information institute conferences...2014/05/05  · data carving using artificial headers time cyber...

16
Information Institute Conferences Las Vegas | Nevada May 21 - 23, 2014 1 INFORMATION INSTITUTE - SCHEDULE

Upload: others

Post on 13-Oct-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Information Institute Conferences...2014/05/05  · Data Carving using Artificial Headers Time Cyber Crime! Salon F Mobility Issues! Salon E 4.00-4.30 Evans Richards, Jason Levy and

Information Institute Conferences Las Vegas | Nevada!!May 21 - 23, 2014

�1INFORMATION INSTITUTE - SCHEDULE

Page 2: Information Institute Conferences...2014/05/05  · Data Carving using Artificial Headers Time Cyber Crime! Salon F Mobility Issues! Salon E 4.00-4.30 Evans Richards, Jason Levy and

!!!!The Information Institute is an academe-industry consortium founded to further understanding of intricate relationships between information science and technology. The Information Institute’s mission is to encourage association among individuals who have an interest in the study of information. The mission is realized by providing educational opportunities for members and promoting scholarly and practitioner work in information studies.

!

!The Information Institute is a non-profit, non partisan information policy research and educational organization incorporated in USA . It is organized as a charitable, educational and scientific concern under section 501(c)(3) of the United States Internal Revenue Code of 1986. Under section 501(c)(3), Information Institute is a tax exempt organization. As per the code the Information Institute is permitted to undertake education and research activities in the field of information science and technology. Such activities may include, but are not limited to, organizing conferences, furnishing scholarships to doctoral students, awarding research grants and publishing scholarly books and journals.

!!

�2INFORMATION INSTITUTE - SCHEDULE

Page 3: Information Institute Conferences...2014/05/05  · Data Carving using Artificial Headers Time Cyber Crime! Salon F Mobility Issues! Salon E 4.00-4.30 Evans Richards, Jason Levy and

Welcome!The year was 2002 and we were still recovering from the aftermath of 9/11. Gordon Hunter, who at that time was a Professor at Lethbridge University in Canada initiated a dialogue with SAP to create an academia-industry alliance. This gave birth to the Information Institute. SAP, University of Nevada Las Vegas, University of Detroit Mercy and a handful of other organizations joined hands to formally create a non-profit entity - The Information Institute. It was later organized as a 501(c)3 entity and gained a tax-exempt status. Over the years the Institute got involved with several conferences and workshops. The ISOneWorld, Annual Security Conference, Conference on Information Science & Technology, all ended up becoming stand alone activities of the Institute. The Institute then began publishing academic journals - the Journal of Information Science & Technology and the Journal of Information System Security took shape. !

All in all it has been an amazing decade for the Information Institute. And we are just coming of age. In 2012 the Information Institute entered into a strategic relationship with the Universidade Técnica de Lisboa, Portugal to offer an International DBA/PhD program in a hybrid format. The Institute has also launched a Cyber Security Certification program. Many more activities are planned. Please stay tuned for the latest. !

I hope you enjoy the beautiful surroundings of Las Vegas. The city has so much to offer - within a 30 minute drive you are in the midst of the dessert, hills and the water systems. And Las Vegas in itself never sleeps. I hope you enjoy the conference and as they say it here - Viva Las Vegas!!

!Gurpreet Dhillon, PhD!President, The Information Institute!Virginia Commonwealth University, USA!!

�3INFORMATION INSTITUTE - SCHEDULE

Page 4: Information Institute Conferences...2014/05/05  · Data Carving using Artificial Headers Time Cyber Crime! Salon F Mobility Issues! Salon E 4.00-4.30 Evans Richards, Jason Levy and

Chair’s Welcome!Welcome to the 2014, 13th Annual Security Conference in Las Vegas, Nevada.  This year, we have an exciting set of topics which reflect the variety and breadth of concerns that fall under the umbrella of Information Systems.  We have compelling security papers on the emergent issues, information privacy, socio-technical dimensions, health IT, and more.  We also have a variety of contributors from around the globe, including participants from Portugal, Sweden, Thailand, the U.K., and the U.S.!!Our aim with the Security conference is to maintain a high-quality experience where new ideas and concepts can be discussed in a nurturing and open environment of both critique and support.  Ideally, the Security Conference provides an experience which balances rigor and relevance in our contemporary inquiries while also keeping an eye on the future.  Thank you for your interest and attendance this year, we look forward to making new friends and gaining new insights through our discourse. !!We are excited to have you here and hope you enjoy your time in Las Vegas!!!Mark Harris, PhD Steven Furnell, PhD !South Carolina University, USA University of Plymouth, UK!Co-Conference Chair! ! ! ! ! ! ! Co-Conference Chair!!!

�4INFORMATION INSTITUTE - SCHEDULE

Page 5: Information Institute Conferences...2014/05/05  · Data Carving using Artificial Headers Time Cyber Crime! Salon F Mobility Issues! Salon E 4.00-4.30 Evans Richards, Jason Levy and

!!!!!!!!!!!!Keep a look out for:!!!!!!!!!!!!!

Journal of Information System Security!www.jissec.org!!!

Journal of Information Science and Technology!www.jist.info

�5INFORMATION INSTITUTE - SCHEDULE

Page 6: Information Institute Conferences...2014/05/05  · Data Carving using Artificial Headers Time Cyber Crime! Salon F Mobility Issues! Salon E 4.00-4.30 Evans Richards, Jason Levy and

!!Wednesday. May 21, 2014:: 8.30 am !!!!

Registration and Coffee in the Foyer !!!!!Wednesday. May 21, 2014 :: 9.30 - 10.00 am !!!!!

Welcome Address Salon E

Dr. Gurpreet Dhillon Virginia Commonwealth University, USA !!!!!!

Dr. Gurpreet Dhillon is Professor of Information Systems at Virginia Commonwealth University, USA and a Guest Professor at ISEG, Universidade de Lisboa, Portugal. He holds a Ph.D. from the London School of Economics and Political Science, UK. Gurpreet has authored eight books including Principles of Information Systems Security: text and cases (John Wiley, 2007) and over 100 research manuscripts. He is also the Editor-in-Chief of the Journal of Information System Security. Gurpreet’s research has been featured in various academic and commercial publications and his expert comments have appeared in the New York Times, USA Today, Business Week, NBC News, NPR, among others.

!

�6INFORMATION INSTITUTE - SCHEDULE

Page 7: Information Institute Conferences...2014/05/05  · Data Carving using Artificial Headers Time Cyber Crime! Salon F Mobility Issues! Salon E 4.00-4.30 Evans Richards, Jason Levy and

Wednesday. May 21, 2014 :: 10.00 - 12 noon !!!Ethical Hacking Class

Salon E

Ethical Hacking is rapidly growing as the threat of security breaches increases. Organizations are finding real business value in identifying weaknesses in their Information Security. This class will introduce penetration testing concepts and tools, and how they can be used to identify current weaknesses in an organization’s Information Security. A strong computing background is required. The goal of this class is to explore the mindset of a hacker in order to secure an organization’s environment from threats.

!Instructors

!Jeff Tehovnik, CISSP

Jeff’s Information Security career started in 1998 as a technician in the Network Operations Center at an Internet Service Provider. His education began at Slippery Rock University as a Computer Science student. Transferring to Virginia Commonwealth University, he earned his Bachelor’s Degree in Information Systems. While at VCU, Jeff worked as a Network Technician and Information Security Analyst. He continues his Information Security education in various ways, and is currently a Senior Information Security Analyst at VCU. He also does International Consulting in Information Security.

Jeff’s background in programming, networking, and system administration is advantageous to Ethical Hacking. Jeff has written papers and conducted research on Ethical Hacking topics such as Malware Command & Control, Security Enhanced Linux, Information Security in the UAE, etc.

Gurpreet Dhillon, PhD, CCP

Gurpreet Dhillon is a Professor of Information Security at the School of Business, Virginia Commonwealth University, USA. He also holds affiliate appointments at Instituto Superior de Economia e Gestao at Universidade Tecnica de Lisboa, Portugal and Lulea Tekniska Universitet, Sweden. Over the years he has also held academic positions at University of Nevada Las Vegas (USA), Cranfield University School of Management (UK), City University of Hong Kong (PRC).

Professor Dhillon is a graduate of the London School of Economics and Polical Science, UK where he studied organizations and information. His research led him to explore aspects of information security, identity and assurance. He has authored over 100 research articles that have been published in various journals. Professor Dhillon is also an author of seven books, including Principles of Information Systems Security: Text and Cases (Wiley, 2007). He is the Editor-in-Chief of the Journal of Information System Security, besides serving on the board of several flagship journals. Professor Dhillon consults regularly with the industry and government and has successfully completed assignments in the US, UK, UAE, Hong Kong, Portugal and India.

!!

�7INFORMATION INSTITUTE - SCHEDULE

Page 8: Information Institute Conferences...2014/05/05  · Data Carving using Artificial Headers Time Cyber Crime! Salon F Mobility Issues! Salon E 4.00-4.30 Evans Richards, Jason Levy and

!!!!!!

Lunch - On Your Own!

Choices!

! BIG AL'S OYSTER BAR

! Koji Sushi Bar & China Bistro

!!!!

!!!!

�8INFORMATION INSTITUTE - SCHEDULE

Page 9: Information Institute Conferences...2014/05/05  · Data Carving using Artificial Headers Time Cyber Crime! Salon F Mobility Issues! Salon E 4.00-4.30 Evans Richards, Jason Levy and

!!!

Wednesday. May 21, 2014 :: 2.00 - 3.30 PM !!!

!!Wednesday. May 21, 2014 :: 3.00 - 3.30 PM !

Break (on your own)

Wednesday. May 21, 2014 :: 3.30 - 5.30 PM !

!!!

�9INFORMATION INSTITUTE - SCHEDULE

Time ACM Workshop!Salon F

Ethical Hacking Class!Salon E

3.30-4.15 Stefan Bauer and Edward W.N. Bernroider An Analysis of the Combined Influences of Neutralization and Planned Behavior on Desirable Information Security Behavior

Ethical Hacking Class

4.15-5.00 Ugochukwu Etudo Exploring Socio Materiality in IS research

Ethical Hacking Class

5.00-5.30 Muhammad Al-Abdullah Actors, Networks and Technology Enabled Money Laundering

Ethical Hacking Class

Time Keynote !Salon F

2.00-3.00 Dionysios Demetic The Anti-Money Laundering System

Page 10: Information Institute Conferences...2014/05/05  · Data Carving using Artificial Headers Time Cyber Crime! Salon F Mobility Issues! Salon E 4.00-4.30 Evans Richards, Jason Levy and

Meet and Greet: Brendan’s Irish Pub 6.30 PM - 8.30 PM !!!!!!!!!!

!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!

�10INFORMATION INSTITUTE - SCHEDULE

Page 11: Information Institute Conferences...2014/05/05  · Data Carving using Artificial Headers Time Cyber Crime! Salon F Mobility Issues! Salon E 4.00-4.30 Evans Richards, Jason Levy and

Thursday May 22, 2014 :: 8:00 am onwards !Registration & Coffee !

Thursday May 22, 2014 :: 8:30 am onwards !

!Thursday May 22, 2014 :: 10.00 - 10.15 !

Coffee Break !

Thursday May 22, 2014 :: 10.15-11.30 !!!

�11INFORMATION INSTITUTE - SCHEDULE

Time Security Challenges!Slaon F

Digital Protection!Salon E

8.30-9.00 Mark Harris and Karen Patten Mobile Device Security Issues Within the U.S. Disadvantaged Business Enterprises Program

Yulia Wati and Dan J. Kim Uncertainty in Online Environment: Examining the Mediating Effect of Trust and Relative Advantage in E-Commerce

9.00-9.30 Meral Binbasioglu Understanding performance measures and resource relationships: a qualitative system dynamics approach

William Mee Protecting Values in a Socially Connected World

9.30-10.00 Timothy Perez and Benjamin Perez Municipal E-Government Security: Trends and Opportunities for Improvement

Beverly Medlin, Sandra Vannoy and Elaine Winston Health Care Workers: A possible insider threat

Time ACM Workshop!Salon E

Ethical Hacking Class!Salon F

10.15-10.45 Sanjeev Mitra, Indira Guzman, Gurpreet Dhillon and Kiet Tran A quantitative investigation of the security factors affecting the use of IT/IS systems in public networks

Ethical Hacking Class

10.45-11.30 Safoorah Mughal and Jason Levy Cyberstalking Counter Measures: A Value Focused Multiple Criteria Approach to Cyberstalking Risk Reduction

Ethical Hacking Class

Page 12: Information Institute Conferences...2014/05/05  · Data Carving using Artificial Headers Time Cyber Crime! Salon F Mobility Issues! Salon E 4.00-4.30 Evans Richards, Jason Levy and

Thursday. May 22, 2014 :: 12.00 - 1.30 PM ! !!!!!!!!!

!!Keynote Address + Lunch

Room: Salon G 12.00 - 1.30 pm !!!

The Future of Money Ian Angell

London School of Economics, UK !!!Chair

Jason Levy Virginia Commonwealth University !

!!!!!!!!!!!! !!

�12INFORMATION INSTITUTE - SCHEDULE

Page 13: Information Institute Conferences...2014/05/05  · Data Carving using Artificial Headers Time Cyber Crime! Salon F Mobility Issues! Salon E 4.00-4.30 Evans Richards, Jason Levy and

Thursday. May 22, 2014 :: 2.00-3.30 PM

!!!Thursday. May 22, 2014 :: 3.30-4.00 PM !!

Coffee Break !

!!!!

�13INFORMATION INSTITUTE - SCHEDULE

Time Technological Services!Salon F

Technological Developments!Salon E

2.00-2.30 Hua Dai, Al Salam and Yan Chen Service quality, service consumption experience and relational exchange in electronic mediated environment

Fabian A. Del Valle, Lyan Lugo, Jeffrey Duffany and Alfredo Cruz Comparing Approximate String Matching Algorithms for Digital Forensics

2.30-3.00 Natalie Gerhart, Vess Johnson and Russell Torres The Impact of Privacy Concerns on Mobile Banking: Adaptation of the IS Continuance Model

Kevin Brooks and Jason Levy Securing Automobile Computer Systems to Prevent Cyber Crimes

3.00-3.30 Mohammed Alnatheer Developing an Information Security Culture Model

Daniel Roberts, Nathan Clarke and Fudong Li Data Carving using Artificial Headers

Time Cyber Crime!Salon F

Mobility Issues!Salon E

4.00-4.30 Evans Richards, Jason Levy and Michael D. Roberts Cyberwarfare in the post-Crimea new world order: Challenges and Opportunities for the United States

Zuleika G. Lopez Mobile Security Threat and Countermeasures

4.30-5.00 Richard Thomchick and Tonia San Nicolas-Rocca Application Level Security: A Case Study of a Public Library

Mark Harris and Robert Brookshire Mobile Application Installation Influences: Have Mobile Device Users Become Desensitized to Excessive Permission Requests?

Page 14: Information Institute Conferences...2014/05/05  · Data Carving using Artificial Headers Time Cyber Crime! Salon F Mobility Issues! Salon E 4.00-4.30 Evans Richards, Jason Levy and

Thursday night social: Nine Fine Irishmen New York New York !

7 PM onwards. Pour your own pint here !!!!!!!!

!

�14INFORMATION INSTITUTE - SCHEDULE

Page 15: Information Institute Conferences...2014/05/05  · Data Carving using Artificial Headers Time Cyber Crime! Salon F Mobility Issues! Salon E 4.00-4.30 Evans Richards, Jason Levy and

Friday. May 23, 2014 :: 8.00-9.00 AM Registration and Coffee !

Friday. May 23, 2014 :: 9.00-10.30 AM

!!!Friday. May 23, 2014 :: 10.30-11.00 AM

Coffee (on your own) !!

!!!

�15INFORMATION INSTITUTE - SCHEDULE

Time Innovative topics!Salon F

Technological Security!Salon E

9.00-9.30 Ibrahim Elbeltagi and Hamdi Alomiri The impact of servant leadership on e-services implementation in Saudi Arabia

Steven Furnell and Liam Moore End-user security: No longer a matter of choice?

9.30-10.00 Michael Lapke A Proposal for a Quantitative Analysis of a Qualitative Model

Celedonio Arroyo-Serrano, Alfredo Cruz and Jeffrey Duffani Interactive Learning Tool for Cryptography.

10.00-10.30 Imari Epps and Jason Levy Managing Cyberbullying in the Social Media Era: A Holistic and Proactive Approach

Khandaker Rahman, Danielle Dierich and Ryan Moormann Proposing a Novel Defense Mechanism to Spoof Attacks Targeting Keystroke Dynamics based Cyber-behavioral Biometric Systems

Time ACM Workshop!Salon F

JISSec Workshop!Salon E

11.00-11.45 Godefroy Foteu Stages of growth of security and evolving nature of organizational competences

Brandon Phillips Users Security Perceptions and Antecedents to Security Intention

11.45-12.30 Spyridon Samonas Back to the Future: Cunning Intelligence in Digital Fraud

Michael D. Roberts, Evans Richards and Jason Levy US-China Cyberconflicts in the Post-Cold War Era: A Game-Theoretic Approach

Page 16: Information Institute Conferences...2014/05/05  · Data Carving using Artificial Headers Time Cyber Crime! Salon F Mobility Issues! Salon E 4.00-4.30 Evans Richards, Jason Levy and

Friday. May 23, 2014 :: 1.30-5.00 PM

�16INFORMATION INSTITUTE - SCHEDULE

Time Ethical Hacking!Salon F

Doctoral Consortium!Salon E

1.30-3.00 Ethical Hacking Class Discussion of research in cyber security

3.30-5.00 Ethical Hacking Class Discussion of research in cyber security