Program

WEIS 2015 features invited speakers and 21 papers that have been selected in a rigorous review process by the program committee. The main venue is the TU Delft Science Center at Mijnbouwstraat 120, 2628RX Delft (maps for walking; website for other travel). The event was live-blogged at Light Blue Touchpaper.

Sunday 21 June 2015
18:00 - 21:00 Welcome Reception (with light dinner)
Delft City Hall (map)
Monday 22 June 2015
08:30 - 09:00Registration and Light Breakfast
09:00 - 09:10 Opening Address
  • Jeroen van der Hoven (Dean of the Technology, Policy and Management Faculty)
09:10 - 10:10 Keynote & Discussion: The Meaning of Democratic Values in a Digitized World
  • Keynote: Marietje Schaake (Member of the European Parliament)
  • Moderator: Michel van Eeten
  • Panelists:

    Ross Anderson (Cambridge University)
    Allan Friedman (NTIA, US Department of Commerce)
    Bruce Schneier (Resilient Systems)
    Ashkan Soltani (US Federal Trade Commission)

10:10 - 10:40 Coffee break
10:40 - 12:20 Session 1 - Economics of Data Breaches
Chairs: Alessandro Acquisti & Rahul Telang
  • The Economics of Mandatory Security Breach Reporting to Authorities [paper]
    Stefan Laube & Rainer Böhme
  • Data Breaches and the Dilemmas in Notifying Customers [paper]
    Fabio Bisogni
  • Hype and Heavy Tails: A Closer Look at Data Breaches [paper]
    Benjamin Edwards, Steven Hofmeyr & Stephanie Forrest
  • The Market Effect of Healthcare Security: Do Patients Care about Data Breaches? [paper]
    Juhee Kwon & Eric Johnson
12:20 - 13:45Lunch
Science Center garden
13:45 - 15:25 Session 2 - Privacy Economics
Chairs: Carlos Gañán & Andrew Odlyzko
  • Online Self-Disclosure and Offline Threat Detection [abstract] [full_paper]
    Alessandro Acquisti, Laura Brandimarte, & Jeff Hancock
  • What is a Cookie Worth? [paper]
    Arslan Aziz & Rahul Telang
  • Caviar and Yachts: How Your Purchase Data May Come Back to Haunt You [paper]
    Benjamin Johnson, Paul Laskowski, Thomas Maillart, John Chuang & Nicolas Christin
  • The Value of Privacy: Keeping the Money Where the Mouth is [paper]
    Ignacio Cofone
15:25 - 15:55Coffee break
15:55 - 17:35 Session 3 - Security Behavior and Design
Chairs: Serge Egelman & Tyler Moore
  • An Empirical Study of Namecoin and Lessons for Decentralized Namespace Design [paper]
    Harry Kalodner, Miles Carlsten, Paul Ellenbogen, Joseph Bonneau & Arvind Narayanan
  • User Acceptance Factors for Anonymous Credentials: An Empirical Investigation [paper]
    Zinaida Benenson, Anna Girard & Ioannis Krontiris
  • Deception by Design: Evidence-Based Signaling Games for Network Defense [paper]
    Jeffrey Pawlick & Quanyan Zhu
  • Experimental Elicitation of Risk Behaviour amongst Information Security Professionals [paper]
    Konstantinos Mersinas, Bjoern Hartig, Keith Martin & Andrew Seltzer
18:00 - 22:30 Social Event & Conference Dinner
Parker Beachclub, Kijkduin, the Hague (map)
Transport will be provided from the conference venue and back to the hotels
Tuesday 23 June 2015
08:30 - 09:00 Light Breakfast
09:00 - 10:15 Keynote & Discussion: The Future of Cyberattack - Lessons from Sony
  • Keynote: Bruce Schneier (Security technologist & CTO Resilient Systems)
  • Moderator: Michel van Eeten
  • Panelists:

    Rainer Böhme (University of Innsbruck)
    Jonathan Cave (University of Warwick)
    Allan Friedman (NTIA, US Department of Commerce)

10:15 - 10:45Coffee break
10:45 - 12:25 Session 4 - Underground Markets
Chairs: Hadi Asghari & Jens Grossklags
  • Concentrating Correctly on Cybercrime Concentration [paper]
    Richard Clayton, Tyler Moore & Nicolas Christin
  • Deception in Online Auction Marketplaces: Incentives and Personality Shape Seller Honesty [paper]
    Brian Glass, Michelle Baddeley & M. Angela Sasse
  • Framing Dependencies Introduced by Underground Commoditization [paper]
    Kurt Thomas, Danny Yuxing Huang, David Wang, Elie Bursztein, Chris Grier,
    Tom Holt, Christopher Kruegel, Damon McCoy, Stefan Savage & Giovanni Vigna
  • No Please, After You: Detecting Fraud in Affiliate Marketing Networks [paper]
    Peter Snyder & Chris Kanich
12:25 - 14:00 Lunch
Science Center garden
(also PC meeting at collegezaal)
14:00 - 15:15 Session 5 - Security Investments
Chairs: Rainer Böhme & Wolter Pieters
  • Prioritizing Security Spending: A Quantitative Analysis of Risk Distributions for Different Business Profiles [paper]
    Armin Sarabi, Parinaz Naghizadeh, Yang Liu & Mingyan Liu
  • Policy, Statistics, and Questions: Reflections on UK Cyber Security Disclosures [paper]
    Chad Heitzenrater & Andrew Simpson
  • Attack-Deterring and Damage-Control Investments in Cybersecurity [paper]
    Wing Man Wynne Lam
15:15 - 15:45Coffee break
15:45 - 16:35 Session 6 - Security of Intermediaries
Chairs: Terrence August & David Pym
  • Designing Cybersecurity Policies [paper]
    Shu He, Gene Moo Lee, John Quarterman & Andrew Whinston
  • Understanding the Role of Sender Reputation in Abuse Reporting and Cleanup [paper]
    Orcun Cetin, Mohammad Hanif Jhaveri, Carlos Gañán, Michel van Eeten & Tyler Moore
16:40 - 16:45Best Paper Award to Benjamin Edwards, Steven Hofmeyr & Stephanie Forrest
(selected by conference attendees)
16:45 - 17:30Rump Session
17:45 - 18:45Closing Remarks & Reception
Science Center garden
Wednesday 24 June 2015 (Invite only)
Location the Hague Security Delta Campus
 Policy Panel 1 - Intellectual Property
 Policy Panel 2 - Responsible Disclosure
 Policy Panel 3 - Data Breach Notification
 Policy Panel 4 - Cyber Opportunities

Hosts

Sponsors

NCSC SIDN NSF DHS LDE IST NLnet