00594nas a2200145 4500008004100000245011300041210006900154260000900223653000800232100002100240700001800261700001500279700001800294856013600312 2023 eng d00aBest of Both Worlds: The Inclusion of Gamification in Virtual Lab Environments to Increase Educational Value0 aBest of Both Worlds The Inclusion of Gamification in Virtual Lab c202310aBIS1 aShadbad, Forough1 aBahr, Gabriel1 aLuse, Andy1 aHammer, Bryan u/biblio/best-both-worlds-inclusion-gamification-virtual-lab-environments-increase-educational-value00463nas a2200121 4500008004100000245007300041210006900114260000900183653000800192100001500200700002100215856010500236 2023 eng d00aHackalytics: Using Computer Hacking to Engage Students in Analytics0 aHackalytics Using Computer Hacking to Engage Students in Analyti c202310aBIS1 aLuse, Andy1 aShadbad, Forough u/biblio/hackalytics-using-computer-hacking-engage-students-analytics01853nas a2200169 4500008004100000245008700041210006900128260004200197520122100239653001501460653000801475100002001483700002101503700001901524700001701543856012301560 2022 eng d00aDo Measures of Security Compliance Intent Equal Non-Compliance Scenario Agreement?0 aDo Measures of Security Compliance Intent Equal NonCompliance Sc aCopenhagen, Denmark, Dec. 2022c20223 aTo better protect organizations from the threat of insiders, IS security (ISS) research frequently emphasizes IS Security Policy (ISP) behavior. The effectiveness of an assessment model is typically analyzed either using short survey statements (behavior survey) or by using scenario agreement (prospective scenario) to measure current and prospective compliance (or non-compliance) behavior. However, a significant gap is the lack of statistical evidence to demonstrate that these two measures or dependent variables (DV) sufficiently agree with one another. We report on an effort to compare and contrast two assessment models which employed alternate styles of DVs and demonstrate that the primary construct from two different ISS behavioral theories had approximately the same effect size on either of the DVs. Our findings add support for substantial (but not overly correlated) synchronization between the two DV values, since we also observe that the prospective scenario non-compliance measure resulted in lower model fit while the behavior survey compliance measures fit both models with higher accuracy. We discuss our findings and recommend that for many studies there can be value in employing both DVs.10aAccounting10aBIS1 aMarshall, Byron1 aShadbad, Forough1 aCurry, Michael1 aBiros, David u/biblio/do-measures-security-compliance-intent-equal-non-compliance-scenario-agreement01771nas a2200169 4500008004100000245008700041210006900128260004200197520122100239653001501460653000801475100002001483700002101503700001901524700001701543856004101560 2022 eng d00aDo Measures of Security Compliance Intent Equal Non-Compliance Scenario Agreement?0 aDo Measures of Security Compliance Intent Equal NonCompliance Sc aCopenhagen, Denmark, Dec. 2022c20223 aTo better protect organizations from the threat of insiders, IS security (ISS) research frequently emphasizes IS Security Policy (ISP) behavior. The effectiveness of an assessment model is typically analyzed either using short survey statements (behavior survey) or by using scenario agreement (prospective scenario) to measure current and prospective compliance (or non-compliance) behavior. However, a significant gap is the lack of statistical evidence to demonstrate that these two measures or dependent variables (DV) sufficiently agree with one another. We report on an effort to compare and contrast two assessment models which employed alternate styles of DVs and demonstrate that the primary construct from two different ISS behavioral theories had approximately the same effect size on either of the DVs. Our findings add support for substantial (but not overly correlated) synchronization between the two DV values, since we also observe that the prospective scenario non-compliance measure resulted in lower model fit while the behavior survey compliance measures fit both models with higher accuracy. We discuss our findings and recommend that for many studies there can be value in employing both DVs.10aAccounting10aBIS1 aMarshall, Byron1 aShadbad, Forough1 aCurry, Michael1 aBiros, David uhttps://aisel.aisnet.org/wisp2022/1900589nas a2200157 4500008004100000245009300041210006900134260000900203300000900212653000800221100002200229700001700251700002100268700001900289856012300308 2022 eng d00aGenerational Differences in Perceiving the Technology Interruptions: A qualitative Study0 aGenerational Differences in Perceiving the Technology Interrupti c2022 a1-2110aBIS1 aKalgotra, Pankush1 aBaham, Corey1 aShadbad, Forough1 aSharda, Ramesh u/biblio/generational-differences-perceiving-technology-interruptions-qualitative-study00578nas a2200121 4500008004100000245015200041210006900193260000900262653000800271100001800279700002100297856013800318 2022 eng d00aPsychological Contract Violations on Information Disclosure: A study of Interpersonal Arrangements and Trust Transference in Social Media Platforms0 aPsychological Contract Violations on Information Disclosure A st c202210aBIS1 aHammer, Bryan1 aShadbad, Forough u/biblio/psychological-contract-violations-information-disclosure-study-interpersonal-arrangements-and00839nas a2200169 4500008004100000245009300041210006900134260004200203520019900245653001500444653000800459100001900467700002000486700002100506700001900527856012300546 2022 eng d00aWill SOC Telemetry Data Improve Predictive Models of User Riskiness? A Work in Progress0 aWill SOC Telemetry Data Improve Predictive Models of User Riskin aCopenhagen, Denmark, Dec. 2022c20223 aThis extended abstract describes our planned efforts to usefully integrate psychometric and telemetry data to help identify cybersecurity risks and more effectively analyze cybersecurity events.10aAccounting10aBIS1 aCurry, Michael1 aMarshall, Byron1 aShadbad, Forough1 aHong, Sanghyun u/biblio/will-soc-telemetry-data-improve-predictive-models-user-riskiness-work-progress00502nas a2200121 4500008004100000245008900041210006900130260000900199653000800208100002100216700001700237856012600254 2021 eng d00aDoes Technostress Triger Insider Threat? A conceptual Model and Mitigation Solutions0 aDoes Technostress Triger Insider Threat A conceptual Model and M c202110aBIS1 aShadbad, Forough1 aBiros, David u/biblio/does-technostress-triger-insider-threat-conceptual-model-and-mitigation-solutions00512nas a2200121 4500008004100000245009500041210006900136260000900205653000800214100002100222700001700243856013000260 2021 eng d00aUnderstanding Employee Information Security Policy Compliance from Role Theory Perspective0 aUnderstanding Employee Information Security Policy Compliance fr c202110aBIS1 aShadbad, Forough1 aBiros, David u/biblio/understanding-employee-information-security-policy-compliance-role-theory-perspective00529nas a2200133 4500008004100000245008900041210006900130260000900199653000800208100002100216700001700237700001700254856012400271 2020 eng d00aA Qualitative Approach to Understand Unintentional Information Security Misbehaviors0 aQualitative Approach to Understand Unintentional Information Sec c202010aBIS1 aShadbad, Forough1 aBaham, Corey1 aBiros, David u/biblio/qualitative-approach-understand-unintentional-information-security-misbehaviors00496nas a2200121 4500008004100000245008600041210006900127260000900196653000800205100002100213700001700234856012300251 2020 eng d00aTechnostress and its Influence on Employee Information Security Policy Compliance0 aTechnostress and its Influence on Employee Information Security  c202010aBIS1 aShadbad, Forough1 aBiros, David u/biblio/technostress-and-its-influence-employee-information-security-policy-compliance00480nas a2200121 4500008004100000245007900041210006900120260000900189653000800198100002100206700001700227856011400244 2019 eng d00aDeveloping an Unintentional Information Security Misbehavior Scale (UISMS)0 aDeveloping an Unintentional Information Security Misbehavior Sca c201910aBIS1 aShadbad, Forough1 aBiros, David u/biblio/developing-unintentional-information-security-misbehavior-scale-uisms00487nas a2200133 4500008004100000245006800041210006600109260000900175653000800184100002100192700001700213700001900230856010400249 2019 eng d00aExamining Technostress on Employees Security-related Behaviors0 aExamining Technostress on Employees Securityrelated Behaviors c201910aBIS1 aShadbad, Forough1 aBiros, David1 aSharma, Madhav u/biblio/examining-technostress-employees-security-related-behaviors00531nas a2200145 4500008004100000245007100041210006900112260000900181653000800190100001800198700002000216700002100236700002000257856010800277 2019 eng d00aPsychological Contract Violation and Sharing Intention on Facebook0 aPsychological Contract Violation and Sharing Intention on Facebo c201910aBIS1 aHammer, Bryan1 aZhang, Tianjian1 aShadbad, Forough1 aAgrawal, Rupesh u/biblio/psychological-contract-violation-and-sharing-intention-facebook