Sunday, 24 June 2012 |
18:00-20:00 |
Welcome Reception
Open air bar "Shan Rahimkhan", Gendarmenmarkt
Directions
|
|
Monday, 25 June 2012 |
09:00-09:10 |
Opening
Welcome Address
Nicolas Zimmer
Permanent Secretary for Economics, Technology and Research of Berlin
|
|
09:10-10:40 | Session 1 Privacy Economics Session Chair: M. Eric Johnson
Empirical Analysis of Data Breach Litigation
Sasha Romanosky (Carnegie Mellon University) David Hoffman (Temple University) Alessandro Acquisti (Carnegie Mellon University)
Paper
- Presentation
Is Patient Data Better Protected in Competitive Healthcare Markets?
Martin S. Gaynor (Carnegie Mellon University) Muhammad Zia Hydari (Carnegie Mellon University) Rahul Telang (Carnegie Mellon University)
Paper
The Privacy Economics of Voluntary Over-disclosure in Web Forms
Sören Preibusch (University of Cambridge) Kat Krol (University College London) Alastair R. Beresford (University of Cambridge)
Paper
- Presentation
|
|
10:40-11:10 |
Coffee Break
|
|
11:10-12:30 | Panel Discussion
Moderator: Nicola Jentzsch
When will Privacy Policy Learn from Privacy Economics?Panelists:
Alessandro Acquisti (Carnegie Mellon University) Jonathan Cave (RAND Europe) Alexander Dix (Berlin Commissioner for Data Protection) Bertin Martens (European Commission) Sarah Spiekermann (Vienna University of Economics and Business)
|
|
12:30-14:00 |
Lunch
|
|
14:00-15:30 | Session 2 Security Economics Session Chair: Michel van Eeten
Security Resources, Capabilities and Cultural Values: Links to Security Performance and Compliance
Juhee Kwon (Dartmouth College) M. Eric Johnson (Dartmouth College)
Paper
- Presentation
Software Security Economics: Theory, in Practice
Stephan Neuhaus (ETH Zürich) Bernhard Plattner (ETH Zürich)
Paper
- Presentation
Sectoral and Regional Interdependency of Japanese Firms under the Influence of Information Security Risks
Bongkot Jenjarrussakul (University of Tokyo) Hideyuki Tanaka (University of Tokyo) Kanta Matsuura (University of Tokyo)
Paper
- Presentation
|
|
15:30-16:00 |
Coffee Break
|
|
16:00-17:20 | Session 3 Studying the Attacker Session Chair: Ross Anderson
Why do Nigerian Scammers Say They are From Nigeria?
Cormac Herley (Microsoft Research)
Paper
- Presentation
Analysis of eCrime in Crowd-sourced Labor Markets: Mechanical Turk vs. Freelancer
Vaibhav Garg (Indiana University) Chris Kanich (UC San Diego) L. Jean Camp (Indiana University)
Paper
- Presentation
Can We Afford Integrity by Proof-of-Work? Scenarios Inspired by the Bitcoin Currency
Jörg Becker, Dominic Breuker, Tobias Heide, Justus Holler, Hans Peter Rauer, Rainer Böhme (University of Münster)
Paper
- Presentation
|
|
18:30-22:00 | Social Event & Conference Dinner Dinner Speech: Gert G. Wagner (DIW Berlin) |
|
Tuesday, 26 June 2012 |
09:00-10:30 | Session 4 Cost of Security Session Chair: Jeremy Epstein
Measuring the Cost of Cybercrime
Ross Anderson (University of Cambridge) Chris Barton (Cloudmark) Rainer Böhme (University of Münster) Richard Clayton (University of Cambridge) Michael van Eeten (Delft University of Technology) Michael Levi (Cardiff University) Tyler Moore (Wellesley College) Stefan Savage (UC San Diego)
Paper
- Presentation
A Closer Look at Information Security Costs
Matthias Brecht (University of Regensburg) Thomas Nowey (Krones AG)
Paper
- Presentation
IT Security Investment and Gordon-Loeb’s 1/e Rule
Yuliy Baryshnikov (University of Illinois at Urbana-Champaign)
Paper
|
|
10:30-11:00 |
Coffee Break
|
|
11:00-12:20 | Session 5 Management of Information Security Session Chair: Rahul Telang
Who Sometimes Violates the Rule of the Organizations? An Empirical Study on Information Security Behaviors and Awareness
Toshihiko Takemura (Kansai University) Ayako Komatsu (Information Technology Promotion Agency, Japan)
Paper
- Presentation
To Invest or Not to Invest? Assessing the Economic Viability of a Policy and Security Configuration Management Tool
Lukas Demetz (University of Innsbruck) Daniel Bachlechner (University of Innsbruck)
Paper
- Presentation
Online Promiscuity: Prophylactic Patching and the Spread of Computer Transmitted Infections
Timothy Kelley (Indiana University) L. Jean Camp (Indiana University)
Paper
- Presentation
Contagion in Cybersecurity Attacks
Adrian Baldwin (Hewlett-Packard Laboratories) Iffat Gheyas (University of Aberdeen) Christos Ioannidis (University of Bath) David Pym (University of Aberdeen) Julian Williams (University of Aberdeen)
Paper
- Presentation
|
|
12:20-14:00 |
Lunch
(with PC Meeting)
|
|
14:00-15:20 | Session 6 Privacy, Security, and Marketing Session Chair: Nicolas Christin
The Effect of Fraud Investigation Cost on Pay-Per-Click Advertising
Min Chen (Richard Stockton College of New Jersey) Varghese Jacob (University of Texas at Dallas) Suresh Radhakrishnan (University of Texas at Dallas) Young Ryu (University of Texas at Dallas)
Paper
Ad-blocking Games: Monetizing Online Content Under the Threat of Ad Avoidance
Nevena Vratonjic (EPFL Lausanne) Mohammad Hossein Manshaei (Isfahan University of Technology, Iran) Jens Grossklags (Penn State University) Jean-Pierre Hubaux (EPFL Lausanne)
Paper
- Presentation
Choice Architecture and Smartphone Privacy: There’s a Price for That
Serge Egelman (UC Berkeley) Adrienne Porter Felt (UC Berkeley) David Wagner (UC Berkeley)
Paper
- Presentation
Would You Sell Your Mother’s Data? Personal Data Disclosure in a Simulated Credit Card Application
Miguel Malheiros (University College London) Sascha Brostoff (University College London) Charlene Jennett (University College London) Angela Sasse (University College London)
Paper
- Presentation
|
|
15:20-15:45 |
Coffee Break
|
|
15:45-16:30 | Session 7 Ten Years of WEIS: Taking Stock and Looking Ahead Session Chair: Alessandro Acquisti
’Maybe We Spend Too Much?’
Bruce Schneier (BT Counterpane)
’No, We Don’t Spend Enough!’
Ross Anderson (University of Cambridge)
|
|
16:30-17:50 |
Rump Session
Liveblog
|
|
17:50-18:00 |
Adjourn
|
|