WISP 2015 – Program (Draft V)

WISP will be held in the Convention Center in rooms 201C (Room A) and 202C (Room B)

8am - 9am – registration + welcome + buffet breakfast

9am - 10am : Room A - Privacy (Chair: TBA)

Privacy dimensions in design of smart home systems for elderly people

Ella Kolkowska

Better Patient Privacy Protection with better patient empowerment about Consent with Health Information Exchanges

Mohamed Abdelhamid, Raj Sharman and Ram Bezawada

Sharing Same-Disease Data with Privacy Preservation

Xiaoping Liu, Xiaobai Li, LuvaiMotiwalla, Wenjun Li, Hua Zheng and Patricia Franklin

9am - 10am : Room B - Sociotechnical aspects of security (Chair: AnatHovav)

New Approaches to Mobile Device Authentication

Jordan Shropshire and Phil Menard

Development of an Artifact for Benchmarking Information Security Policy

DaeYoup Kang and AnatHovav

Integrating Social and Economic Models of Responding to Privacy Messages in Mobile Computing: A Research Agenda

Dave Eargle, Dennis Galletta, ShadiJanansefat, DimitarKunev, ShivenduPratap Singh

10am - 10:20am –Coffee break

10:20am – 11am Room A: Cyber security education and skills (Chair: Yair Levy)

Development of a Cybersecurity Skills Index: A Scenarios-Based, Hands-On Measure of Non-IT Professionals’ Cybersecurity Skills

Melissa Carlton,Yair Levy, Michelle Ramim and Steve Terrell

A Study on Resolution Skills in Phishing Detection

Yuan Li, Jingguo Wang and H. Raghav Rao

10:20am – 11am Room B: Cyber security economics and risk (Chair: TBA)

Business orientation in knowledge risk management – a literature review

Ilona Ilvonen and JariJussila

Investment in Information Security Measures: A Behavioral Investigation

Roozmehr Safi, Glenn Browne

11-11:45 Room A

Guest SpeakerJae Kyu Lee: The Bright ICT Initiative

11:45 - 1:15pm – Sponsor and poster presentations + buffet lunch in Room B

Sponsor presentation

Patrick Ochoa, ProctorU’s regional partnership manager

Poster presentations 5 minutes each

Motivating Employees to Comply with Information Security Policies

David Sikolia

Promoting the Use of Information Security Measures for Threat Prevention and Threat Detection

Roozmehr Safi, Glenn Browne

A Research Study to Understand and Improve Fundamental Information Security Practices in Very Small Enterprises

Salvatore Aurigemma, Lori Leonard, Thomas Mattson

An Evaluation of Security Breach Evolution and Financial Impact on Firms: Developing an Attack Sophistication Index

NicolauDepaula, Sanjay Goel

1:20pm – 2:40pm Room A: Behavioral aspects of cyber security Work in Progress Papers (20 minutes each)

“Not Now:” Using fMRI and Eye Tracking to Improve the Timing of Security Messages

Bonnie Anderson, Jeffrey Jenkins, Brock Kirwan and Anthony Vance

The Role of Trust and Familiarity in Click-through Intention: A Perception Transfer Theory in a Cybersecurity Context

Obi Ogbanufe and Dan Kim

Why We Don’t Block 3rd Party Trackers: An Attributional Theory Perspective

Frank Goethals and ShamelAddas

When does One Weight Threats more? An Integration of Regulatory Focus Theory and Protection Motivation Theory

Jack Shih-Chieh Hsu and Sheng-Pao Shih

Social Media is Weakening Passwords

Justin Giboney, Joseph Buckmanand Yuan Hong

1:20pm – 2:40pm Room B: Behavioral aspects of privacy and mobile security Work in Progress Papers (20 minutes each)

Impact of Mobile Technologies on Patients’ Health Information Security

Isabelle Fagnot

The Impact of Information Privacy Apathy and Privacy Learned Helplessness on Disclosure Behavioral

Gregory Bott

Measuring Users’ Privacy Concerns in Social Networking Sites

Samira Farivar and Yufei Yuan

Improving User Authentication with Fingerprint Biometrics and Biometric Personal Identification Number (BIO-PINTM) when used as a Multi-Factor Authentication Mechanism

Robert Batie, Yair Levy, Stephen Furnell and Peixiang Liu

2:40pm – 3:40pm Room A: Behavioral aspects of cyber security (Chair:H. Raghav Rao)

Information Security Policy Rule-Breaking Behavioral: Role of Susceptibility to Interpersonal Influence and Ethical Climate

Adel Yazdanmehr,Jongguo WangandZhiyong Yang

An Exploration of Phishing Information Adoption: A Heuristic-Systematic Approach

RohitValecha, Rui Chen, TejuHerath, ArunVishwanath, Jingguo Wang, H. Raghav Rao

2:40pm – 3:40pm Room B: Ethical aspects of cyber security (Chair:TBA)

Organizational Security Norms in the Banking Industry: The United States vs. South Korea

Adel Yazdanmehr,Jongguo WangandZhiyong Yang

Why Cooperate?: An Ethical Approach to Vulnerability Disclosures

Mark-David Mclaughlinand Janis Gogan

3:40pm – 4:00pm –Coffee and Ice Cream Bar (room A)

4pm - 5:30 pm - room B

4pm-4:45pm: Panel: Bright Blue Cybersecurity (BBC) Project - SIGSEC Research Initiative (Chairs: Herb Mattord andYair Levy)

Participants: Bonnie Anderson, Dave Biros, John D'Arcy, Gurpreet Dhillon, AnatHovav, and Andrew Phillips

4:45-5:30 – room B:Panel: The Cyber Education Project: Defining Educational Standards for an Emerging Discipline (chair: Allen Parrish)

Participants: Allen Parrish,Andrew Phillips,Chris InglisandJean Blair

5:30pm – WISP business meeting and closing remarks