{"id":205,"date":"2021-10-25T17:39:47","date_gmt":"2021-10-25T17:39:47","guid":{"rendered":"https:\/\/cybersecurity.fsu.edu\/wisp\/?page_id=205"},"modified":"2022-08-02T16:22:53","modified_gmt":"2022-08-02T16:22:53","slug":"program","status":"publish","type":"page","link":"https:\/\/cybersecurity.fsu.edu\/wisp\/?page_id=205","title":{"rendered":"Program (2021)"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Hosted by AIS&nbsp;SIGSEC,&nbsp;Bright Internet Global Summit (BIGS),&nbsp;and&nbsp;IFIP TC 11.1<\/h2>\n\n\n\n<p><strong><a href=\"https:\/\/cybersecurity.fsu.edu\/wisp\/wp-content\/uploads\/2021\/12\/WISP_Program21-Hybrid-2021.12.12.pdf\">THE PROGRAM<\/a><\/strong> | <a href=\"https:\/\/cybersecurity.fsu.edu\/wisp\/wp-content\/uploads\/2021\/12\/WISP_Program21-Hybrid-2021.12.12.pdf\">PDF<\/a> DOWNLOAD<\/p>\n\n\n\n<p><strong>WELCOME<\/strong>, <em>SIGSEC President Michael Curry<\/em><br>9:00am\u20149:15am (Room 208)<\/p>\n\n\n\n<p><strong>KEYNOTE ADDRESS<\/strong> &#8220;<em>Cybersecurity Research: Be Part of the Policy Conversation<\/em>&#8220;, <em>Tawei (David) Wang<\/em>, <em>Associate Professor<\/em>, <em>Associate Dean for Operational Effectiveness and a Driehaus Fellow at the Driehaus College of Business<\/em>, <em>DePaul University<\/em><br><meta charset=\"utf-8\">9:15am\u201410:00am (Room 208)<\/p>\n\n\n\n<p>10:00am<meta charset=\"utf-8\">\u201410:15am, Break<\/p>\n\n\n\n<p><strong>SESSION 1<\/strong> (In Person) Track Chair: <em>Matthew Jensen, University of Oklahoma<\/em><br><meta charset=\"utf-8\">10:15am<meta charset=\"utf-8\">\u201410:455am (Room 208)<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>User engagement and uncertainty from COVID-19 misinformation on social media: an examination of emotions and harms (complete) <em>Thi Tran, Pranali Mandaoka, Naga Vemprala, Rohit Valecha, Govind Hariharan and H.R. Rao<\/em><\/li><li>Understanding the impact of group characteristics on individual&#8217;s privacy behavior&#8211;a systematic literature review (complete) <em>Adeline Frenzel-Piasentin and Daniel Veit<\/em><\/li><li>Rational ignorance: A privacy pre-calculus (complete) <em>Craig Van Slyke, Mihir Parikh, Damien Joseph and W. Grant Clary<\/em><\/li><\/ul>\n\n\n\n<p><strong>SESSION 1<\/strong> (Virtual) Track Chair: <em>Gregory J. Bott, The University of Alabama<\/em><br><meta charset=\"utf-8\">10:15am<meta charset=\"utf-8\">\u201410:455am (Room 205)<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Bait the hook to suit the phish, not the phisherman: A field experiment on security networks of teams to withstand spear phishing attacks on online social networks (WIP)<br><em>Robert Lamprecht, Andreas Eckhardt and Ryan Wright<\/em><\/li><li>The role of organizational competence on information security job performance (WIP)<br><em>Joti Kaur, Gurpreet Dhillon and Winnie Picoto<\/em><\/li><li>Use of protection motivation theory in non-compliance research (complete)<br><em>Marcus Gerdin, Ella Kolkowska and \u00c5ke Gr\u00f6nlund<\/em><\/li><\/ul>\n\n\n\n<p><meta charset=\"utf-8\"><strong>LUNCH BREAK<\/strong><br>11:45am\u201412:45pm<\/p>\n\n\n\n<p><strong>AWARD CEREMONY<\/strong>, Co-Chairs <em>Shuyuan Mary Ho<\/em> and <em>Obi Ogbanufe<\/em><br><meta charset=\"utf-8\">11:45am\u201412:45pm<\/p>\n\n\n\n<p><strong>SESSION 2<\/strong> (In Person) Track Chair: <em>Alexandra Durcikova, University of Oklahoma<\/em><br>1:00pm\u20142:00pm (Room 208)<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Users&#8217; privacy perceptions in interorganizational information sharing (complete) <em>Christina Wagner, Manuel Trenz, Daniel Veit and Chee-Wee Tan<\/em><\/li><li>Privacy policy violations: A corporate nexus of healthcare providers and social media platforms (WIP) <em>John Drake, Christopher Furner and Nikhil Mehta<\/em><\/li><\/ul>\n\n\n\n<p><strong>SESSION 2<\/strong> (Virtual) Track Chair: <em>Jacob A. Youn<\/em>g, Bradley University<br>1:00pm\u20142:00pm (Room 205)<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Analytical study of the COVID apps users&#8217; perception about data security and privacy (complete) <em>Yazan Alnsour and Ahmad Juma\u2019h<\/em><\/li><li>Self-sovereign identity: a primer and call for research in information systems (WIP) <em>Jacob Young and Sahar Farshadkhah<\/em><\/li><\/ul>\n\n\n\n<p>2:00pm<meta charset=\"utf-8\">\u20142:15pm, Break<\/p>\n\n\n\n<p><strong>SESSION 3<\/strong> (Virtual) Track Chair: <em>Y. Ken Wang, University of Pittsburgh<\/em><br>2:15pm\u20143:15pm (Room 208)<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Detection of fraudulent campaigns on donation-based crowdfunding platforms using a combination of machine (WIP) <em>Pranay Prateek, Dan Kim and Ling Ge<\/em><\/li><li>Process business modelling of emerging security threats with BPMN extension (complete) <em>Tomasz Krym, \u0141ukasz Chom\u0105tek and Aneta Poniszewska-Maranda<\/em><\/li><\/ul>\n\n\n\n<p><strong>SESSION 3<\/strong> (Virtual) Track Chair: <em>Christie Fuller, Boise State University<\/em><br><meta charset=\"utf-8\">2:15pm\u20143:15pm (Room 205)<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Expressing uncertainty in security analytics research: a demonstration of Bayesian analysis applied to binary classification problems (complete)<em><br>Douglas Twitchell and Christie Fuller<\/em><\/li><li>Developing a measure of adversarial thinking in social engineering scenarios (complete) <em>Justin Giboney, Ryan Schuetzler and Mark Grimes<\/em><\/li><\/ul>\n\n\n\n<p><strong>POSTER SESSION<\/strong><br>3:15pm\u20144:15pm (Room 205)<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Suitable targets of phishing victimization, <em>Miloslava Plachkinova<\/em><\/li><li>Uncovering Dimensions and cyber attacks using content analysis on fraudulent emails, <em>Debalina Bera and Dan Kim<\/em><\/li><li>The youth cybersecurity concepts instrument (YCCI): Developing a scale for the GenCyber cybersecurity concepts <em>Justin Giboney, Geoffrey Wright, Ersin Dincelli, Quincy Taylor and Dallin Christensen<\/em><\/li><li>An empirical study on acceptance drivers of IT security investment evaluation methods (IT-SIEM)- a multi-theoretical perspective, <em>Tizian Matschak, Florian Rampold, Till Diesterh\u00f6ft, Ilja Nastjuk and Simon Trang<\/em><\/li><\/ul>\n\n\n\n<p><strong>THE PROGRAM COMMITTEE&nbsp;<\/strong><br>Shuyuan Mary Ho (WORKSHOP CO-CHAIR), Florida State University<br>Obi Ogbanufe (WORKSHOP CO-CHAIR), University of North Texas<br>Gregg Bott (SIGSEC Secretary) University of Alabama<br>Michael Curry (SIGSEC President), Oregon State University<br>Matthew Jensen, University of Oklahoma<br>Hwee-Joo Kam, University of Tampa<\/p>\n\n\n\n<p><strong>VENUE<\/strong><br>Primary Zoom link (Room 208): <a href=\"https:\/\/us02web.zoom.us\/j\/89132311385?pwd=bTBWT2lmZGRYZklXSjkvdUJSb05CUT09\">https:\/\/us02web.zoom.us\/j\/89132311385?pwd=bTBWT2lmZGRYZklXSjkvdUJSb05CUT09<\/a><br>Meeting ID: 891 3231 1385<br>Passcode: 585480<\/p>\n\n\n\n<p>Track 2 Zoom link (Room 205):&nbsp; <a href=\"https:\/\/us02web.zoom.us\/j\/87005491370?pwd=Z3JJdUdOMDZ4ZnJZbUtIN0ljejlTdz09\"><\/a><a rel=\"noreferrer noopener\" href=\"https:\/\/urldefense.com\/v3\/__https:\/\/nam04.safelinks.protection.outlook.com\/?url=https*3A*2F*2Fus02web.zoom.us*2Fj*2F85901052302*3Fpwd*3DdW9vVGE1R3NHdXBiMTZwV1VOTjMwUT09&amp;data=04*7C01*7Cmichael.curry*40oregonstate.edu*7Ccf3d21672f38493041e308d9bd8964dc*7Cce6d05e13c5e4d6287a84c4a2713c113*7C0*7C0*7C637749220258117106*7CUnknown*7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0*3D*7C2000&amp;sdata=xy7SX1t4kc3UyY8jgaXCOBAtYuY64frMIOS2GwvSwGY*3D&amp;reserved=0__;JSUlJSUlJSUlJSUlJSUlJSUlJSU!!PhOWcWs!jx3zoLvLctLEv2J_zpEy116Ze-lrBP0y3PwZ2fEuFd2MolAooy0wYd8SMjpe$\" target=\"_blank\">https:\/\/us02web.zoom.us\/j\/85901052302?pwd=dW9vVGE1R3NHdXBiMTZwV1VOTjMwUT09<\/a><br>Meeting ID: 859 0105 2302<br>Passcode: 329036<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hosted by AIS&nbsp;SIGSEC,&nbsp;Bright Internet Global Summit (BIGS),&nbsp;and&nbsp;IFIP TC 11.1 THE PROGRAM | PDF DOWNLOAD WELCOME, SIGSEC President Michael Curry9:00am\u20149:15am (Room 208) KEYNOTE ADDRESS &#8220;Cybersecurity Research: Be Part of the Policy Conversation&#8220;, Tawei (David) Wang, Associate Professor, Associate Dean for Operational Effectiveness and a Driehaus Fellow at the Driehaus College of Business, DePaul University9:15am\u201410:00am (Room 208) &#8230; <a title=\"Program (2021)\" class=\"read-more\" href=\"https:\/\/cybersecurity.fsu.edu\/wisp\/?page_id=205\" aria-label=\"Read more about Program (2021)\">Read more<\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-205","page","type-page","status-publish"],"_links":{"self":[{"href":"https:\/\/cybersecurity.fsu.edu\/wisp\/index.php?rest_route=\/wp\/v2\/pages\/205","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybersecurity.fsu.edu\/wisp\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cybersecurity.fsu.edu\/wisp\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cybersecurity.fsu.edu\/wisp\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurity.fsu.edu\/wisp\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=205"}],"version-history":[{"count":41,"href":"https:\/\/cybersecurity.fsu.edu\/wisp\/index.php?rest_route=\/wp\/v2\/pages\/205\/revisions"}],"predecessor-version":[{"id":340,"href":"https:\/\/cybersecurity.fsu.edu\/wisp\/index.php?rest_route=\/wp\/v2\/pages\/205\/revisions\/340"}],"wp:attachment":[{"href":"https:\/\/cybersecurity.fsu.edu\/wisp\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=205"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}