top of page

December 10th (Sunday) : COEX Conference Room 307

11:00 – 12:00 am

Workshop Opening

  • Opening

    • Dan J. Kim (University of North Texas)

    • H. R. Rao (University of Texas at San Antonio)

  • BIG Summit Update

    • Jae Kyu Lee (KAIST & Yonsei University)

  • Keynote

    • ​“The Bright Internet: Opportunities, Challenges and The Road Ahead” Ritu Agarwal (University of Maryland)

3:00 – 4:20 pm

Paper Section A
Section Chair: Kichan Nam (American University of Sharjah)

  • A1. An Attacker-Defender Game in System Exploitation

Kay-Yut Chen1 (University of Texas Arlington), Jingguo Wang (UTA), Laura Marusich (UTA), Jonathan Bakdash (University of Texas Dallas)

  • A2. Assessing Electronic Commerce Firms Participating in Rural Development Projects: A Customer-based Platform Brand Equity Perspective

Liguo Lou (Chonnam National University), Joon Koh (Chonnam National University), Hyun Shik Yoon (Chonnam National University), and Sang-Joon Lee (Chonnam National University) 

  • A3. Automatically Detecting the Resonance of Terrorist Movement Frames

​Ugochukwu Etudo (University of Connecticut) and Victoria Yoon (Virginia Commonwealth University) 

  • A4. Designing Cloud Computing Services Resilient to Distributed Denial of Service Attacks

​Sungjune Park, Chandrasekar Subramaniam (University of North Carolina at Charlotte), Nam K. Kim (Chonnam National University), and Won Seok Yang (Hannam University)

4:40 – 6:00 pm

Paper Section B
Section Chair: Victoria Yoon (Virginia Commonwealth University)

  • B1. The Role of Ethical Climate on Employee’s Perceived Security Risk Assessment

Randi Jiang (Louisiana Tech University), Jaeung Lee (Louisiana Tech University), Tom Stafford Louisiana Tech University), and Selwyn Ellis (Louisiana Tech University)

  • B2. Optimal Payoff for Selective Traceable Anonymity of a Network System

Rasel Md Mamun (University of North Texas), Bongsik Shin (San Diego State University), Bin Mai (UNT), Shailesh Kuikarmi (UNT), and Dan J. Kim (UNT)

  • B3. Perceived Responsibilities of Internet Users on Cybersecurity Issues

Daegon Cho (KAIST), Jaeung Sim (KAIST), and Jae Kyu Lee (KAIST)

  • B4. An Investigation of Cyber-rumor Sharing: The Case of Zika Virus

Rohit Valecha (UTSA), Tejaswi Volety (UTSA), Naga Vemprala (UTSA), K. Hazel Kwon (Arizona State University), and H. Raghav Rao (UTSA)

  • B5. Managing the Risks of Data Security and Privacy in Cloud Computing: A Shared Responsibility between Vendors and Client Organisations

Anup Shrestha (University of Southern Queensland), Omar Ali (University of Southern Queensland), and Michael Lane (University of Southern Queensland)

5:45 pm

Workshop Closing
Dan J. Kim (University of North Texas)

bottom of page