|
|
PARTICIPANT LIST
Alessandro
Acquisti, CMU: What
Can Behavioral Economics Teach Us About Privacy?; Privacy
in Electronic Commerce and the Economics of Immediate
Gratification
Andrew A. Adams, Meiji University: The Development of Japanese Data Protection; The Open vs Closed Debate
Idris
Adjerid, CMU
Sadia
Afroz, Drexel
Luis von Ahn, Carnegie Mellon University
Ross
Anderson, University of Cambridge: Book chapters on psychology
and terror;
It's the
Anthropology, Stupid
Michelle Baddeley, University of Cambridge: Information Security: Lessons from Behavioural Economics
Matt Blaze,
UPenn;Toward a
broader view of security protocols
Caspar
Bowden, Microsoft
Laura
Brandimarte, CMU
Lee
Branstetter, CMU
Pam Briggs, Northumbria: Authentication, implied mistrust and social embarrassment
Jon
Callas, Apple
Ryan
Calo, Stanford
Jean Camp,
Indiana: Privacy Framework for Older Adults
Luke Church,
Cambridge
Richard
Clayton, University of Cambridge
Lorrie Cranor,
CMU: A
Framework for Reasoning About the Human in the Loop
Eric Davis, Google
Dylan Evans,
UCC: online risk
intelligence test
Baruch
Fischhoff, CMU
Mark Frank, Buffalo; Human
Behaviour and Deception Detection
Allan Friedman, Brookings
Rachel
Greenstadt, Drexel: Learning
to Extract Quality Discourse in Online Communities
Jeff
Hancock, Cornell: On Lying and
Being Lied To: A Linguistic Analysis of Deception in Computer-Mediated
Communication; Separating
Fact From Fiction: An Examination of Deceptive Self-Presentation in
Online Dating Profiles
Cormac Herley, Microsoft: So
Long And No Thanks; Where
Do Security Policies Come From
Chris
Hoofnagle, UC Berkeley: Internalizing
Identity Theft; Identity
Theft: Making the Unknowns Known
Nick
Humphrey, Cambridge
Inka
Karpinnen, UCL
Iacovos
Kirlappos, UCL
Markus
Jakobsson, PayPal: Fastwords -- Faster and more secure user authentication
Richard
John, USC: Decision
Analysis by Proxy for the Rational Terrorist
Adam Joinson,
Bath: Digital Crowding; Privacy Dictionary
Eric
Johnson, Dartmouth: Access
Flexibility with Escalation and Audit; Security
through Information Risk Management
Ben
Laurie, Google
Steven
Leblanc, Harvard
Jeff
MacKie-Mason, U Michigan
Betsy Masiello, Google
David
Modic, Exeter
John Mueller, Ohio State:Terror, Security, and Money (Book
website)
Bashar Nuseibeh, Open University: A
Multi-Pronged Empirical Approach to Mobile Privacy Investigation;
Security
Requirements Engineering: A Framework for Representation and
Analysis
Andrew Odlyzko, University of Minnesota: Providing
security with insecure systems, Economics,
psychology, and sociology of security;
Bubbles, Gullibility, and Other Challenges for Economics, Psychology, Sociology, and Information Sciences
Sandra
Petronio, IUPUI: Regulating
the Privacy of Confidentiality, Unpacking the Paradoxes of Privacy in CMC
Relationships: The Challenges of Blogging and Relational Communication
on the Internet
Shari Pfleeger, Dartmouth: Privacy; Leveraging Human Behavior
Peter
Robinson, Cambridge: Affective Computing
Sasha
Romanosky, CMU
Angela
Sasse, UCL: Not seeing the
crime for the cameras?; The True Cost
of Unusable Password Policies
Stuart
Schechter, Microsoft: It's no
secret; The
Emperor's New Security Indicators
Bruce Schneier, Counterpane: Worst-Case Thinking Makes
Us Nuts, Not Safe; Google And Facebook's
Privacy Illusion; Our Reaction Is the Real
Security Failure
David Livingstone
Smith, University of New England: Less than
Human
Ashkan
Soltani, UC Berkeley
Frank
Stajano, University of Cambridge: Understanding scam
victims: seven principles for systems security; It's the
Anthropology, Stupid
Paul Syverson, Naval Research Laboratory
Milind Tambe, USC
Terence
Taylor, ICLS: Darwinian Security; Natural Security (A
Darwinian Approach to a Dangerous World)
Rahul
Telang, CMU
Doug
Tygar, Berkeley
Claire
Vishik, Intel
Melanie
Volkamer, CASED
Rick
Wash, Michigan State: Folk Models of Home Computer Security
Henry H. Willis, RAND: Deterring the Smuggling of Nuclear Weapons in Container Freight Through Detection and Retaliation, Measuring efforts to improve emergency response capabilities, Evaluating public health emergency preparedness programs
|