAM SESSION Chair: Andy Green
11:45am—12:15pm

  • Achieving data privacy through legislation, Ganesh J and Rajendra Bandi
  • Understanding the impact of ransomware attack: A comprehensive study on evolution, detection and prevention techniques, challenges, Rimpa Dutta
  • Building inter-organizational information security management practices, Hanna Paananen
  • Healthcare security breaches in the United States: Insights and their socio-technical implications, Megha Moncy, Sadia Afreen and Saptarshi Purkayastha
  • The evolution of cybersecurity and information privacy laws and regulations: The case of India, Simran Dhillon and Chandrashekar Challa
  • Applications of big data technologies to cope with cybersecurity challenges, Babak Safaei and Yufei Yuan
  • Cybersecurity challenges due to the unethical exploitation of AI by Generation Z, Saksham Shori, Gurpreet Dhillon, Kane Smith and Joti Kaur
  • From likes to shields: The influencer effect on cybersecurity awareness, Srinivas Josyula and Abhishek Srivastava
  • Implications of India’s privacy regulation on telehealth, Shubha Krishnamurthy and Rajendra K. Bandi
  • Cyber-risk management framework for ransomware attacks, Kalpit Sharma

LUNCH BREAK
12:15pm—1:15pm

AWARD CEREMONY, Co-Chairs Shuyuan Mary Ho Metcalfe and Andy Green
12:15pm—1:15pm

SESSION 2 Behavioral Cybersecurity | Chair: Deepti Agrawal
1:15pm—3:15pm

  • Information security policy violations in the work-from-home era, Balagopal N and Saji Mathew
  • What technical and professional skills are needed for cybersecurity roles?, Mary Sumner, Chris Maurer, Dan Mazzola and Keri Pearlson
  • Understanding Generation Z’s information security behaviors regarding penalties, pressures and perceived effectiveness, Alisha Madhuvarshi, Kane Smith, Gurpreet Dhillon and Joti Kaur
  • Protection against phishing attacks on social networks with use of selected machine learning, Aneta Poniszewska-Maranda and Aleksander Lemiesz
  • To follow the rules or break them: A rule following perspective, Darin Hodges, Deepti Agrawal and Russell Haines
  • How to avoid medication errors – Investigating the roles of policies and nudging from a stress perspective, Gilbert G. Hövel, Ilja Nastjuk, Simon Trang and Tizian Matschak

3:15pm—3:30pm, Coffee Break

SESSION 3 Societal Security and Privacy Issues | Chair: Kane Smith
3:30pm—5:10pm

  • Antecedents and outcomes of information privacy concerns: A replication study in rural India, Manjinder Kaur, Gurpreet Dhillon, Kane Smith and Joti Kaur
  • A bibliometric analysis of privacy concepts based on Westin information privacy eras, Eric Di Benedetto and Alain Cucchi
  • Escaping the echo: Understanding the impact of social media on over concentration of emerging technology security threats, Harsh Parekh and Paras Bhatt
  • Examining the influence of moral foundations on polarization in social media discourse: A context of vigilantism, Shalini Kapali Kurumathur, Rohit Valecha, Govind Hariharan and H. Raghav Rao
  • Cloud optimization for disinformation detection and news veracity, Lumbardha Hasimi and Aneta Poniszewska-Maranda

WORKSHOP CO-CHAIRS
Shuyuan Mary Ho Metcalfe, Florida State University
Philip Menard, The University of Texas at San Antonio
Andy Green, Kennesaw State University
Obi Ogbanufe, University of North Texas

THE PROGRAM COMMITTEE

Alvaro Arenas, IE Business School
Yves Barlette, Montpellier Business School
Gunjan Batra, Kennesaw State University
Anitha Chennamaneni, Texas A&M University – Central Texas
Gurpreet Dhillon, University of North Texas
Andreas Eckhardt, University of Innsbruck
Steven Furnell, University of Nottingham
Matthew Jensen, University of Oklahoma
Hwee-Joo Kam, University of Tampa
Mark Keith, Brigham Young University
Brett J. L. Landry, University of Dallas
Herb Mattord, Kennesaw State University
Sean Maynard, The University of Melbourne
Arunabha Mukhopadhyay, Indian Institute of Management (IIM) Lucknow

Marko Ilmari Niemimaa, University of Agder
Daniel Pienta, University of Tennessee, Knoxville
Jean-Loup Richet, Sorbonne Business School
Sumantra Sarkar, SUNY Binghamton
Kalpit Sharma, Indian Institute of Management Amritsar
Kane Smith, University of North Texas
Paolo Spagnoletti, Luiss University
Mary B. Sumner, University of Oklahoma
Gurvirender Tejay, University of Colorado at Colorado Springs
Tawei (David) Wang, DePaul University
Tianjian Zhang, California State University Dominguez Hills
Lina Zhou, UNC Charlotte

VENUE
WISP will be held at Hyderabad International Convention Centre (HICC), Hyderabad, India, in conjunction with the International Conference on Information Systems (ICIS) 2023. Please register using the conference registration site (attendees may register for WISP alone).

THE PROGRAM | PDF DOWNLOAD

ACKNOWLEDGEMENT
Thanks to the Department of Information Systems and Security, Coles College of Business, Kennesaw State University for its support of WISP.