Program Overview
WEIS 2014 will feature a program which includes invited speakers, and 20 papers which have been selected in a rigorous review process by the international program committee.Program Details
Sunday June 22, 2014 | |
1:00-4:00pm |
Optional Afternoon Activity (Campus Tour)
|
6:00-10:00pm |
Evening Welcome Reception at Whisker's Bar in the Nittany Lion Inn
|
Monday June 23, 2014: Day 1 of Academic Program | |
8:00-9:00am |
Continental Breakfast
|
9:00-9:10am |
Welcome Address
|
9:10-10:00am | Session 1
Understanding the Influence of Cybercrime Risk on the E-Service Adoption of European Internet Users
Experimental Measurement of Attitudes Regarding Cybercrime
|
10:00-10:30am |
Coffee Break (30 minutes)
|
10:30-11:10am | Session 2
Privacy versus Government Surveillance: Where Network Effects Meet Public Choice
Government Surveillance and Incentives to Abuse Power
|
11:10am-12:30pm | Panel Discussion
|
12:30-2:15pm | Lunch and Invited Talk by Richard Sullivan (Federal Reserve Bank of Kansas City) |
2:15-3:15pm | Session 3
Should Payment Card Issuers Reissue Cards in Response to a Data Breach?
Automation and Disruption in Stolen Payment Card Markets
Defending Debit: A Historical Study of the Indirect Effects of the Durbin Amendment on Investment in Debit Card Security
|
3:15-3:55pm |
Coffee Break (40 minutes)
|
3:55-5:05pm | Session 4
Empirically Characterizing Domain Abuse and the Revenue Impact of Blacklisting
A Study of Whois Privacy and Proxy Service Abuse
Why Them? Extracting Intelligence about Target Selection from Zeus Financial Malware
|
Rump Session Talks and Organizational Remarks
|
|
6:30-10:00pm |
Social Event & Conference Dinner at the Happy Valley Brewing Company (www.happyvalleybeer.com)
|
Tuesday June 24, 2014: Day 2 of Academic Program | |
8:00am-9:00am |
Continental Breakfast
|
9:00-10:30am | Session 5
The Effect of Decentralized Behavioral Decision Making on System-Level Risk
Resilience in Information Stewardship
Competition in the Crypto-Currency Market
Incentive Engineering for Outsourced Computation in the Face of Collusion
|
10:30-11:00am |
Coffee Break (30 minutes)
|
11:00am-12:30pm | Panel Discussion
|
12:30-2:15pm |
Lunch
|
2:15-3:20pm | Session 6
Voluntary Participation in Cyber-Insurance Markets
On Decentralizing Prediction Markets and Order Books
Analysis of Japanese Loyalty Programs Considering Liquidity, Security Efforts, and Actual Security Levels
|
3:20-3:45pm |
Coffee Break (25 minutes)
|
3:45-4:55pm | Session 7
Framing and the Malleability of Privacy Choices
Meaningful Healthcare Security: Does ''Meaningful-Use'' Attestation Improve Information Security Performance?
Aiming at a More Cost-Efficient Census Via Online Data Collection: Privacy Trade-Offs of Geo-Location
|
Closing Remarks
|
|
Closing Reception
|