{"id":391,"date":"2022-11-12T17:41:35","date_gmt":"2022-11-12T17:41:35","guid":{"rendered":"https:\/\/cybersecurity.fsu.edu\/wisp\/?page_id=391"},"modified":"2023-08-15T18:43:32","modified_gmt":"2023-08-15T18:43:32","slug":"program-2","status":"publish","type":"page","link":"https:\/\/cybersecurity.fsu.edu\/wisp\/?page_id=391","title":{"rendered":"Program (2022)"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Hosted by AIS&nbsp;SIGSEC and&nbsp;Bright Internet<\/h2>\n\n\n\n<p><strong><a href=\"https:\/\/cybersecurity.fsu.edu\/wisp\/wp-content\/uploads\/2022\/12\/WISP2022Program.pdf\">THE PROGRAM<\/a><\/strong> | <a href=\"https:\/\/cybersecurity.fsu.edu\/wisp\/wp-content\/uploads\/2022\/12\/WISP2022Program.pdf\">PDF<\/a> DOWNLOAD<\/p>\n\n\n\n<p><strong>WELCOME<\/strong>, <em>SIGSEC President Obi Ogbanufe<\/em><br>8:50am\u20149:00am (Room B4 M5-6)<\/p>\n\n\n\n<p><strong>KEYNOTE ADDRESS<\/strong>   <em>Richard Baskerville<\/em>, Regents\u2019 Professor and Board of Advisors Professor in the Department of Computer Information Systems, J. Mack Robinson College of Business at Georgia State University<br>9:00am\u20149:50am (Room B4 M5-6)<\/p>\n\n\n\n<p>9:50am\u201410:00am, Coffee Break<\/p>\n\n\n\n<p><strong>SESSION 1<\/strong> Track A Organizational Issues in Cybersecurity | Chair: <em>Matthew Jensen<\/em><br>10:00am\u201412:00am (Room B4 M5-6)<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Cybersecurity Risk of Interfirm Cooperation: Alliance or Joint Venture? (complete) <em>Huseyin Tanriverdi <\/em>and <em>Ghiyoung Im<\/em><\/li>\n\n\n\n<li>Making Sense of Certification Internalization: A Process Model for Implementing Information Security and Data Protection Certifications (complete) <em>Philipp Danylak, Sebastian Lins, Carol Hsu, <\/em>and<em> Ali Sunyaev<\/em><\/li>\n\n\n\n<li>Factors Influencing the Organizational Decision to Outsource IT Security (complete) <em><em>Antra Arshad, Atif Ahmad, <\/em>and<em> Sean B. Maynard<\/em><\/em><\/li>\n\n\n\n<li>The Value Relevance of an Official Press Release of a Security Breach and Complementarities between the Content Elements of the Release (complete) <em>Nirup Menon, Brian Ngac, <\/em>and <em>Fatou Diouf<\/em><\/li>\n\n\n\n<li>A Role Theory Perspective: Will Shifting Left Become a Pain for Application Developers? (WIP) <em>Hwee-Joo Kam <\/em>and<em> John D&#8217;Arcy<\/em><\/li>\n<\/ul>\n\n\n\n<p><strong>SESSION 1<\/strong> Track B Cyber Threat Detection | Chair: <em>Adeline Frenzel-Piasentin<\/em><br>10:00am\u201412:00am (Room B3 M7-8)<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Will SOC Telemetry Data Improve Predictive Models of User Riskiness? A Work in Progress (WIP) <em>Michael Curry,&nbsp;Byron Marshall,&nbsp;Forough Shadbad, <\/em>and<em>&nbsp;Sanghyun Hong<\/em><\/li>\n\n\n\n<li>Too good for Malware: Investigating Effects of Entitlement on Cybersecurity Threat Assessment and Piracy Behavior (complete) <em>Andy Bowman, Madhav Sharma, <\/em>and<em> David Biros<\/em><\/li>\n\n\n\n<li>Blockchain Technologies and Forensic Challenges: Emergent Potential and Diverging Affordances (complete) <em><em>Chadi Aoun<\/em><\/em><\/li>\n\n\n\n<li>Progenitors and Antagonists of Shadow IT Use: Results of a computational-driven approach using Reddit data (complete) <em>Animesh Kumar, Christoph Burtscher, <\/em>and<em> Andreas Eckhardt<\/em><\/li>\n\n\n\n<li>Network Analysis of a Darknet Marketplace: Identifying Themes and Key Users of Illicit Networks (WIP) <em>Obi Ogbanufe, Fallon Baucum, <\/em>and<em> Jasmine Benjamin<\/em><\/li>\n<\/ul>\n\n\n\n<p><strong>LUNCH BREAK<\/strong><br>12:00pm\u20141:00pm<\/p>\n\n\n\n<p><strong>AWARD CEREMONY<\/strong>, Co-Chairs <em>Shuyuan Mary Ho Metcalfe<\/em> and <em>Kane Smith<\/em><br>12:00pm\u20141:00pm (Room B4 M5-6)<\/p>\n\n\n\n<p><strong>SESSION 2<\/strong> Track A Security Training and Compliance | Chair: <em>Michael Curry<\/em><br>1:00pm\u20143:00pm (Room B4 M5-6)<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Risk Compensation Behaviors on Cascaded Security Choices (WIP) <em>Richard Henkenjohann <\/em>and<em> Manuel Trenz<\/em><\/li>\n\n\n\n<li>Do Measures of Security Compliance Intent Equal Non-Compliance Scenario Agreement? (complete) <em><em>Byron Marshall, Forough Shadbad,&nbsp;Michael Curry, <\/em>and<em> David Biros<\/em><\/em><\/li>\n\n\n\n<li>Trading well-being for ISP compliance: An investigation of the positive and negative effects of SETA programs (WIP) <em>Jalal Sarabadani, Robert E. Crossler, <\/em>and<em> John D&#8217;Arcy<\/em><\/li>\n\n\n\n<li>Revisiting neutralization theory and its underlying assumptions to inspire future information security research (complete) <em>Wael Soliman <\/em>and<em> Hojat Mohammadnazar<\/em><\/li>\n\n\n\n<li>Choose Your Words Wisely! Understanding the Strategic Communication of Differential Privacy (complete) <em>Aycan Aslan, Maike Greve, <\/em>and<em> Till Ole Diesterh\u00f6ft<\/em><\/li>\n<\/ul>\n\n\n\n<p><strong>SESSION 2<\/strong> Poster Slam Session | Chair: <em>Andy Green<\/em><br>1:00pm\u20143:00pm (Room B3 M7-8)<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Mapping Privacy Concern Research from 2011 to 2020: Co-word, Bibliographic coupling, and Co-citation analyses, <em>Ruilin Zhu, Youyou Tao, <\/em>and<em> Ace Vo<\/em><\/li>\n\n\n\n<li>Deception as Bias: Theory-based Data Pipeline Using Bayesian Networks, <em>Ronit Purian-Lukatch&nbsp;<\/em>and<em> Natan Katz Katz<\/em><\/li>\n\n\n\n<li>Fostering an Organizational Cybersecurity Culture: A Culture Identity Perspective, <em>Kira Gedris, France Belanger, <\/em>and<em> Anthony Vance<\/em><\/li>\n\n\n\n<li>Study of Privacy-Preserving Mechanisms in Contact Tracing Applications, <em>Taimoor Ali Danish <\/em>and<em> Sergey Butakov<\/em><\/li>\n\n\n\n<li>A Conceptual Model for the Development of an Information Security Culture of Policy Compliance to Improve Cyber-security Practices Within Small and Micro Enterprises (SMEs) in Developing Countries: Case: Jamaica, <em>Nadine Barrett-Maitland <\/em>and<em> Kweku-Muata Osei-Bryson<\/em><\/li>\n\n\n\n<li>Exploring the Dark Side of IT Security: Delphi Study on Business Processes\u2019 Influencing Factors, <em>Tizian Matschak, Ilja Nastjuk, Stephan K\u00fchnel, <\/em>and<em> Simon Trang<\/em><\/li>\n\n\n\n<li>The Role of Culture in Privacy Assurances for Mobile Cloud Computing Apps, <em>Hamid Reza Nikkhah, Frederic Schlackl, <\/em>and<em> Rajiv Sabherwal<\/em><\/li>\n\n\n\n<li>How is security training content provided? \u2013 A taxonomy-based approach to real-world SETA programs, <em>Florian Rampold,&nbsp;Florian Schuetz, Julia Klein, <\/em>and<em> Kristin Masuch<\/em><\/li>\n\n\n\n<li>Security of Internet of Things in Healthcare: A Systematic Literature Review, <em>Arun Aryal <\/em>and<em> Crystal Wu<\/em><\/li>\n\n\n\n<li>Vendor-Sided, Perceived Architectural and Outcome-Related Privacy Risks \u2013 Exploring Messaging Service Discontinuance, <em>Verena Kessler Verzar, Adeline Frenzel-Piasentin, Jason B. Thatcher, <\/em>and<em> Daniel J. Veit<\/em><\/li>\n\n\n\n<li>A Self-regulatory Framework of Security Fatigue: Antecedents and Implications on Security Behavior, <em>Akanksha Malik,&nbsp;Sanjay Goel,&nbsp;<\/em>and<em> Shuchi Sinha<\/em><\/li>\n\n\n\n<li>Harmonizing Espoused Privacy and Privacy Behavior: The Myth of the Privacy Paradox, <em>Jingyi Huang, Sanjay Goel, Alan Dennis, <\/em>and<em> Kevin Williams<\/em><\/li>\n\n\n\n<li>Value Based Objectives for Preventing Online Sex Trafficking, <em>Smriti Srivastava <\/em>and<em> Gurpreet Dhillon<\/em><\/li>\n<\/ul>\n\n\n\n<p>3:00pm\u20143:30pm, Coffee Break<\/p>\n\n\n\n<p><strong>PANEL DISCUSSION<\/strong> &#8220;Publishing Information Security and Privacy Research in Top Journals&#8221;<br>Panelists <em>France Belanger<\/em> (Virginia Tech), <em>Alec Cram<\/em> (University of Waterloo), <em>Huigang Liang<\/em> (University of Memphis), <em>Mikko Siponen<\/em> (University of Jyv\u00e4skyl\u00e4) | Moderator: <em>Bryan Hammer<\/em><br>3:30pm\u20144:20pm (Room B4 M5-6)<\/p>\n\n\n\n<p>4:20pm\u20144:30pm, Coffee Break<\/p>\n\n\n\n<p><strong>SESSION 3<\/strong> Track A Policy and Regulatory Issues in Cybersecurity | Chair: <em>Shuyuan Mary Ho Metcalfe<\/em><br>4:30pm\u20145:45pm (Room B4 M5-6)<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Beyond Economic and Financial Analyses: A revelatory study of IT security investment decision-making process (complete) <em>Rajiv Kohli, Suprateek Sarker, Mikko Siponen, Mari Karjalainen,<\/em> and <em>Xiuyan Shao<\/em><\/li>\n\n\n\n<li>Introducing Conversational Explanations as a Novel Response Strategy to Data Breach Incidents in Digital Commerce (complete) <em><em>Till Ole Diesterh\u00f6ft, Dennis Benner, <\/em>and<em> Benjamin Brauer<\/em><\/em><\/li>\n\n\n\n<li>Configuration and management of security procedures with dedicated \u2018spa-lang\u2019 domain language in security engineering (complete) <em><em>Tomasz Krym, Aneta Poniszewska-Maranda, \u0141ukasz Chom\u0105tek, <\/em>and<em> Jakub Ch\u0142api\u0144ski<\/em><\/em><\/li>\n<\/ul>\n\n\n\n<p><strong>SESSION 3<\/strong> Track B Privacy and Information Disclosure | Chair: <em>Christina Wagner<\/em><br>4:30pm\u20145:45pm (Room B3 M7-8)<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Cookie Intermediaries: Does Competition Leads to More Privacy? Evidence from the Dark Web (complete)<em> <em>Arion Cheong, Tawei Wang, <\/em>and<em> Daniel Sokol<\/em><\/em><\/li>\n\n\n\n<li>Exploring the Impact of Data Breaches and System Malfunctions on Users\u2019 Safety and Privacy Perceptions in the Context of Autonomous Vehicles (WIP) <em><em>Henrik Lechte <\/em>and<em> Jannes Heinrich Diedrich Menck<\/em><\/em><\/li>\n\n\n\n<li>Perceived Privacy Violations through Information Sharing with External Parties \u2013 Diving into User Perceptions and Reactions (complete) <em>Christina Wagner,&nbsp;Manuel Trenz,&nbsp;Chee-Wee Tan,&nbsp;<\/em>and<em>&nbsp;Daniel Veit<\/em><\/li>\n<\/ul>\n\n\n\n<p><strong>THE PROGRAM COMMITTEE&nbsp;<\/strong><br>Shuyuan Mary Ho Metcalfe (CO-CHAIR), Florida State University<br>Kane Smith (CO-CHAIR), University of North Texas<br>Alvaro Arenas, IE University<br>Yves Barlette, Montpellier Business School<br>Rui Chen, Iowa State University<br>Wei-Lun Chang, National Taipei University of Technology<br>Michael Curry (SIGSEC Past President), Oregon State University<br>Gurpreet Dhillon, University of North Texas<br>Andreas Eckhardt, University of Innsbruck<br>Adeline Frenzel-Piasentin, University of Augsburg<br>Steven Furnell, University of Nottingham<br>Craig Horne, The University of Melbourne&nbsp;<br>Matthew Jensen,&nbsp; University of Oklahoma<br>Hwee-Joo Kam, University of Tampa<br>Dan J. Kim, University of North Texas<br>Herbert J. Mattord, Kennesaw State University<br>Obi Ogbanufe (SIGSEC President), University of North Texas<br>Daniel Pienta, Baylor University<br>Mia Plachkinova, Kennesaw State University<br>Paolo Spagnoletti, Libera Universit\u00e0 Internazionale<br>Nishant Vishwamitra, University of Texas at San Antonio&nbsp;<br>Christina Wagner, University of Augsburg<br>Tianjian Zhang, City&nbsp;University&nbsp;of&nbsp;Hong Kong<\/p>\n\n\n\n<p><strong>VENUE<\/strong><br>WISP will be held at the AC Hotel Bella Sky Copenhagen, Denmark, in conjunction with the International Conference on Information Systems (ICIS) 2022. Please register using the conference registration site (attendees may register for WISP alone).<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/cybersecurity.fsu.edu\/wisp\/wp-content\/uploads\/2022\/12\/WISP2022Program.pdf\">THE PROGRAM<\/a><\/strong> | <a href=\"https:\/\/cybersecurity.fsu.edu\/wisp\/wp-content\/uploads\/2022\/12\/WISP2022Program.pdf\">PDF<\/a> DOWNLOAD<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>ACKNOWLEDGEMENT<\/strong><br>Thanks to Oregon State University\u2019s College of Business, Business Information Systems (BIS) Cybersecurity Management Program for its support of WISP.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hosted by AIS&nbsp;SIGSEC and&nbsp;Bright Internet THE PROGRAM | PDF DOWNLOAD WELCOME, SIGSEC President Obi Ogbanufe8:50am\u20149:00am (Room B4 M5-6) KEYNOTE ADDRESS Richard Baskerville, Regents\u2019 Professor and Board of Advisors Professor in the Department of Computer Information Systems, J. Mack Robinson College of Business at Georgia State University9:00am\u20149:50am (Room B4 M5-6) 9:50am\u201410:00am, Coffee Break SESSION 1 Track &#8230; <a title=\"Program (2022)\" class=\"read-more\" href=\"https:\/\/cybersecurity.fsu.edu\/wisp\/?page_id=391\" aria-label=\"Read more about Program (2022)\">Read more<\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-391","page","type-page","status-publish"],"_links":{"self":[{"href":"https:\/\/cybersecurity.fsu.edu\/wisp\/index.php?rest_route=\/wp\/v2\/pages\/391","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybersecurity.fsu.edu\/wisp\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cybersecurity.fsu.edu\/wisp\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cybersecurity.fsu.edu\/wisp\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurity.fsu.edu\/wisp\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=391"}],"version-history":[{"count":37,"href":"https:\/\/cybersecurity.fsu.edu\/wisp\/index.php?rest_route=\/wp\/v2\/pages\/391\/revisions"}],"predecessor-version":[{"id":517,"href":"https:\/\/cybersecurity.fsu.edu\/wisp\/index.php?rest_route=\/wp\/v2\/pages\/391\/revisions\/517"}],"wp:attachment":[{"href":"https:\/\/cybersecurity.fsu.edu\/wisp\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=391"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}