{"id":742,"date":"2024-12-05T11:23:43","date_gmt":"2024-12-05T11:23:43","guid":{"rendered":"https:\/\/cybersecurity.fsu.edu\/wisp\/?page_id=742"},"modified":"2024-12-12T15:29:18","modified_gmt":"2024-12-12T15:29:18","slug":"program-2024","status":"publish","type":"page","link":"https:\/\/cybersecurity.fsu.edu\/wisp\/?page_id=742","title":{"rendered":"Program"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Hosted by AIS&nbsp;SIGSEC<\/h2>\n\n\n\n<p><strong>THE PROGRAM<\/strong> | <a href=\"https:\/\/cybersecurity.fsu.edu\/wisp\/wp-content\/uploads\/2024\/12\/WISP2024Program-2024.12.12-FINAL.pdf\">PDF<\/a> DOWNLOAD<\/p>\n\n\n\n<p><strong>WELCOME<\/strong>, <em>SIGSEC President <\/em>Phil Menard<br>8:20am\u20148:30am<\/p>\n\n\n\n<p><strong>KEYNOTE ADDRESS<\/strong> Dr. Juan (Jane) Feng, Professor, Tsinghua University | Co-Guest Editor, MISQ Special Issue on AI-IA<br>8:30am\u20149:15am<\/p>\n\n\n\n<p><strong>SESSION 1<\/strong> Behavioral Cybersecurity 1 | Chair: Christina Wagner<br>9:15am\u201410:15am<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/cybersecurity.fsu.edu\/wisp\/wp-content\/uploads\/2024\/12\/WISP2024_paper_25.pdf\">Contextual Factors as Moderators of Demographic Effects on Phishing Victimization<\/a>, <em>Lina Zhou, Zhe Fu and Dongsong Zhang<\/em><\/li>\n\n\n\n<li><a href=\"https:\/\/cybersecurity.fsu.edu\/wisp\/wp-content\/uploads\/2024\/12\/WISP2024_paper_7.pdf\">Conceptualizing Mobile Security Mindfulness: A Mixed-Methods Research<\/a>, <em>Bowen Guan, Yangting Li and Carol Hsu<\/em><\/li>\n\n\n\n<li><a href=\"https:\/\/cybersecurity.fsu.edu\/wisp\/wp-content\/uploads\/2024\/12\/WISP2024_paper_16.pdf\">Wait, Is This Dangerous For Me? Consumers\u2019 Reactions to Data Breaches That Pose (No) Risk to Them<\/a>, <em>Frederic Schlackl and Florian Pethig<\/em><\/li>\n<\/ul>\n\n\n\n<p>10:15am\u201410:30am, Coffee Break<\/p>\n\n\n\n<p><strong>SESSION 2<\/strong> Behavioral Cybersecurity 2 | Chair: Adeline Frenzel-Piasentin<br>10:30am\u201411:30am<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/cybersecurity.fsu.edu\/wisp\/wp-content\/uploads\/2024\/12\/WISP2024_paper_19.pdf\">Contextual Influences on Phishing Susceptibility: A Qualitative Comparative Analysis<\/a>, <em>Fabian Hable, Bart van den Hooff and Nina-Birte Schirrmacher<\/em><\/li>\n\n\n\n<li><a href=\"https:\/\/cybersecurity.fsu.edu\/wisp\/wp-content\/uploads\/2024\/12\/WISP2024_paper_31.pdf\">The Spillover Effect of Workplace Cybersecurity Training on Home Cyber Hygiene<\/a>, <em>Weiyu Wang and Matthew Jensen<\/em><\/li>\n\n\n\n<li><a href=\"https:\/\/cybersecurity.fsu.edu\/wisp\/wp-content\/uploads\/2024\/12\/WISP2024_paper_18.pdf\">Examining Accounting Employees Information Security Policy Stress: Insights from the Justice and Responsibility Rationalization<\/a>, <em>Randi Jiang<\/em><\/li>\n<\/ul>\n\n\n\n<p><strong>POSTER SLAM SESSION<\/strong> | Chair: Sebastian Schuetz<br>11:30am\u201412:00pm<\/p>\n\n\n\n<p><strong>LUNCH BREAK<\/strong><br>12:00pm\u20141:00pm<\/p>\n\n\n\n<p id=\"block-18ae6017-ff43-4bc6-9c0e-33176790ee65\"><strong>AWARD CEREMONY<\/strong>, Co-Chairs: Phil Menard, Greg Bott, and Shuyuan Metcalfe<br>12:00pm\u20141:00pm<\/p>\n\n\n\n<p><strong>SESSION 3<\/strong> Organizational and Systemic Cybersecurity Challenges | Chair: Jonna J\u00e4rvel\u00e4inen<br>1:00pm\u20143:00pm<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/cybersecurity.fsu.edu\/wisp\/wp-content\/uploads\/2024\/12\/WISP2024_paper_28.pdf\">Corporate Governance and the Insider Threat: Investigating the Impact of Management Teams on Data Breaches<\/a>, <em>Miloslava Plachkinova and Prachi Gala<\/em><\/li>\n\n\n\n<li><a href=\"https:\/\/cybersecurity.fsu.edu\/wisp\/wp-content\/uploads\/2024\/12\/WISP2024_paper_5.pdf\">Moral Dynamics in the Age of Remote Work: Exploring the Role of Generational Shifts in Information Security<\/a>, <em>Patricia Akello, David Firth and Shawn Clouse<\/em><\/li>\n\n\n\n<li><a href=\"https:\/\/cybersecurity.fsu.edu\/wisp\/wp-content\/uploads\/2024\/12\/WISP2024_paper_14.pdf\">Boundary Uncertainty in Interorganizational Information Sharing<\/a>, <em>Christina Wagner, Manuel Trenz, Chee-Wee Tan and Daniel J. Veit<\/em><\/li>\n\n\n\n<li><a href=\"https:\/\/cybersecurity.fsu.edu\/wisp\/wp-content\/uploads\/2024\/12\/WISP2024_paper_6.pdf\">Measurement of Cybercrime Severity: A Victims\u2019 Perspective<\/a>, <em>Binod Kumar, Saji K. Mathew and Kandaswamy Paramasivan<\/em><\/li>\n\n\n\n<li><a href=\"https:\/\/cybersecurity.fsu.edu\/wisp\/wp-content\/uploads\/2024\/12\/WISP2024_paper_24.pdf\">Between Habit and Control\u2013Opening the Black Box of ISP Compliance Under Stress<\/a>, <em>Theresa Pfaff, Florian Rampold, Gilbert Hoevel and Jana Driller<\/em><\/li>\n\n\n\n<li><a href=\"https:\/\/cybersecurity.fsu.edu\/wisp\/wp-content\/uploads\/2024\/12\/WISP2024_paper_34.pdf\">Bystanders\u2019 Perceptions and Reporting Responses in Doxing Cases: The Influence of Online Social Dynamics<\/a>,<em>Yuan Fang<\/em><\/li>\n<\/ul>\n\n\n\n<p>3:00pm\u20143:20pm, Coffee Break<\/p>\n\n\n\n<p><strong>SESSION 4<\/strong> Generative AI and Emerging Cybersecurity Tools | Chair: Patricia Akello Perry<br>3:20pm\u20144:40pm<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/cybersecurity.fsu.edu\/wisp\/wp-content\/uploads\/2024\/12\/WISP2024_paper_15.pdf\">Integrating Generative AI in Cybersecurity: A Sensemaking Perspective<\/a>, <em>Hwee-Joo Kam, Allen Johnston, Wael Soliman and Chen Zhong<\/em><\/li>\n\n\n\n<li><a href=\"https:\/\/cybersecurity.fsu.edu\/wisp\/wp-content\/uploads\/2024\/12\/WISP2024_paper_23.pdf\">Using Generative AI for Cybersecurity Awareness Training in Healthcare<\/a>, <em>Dmitry Zhdanov, Thomas Caldera and Mary Elaine Califf<\/em><\/li>\n\n\n\n<li><a href=\"https:\/\/cybersecurity.fsu.edu\/wisp\/wp-content\/uploads\/2024\/12\/WISP2024_paper_21.pdf\">Human-Computer Interaction in Multimodal Fake News Detection<\/a>, <em>Mateusz Walczak and Aneta Poniszewska-Maranda<\/em><\/li>\n\n\n\n<li><a href=\"https:\/\/cybersecurity.fsu.edu\/wisp\/wp-content\/uploads\/2024\/12\/WISP2024_paper_32.pdf\">Experience and Efficiency in Vulnerability Resolution on Bug Bounty Platforms<\/a>, <em>Ali Ahmed, Brian Lee and Amit Deokar<\/em><\/li>\n<\/ul>\n\n\n\n<p><strong>POSTER SESSION<\/strong> | Chair: Sebastian Schuetz<br>exhibited during the entire workshop<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Categorizing Differences in Cyber Incident Definitions and The Impact on Regulatory Compliance, <em>Stuart Madnick and Angelica Marotta<\/em><\/li>\n\n\n\n<li>Comprehensive Analysis of Data Breaches and Compromised Data Classes: Trends and Implications from \u2018Have I Been Pwned\u2019 Dataset, <em>Abhishek Sharma and May Bantan<\/em><\/li>\n\n\n\n<li>How Human Behavior Can Mitigate AI-Generated Cybersecurity Threats&nbsp;, <em>Abdul Rahman Noordeen<\/em><\/li>\n\n\n\n<li>Building a Foundation in Cyber Hygiene and Privacy: A Study of Existing Frameworks and the Development of a Model Cybersecurity Curriculum for Primary School Students, <em>Srinivas Josyula and Abhishek Srivastava<\/em><\/li>\n\n\n\n<li>Bringing Ransomware to Light \u2013 Insights from the First Iteration of the Design of an Artifact to Collect Ransomware Real-World Data, <em>Gilbert Hoevel, Tim Brinkmeier, Lukas Sestendrup and Florian Rampold<\/em><\/li>\n\n\n\n<li>MorphDet: Towards the Detection of Morphing Attacks, <em>Jival Kapoor, Priyanka Singh and Manoranjan Mohanty<\/em><\/li>\n\n\n\n<li>Identifying Cybersecurity Threats Using Security Logs: A Review of SIEM Risk Estimates, <em>Adam Solomon, Michael Curry, Forough Shadbad and Byron Marshall<\/em><\/li>\n<\/ul>\n\n\n\n<p><strong>WORKSHOP CO-CHAIRS<\/strong><br>Philip Menard, The University of Texas at San Antonio<br>Greg Bott, The University of Alabama<br>Andy Green, Kennesaw State University<br>Shuyuan Mary Ho Metcalfe, Florida State University<\/p>\n\n\n\n<p><strong>THE PROGRAM COMMITTEE<\/strong><\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p>May Bantan, Kennesaw State University<br>Yves Barlette, Montpellier Business School<br>Mahesh Boodraj, Boise State University<br>Michael Curry, Oregon State University<br>Gurpreet Dhillon, University of North Texas<br>Adeline Frenzel-Piasentin, University of Augsburg<br>Saurabh Gupta, Kennesaw State University<br>Matthew Jensen, University of Oklahoma<br>Anjali Kaushik, MDI Gurgaon<br>Herb Mattord, Kennesaw State University<br>Arunabha Mukhopadhyay, IIM Lucknow<br>DeJarvis Oliver, North Carolina Agricultural &amp; Technical&nbsp;State University<br>Daniel Pienta, University of Tennessee, Knoxville<br>Jean-Loup Richet, Sorbonne business school<br>Mary B. Sumner, University of Oklahoma<br>Tawei (David) Wang, DePaul University<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p>Gunjan Batra, Kennesaw State University<br>Steven Furnell, University of Nottingham<br>Hwee-Joo Kam, University of Tampa<br>Mark Keith, Brigham Young University<br>Kent Marett, Mississippi State University<br>Sean Maynard, The University of Melbourne<br>Charles McElroy, Cleveland State University<br>Gregory Moody, University of Nevada, Las Vegas<br>Trevor Moores,&nbsp;Baruch College\/CUNY<br>Sumantra Sarkar, SUNY Binghamton<br>Paolo Spagnoletti, Luiss University<br>Carlos Torres, Baylor University<br>Christina Wagner, University of Augsburg<br>Tianjian Zhang, California State University Dominguez Hills<br>Lina Zhou, UNC Charlotte<\/p>\n<\/div>\n<\/div>\n\n\n\n<p><strong>VENUE<\/strong><br>WISP will be held at Queen\u2019s Park Marriott Marquis, Bangkok, Thailand, in conjunction with the International Conference on Information Systems (ICIS) 2024. Please register using the conference registration site (attendees may register for WISP alone).<\/p>\n\n\n\n<p><strong>THE PROGRAM<\/strong> | <a href=\"https:\/\/cybersecurity.fsu.edu\/wisp\/wp-content\/uploads\/2024\/12\/WISP2024Program-2024.12.12-FINAL.pdf\">PDF<\/a> DOWNLOAD<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hosted by AIS&nbsp;SIGSEC THE PROGRAM | PDF DOWNLOAD WELCOME, SIGSEC President Phil Menard8:20am\u20148:30am KEYNOTE ADDRESS Dr. Juan (Jane) Feng, Professor, Tsinghua University | Co-Guest Editor, MISQ Special Issue on AI-IA8:30am\u20149:15am SESSION 1 Behavioral Cybersecurity 1 | Chair: Christina Wagner9:15am\u201410:15am 10:15am\u201410:30am, Coffee Break SESSION 2 Behavioral Cybersecurity 2 | Chair: Adeline Frenzel-Piasentin10:30am\u201411:30am POSTER SLAM SESSION | &#8230; <a title=\"Program\" class=\"read-more\" href=\"https:\/\/cybersecurity.fsu.edu\/wisp\/?page_id=742\" aria-label=\"Read more about Program\">Read more<\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-742","page","type-page","status-publish"],"_links":{"self":[{"href":"https:\/\/cybersecurity.fsu.edu\/wisp\/index.php?rest_route=\/wp\/v2\/pages\/742","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybersecurity.fsu.edu\/wisp\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cybersecurity.fsu.edu\/wisp\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cybersecurity.fsu.edu\/wisp\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurity.fsu.edu\/wisp\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=742"}],"version-history":[{"count":8,"href":"https:\/\/cybersecurity.fsu.edu\/wisp\/index.php?rest_route=\/wp\/v2\/pages\/742\/revisions"}],"predecessor-version":[{"id":773,"href":"https:\/\/cybersecurity.fsu.edu\/wisp\/index.php?rest_route=\/wp\/v2\/pages\/742\/revisions\/773"}],"wp:attachment":[{"href":"https:\/\/cybersecurity.fsu.edu\/wisp\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=742"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}