{"id":623,"date":"2023-11-16T01:00:36","date_gmt":"2023-11-16T01:00:36","guid":{"rendered":"https:\/\/cybersecurity.fsu.edu\/wisp\/?page_id=623"},"modified":"2024-02-04T14:39:26","modified_gmt":"2024-02-04T14:39:26","slug":"program-2023","status":"publish","type":"page","link":"https:\/\/cybersecurity.fsu.edu\/wisp\/?page_id=623","title":{"rendered":"Program (2023)"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Hosted by AIS&nbsp;SIGSEC<\/h2>\n\n\n\n<p><strong>THE PROGRAM<\/strong> | <a href=\"https:\/\/cybersecurity.fsu.edu\/wisp\/wp-content\/uploads\/2023\/12\/WISP2023Program.pdf\">PDF<\/a> DOWNLOAD<\/p>\n\n\n\n<p><strong>WELCOME<\/strong>, <em>SIGSEC President Shuyuan Mary Ho Metcalfe<\/em><br>8:50am\u20149:00am (Room MR 1.01)<\/p>\n\n\n\n<p><strong>KEYNOTE ADDRESS<\/strong>   <em>N. Rajendran<\/em>, Chief Digital Officer, Multi Commodity Exchange of India<br>9:00am\u20149:30am<\/p>\n\n\n\n<p><strong>PANEL DISCUSSION<\/strong> &#8220;Topic: Challenges of securing public digital infrastructure in India and beyond&#8221; | Moderator: Gurpreet Dhillon<br>9:30am\u201410:00am<\/p>\n\n\n\n<div class=\"wp-block-group is-vertical is-layout-flex wp-container-core-group-is-layout-8cf370e7 wp-block-group-is-layout-flex\">\n<p>Panelists include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>N Rajendran, Chief Digital Officer, Multi Commodity Exchange of India<\/li>\n\n\n\n<li>Sates Palagiri, Chief of Mobility Solutions at National Payments Corporation Of India (NPCI)<\/li>\n\n\n\n<li>Krishna Sastry Pendyala, Partner, Cybersecurity, Ernst &amp; Young (EY) LLP<\/li>\n\n\n\n<li>Prof. G Geethakumari, BITS Pilani<\/li>\n<\/ul>\n<\/div>\n\n\n\n<p>10:00am\u201410:15am, Coffee Break<\/p>\n\n\n\n<p><strong>SESSION 1<\/strong> Organizational Cybersecurity Considerations | Chair: Laura Georg Schaffner<br>10:15am\u201411:45am<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Effectiveness of organizational mitigations for cybersecurity, privacy, and IT failure risks of artificial intelligence, <em>Huseyin Tanriverdi and John-Patrick Akinyemi<\/em><\/li>\n\n\n\n<li>Optimization of investments in cybersecurity: A linear programming approach, <em>Swati Jain and Arunabha Mukhopadhyay<\/em><\/li>\n\n\n\n<li>Cybersecurity in contemporary organizations: A leadership challenge, <em>Gurpreet Dhillon and Rajiv Kohli<\/em><\/li>\n\n\n\n<li>Cyber security and risk disclosure: A literature review for theory and practice, <em>Laura Georg Schaffner, Patrizia Tettamanzi and Michael Murgolo<\/em><\/li>\n<\/ul>\n\n\n\n<p><strong>POSTER SLAM SESSION<\/strong> Chair: Andy Green<br>11:45am\u201412:15pm<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Achieving data privacy through legislation, <em>Ganesh J and Rajendra Bandi<\/em><\/li>\n\n\n\n<li>Understanding the impact of ransomware attack: A comprehensive study on evolution, detection and prevention techniques, challenges, <em>Rimpa Dutta<\/em><\/li>\n\n\n\n<li>Building inter-organizational information security management practices, <em>Hanna Paananen<\/em><\/li>\n\n\n\n<li>Healthcare security breaches in the United States: Insights and their socio-technical implications, <em>Megha Moncy, Sadia Afreen and Saptarshi Purkayastha<\/em><\/li>\n\n\n\n<li>The evolution of cybersecurity and information privacy laws and regulations: The case of India, <em>Simran Dhillon and Chandrashekar Challa<\/em><\/li>\n\n\n\n<li>Applications of big data technologies to cope with cybersecurity challenges, <em>Babak Safaei and Yufei Yuan<\/em><\/li>\n\n\n\n<li>Cybersecurity challenges due to the unethical exploitation of AI by Generation Z, <em>Saksham Shori, Gurpreet Dhillon, Kane Smith and Joti Kaur<\/em><\/li>\n\n\n\n<li>From likes to shields: The influencer effect on cybersecurity awareness, <em>Srinivas Josyula and Abhishek Srivastava<\/em><\/li>\n\n\n\n<li>Implications of India\u2019s privacy regulation on telehealth, <em>Shubha Krishnamurthy and Rajendra K. Bandi<\/em><\/li>\n\n\n\n<li>Cyber-risk management framework for ransomware attacks, <em>Kalpit Sharma<\/em><\/li>\n<\/ul>\n\n\n\n<p><strong>LUNCH BREAK<\/strong><br>12:15pm\u20141:15pm<\/p>\n\n\n\n<p><strong>AWARD CEREMONY<\/strong>, Co-Chairs <em>Shuyuan Mary Ho Metcalfe<\/em> and Andy Green<br>12:15pm\u20141:15pm<\/p>\n\n\n\n<p><strong>SESSION 2<\/strong> Behavioral Cybersecurity | Chair: Deepti Agrawal<br>1:15pm\u20143:15pm<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Information security policy violations in the work-from-home era, <em>Balagopal N and Saji Mathew<\/em><\/li>\n\n\n\n<li>What technical and professional skills are needed for cybersecurity roles?, <em>Mary Sumner, Chris Maurer, Dan Mazzola and Keri Pearlson<\/em><\/li>\n\n\n\n<li>Understanding Generation Z\u2019s information security behaviors regarding penalties, pressures and perceived effectiveness, <em>Alisha Madhuvarshi, Kane Smith, Gurpreet Dhillon and Joti Kaur<\/em><\/li>\n\n\n\n<li>Protection against phishing attacks on social networks with use of selected machine learning, <em>Aneta Poniszewska-Maranda and Aleksander Lemiesz<\/em><\/li>\n\n\n\n<li>To follow the rules or break them: A rule following perspective, <em>Darin Hodges, Deepti Agrawal and Russell Haines<\/em><\/li>\n\n\n\n<li>How to avoid medication errors \u2013 Investigating the roles of policies and nudging from a stress perspective, <em>Gilbert G. H\u00f6vel, Ilja Nastjuk, Simon Trang and Tizian Matschak<\/em><\/li>\n<\/ul>\n\n\n\n<p>3:15pm\u20143:30pm, Coffee Break<\/p>\n\n\n\n<p><strong>SESSION 3<\/strong> Societal Security and Privacy Issues | Chair: Kane Smith<br>3:30pm\u20145:10pm<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Antecedents and outcomes of information privacy concerns: A replication study in rural India, <em>Manjinder Kaur, Gurpreet Dhillon, Kane Smith and Joti Kaur<\/em><\/li>\n\n\n\n<li>A bibliometric analysis of privacy concepts based on Westin information privacy eras, <em>Eric Di Benedetto and Alain Cucchi<\/em><\/li>\n\n\n\n<li>Escaping the echo: Understanding the impact of social media on over concentration of emerging technology security threats, <em>Harsh Parekh and Paras Bhatt<\/em><\/li>\n\n\n\n<li>Examining the influence of moral foundations on polarization in social media discourse: A context of vigilantism, <em>Shalini Kapali Kurumathur, Rohit Valecha, Govind Hariharan and H. Raghav Rao<\/em><\/li>\n\n\n\n<li>Cloud optimization for disinformation detection and news veracity, <em>Lumbardha Hasimi and Aneta Poniszewska-Maranda<\/em><\/li>\n<\/ul>\n\n\n\n<p><strong>WORKSHOP CO-CHAIRS<\/strong><br>Shuyuan Mary Ho Metcalfe, Florida State University<br>Philip Menard, The University of Texas at San Antonio<br>Andy Green, Kennesaw State University<br>Obi Ogbanufe, University of North Texas<\/p>\n\n\n\n<p><strong>THE PROGRAM COMMITTEE<\/strong><\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p>Alvaro Arenas, IE Business School<br>Yves Barlette, Montpellier Business School<br>Gunjan Batra, Kennesaw State University<br>Anitha Chennamaneni, Texas A&amp;M University &#8211; Central Texas<br>Gurpreet Dhillon, University of North Texas<br>Andreas Eckhardt, University of Innsbruck<br>Steven Furnell, University of Nottingham<br>Matthew Jensen, University of Oklahoma<br>Hwee-Joo Kam, University of Tampa<br>Mark Keith, Brigham Young University<br>Brett J. L. Landry, University of Dallas<br>Herb Mattord, Kennesaw State University<br>Sean Maynard, The University of Melbourne<br>Arunabha Mukhopadhyay, Indian Institute of Management (IIM) Lucknow<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p>Marko Ilmari Niemimaa, University of Agder<br>Daniel Pienta, University of Tennessee, Knoxville<br>Jean-Loup Richet, Sorbonne Business School<br>Sumantra Sarkar, SUNY Binghamton<br>Kalpit Sharma, Indian Institute of Management Amritsar<br>Kane Smith, University of North Texas<br>Paolo Spagnoletti, Luiss University<br>Mary B. Sumner, University of Oklahoma<br>Gurvirender Tejay, University of Colorado at Colorado Springs<br>Tawei (David) Wang, DePaul University<br>Tianjian Zhang, California State University Dominguez Hills<br>Lina Zhou, UNC Charlotte<\/p>\n<\/div>\n<\/div>\n\n\n\n<p><strong>VENUE<\/strong><br>WISP will be held at Hyderabad International Convention Centre (HICC), Hyderabad, India, in conjunction with the International Conference on Information Systems (ICIS) 2023. Please register using the conference registration site (attendees may register for WISP alone).<\/p>\n\n\n\n<p><strong>THE PROGRAM<\/strong> | <a href=\"https:\/\/cybersecurity.fsu.edu\/wisp\/wp-content\/uploads\/2023\/12\/WISP2023Program.pdf\">PDF<\/a> DOWNLOAD<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>ACKNOWLEDGEMENT<\/strong><br>Thanks to the Department of Information Systems and Security, Coles College of Business, Kennesaw State University for its support of WISP.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"792\" height=\"433\" src=\"https:\/\/cybersecurity.fsu.edu\/wisp\/wp-content\/uploads\/2023\/11\/SB_3Clr_Coles_Dept-of-Info-Systems-and-Security_Logo.png\" alt=\"\" class=\"wp-image-635\"\/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Hosted by AIS&nbsp;SIGSEC THE PROGRAM | PDF DOWNLOAD WELCOME, SIGSEC President Shuyuan Mary Ho Metcalfe8:50am\u20149:00am (Room MR 1.01) KEYNOTE ADDRESS N. Rajendran, Chief Digital Officer, Multi Commodity Exchange of India9:00am\u20149:30am PANEL DISCUSSION &#8220;Topic: Challenges of securing public digital infrastructure in India and beyond&#8221; | Moderator: Gurpreet Dhillon9:30am\u201410:00am Panelists include: 10:00am\u201410:15am, Coffee Break SESSION 1 Organizational &#8230; <a title=\"Program (2023)\" class=\"read-more\" href=\"https:\/\/cybersecurity.fsu.edu\/wisp\/?page_id=623\" aria-label=\"Read more about Program (2023)\">Read more<\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-623","page","type-page","status-publish"],"_links":{"self":[{"href":"https:\/\/cybersecurity.fsu.edu\/wisp\/index.php?rest_route=\/wp\/v2\/pages\/623","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybersecurity.fsu.edu\/wisp\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cybersecurity.fsu.edu\/wisp\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cybersecurity.fsu.edu\/wisp\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurity.fsu.edu\/wisp\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=623"}],"version-history":[{"count":33,"href":"https:\/\/cybersecurity.fsu.edu\/wisp\/index.php?rest_route=\/wp\/v2\/pages\/623\/revisions"}],"predecessor-version":[{"id":711,"href":"https:\/\/cybersecurity.fsu.edu\/wisp\/index.php?rest_route=\/wp\/v2\/pages\/623\/revisions\/711"}],"wp:attachment":[{"href":"https:\/\/cybersecurity.fsu.edu\/wisp\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=623"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}