AAU logo

Papers & presentations

SLIDES FOR THE 8TH CMI CONFERENCE, 2015

 

Day 1

 

When Data Protection and Cybersecurity go Hand in Hand by Lena Andersen, Deputy Commissioner, Danish Data Protection Agency

When Cybersecurity Threatens the Values We Aim to Protect by Helge Veum, Head of Audit and Security Department, Norwegian Data Protection Authority

 

Slides from Session 1 - Privacy and Cybersecurity:

Privacy as a Competitive Parameter by Pernille Tranberg, Advisor and Owner, Digital Identity

Cybersecurity, Privacy and Regulation: Principles and Practice by Søren Sandfeld Jakobsen, Professor of IT Law, International Economic Crime and Cybercrime Research Centre (IECC)

Legal Implications of the New European Data Protection Regulation by Michael Hopp, Partner, Plesner law firm

Privacy Challenges and Opportunities for the Enterprise by David Fowler, Chief Privacy Officer, Act-On Software

Enterprise Risk Management and the Role of Cyber Insurance by Berndt Sandell, Senior Vice President - legal expert, Marsh

 

Slides from Session 2 - Cybercrime and Cybersecurity:

Legal Disruption: Jurisdiction, Old Regulation and New Technologies by Lars Bo Langsted, Professor and Director, International Economic Crime and Cybercrime Research Centre (IECC)

The Present Threat Assessment and the Role of Centre for Cybersecurity in Dealing with Cyber Threats by Thomas Kristmar, Head of Policy Dept., Centre for Cybersecurity, Danish Ministry of Defense

Legal, Political, and Technical Impacts of Cybersecurity from the Telecom Perspective by Mathias L. Faaborg, Director, Group Strategy , TDC

The FTC’s (un)Common Law Approach to Cybersecurity by Justin (Gus) Hurwitz, Assistant Professor of Law, Center for Space, Cyber and Telecommunications Law, University of Nebraska

 

Slides from Academic Session 1:

Privacy & Economics in a 5G environment by Samant Khajuria, Assistant Professor, Aalborg University

Factors Affecting the Continuance Use of Mobile Social Media: The Effect of Privacy Concerns by Kwame Simpe Ofori, SMC University, Switzerland; Otu-Larbi Siaw and Eli Fianu, Ghana Technology University College; Eddie Richard Gladjah,University of Cape Coast

The Practical Security and Privacy Risks of a Low-Cost Android Device for the Developing World by Greig Paul and James Irvine, University of Stathclyde, United Kingdom

 

Day 2

 

Emerging Cybersecurity Threats and Challenges by Ole Kjeldsen, National Technology Officer, Microsoft

 

Slides from Session 3 - Educational Initiatives:

CMI Research and Teaching in the Field of Privacy and Cybersecurity by Henning Olesen, Associate Professor, Aalborg University

Cybersecurity Education 2.0 by Stewart Kowalski, Vice Dean and Professor, Norwegian Information Security Laboratory Department of Computer Science and Media Technology, Gjøvik University College, Norway 

 

Slides from Academic Session 2:

Digital Forensic Investigations: Issues of Intangibility, Complications and Inconsistencies in Cybercrimes by Ezer Yeboah-Boateng, GTUC, and Elvis Akwa-Bonsu, 2Detectware Limited, Ghana

Information Security Risk Assessment of Smartphones using Bayesian Networks by Kristian Herland, Heikki Hämmäinen, and Pekka Kekolahti, Aalto University, Finland

On the use of Machine Learning for Identifying Botnet Network Traffic by Matija Stevanovic and Jens Myrup Pedersen, Aalborg University

Forging Trust Communities: How Technology Changes Politics by Irene Wu, Senior Analyst, International Bureau , Federal Communications Commission, USA

How to Build and Manage Trust Online by Christian D. Jensen, Associate Professor, DTU COMPUTE

Making Security Part of Enterprise DNA by Kim Larsen, Chief Security Officer, Huawei