Important: This instance is deprecated and will be closed soon! Please visit this platform
26-29 May 2015
Fürstenberghaus
Europe/Berlin timezone
Home > Timetable > Session details
PDF | iCal

31-02 - Security and Privacy of Information and IS

Place

Location: Fürstenberghaus
Address: Domplatz 20-22 48143 Münster Germany
Room: F5
Date: 28 May 13:30 - 15:30

Description

Past decade has been marked by the exponential growth in the amount of collected data and the accompanying information processing in both public and corporate sectors. In addition to “traditional” forms of data collection by organizations, data-intensive Social Media platforms have contributed greatly to the rising vulnerability of users, adding new “quality” to the data that can be accessed and used by third-parties worldwide. Indeed, with millions of data items shared every week on Facebook and other Social Media platforms, the scale of social information available is breath-taking. Additionally, increasing use of smartphones has spurred the unprecedented growth of mobile applications that allow for a new location-based view on user behavior. Overall, this growing volume of data generated across multiple channels presents significant security and privacy challenges. Both businesses and public organizations increasingly face these risks as more and more data on customers and citizens is collected, interconnected, and processed. Recognizing these vulnerabilities, this track seeks contributions that address these rising concerns over privacy and security. We especially encourage research that focuses on the emerging Social Web applications. All methodological approaches are welcome, including, but not limited to experimental studies, qualitative studies, case studies, as well as conceptual papers. Full and research-in-progress papers can be submitted to this track.

Conveners

  • Session 2
    • Fabian, Ben (Humboldt University Berlin)

Timetable | Contribution List

Displaying 4 contributions out of 4
Type: Complete Research Paper Session: 31-02 - Security and Privacy of Information and IS
Track: 31 - Security and Privacy of Information and IS
The inventory process, i.e. the assessment of assets and implemented countermeasures, consumes a significant amount of time in the risk and compliance management process. Assets and countermeasures have to be identified and classified in terms of confidentiality, integrity and availability requirements. Depending on the organization's size this process may include thousands of assets and counterme ... More
Presented by Johannes HEURIX on 28/5/2015 at 11:30
Type: Complete Research Paper Session: 31-02 - Security and Privacy of Information and IS
Track: 31 - Security and Privacy of Information and IS
IT security has become a major issue for organizations as they need to protect their assets, including IT resources, intellectual property and business processes, against security attacks. Disruptions of IT-based business activities can easily lead to economic damage, such as loss of productivity, revenue and reputation. Organizations need to decide (1) which assets need which level of protection ... More
Presented by Eva WEISHÄUPL, Guido SCHRYEN, Emrah YASASIN on 28/5/2015 at 14:30
Type: Complete Research Paper Session: 31-02 - Security and Privacy of Information and IS
Track: 31 - Security and Privacy of Information and IS
As a potential explanation to measured inconsistencies between stated privacy concerns and actual disclosing behavior, denoted as the „privacy paradox“, scholars have proposed a systematic distinction between situational privacy considerations and pre-existing, superordinate factors that shape the decisive situation without being directly connected to the situation itself. Deploying an experim ... More
Presented by Flavius KEHR on 28/5/2015 at 15:00
Type: Complete Research Paper Session: 31-02 - Security and Privacy of Information and IS
Track: 31 - Security and Privacy of Information and IS
In this paper we present and validate a novel attacker model based on the economic notion that the attacker has limited resources to forge a new attack. We focus on the vulnerability exploitation case, whereby the attacker has to choose whether to exploit a new vulnerability or keep an old one. We postulate that most vulnerabilities remain unattacked, and that the exploit development cycle relates ... More
Presented by Luca ALLODI on 28/5/2015 at 12:00
Building timetable...