Title |
Speakers |
Summary |
Topic Types |
Understanding the Influence of Cybercrime Risk on the E-Service Adoption of European Internet Users |
Rainer Böhme
,
Tyler Moore
,
Markus Riek
|
N/A |
|
Experimental Measurement of Attitudes Regarding Cybercrime |
Alessandro Acquisti
,
Ross Anderson
,
James Graves
|
N/A |
|
Privacy versus Government Surveillance: Where Network Effects Meet Public Choice |
Ross Anderson
|
N/A |
|
Government Surveillance and Incentives to Abuse Power |
Benjamin Johnson
,
John Chuang
,
Paul Laskowski
,
Thomas Maillart
|
N/A |
|
Cognitive Security |
David Reitter
|
N/A |
|
Should Payment Card Issuers Reissue Cards in Response to a Data Breach? |
Alessandro Acquisti
,
Nicolas Christin
,
James Graves
|
N/A |
|
Automation and Disruption in Stolen Payment Card Markets |
Allan Friedman
,
Timothy Peacock
|
N/A |
|
Defending Debit: A Historical Study of the Indirect Effects of the Durbin Amendment on Investment in Debit Card Security |
Allison Miller
|
N/A |
|
Empirically Characterizing Domain Abuse and the Revenue Impact of Blacklisting |
Damon Mccoy
,
Geoffrey M. Voelker
,
Stefan Savage
,
Neha Chachra
|
N/A |
|
A Study of Whois Privacy and Proxy Service Abuse |
Richard Clayton
,
Tony Mansfield
|
N/A |
|
Why Them? Extracting Intelligence about Target Selection from Zeus Financial Malware |
Samaneh Tajalizadehkhoob
,
Hadi Asghari
,
Carlos Gañán
,
Michel Van Eeten
|
N/A |
|
The Effect of Decentralized Behavioral Decision Making on System-Level Risk |
Kim Kaivanto
|
N/A |
|
Resilience in Information Stewardship |
Iffat Gheyas
,
Christos Ioannidis
,
David Pym
,
Julian Williams
|
N/A |
|
Competition in the Crypto-Currency Market |
Neil Gandal
,
Hanna Halaburda
|
N/A |
|
Incentive Engineering for Outsourced Computation in the Face of Collusion |
Carlos Cid
,
Mhr Khouzani
,
Viet Pham
|
N/A |
|
Genome Privacy |
Vitaly Shmatikov
,
Ross Anderson
,
Carl A Gunter
,
Aleksandra Slavkovic
|
N/A |
|
Voluntary Participation in Cyber-Insurance Markets |
Mingyan Liu
,
Parinaz Naghizadeh
|
N/A |
|
On Decentralizing Prediction Markets and Order Books |
Jeremy Clark
,
Edward W. Felten
,
Joseph Bonneau
,
Arvind Narayanan
,
Joshua Kroll
,
Andrew Miller
|
N/A |
|
Analysis of Japanese Loyalty Programs Considering Liquidity, Security Efforts, and Actual Security Levels |
Kanta Matsuura
,
Bongkot Jenjarrussakul
|
N/A |
|
Framing and the Malleability of Privacy Choices |
Alessandro Acquisti
,
Idris Adjerid
,
George Loewenstein
|
N/A |
|
Meaningful Healthcare Security: Does ''Meaningful-Use'' Attestation Improve Information Security Performance? |
M. eric Johnson
,
Juhee Kwon
|
N/A |
|