Agenda


Sessions will be held virtually. All times indicated are Eastern Daylight Time (UTC – 4).

Monday, June 28, 2021

Opening Remarks 0900-0910

Session 1: Cybercrime 0910-1010

  • Measuring the Deterioration of Trust on the Dark Web: Evidence from Operation Bayonet, Scott Lee Chua
  • Measuring Cybercrime as a Service (CaaS) Offerings in a Cybercrime Forum, Ugur Akyazi, Michel van Eeten, Carlos Ganan
  • Silicon Den: Cybercrime is Entrepreneurship, Ross Anderson, Rainer Böhme, Richard Clayton, Ben Collier

Break 1010-1030

Session 2: Post-Breach Activities 1030-1130

  • How Cyber Insurance Shapes Incident Response: A Mixed Methods Study, Daniel W Woods and Rainer Böhme
  • Cybersecurity Information Sharing: Analysing an Email Corpus of Coordinated Vulnerability Disclosure, Kiran Sridhar, Allen Householder, Jonathan Spring, Daniel Woods
  • The value of data: Estimating the value individuals put on access to their computer files, Anna Cartwright, Edward Cartwright, Lian Xue

Break 1130-1200

Session 3: Vulnerabilities 1200-1300

  • IoT Marketplace: Willingness-To-Pay vs. Willingness-To-Accept, Shakthidhar Gopavaram, Jayati Dev, Sanchar Das, L. Jean Camp
  • Super-Spreaders: Quantifying the Role of IoT Manufacturers in Device Infections, Elsa Rodriguez, Arman Noroozian, Michel Van Eeten, Carlos, Gañán
  • On the Benefits of Bug Bounty Programs: A Study of Chromium Vulnerabilities, Amutheezan Sivagnanam, Soodeh Atefi, Afiya Ayman, Jens Grossklags, Aron Laszka

Tuesday, June 29, 2021

Session 4: Empirical Models 0900-1000

  • The Impact of Data Breach Announcements on Company Value in European Markets, Adrian Ford, Ameer Al-Nemrat, Seyed Ali Ghorashi, Julia Davidson
  • Surprisingly Small: The Effect of Trade Secret Breaches on Firm Performance, Nicola Searle, Andrew Vivian
  • Behavioral advertising and consumer welfare: An empirical investigation, Eduardo Abraham Schnadower Mustri, Alessandro Acquisti, Idris Adjerid

Break 1000-1020

Session 5: Strategic Models 1020-1120

  • A Model of Information Security and Competition, Alexandre de Corniere, Greg Taylor
  • Deterrence, Backup, or Insurance: A Game-Theoretic Analysis of Ransomware, Tongxin Yin, Armin Sarabi, Mingyan Liu
  • Omnichannel Cybersecurity: Optimizing Security by Leveraging Asymmetric Motivation, Spencer Oriot, Josiah Dykstra, Adam Williams

Break 1120-1150

Session 6: WEIS at 20 Years: Panel Discussion 1150-1250

Concluding Remarks 1250-1300