{"id":93,"date":"2020-12-08T16:50:57","date_gmt":"2020-12-08T16:50:57","guid":{"rendered":"https:\/\/cybersecurity.fsu.edu\/wisp\/?page_id=93"},"modified":"2021-09-30T09:38:25","modified_gmt":"2021-09-30T09:38:25","slug":"program-wisp2020","status":"publish","type":"page","link":"https:\/\/cybersecurity.fsu.edu\/wisp\/?page_id=93","title":{"rendered":"Program (2020)"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Hosted by AIS\u00a0SIGSEC,\u00a0Bright Internet Global Summit (BIGS),\u00a0and\u00a0IFIP TC 11.1<\/h2>\n\n\n\n<p><strong>WELCOME AND KEYNOTE<\/strong><br>9:30am\u201410:45am EST (New York), December 12, 2020<br>3:30pm\u20144:45pm CET (Berlin)<br>8:00pm\u20149:15pm IST (Hyderabad)<br>1:30am\u20142:45am AEDT (Melbourne), December 13, 2020<\/p>\n\n\n\n<p><strong>Keynote speaker<\/strong>: <strong>Dr. Gurpreet Dhillon<\/strong>\u2014 &#8220;<em>Grand Challenges in Information Systems Security Research<\/em>&#8220;<\/p>\n\n\n\n<p>11:00am\u201412:00pm EST, Virtual Session 1, Chair <strong>Dr. Obi Ogbanufe<\/strong><\/p>\n\n\n\n<p><strong>Factors Affecting the Performance of Web Application Firewall<\/strong><br><em>Dainya Thomas-Reynolds and Sergey Butakov<\/em><\/p>\n\n\n\n<p><strong>Unlocking Risk Perception of Japanese Mobile Payment Users<\/strong><br><em>Wei-Lun Chang<\/em><\/p>\n\n\n\n<p><strong>The Bright and Dark Side of Financial Services Ecosystem<\/strong><br><em>Andrea Salvi, Paolo Spagnoletti, and Federica Ceci<\/em><\/p>\n\n\n\n<p><strong>The (Lacking) User Adoption of COVID-19 Contact Tracing Apps\u2014Insights from Switzerland and Germany<\/strong><br><em>Manus Bonner, Dana Naous, Christine Legner and Jo\u00ebl Wagner<\/em><\/p>\n\n\n\n<p>12:15pm\u20141:10pm EST, Virtual Session 2, Chair <strong>Dr. Shuyuan Mary Ho<\/strong><\/p>\n\n\n\n<p><strong>Deception against Deception: Toward a Deception Framework for Deception and Characterization of Covert Micro-targeting Campaigns on Online Social Networks<\/strong><br><em>J. Haadi Jafarian, Ersin Dincelli, Keith Guzik, Matthew Michaelis, Farnoush Banaei-Kashani, and Ashis Biswas<\/em><\/p>\n\n\n\n<p><strong>Toward Conceptualizing Perplexity in Cybersecurity: An Exploratory Study<\/strong><br><em>Malte Greulich, Sebastian Lins, Daniel Pienta, Jason Bennett Thatcher and Ali Sunyaev<\/em><\/p>\n\n\n\n<p><strong>Really, What Are They Offering? A Taxonomy of Companies&#8217; Actual Response Strategies after a Data Breach<\/strong><br><em>Till Diesterh\u00f6ft, Kristin Masuch, Maike Greve and Simon Trang<\/em><\/p>\n\n\n\n<p><strong>LUNCH BREAK<\/strong><br>1:10pm\u20141:45pm EST (New York), December 12, 2020<br>7:10pm\u20147:45pm CET (Berlin), December 12, 2020<br>11:40pm\u201412:15am IST (Hyderabad), December 13, 2020<br>5:10am\u20145:45am AEDT (Melbourne), December 13, 2020<\/p>\n\n\n\n<p>1:45pm\u20142:40pm EST, Virtual Session 3, Chair <strong>Dr. Mathew Jensen<\/strong><\/p>\n\n\n\n<p><strong>Improving Cybersecurity Behaviors: A Proposal for Analyzing Four Types of Phishing Training<\/strong><br><em>Alanah Mitchell<\/em><\/p>\n\n\n\n<p><strong>When Organizational Pressures Collide \u2013 Balancing Information Security Risk Management and Compliance<\/strong><br><em>Darwin M. Rivera and Alvaro Arenas<\/em><\/p>\n\n\n\n<p><strong>Information Security Compliance Regarding Security Culture, Job Satisfaction, and Perceived Organizational Support<\/strong><br><em>Zhen Sui McKnight, and Merrill Warkentin<\/em><\/p>\n\n\n\n<p>3:00pm\u20143:45pm EST, Virtual Session 4, Chair <strong>Dr. Sean Maynard<\/strong><\/p>\n\n\n\n<p><strong>Towards Governance of Information Security Incident Response<\/strong><br><em>Craig A Horne, Sean B Maynard and Atif Ahmad<\/em><\/p>\n\n\n\n<p><strong>Key Security and Privacy Related Factors Influencing the Use of Cloud Computing in SMEs<\/strong><br><em>Ruwan Nagahawatta and Matthew Warren<\/em><\/p>\n\n\n\n<p><strong>A Zero-Trust Federated Identity and Access Management Framework for Cloud and Cloud-based Computing Environments<\/strong><br><em>Monjur Ahmed and Krassie Petrova<\/em><\/p>\n\n\n\n<p><strong>CLOSING REMARKS<\/strong><br>3:45pm\u20144:15pm EST (New York), December 12, 2020<br>9:45pm\u201410:15pm CET (Berlin), December 12, 2020<br>2:15am\u20142:45am IST (Hyderabad), December 13, 2020<br>7:45am\u20148:15am AEDT (Melbourne), December 13, 2020<\/p>\n\n\n\n<p><strong>WORKSHOP CO-CHAIRS<\/strong><br>Sean Maynard, University of Melboure &lt;sean.maynard@unimelb.edu.au&gt;<br>Shuyuan Mary Ho, Florida State University &lt;smho@fsu.edu&gt;<br>Hwee-Joo Kam, University of Tampa &lt;hkam@ut.edu&gt;<br>Michael Curry, Oregon State University &lt;michael.curry@oregonstate.edu&gt;<\/p>\n\n\n\n<p><strong>VENUE<\/strong><br>AIS SIG SEC Pre-ICIS 2020 Workshop of Information Security and Privacy (WISP 2020) was held as a virtual session (Zoom link: <a href=\"https:\/\/us02web.zoom.us\/j\/82443302717?pwd=SzlZMEpCQSs5eko3RUExVW11eW4wQT09\">https:\/\/us02web.zoom.us\/j\/82443302717?pwd=SzlZMEpCQSs5eko3RUExVW11eW4wQT09<\/a>)&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hosted by AIS\u00a0SIGSEC,\u00a0Bright Internet Global Summit (BIGS),\u00a0and\u00a0IFIP TC 11.1 WELCOME AND KEYNOTE9:30am\u201410:45am EST (New York), December 12, 20203:30pm\u20144:45pm CET (Berlin)8:00pm\u20149:15pm IST (Hyderabad)1:30am\u20142:45am AEDT (Melbourne), December 13, 2020 Keynote speaker: Dr. Gurpreet Dhillon\u2014 &#8220;Grand Challenges in Information Systems Security Research&#8220; 11:00am\u201412:00pm EST, Virtual Session 1, Chair Dr. Obi Ogbanufe Factors Affecting the Performance of Web Application &#8230; <a title=\"Program (2020)\" class=\"read-more\" href=\"https:\/\/cybersecurity.fsu.edu\/wisp\/?page_id=93\" aria-label=\"Read more about Program (2020)\">Read more<\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-93","page","type-page","status-publish"],"_links":{"self":[{"href":"https:\/\/cybersecurity.fsu.edu\/wisp\/index.php?rest_route=\/wp\/v2\/pages\/93","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybersecurity.fsu.edu\/wisp\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cybersecurity.fsu.edu\/wisp\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cybersecurity.fsu.edu\/wisp\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurity.fsu.edu\/wisp\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=93"}],"version-history":[{"count":21,"href":"https:\/\/cybersecurity.fsu.edu\/wisp\/index.php?rest_route=\/wp\/v2\/pages\/93\/revisions"}],"predecessor-version":[{"id":194,"href":"https:\/\/cybersecurity.fsu.edu\/wisp\/index.php?rest_route=\/wp\/v2\/pages\/93\/revisions\/194"}],"wp:attachment":[{"href":"https:\/\/cybersecurity.fsu.edu\/wisp\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=93"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}