<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=Windows-1252">
<style type="text/css" style="display:none;"> P {margin-top:0;margin-bottom:0;} </style>
</head>
<body dir="ltr">
<div class="elementToProof" style="font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, Calibri, Helvetica, sans-serif; font-size: 12pt; color: rgb(0, 0, 0);">
A kind reminder of the workshop (deadline for submissions April 30). </div>
<div class="elementToProof" style="font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, Calibri, Helvetica, sans-serif; font-size: 12pt; color: rgb(0, 0, 0);">
<br>
</div>
<div class="elementToProof" style="font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, Calibri, Helvetica, sans-serif; font-size: 12pt; color: rgb(0, 0, 0);">
<b>Professor Mikko Siponen (University of Alabama) has agreed to give a keynote at the event!
</b>Professor Siponen is one of the leading scholars in the human aspects of cybersecurity. See<b>
</b><a href="https://scholar.google.fi/citations?user=lG0VhooAAAAJ&hl=fi&oi=ao" id="LPlnk434810">https://scholar.google.fi/citations?user=lG0VhooAAAAJ&hl=fi&oi=ao</a></div>
<div id="appendonsend"></div>
<hr style="display:inline-block;width:98%" tabindex="-1">
<div id="divRplyFwdMsg" dir="ltr"><font face="Calibri, sans-serif" style="font-size:11pt" color="#000000"><b>Lähettäjä:</b> Marko Ilmari Niemimaa<br>
<b>Lähetetty:</b> perjantai 8. maaliskuuta 2024 9.21<br>
<b>Vastaanottaja:</b> IRIS@lists.aisnet.org <iris@lists.aisnet.org><br>
<b>Aihe:</b> CfP ECIS 2024 SIGSEC Workshop: Reconsidering assumptions about the human role in cybersecurity and privacy research</font>
<div> </div>
</div>
<style type="text/css" style="display:none">
<!--
p
        {margin-top:0;
        margin-bottom:0}
-->
</style>
<div dir="ltr">
<div class="x_elementToProof" style="font-family:Aptos,Aptos_EmbeddedFont,Aptos_MSFontService,Calibri,Helvetica,sans-serif; font-size:12pt; color:rgb(0,0,0)">
Dear colleagues,</div>
<div class="x_elementToProof" style="font-family:Aptos,Aptos_EmbeddedFont,Aptos_MSFontService,Calibri,Helvetica,sans-serif; font-size:12pt; color:rgb(0,0,0)">
<br>
</div>
<div class="x_elementToProof" style="font-family:Aptos,Aptos_EmbeddedFont,Aptos_MSFontService,Calibri,Helvetica,sans-serif; font-size:12pt; color:rgb(0,0,0)">
please, consider submitting.</div>
<div class="x_elementToProof" style="font-family:Aptos,Aptos_EmbeddedFont,Aptos_MSFontService,Calibri,Helvetica,sans-serif; font-size:12pt; color:rgb(0,0,0)">
<br>
</div>
<p class="x_elementToProof" style="margin-top:0px; margin-bottom:0px"><span style="font-family:Aptos,Aptos_EmbeddedFont,Aptos_MSFontService,Calibri,Helvetica,sans-serif; font-size:12pt; color:rgb(0,0,0)">---</span></p>
<p class="x_elementToProof" style="margin-top:0px; margin-bottom:0px"><span style="font-family:"Calibri",sans-serif; font-size:11pt; color:rgb(0,0,0)"><b>CFP: ECIS 2024 SIGSEC Workshop: Reconsidering assumptions about the human role in cybersecurity and privacy
 research</b></span></p>
<p class="x_elementToProof" style="margin:0cm 0cm 8pt"><span style="font-family:"Calibri",sans-serif; font-size:11pt; color:rgb(0,0,0)"><b>June 16, 2024, Paphos, Cyprus</b></span></p>
<p class="x_elementToProof" style="margin:0cm 0cm 8pt"><span style="font-family:"Calibri",sans-serif; font-size:11pt; color:rgb(0,0,0)">Submissions:
<a href="mailto:ecis2024-sigsec@jyu.fi" id="OWA4ae08abd-9882-c95b-19f9-796dbfcdbfd3" class="x_OWAAutoLink" data-loopstyle="linkonly" style="margin-top:0px; margin-bottom:0px">
ecis2024-sigsec@jyu.fi</a></span></p>
<p style="margin:0cm 0cm 8pt"><span style="font-family:"Calibri",sans-serif; font-size:11pt; color:black">In cyber security research, the role of “human” is often discussed with a negative undertone, framing employees as ‘insider threats’, ‘computer abusers’,
 or ‘cyber deviants’ when they do not comply with the prescribed security rules. Whether the negative perspective is a paradigm (Morgan, 1980) can be discussed, but there are certain prevalent metaphors such as the human being “the weakest link” in the information
 security chain. Using criminological theories, such as deterrence and neutralization theory, persuades us to accept the assumption that a non-compliant employee is performing a “white collar crime” (Straub, 1989, p.154). Further, to Morgan’s (1980) classification,
 suggesting intimidating employees into compliance with punishment </span><span style="font-family:"Calibri",sans-serif; font-size:11pt; color:rgb(0,0,0)">and fear appeals has become a de facto
</span><span style="font-family:"Calibri",sans-serif; font-size:11pt; color:black">puzzle-solving (i.e. specific solutions to specific problems)
</span><span style="font-family:"Calibri",sans-serif; font-size:11pt; color:rgb(0,0,0)">practice.</span></p>
<p style="margin:0cm 0cm 8pt"><span style="font-family:"Calibri",sans-serif; font-size:11pt; color:black">What if, when discussing puzzle-solving solutions, we would discuss incentives instead of sanctions? On the metaphor level, what if we researchers challenged
 the negative assumptions behind deterrence, neutralization, and protection motivation theories and replaced them with self-determination theory or socio-technical approaches? Self-determination theory by Deci and Ryan
</span><span style="font-family:"Times New Roman",serif; font-size:11pt; color:rgb(0,0,0)">(1980)</span><span style="font-family:"Calibri",sans-serif; font-size:11pt; color:black"> argues that people have an intrinsic need for autonomy, competence, and relatedness.
 This triad could translate to inspiring aspects such as empowering with knowledge, the joy of gamifying, and a sense of community.</span></p>
<p style="margin:0cm"><span style="font-family:"Calibri",sans-serif; font-size:11pt; color:rgb(0,0,0)">Or if we use some other metaphors such as Johnston et al. (2019) “It takes a village” or the idea of security as a team sport (Yoo et al., 2020) or ‘human-as-solution’(Zimmermann
 & Renaud, 2019)? We would view humans as valuable actors, and first responders to security threats. This kind of imagery is needed for the empowerment of humans as an integral part of an information security management system.</span></p>
<p style="margin:0cm 0cm 8pt"><span style="font-family:"Calibri",sans-serif; font-size:11pt; color:black">We invite papers problematizing the negative assumptions and solutions, or even the way of seeing the reality in cyber security as well as privacy research,
 whether they employ qualitative, quantitative, conceptual, or other research approaches</span></p>
<p style="margin:0cm 0cm 8pt"><span style="font-family:"Calibri",sans-serif; font-size:11pt; color:black">Interesting topics include (but are not limited to):</span></p>
<ul data-editing-info="{"unorderedStyleType":2}" style="margin-top:0cm; margin-right:0cm">
<li style="font-family:Aptos,Aptos_EmbeddedFont,Aptos_MSFontService,Calibri,Helvetica,sans-serif; font-size:12pt; color:rgb(0,0,0); line-height:107%; margin:0cm 0cm 0cm 36pt; list-style-type:"- "">
<span style="font-family:"Calibri",sans-serif; font-size:11pt; color:black">Problematizing current imagery of the human role in security and privacy</span></li><li style="font-family:"Calibri",sans-serif; font-size:11pt; color:rgb(0,0,0); line-height:107%; margin:0cm 0cm 0cm 36pt; list-style-type:"- "">
<span style="font-family:"Calibri",sans-serif; font-size:11pt; color:black">Intrinsic and extrinsic motivation to improve security and privacy behavior</span></li><li style="font-family:"Calibri",sans-serif; font-size:11pt; color:rgb(0,0,0); line-height:107%; margin:0cm 0cm 0cm 36pt; list-style-type:"- "">
<span style="font-family:"Calibri",sans-serif; font-size:11pt; color:black">Community and team approach to improve security and privacy behavior</span></li><li style="font-family:"Calibri",sans-serif; font-size:11pt; color:rgb(0,0,0); line-height:107%; margin:0cm 0cm 0cm 36pt; list-style-type:"- "">
<span style="font-family:"Calibri",sans-serif; font-size:11pt; color:black">Gamification in security and privacy</span></li><li style="font-family:"Calibri",sans-serif; font-size:11pt; color:rgb(0,0,0); line-height:107%; margin:0cm 0cm 0cm 36pt; list-style-type:"- "">
<span style="font-family:"Calibri",sans-serif; font-size:11pt; color:black">Empowering humans in security and privacy</span></li><li style="font-family:"Calibri",sans-serif; font-size:11pt; color:rgb(0,0,0); line-height:107%; margin:0cm 0cm 8pt 36pt; list-style-type:"- "">
<span style="font-family:"Calibri",sans-serif; font-size:11pt; color:black">AI in cybersecurity and privacy</span></li></ul>
<p style="margin:0cm 0cm 8pt"><span style="font-family:"Calibri",sans-serif; font-size:11pt; color:black">Format: We invite short abstracts (max 500 words) and extended abstracts (max 5000 words) to this paper development workshop. We welcome both papers in
 the early phase from authors who wish to expose their ideas for discussion and more well-developed manuscripts from authors who wish to present and discuss their arguments before submission to a journal.</span></p>
<p style="margin:0cm 0cm 8pt"><span style="font-family:"Calibri",sans-serif; font-size:11pt; color:black">All accepted submissions will be shortly presented to the audience (“pitch talks”) and then discussed in roundtable sessions so that more discussion time
 is allocated to extended abstracts.</span></p>
<p class="x_elementToProof" style="margin:0cm 0cm 8pt"><span style="font-family:"Calibri",sans-serif; font-size:11pt; color:rgb(0,0,0)">Important dates:</span></p>
<p style="margin:0cm 0cm 8pt"><span style="font-family:"Calibri",sans-serif; font-size:11pt; color:black"><b>Submission deadline</b>: April 30, 2024<br>
<b>Peer feedback deadline:</b> May 21, 2024<br>
<br>
</span></p>
<p style="margin:0cm 0cm 8pt"><span style="font-family:"Calibri",sans-serif; font-size:11pt; color:rgb(0,0,0)">On behalf of the workshop organizing committee</span></p>
<p style="margin:0cm 0cm 8pt"><span style="font-family:"Calibri",sans-serif; font-size:11pt; color:black">Jonna Järveläinen, Associate Professor, University of Jyväskylä and Turku, Finland,
</span><span style="font-family:"Calibri",sans-serif; font-size:11pt; color:rgb(0,0,0)"><a href="mailto:jonna.k.jarvelainen@jyu.fi" id="OWA0e4401b4-dec3-dd6d-c491-3e0b4c06a538" class="x_OWAAutoLink" data-loopstyle="linkonly" style="margin-top:0px; margin-bottom:0px">jonna.k.jarvelainen@jyu.fi</a></span><span style="font-family:"Calibri",sans-serif; font-size:11pt; color:black"> (primary
 contact person)</span></p>
<p style="margin:0cm 0cm 8pt"><span style="font-family:"Calibri",sans-serif; font-size:11pt; color:black">Wael Soliman, Associate Professor, University of Agder, Norway,
</span><span style="font-family:"Calibri",sans-serif; font-size:11pt; color:rgb(0,0,0)"><a href="mailto:wael.soliman@uia.no" id="OWA3cd38d9d-3b1e-3cea-3022-920ad08bacde" class="x_OWAAutoLink" data-loopstyle="linkonly" style="margin-top:0px; margin-bottom:0px">wael.soliman@uia.no</a></span></p>
<p style="margin:0cm 0cm 8pt"><span style="font-family:"Calibri",sans-serif; font-size:11pt; color:black">Paolo Spagnoletti, Associate Professor, LUISS, Italy and University of Agder, Norway,
</span><span style="font-family:"Calibri",sans-serif; font-size:11pt; color:rgb(0,0,0)"><a href="mailto:pspagnoletti@luiss.it" id="OWAecd6e34f-2e0b-e036-bfad-58f5935d9bca" class="x_OWAAutoLink" data-loopstyle="linkonly" style="margin-top:0px; margin-bottom:0px">pspagnoletti@luiss.it</a></span></p>
<p style="margin:0cm 0cm 8pt"><span style="font-family:"Calibri",sans-serif; font-size:11pt; color:black">Marko Niemimaa, Associate Professor, University of Agder, Norway,
</span><span style="font-family:"Calibri",sans-serif; font-size:11pt; color:rgb(0,0,0)"><a href="mailto:marko.niemimaa@uia.no" id="OWA4ed3266d-37e5-fa12-0ddf-e5014f4f2753" class="x_OWAAutoLink" data-loopstyle="linkonly" style="margin-top:0px; margin-bottom:0px">marko.niemimaa@uia.no</a></span></p>
<p style="margin:0cm 0cm 8pt"><span style="font-family:"Calibri",sans-serif; font-size:11pt; color:black">João Baptista, Professor, University of Lancaster, UK,
</span><span style="font-family:"Calibri",sans-serif; font-size:11pt; color:rgb(0,0,0)"><a href="mailto:j.baptista@lancaster.as.uk" id="OWA50fff743-b4cf-5813-f74f-a8014da345ec" class="x_OWAAutoLink" data-loopstyle="linkonly" style="margin-top:0px; margin-bottom:0px">j.baptista@lancaster.as.uk</a></span></p>
<p style="margin:0cm 0cm 8pt"><span style="font-family:"Calibri",sans-serif; font-size:11pt; color:black">Shuyuan Metcalfe, Associate Professor, Florida State University, USA,
</span><span style="font-family:"Calibri",sans-serif; font-size:11pt; color:rgb(0,0,0)"><a href="mailto:smho@fsu.edu" id="OWA3e0be655-6607-2821-ad23-ff1a10ec4177" class="x_OWAAutoLink" data-loopstyle="linkonly" style="margin-top:0px; margin-bottom:0px">smho@fsu.edu</a></span></p>
<p style="margin:0cm 0cm 8pt"><span style="font-family:"Calibri",sans-serif; font-size:11pt; color:rgb(0,0,0)"> </span></p>
<div class="x_elementToProof" style="font-family:Aptos,Aptos_EmbeddedFont,Aptos_MSFontService,Calibri,Helvetica,sans-serif; font-size:12pt; color:rgb(0,0,0)">
<br>
</div>
<div class="x_elementToProof" style="font-family:Aptos,Aptos_EmbeddedFont,Aptos_MSFontService,Calibri,Helvetica,sans-serif; font-size:12pt; color:rgb(0,0,0)">
---</div>
<div class="x_elementToProof" style="font-family:Aptos,Aptos_EmbeddedFont,Aptos_MSFontService,Calibri,Helvetica,sans-serif; font-size:12pt; color:rgb(0,0,0)">
<br>
</div>
<div id="x_Signature">
<p><span style="font-family:Calibri,Arial,Helvetica,sans-serif; font-size:12pt; color:rgb(0,0,0)"><b>---</b></span></p>
<p><span style="font-family:Calibri,Arial,Helvetica,sans-serif; font-size:12pt; color:rgb(0,0,0)"><b>Dr. Marko Niemimaa</b></span></p>
<p><span style="font-family:Calibri,Arial,Helvetica,sans-serif; font-size:12pt; color:rgb(0,0,0)">Associate Professor<br>
Information Systems<br>
<b>University of Agder</b><br>
Tlf: +47 38 14 18 42<br>
email: marko.niemimaa@uia.no<br>
<a href="http://www.uia.no/en" target="_self" id="OWAab587307-0883-b442-69be-7edc986efd1c" class="x_OWAAutoLink" data-loopstyle="linkonly" style="margin-top:0px; margin-bottom:0px">www.uia.no/en</a><br>
<a href="https://www.uia.no/en/kk/profile/markoin" id="OWAea18bab9-8242-9dc6-1ec4-de0eaaecd089" class="x_OWAAutoLink" data-loopstyle="linkonly" style="margin-top:0px; margin-bottom:0px">https://www.uia.no/en/kk/profile/markoin</a></span></p>
<span style="font-family:Calibri,Arial,Helvetica,sans-serif; font-size:12pt; color:rgb(0,0,0)"><br>
</span></div>
</div>
</body>
</html>