WEIS 2014 June 23, 2014 to June 24, 2014, Pennsylvania,USA

Event Page

Tell us about missing data
Title Speakers Summary Topic Types
Understanding the Influence of Cybercrime Risk on the E-Service Adoption of European Internet Users Rainer Böhme , Tyler Moore , Markus Riek N/A
Experimental Measurement of Attitudes Regarding Cybercrime Alessandro Acquisti , Ross Anderson , James Graves N/A
Privacy versus Government Surveillance: Where Network Effects Meet Public Choice Ross Anderson N/A
Government Surveillance and Incentives to Abuse Power Benjamin Johnson , John Chuang , Paul Laskowski , Thomas Maillart N/A
Cognitive Security David Reitter N/A
Should Payment Card Issuers Reissue Cards in Response to a Data Breach? Alessandro Acquisti , Nicolas Christin , James Graves N/A
Automation and Disruption in Stolen Payment Card Markets Allan Friedman , Timothy Peacock N/A
Defending Debit: A Historical Study of the Indirect Effects of the Durbin Amendment on Investment in Debit Card Security Allison Miller N/A
Empirically Characterizing Domain Abuse and the Revenue Impact of Blacklisting Damon Mccoy , Geoffrey M. Voelker , Stefan Savage , Neha Chachra N/A
A Study of Whois Privacy and Proxy Service Abuse Richard Clayton , Tony Mansfield N/A
Why Them? Extracting Intelligence about Target Selection from Zeus Financial Malware Samaneh Tajalizadehkhoob , Hadi Asghari , Carlos Gañán , Michel Van Eeten N/A
The Effect of Decentralized Behavioral Decision Making on System-Level Risk Kim Kaivanto N/A
Resilience in Information Stewardship Iffat Gheyas , Christos Ioannidis , David Pym , Julian Williams N/A
Competition in the Crypto-Currency Market Neil Gandal , Hanna Halaburda N/A
Incentive Engineering for Outsourced Computation in the Face of Collusion Carlos Cid , Mhr Khouzani , Viet Pham N/A
Genome Privacy Vitaly Shmatikov , Ross Anderson , Carl A Gunter , Aleksandra Slavkovic N/A
Voluntary Participation in Cyber-Insurance Markets Mingyan Liu , Parinaz Naghizadeh N/A
On Decentralizing Prediction Markets and Order Books Jeremy Clark , Edward W. Felten , Joseph Bonneau , Arvind Narayanan , Joshua Kroll , Andrew Miller N/A
Analysis of Japanese Loyalty Programs Considering Liquidity, Security Efforts, and Actual Security Levels Kanta Matsuura , Bongkot Jenjarrussakul N/A
Framing and the Malleability of Privacy Choices Alessandro Acquisti , Idris Adjerid , George Loewenstein N/A
Meaningful Healthcare Security: Does ''Meaningful-Use'' Attestation Improve Information Security Performance? M. eric Johnson , Juhee Kwon N/A