Host

PSU IST

Sponsors

Cisco

NSF

DHS

Program Overview

WEIS 2014 will feature a program which includes invited speakers, and 20 papers which have been selected in a rigorous review process by the international program committee.

List of Accepted Papers

Kim Kaivanto. The Effect of Decentralized Behavioral Decision Making on System-Level Risk [Paper]

Christos Ioannidis, David Pym, Julian Williams and Iffat Gheyas. Resilience in Information Stewardship [Paper]

Bongkot Jenjarrussakul and Kanta Matsuura. Analysis of Japanese Loyalty Programs Considering Liquidity, Security Efforts, and Actual Security Levels [Paper]

Neil Gandal and Hanna Halaburda. Competition in the Crypto-Currency Market [Paper]

Richard Clayton and Tony Mansfield. A Study of Whois Privacy and Proxy Service Abuse [Paper]

Juhee Kwon and M. Eric Johnson. Meaningful Healthcare Security: Does “Meaningful-Use” Attestation Improve Information Security Performance [Paper]

Markus Riek, Rainer Böhme and Tyler Moore. Understanding the Influence of Cybercrime Risk on the E-Service Adoption of European Internet Users [Paper]

Allison Miller. Defending Debit: A Historical Study of the Indirect Effects of the Durbin Amendment on Investment in Debit Card Security [Paper]

Ross Anderson. Privacy versus Government Surveillance: Where Network Effects Meet Public Choice [Paper]

Samaneh Tajalizadehkhoob, Hadi Asghari, Carlos Gañán and Michel van Eeten. Why Them? Extracting Intelligence about Target Selection from Zeus Financial Malware [Paper]

Parinaz Naghizadeh and Mingyan Liu. Voluntary Participation in Cyber-Insurance Markets [Paper]

Mhr Khouzani, Viet Pham and Carlos Cid. Incentive Engineering for Outsourced Computation in the Face of Collusion [Paper]

Paul Laskowski, Benjamin Johnson, Thomas Maillart and John Chuang. Government Surveillance and Incentives to Abuse Power [Paper]

James Graves, Alessandro Acquisti and Ross Anderson. Experimental Measurement of Attitudes Regarding Cybercrime [Paper]

James Graves, Alessandro Acquisti and Nicolas Christin. Should Payment Card Issuers Reissue Cards in Response to a Data Breach? [Paper]

Jeremy Clark, Joseph Bonneau, Edward Felten, Joshua Kroll, Andrew Miller and Arvind Narayanan. On Decentralizing Prediction Markets and Order Books [Paper]

Timothy Peacock and Allan Friedman. Automation and Disruption in Stolen Payment Card Markets [Paper]

Neha Chachra, Damon Mccoy, Stefan Savage and Geoffrey M. Voelker. Empirically Characterizing Domain Abuse and the Revenue Impact of Blacklisting [Paper]

Idris Adjerid, Alessandro Acquisti and George Loewenstein. Framing and the Malleability of Privacy Choices [Paper]

Laura Brandimarte and Alessandro Acquisti. Aiming at a More Cost-Efficient Census Via Online Data Collection: Privacy Trade-Offs of Geo-Location [Paper]

Sponsors