WISP 2015 – Program (Draft V)
WISP will be held in the Convention Center in rooms 201C (Room A) and 202C (Room B)
8am - 9am – registration + welcome + buffet breakfast
9am - 10am : Room A - Privacy (Chair: TBA)
Privacy dimensions in design of smart home systems for elderly people
Ella Kolkowska
Better Patient Privacy Protection with better patient empowerment about Consent with Health Information Exchanges
Mohamed Abdelhamid, Raj Sharman and Ram Bezawada
Sharing Same-Disease Data with Privacy Preservation
Xiaoping Liu, Xiaobai Li, LuvaiMotiwalla, Wenjun Li, Hua Zheng and Patricia Franklin
9am - 10am : Room B - Sociotechnical aspects of security (Chair: AnatHovav)
New Approaches to Mobile Device Authentication
Jordan Shropshire and Phil Menard
Development of an Artifact for Benchmarking Information Security Policy
DaeYoup Kang and AnatHovav
Integrating Social and Economic Models of Responding to Privacy Messages in Mobile Computing: A Research Agenda
Dave Eargle, Dennis Galletta, ShadiJanansefat, DimitarKunev, ShivenduPratap Singh
10am - 10:20am –Coffee break
10:20am – 11am Room A: Cyber security education and skills (Chair: Yair Levy)
Development of a Cybersecurity Skills Index: A Scenarios-Based, Hands-On Measure of Non-IT Professionals’ Cybersecurity Skills
Melissa Carlton,Yair Levy, Michelle Ramim and Steve Terrell
A Study on Resolution Skills in Phishing Detection
Yuan Li, Jingguo Wang and H. Raghav Rao
10:20am – 11am Room B: Cyber security economics and risk (Chair: TBA)
Business orientation in knowledge risk management – a literature review
Ilona Ilvonen and JariJussila
Investment in Information Security Measures: A Behavioral Investigation
Roozmehr Safi, Glenn Browne
11-11:45 Room A
Guest SpeakerJae Kyu Lee: The Bright ICT Initiative
11:45 - 1:15pm – Sponsor and poster presentations + buffet lunch in Room B
Sponsor presentation
Patrick Ochoa, ProctorU’s regional partnership manager
Poster presentations 5 minutes each
Motivating Employees to Comply with Information Security Policies
David Sikolia
Promoting the Use of Information Security Measures for Threat Prevention and Threat Detection
Roozmehr Safi, Glenn Browne
A Research Study to Understand and Improve Fundamental Information Security Practices in Very Small Enterprises
Salvatore Aurigemma, Lori Leonard, Thomas Mattson
An Evaluation of Security Breach Evolution and Financial Impact on Firms: Developing an Attack Sophistication Index
NicolauDepaula, Sanjay Goel
1:20pm – 2:40pm Room A: Behavioral aspects of cyber security Work in Progress Papers (20 minutes each)
“Not Now:” Using fMRI and Eye Tracking to Improve the Timing of Security Messages
Bonnie Anderson, Jeffrey Jenkins, Brock Kirwan and Anthony Vance
The Role of Trust and Familiarity in Click-through Intention: A Perception Transfer Theory in a Cybersecurity Context
Obi Ogbanufe and Dan Kim
Why We Don’t Block 3rd Party Trackers: An Attributional Theory Perspective
Frank Goethals and ShamelAddas
When does One Weight Threats more? An Integration of Regulatory Focus Theory and Protection Motivation Theory
Jack Shih-Chieh Hsu and Sheng-Pao Shih
Social Media is Weakening Passwords
Justin Giboney, Joseph Buckmanand Yuan Hong
1:20pm – 2:40pm Room B: Behavioral aspects of privacy and mobile security Work in Progress Papers (20 minutes each)
Impact of Mobile Technologies on Patients’ Health Information Security
Isabelle Fagnot
The Impact of Information Privacy Apathy and Privacy Learned Helplessness on Disclosure Behavioral
Gregory Bott
Measuring Users’ Privacy Concerns in Social Networking Sites
Samira Farivar and Yufei Yuan
Improving User Authentication with Fingerprint Biometrics and Biometric Personal Identification Number (BIO-PINTM) when used as a Multi-Factor Authentication Mechanism
Robert Batie, Yair Levy, Stephen Furnell and Peixiang Liu
2:40pm – 3:40pm Room A: Behavioral aspects of cyber security (Chair:H. Raghav Rao)
Information Security Policy Rule-Breaking Behavioral: Role of Susceptibility to Interpersonal Influence and Ethical Climate
Adel Yazdanmehr,Jongguo WangandZhiyong Yang
An Exploration of Phishing Information Adoption: A Heuristic-Systematic Approach
RohitValecha, Rui Chen, TejuHerath, ArunVishwanath, Jingguo Wang, H. Raghav Rao
2:40pm – 3:40pm Room B: Ethical aspects of cyber security (Chair:TBA)
Organizational Security Norms in the Banking Industry: The United States vs. South Korea
Adel Yazdanmehr,Jongguo WangandZhiyong Yang
Why Cooperate?: An Ethical Approach to Vulnerability Disclosures
Mark-David Mclaughlinand Janis Gogan
3:40pm – 4:00pm –Coffee and Ice Cream Bar (room A)
4pm - 5:30 pm - room B
4pm-4:45pm: Panel: Bright Blue Cybersecurity (BBC) Project - SIGSEC Research Initiative (Chairs: Herb Mattord andYair Levy)
Participants: Bonnie Anderson, Dave Biros, John D'Arcy, Gurpreet Dhillon, AnatHovav, and Andrew Phillips
4:45-5:30 – room B:Panel: The Cyber Education Project: Defining Educational Standards for an Emerging Discipline (chair: Allen Parrish)
Participants: Allen Parrish,Andrew Phillips,Chris InglisandJean Blair
5:30pm – WISP business meeting and closing remarks