SlideShare a Scribd company logo
AFTER THE ATTACK
Hilton Hawaiian Village Waikiki Beach Resort,
3-6 January 2024, Honolulu, Hawaii, USA
01
HICSS.HAWAII.EDU
Introductiontothe
CybercrimeMinitrack
The minitrack
Piotr Siuda
Kazimierz Wielki University
Tuomas J. Harviainen
Tampere University
Juho Hamari
Tampere University
Robert W. Gehl
York University
co-chairs
02
HICSS.HAWAII.EDU
Minitrack in General
Empirical
investiagations
03
Theoretical
insights
HICSS.HAWAII.EDU
Any
methodology
Cybercrime’s
muliptle meanings
State-of-the-art
researrch
First edition in 2023
Giddens, Petter, Bichler, Rivas, Fullilove, Cerny,
Navigating an Interdisciplinary Approach to Cybercrime
Research
Liu, Frank, Warkentin,
Drugs for Sale! An Analysis and Estimation of Drug
Products on the Cryptomarket Ecosystem
Fitzgerald, Mason, Mulhair, Glisson,
Exploiting a Contact Tracing App to Attack Neighboring
Devices
HICSS.HAWAII.EDU
04
Second
edition!
Acceptance Rate: 33.33 %
All accepted papers have a strong focus on how to respond
optimally when organizations and individuals are successfully
cyber-attacked.
Despite initial submissions on a range of significant topics,
the final shape of this year’s minitrack emphasizes the role of
communication in cybercrime research.
05
HICSS.HAWAII.EDU
This year’s papers
HICSS.HAWAII.EDU
Conceal or Communicate?
Organizational
Notifications to
Stakeholders Following
Ransomware Attacks
Paper 1 Paper 2
BP nomination
Paper 3
06
W. Alec Cram
Albert Chan
Jonathan Yuan
Dennis Joo
The Effects of Dark Triad
Traits and Perceived Law
Enforcement Competence
in Responding to
Ransomware Attacks
Understanding
Leadership Competencies
in Cyber Crisis
Management
Truong (Jack) Luu
Michael Jones
Binny Samuel
Nico Abbatemarco
Gianluca Salviotti
Chiara D'Ignazio
L.M. De Rossi
Enjoy!
HICSS.HAWAII.EDU
Feel invited for the third edition
07
All images generated using DALLE-2
The intro paper: https://hdl.handle.net/10125/106890
Prime co-chair email: piotr@ukw.edu.pl
X: @piotrsiuda

More Related Content

Similar to After the Attack: Introduction to the Cybercrime Minitrack

Saif Al KatheeriDr. Gina Gemmel English 161 July, 15th 2019.docx
Saif Al KatheeriDr. Gina Gemmel English 161 July, 15th 2019.docxSaif Al KatheeriDr. Gina Gemmel English 161 July, 15th 2019.docx
Saif Al KatheeriDr. Gina Gemmel English 161 July, 15th 2019.docx
jeffsrosalyn
 
CyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderlandCyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderland
Enrique J Cordero
 
INCIDENT RESPONSE PLAN FOR A SMALL TO MEDIUM SIZED HOSPITAL
INCIDENT RESPONSE PLAN FOR A SMALL TO MEDIUM SIZED HOSPITALINCIDENT RESPONSE PLAN FOR A SMALL TO MEDIUM SIZED HOSPITAL
INCIDENT RESPONSE PLAN FOR A SMALL TO MEDIUM SIZED HOSPITAL
IJNSA Journal
 
Ijnsa050201
Ijnsa050201Ijnsa050201
Ijnsa050201
IJNSA Journal
 
Exploring the Psychological Mechanisms used in Ransomware Splash Screens
Exploring the Psychological Mechanisms used in Ransomware Splash ScreensExploring the Psychological Mechanisms used in Ransomware Splash Screens
Exploring the Psychological Mechanisms used in Ransomware Splash Screens
Jeremiah Grossman
 
CJ513Unit 3 DQTopic #1The Definition of CyberterrorismDi
CJ513Unit 3 DQTopic #1The Definition of CyberterrorismDiCJ513Unit 3 DQTopic #1The Definition of CyberterrorismDi
CJ513Unit 3 DQTopic #1The Definition of CyberterrorismDi
VinaOconner450
 
Gsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awardsGsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awards
Chuck Brooks
 
Developing counter strategy for Information warfare in Health Sector – siftin...
Developing counter strategy for Information warfare in Health Sector – siftin...Developing counter strategy for Information warfare in Health Sector – siftin...
Developing counter strategy for Information warfare in Health Sector – siftin...
TanveerRehman4
 
Fake News in Digital Culture
Fake News in Digital CultureFake News in Digital Culture
Fake News in Digital Culture
Liliana Bounegru
 
EEE3122
EEE3122EEE3122
EEE3122
Kevin Chan
 
Internet2 and Public Health Surveillance
Internet2 and Public Health SurveillanceInternet2 and Public Health Surveillance
Internet2 and Public Health Surveillance
Taha Kass-Hout, MD, MS
 
Power point project for submission ppt (2)
Power point project for submission ppt (2)Power point project for submission ppt (2)
Power point project for submission ppt (2)
mshaner
 
Totally
TotallyTotally
Totally
MEBYER4954
 
Power point project for submission.ppt
Power point project for submission.pptPower point project for submission.ppt
Power point project for submission.ppt
MEBYER4954
 
Perfect font
Perfect fontPerfect font
Perfect font
MEBYER4954
 
Ci2 cyber insurance presentation
Ci2 cyber insurance presentationCi2 cyber insurance presentation
Ci2 cyber insurance presentation
Ethan S. Burger
 
Can We Avert A Cyber-Insurance Market Crisis?
Can We Avert A Cyber-Insurance Market Crisis?Can We Avert A Cyber-Insurance Market Crisis?
Can We Avert A Cyber-Insurance Market Crisis?
Ethan S. Burger
 
lis 3201 Final presentation
lis 3201 Final presentationlis 3201 Final presentation
lis 3201 Final presentation
Monte VanDyke
 
The psychological effects of cyber terrorismMichael L. Gross.docx
The psychological effects of cyber terrorismMichael L. Gross.docxThe psychological effects of cyber terrorismMichael L. Gross.docx
The psychological effects of cyber terrorismMichael L. Gross.docx
oreo10
 
Cyber Weapons Proliferation
Cyber Weapons Proliferation                                 Cyber Weapons Proliferation
Cyber Weapons Proliferation
OllieShoresna
 

Similar to After the Attack: Introduction to the Cybercrime Minitrack (20)

Saif Al KatheeriDr. Gina Gemmel English 161 July, 15th 2019.docx
Saif Al KatheeriDr. Gina Gemmel English 161 July, 15th 2019.docxSaif Al KatheeriDr. Gina Gemmel English 161 July, 15th 2019.docx
Saif Al KatheeriDr. Gina Gemmel English 161 July, 15th 2019.docx
 
CyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderlandCyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderland
 
INCIDENT RESPONSE PLAN FOR A SMALL TO MEDIUM SIZED HOSPITAL
INCIDENT RESPONSE PLAN FOR A SMALL TO MEDIUM SIZED HOSPITALINCIDENT RESPONSE PLAN FOR A SMALL TO MEDIUM SIZED HOSPITAL
INCIDENT RESPONSE PLAN FOR A SMALL TO MEDIUM SIZED HOSPITAL
 
Ijnsa050201
Ijnsa050201Ijnsa050201
Ijnsa050201
 
Exploring the Psychological Mechanisms used in Ransomware Splash Screens
Exploring the Psychological Mechanisms used in Ransomware Splash ScreensExploring the Psychological Mechanisms used in Ransomware Splash Screens
Exploring the Psychological Mechanisms used in Ransomware Splash Screens
 
CJ513Unit 3 DQTopic #1The Definition of CyberterrorismDi
CJ513Unit 3 DQTopic #1The Definition of CyberterrorismDiCJ513Unit 3 DQTopic #1The Definition of CyberterrorismDi
CJ513Unit 3 DQTopic #1The Definition of CyberterrorismDi
 
Gsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awardsGsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awards
 
Developing counter strategy for Information warfare in Health Sector – siftin...
Developing counter strategy for Information warfare in Health Sector – siftin...Developing counter strategy for Information warfare in Health Sector – siftin...
Developing counter strategy for Information warfare in Health Sector – siftin...
 
Fake News in Digital Culture
Fake News in Digital CultureFake News in Digital Culture
Fake News in Digital Culture
 
EEE3122
EEE3122EEE3122
EEE3122
 
Internet2 and Public Health Surveillance
Internet2 and Public Health SurveillanceInternet2 and Public Health Surveillance
Internet2 and Public Health Surveillance
 
Power point project for submission ppt (2)
Power point project for submission ppt (2)Power point project for submission ppt (2)
Power point project for submission ppt (2)
 
Totally
TotallyTotally
Totally
 
Power point project for submission.ppt
Power point project for submission.pptPower point project for submission.ppt
Power point project for submission.ppt
 
Perfect font
Perfect fontPerfect font
Perfect font
 
Ci2 cyber insurance presentation
Ci2 cyber insurance presentationCi2 cyber insurance presentation
Ci2 cyber insurance presentation
 
Can We Avert A Cyber-Insurance Market Crisis?
Can We Avert A Cyber-Insurance Market Crisis?Can We Avert A Cyber-Insurance Market Crisis?
Can We Avert A Cyber-Insurance Market Crisis?
 
lis 3201 Final presentation
lis 3201 Final presentationlis 3201 Final presentation
lis 3201 Final presentation
 
The psychological effects of cyber terrorismMichael L. Gross.docx
The psychological effects of cyber terrorismMichael L. Gross.docxThe psychological effects of cyber terrorismMichael L. Gross.docx
The psychological effects of cyber terrorismMichael L. Gross.docx
 
Cyber Weapons Proliferation
Cyber Weapons Proliferation                                 Cyber Weapons Proliferation
Cyber Weapons Proliferation
 

More from Piotr Siuda

Workshop: AI's Role in Scientific Research
Workshop: AI's Role in Scientific ResearchWorkshop: AI's Role in Scientific Research
Workshop: AI's Role in Scientific Research
Piotr Siuda
 
Comparing Drug Trade on Tor in Finnish, Polish, and English Speaking Cultures
Comparing Drug Trade on Tor in Finnish, Polish, and English Speaking CulturesComparing Drug Trade on Tor in Finnish, Polish, and English Speaking Cultures
Comparing Drug Trade on Tor in Finnish, Polish, and English Speaking Cultures
Piotr Siuda
 
Writing for Top-Tier Journals. Learn How to Impress the Editors and Increase ...
Writing for Top-Tier Journals. Learn How to Impress the Editors and Increase ...Writing for Top-Tier Journals. Learn How to Impress the Editors and Increase ...
Writing for Top-Tier Journals. Learn How to Impress the Editors and Increase ...
Piotr Siuda
 
Popularizing and Connecting Esports Research: Introduction to the Esports Min...
Popularizing and Connecting Esports Research: Introduction to the Esports Min...Popularizing and Connecting Esports Research: Introduction to the Esports Min...
Popularizing and Connecting Esports Research: Introduction to the Esports Min...
Piotr Siuda
 
The Next Level of Horror Entertainment: Facing Fear in Cooperative Interactiv...
The Next Level of Horror Entertainment: Facing Fear in Cooperative Interactiv...The Next Level of Horror Entertainment: Facing Fear in Cooperative Interactiv...
The Next Level of Horror Entertainment: Facing Fear in Cooperative Interactiv...
Piotr Siuda
 
Dziesięć lat kierunku humanistyka drugiej generacji. Czas zmian i plany na pr...
Dziesięć lat kierunku humanistyka drugiej generacji. Czas zmian i plany na pr...Dziesięć lat kierunku humanistyka drugiej generacji. Czas zmian i plany na pr...
Dziesięć lat kierunku humanistyka drugiej generacji. Czas zmian i plany na pr...
Piotr Siuda
 
Sztuczna inteligencja (AI), gry i edukacja
Sztuczna inteligencja (AI), gry i edukacjaSztuczna inteligencja (AI), gry i edukacja
Sztuczna inteligencja (AI), gry i edukacja
Piotr Siuda
 
Media sports and esports during the COVID-19 pandemic - project report
Media sports and esports during the COVID-19 pandemic - project reportMedia sports and esports during the COVID-19 pandemic - project report
Media sports and esports during the COVID-19 pandemic - project report
Piotr Siuda
 
Darknet imaginaries: The discursive malleability of the cultural status of di...
Darknet imaginaries: The discursive malleability of the cultural status of di...Darknet imaginaries: The discursive malleability of the cultural status of di...
Darknet imaginaries: The discursive malleability of the cultural status of di...
Piotr Siuda
 
Toward Successful Esports Team: How Does National Diversity Affect Multiplaye...
Toward Successful Esports Team: How Does National Diversity Affect Multiplaye...Toward Successful Esports Team: How Does National Diversity Affect Multiplaye...
Toward Successful Esports Team: How Does National Diversity Affect Multiplaye...
Piotr Siuda
 
Microtransaction Politics in FIFA Ultimate Team: Game Fans, Twitch Streamers,...
Microtransaction Politics in FIFA Ultimate Team: Game Fans, Twitch Streamers,...Microtransaction Politics in FIFA Ultimate Team: Game Fans, Twitch Streamers,...
Microtransaction Politics in FIFA Ultimate Team: Game Fans, Twitch Streamers,...
Piotr Siuda
 
Cancer on TikTok–Evaluating Online Self-Disclosure Using Directed Content Ana...
Cancer on TikTok–Evaluating Online Self-Disclosure Using Directed Content Ana...Cancer on TikTok–Evaluating Online Self-Disclosure Using Directed Content Ana...
Cancer on TikTok–Evaluating Online Self-Disclosure Using Directed Content Ana...
Piotr Siuda
 
Imaginaria darknetu w internetowych memach
Imaginaria darknetu w internetowych memachImaginaria darknetu w internetowych memach
Imaginaria darknetu w internetowych memach
Piotr Siuda
 
Sacrum w sieci. Definicje, sposby badań, typologie
Sacrum w sieci. Definicje, sposby badań, typologieSacrum w sieci. Definicje, sposby badań, typologie
Sacrum w sieci. Definicje, sposby badań, typologie
Piotr Siuda
 
Pisanie artykułów naukowych
Pisanie artykułów naukowychPisanie artykułów naukowych
Pisanie artykułów naukowych
Piotr Siuda
 
Sport w czasach pandemii. O powiązaniu sportu, mediów i gier
Sport w czasach pandemii. O powiązaniu sportu, mediów i gierSport w czasach pandemii. O powiązaniu sportu, mediów i gier
Sport w czasach pandemii. O powiązaniu sportu, mediów i gier
Piotr Siuda
 
Starzenie się a nowe technologie komunikacyjne
Starzenie się a nowe technologie komunikacyjneStarzenie się a nowe technologie komunikacyjne
Starzenie się a nowe technologie komunikacyjne
Piotr Siuda
 
Film on Demand
Film on DemandFilm on Demand
Film on Demand
Piotr Siuda
 
Netflix - fenomen i przyszlość
Netflix - fenomen i przyszlośćNetflix - fenomen i przyszlość
Netflix - fenomen i przyszlość
Piotr Siuda
 
Religia i internet. Kilka uwag teoretycznych
Religia i internet. Kilka uwag teoretycznychReligia i internet. Kilka uwag teoretycznych
Religia i internet. Kilka uwag teoretycznych
Piotr Siuda
 

More from Piotr Siuda (20)

Workshop: AI's Role in Scientific Research
Workshop: AI's Role in Scientific ResearchWorkshop: AI's Role in Scientific Research
Workshop: AI's Role in Scientific Research
 
Comparing Drug Trade on Tor in Finnish, Polish, and English Speaking Cultures
Comparing Drug Trade on Tor in Finnish, Polish, and English Speaking CulturesComparing Drug Trade on Tor in Finnish, Polish, and English Speaking Cultures
Comparing Drug Trade on Tor in Finnish, Polish, and English Speaking Cultures
 
Writing for Top-Tier Journals. Learn How to Impress the Editors and Increase ...
Writing for Top-Tier Journals. Learn How to Impress the Editors and Increase ...Writing for Top-Tier Journals. Learn How to Impress the Editors and Increase ...
Writing for Top-Tier Journals. Learn How to Impress the Editors and Increase ...
 
Popularizing and Connecting Esports Research: Introduction to the Esports Min...
Popularizing and Connecting Esports Research: Introduction to the Esports Min...Popularizing and Connecting Esports Research: Introduction to the Esports Min...
Popularizing and Connecting Esports Research: Introduction to the Esports Min...
 
The Next Level of Horror Entertainment: Facing Fear in Cooperative Interactiv...
The Next Level of Horror Entertainment: Facing Fear in Cooperative Interactiv...The Next Level of Horror Entertainment: Facing Fear in Cooperative Interactiv...
The Next Level of Horror Entertainment: Facing Fear in Cooperative Interactiv...
 
Dziesięć lat kierunku humanistyka drugiej generacji. Czas zmian i plany na pr...
Dziesięć lat kierunku humanistyka drugiej generacji. Czas zmian i plany na pr...Dziesięć lat kierunku humanistyka drugiej generacji. Czas zmian i plany na pr...
Dziesięć lat kierunku humanistyka drugiej generacji. Czas zmian i plany na pr...
 
Sztuczna inteligencja (AI), gry i edukacja
Sztuczna inteligencja (AI), gry i edukacjaSztuczna inteligencja (AI), gry i edukacja
Sztuczna inteligencja (AI), gry i edukacja
 
Media sports and esports during the COVID-19 pandemic - project report
Media sports and esports during the COVID-19 pandemic - project reportMedia sports and esports during the COVID-19 pandemic - project report
Media sports and esports during the COVID-19 pandemic - project report
 
Darknet imaginaries: The discursive malleability of the cultural status of di...
Darknet imaginaries: The discursive malleability of the cultural status of di...Darknet imaginaries: The discursive malleability of the cultural status of di...
Darknet imaginaries: The discursive malleability of the cultural status of di...
 
Toward Successful Esports Team: How Does National Diversity Affect Multiplaye...
Toward Successful Esports Team: How Does National Diversity Affect Multiplaye...Toward Successful Esports Team: How Does National Diversity Affect Multiplaye...
Toward Successful Esports Team: How Does National Diversity Affect Multiplaye...
 
Microtransaction Politics in FIFA Ultimate Team: Game Fans, Twitch Streamers,...
Microtransaction Politics in FIFA Ultimate Team: Game Fans, Twitch Streamers,...Microtransaction Politics in FIFA Ultimate Team: Game Fans, Twitch Streamers,...
Microtransaction Politics in FIFA Ultimate Team: Game Fans, Twitch Streamers,...
 
Cancer on TikTok–Evaluating Online Self-Disclosure Using Directed Content Ana...
Cancer on TikTok–Evaluating Online Self-Disclosure Using Directed Content Ana...Cancer on TikTok–Evaluating Online Self-Disclosure Using Directed Content Ana...
Cancer on TikTok–Evaluating Online Self-Disclosure Using Directed Content Ana...
 
Imaginaria darknetu w internetowych memach
Imaginaria darknetu w internetowych memachImaginaria darknetu w internetowych memach
Imaginaria darknetu w internetowych memach
 
Sacrum w sieci. Definicje, sposby badań, typologie
Sacrum w sieci. Definicje, sposby badań, typologieSacrum w sieci. Definicje, sposby badań, typologie
Sacrum w sieci. Definicje, sposby badań, typologie
 
Pisanie artykułów naukowych
Pisanie artykułów naukowychPisanie artykułów naukowych
Pisanie artykułów naukowych
 
Sport w czasach pandemii. O powiązaniu sportu, mediów i gier
Sport w czasach pandemii. O powiązaniu sportu, mediów i gierSport w czasach pandemii. O powiązaniu sportu, mediów i gier
Sport w czasach pandemii. O powiązaniu sportu, mediów i gier
 
Starzenie się a nowe technologie komunikacyjne
Starzenie się a nowe technologie komunikacyjneStarzenie się a nowe technologie komunikacyjne
Starzenie się a nowe technologie komunikacyjne
 
Film on Demand
Film on DemandFilm on Demand
Film on Demand
 
Netflix - fenomen i przyszlość
Netflix - fenomen i przyszlośćNetflix - fenomen i przyszlość
Netflix - fenomen i przyszlość
 
Religia i internet. Kilka uwag teoretycznych
Religia i internet. Kilka uwag teoretycznychReligia i internet. Kilka uwag teoretycznych
Religia i internet. Kilka uwag teoretycznych
 

Recently uploaded

Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
Tarandeep Singh
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
thezot
 
cyber crime.pptx..........................
cyber crime.pptx..........................cyber crime.pptx..........................
cyber crime.pptx..........................
GNAMBIKARAO
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
Donato Onofri
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
APNIC
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
APNIC
 
How to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdfHow to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdf
Infosec train
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
rtunex8r
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
3a0sd7z3
 
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
dtagbe
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
3a0sd7z3
 

Recently uploaded (11)

Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
 
cyber crime.pptx..........................
cyber crime.pptx..........................cyber crime.pptx..........................
cyber crime.pptx..........................
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
 
How to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdfHow to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdf
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
 
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
 

After the Attack: Introduction to the Cybercrime Minitrack

  • 1. AFTER THE ATTACK Hilton Hawaiian Village Waikiki Beach Resort, 3-6 January 2024, Honolulu, Hawaii, USA 01 HICSS.HAWAII.EDU Introductiontothe CybercrimeMinitrack
  • 2. The minitrack Piotr Siuda Kazimierz Wielki University Tuomas J. Harviainen Tampere University Juho Hamari Tampere University Robert W. Gehl York University co-chairs 02 HICSS.HAWAII.EDU
  • 4. First edition in 2023 Giddens, Petter, Bichler, Rivas, Fullilove, Cerny, Navigating an Interdisciplinary Approach to Cybercrime Research Liu, Frank, Warkentin, Drugs for Sale! An Analysis and Estimation of Drug Products on the Cryptomarket Ecosystem Fitzgerald, Mason, Mulhair, Glisson, Exploiting a Contact Tracing App to Attack Neighboring Devices HICSS.HAWAII.EDU 04
  • 5. Second edition! Acceptance Rate: 33.33 % All accepted papers have a strong focus on how to respond optimally when organizations and individuals are successfully cyber-attacked. Despite initial submissions on a range of significant topics, the final shape of this year’s minitrack emphasizes the role of communication in cybercrime research. 05 HICSS.HAWAII.EDU
  • 6. This year’s papers HICSS.HAWAII.EDU Conceal or Communicate? Organizational Notifications to Stakeholders Following Ransomware Attacks Paper 1 Paper 2 BP nomination Paper 3 06 W. Alec Cram Albert Chan Jonathan Yuan Dennis Joo The Effects of Dark Triad Traits and Perceived Law Enforcement Competence in Responding to Ransomware Attacks Understanding Leadership Competencies in Cyber Crisis Management Truong (Jack) Luu Michael Jones Binny Samuel Nico Abbatemarco Gianluca Salviotti Chiara D'Ignazio L.M. De Rossi
  • 7. Enjoy! HICSS.HAWAII.EDU Feel invited for the third edition 07 All images generated using DALLE-2 The intro paper: https://hdl.handle.net/10125/106890 Prime co-chair email: piotr@ukw.edu.pl X: @piotrsiuda