Workshop #1 Introduction to Intrusion Detection
Room: Manchester
Refreshment Break
Room: Foyer
Luncheon and Keynote
Trefor Munn-Venn, Conference Board of Canada Room: Ballroom AB
Workshop #2 Interactive Privacy: Utilizing Assessments to Support Effective Decision-Making
Room: Manchester
Refreshment Break
Room: Foyer
Workshop #3 Towards an Open Source Vulnerability Assessment Framework
Room: Robertson
Networking Reception (NB Museum, Hall of Great Whales)
Wednesday August 26, 2009
8:00
8:30 a.m.
9:00 a.m
10:00 a.m.
10:30 - 12:00 a.m.
12:00 Noon
1:30 p.m.
2:30 p.m.
3:00 - 4:30 p.m.
4:30 -6:00 p.m
6:30 p.m.
Breakfast
Room: Foyer
Official Opening
Keynote #1
Dr. Viswanath Venkatesh, University of Arkansas
Room: Ballroom AB
Refreshment Break
Room: Foyer
Paper Session #1A
Theme: eHealth,
Room: Ballroom AB
Chair: Norman Archer, McMaster University
Adoption of SMS for Health Adherence: A Consumer Perspective Mihail Cocosila, Norm Archer, and Yufei Yuan
Non-intrusive Patient Monitoring of Alzheimer’s Disease Subjects Using Wireless Sensor Networks Marco Avvenuti, Christopher Baker, Janet Light, Dan Tulpan, and Alessio Vecchio
Opportunities and Challenges in Creating Mobile Work Support for Community Nurses David Daglish
Paper Session #1B
Theme: eInnovation
Room: Manchester
Chair: Michael Bliemel, Dalhousie University
A Critical Discourse Analysis of Amazon.com’s Rise in the Media 1995-2008 Wendy Cukier, Jaigris Hodson, and Peter M. Ryan
Weaving Innovation into the Fabric of Transformation: An e-Training Approach to Innovation Ed Leach, Timothy Little, and Mary Kilfoil
Luncheon and Keynote #2
Dr. Mark Williamson, DRDC Centre for Security Science, Ottawa
Room: Ballroom AB
Keynote #3
Al Valdes, SRI International, USA
Room: Ballroom AB
Refreshment Break
Room: Foyer
Paper Session #2A,
Theme: eHealth
Room: Ballroom AB
Chair: Norman Archer, McMaster University
Electronic Personal Health Record Systems: A Brief Review of Privacy, Security, and Architectural Issues David Daglish and Norm Archer
Improving EMR System Adoption in Canadian Medical Practice: A Research Model Norm Archer and Mihail Cocosila
The Discharge Summary Divide: a review of electronic solutions, obstacles and benefits Jagdeep Kaur, Margaret Leyland, Danielle Hunter, and Jane Sparkes
Paper Session #2B Theme: Security
Room: Manchester
Chair: Nur Zincir-Heywood, Dalhousie University
Performance Comparison of Four Rule Sets: An Example for Encrypted Traffic Classification Riyad Alshammari, A. Nur Zincir-Heywood, and Abdel Aziz Farrag
Classification and discovery of rule misconfigurations in intrusion detection and response devices Yao Li and Ali A. Ghorbani
Worm Analysis and Changes in Host Behaviors During Worm Outbreaks Sunny Jamwal and John McHugh
Paper Session #3A
Theme: eHealth
Room: Ballroom AB
Chair: Norman Archer, McMaster University
Project Control for Healthcare Information Systems Initiatives Lorne D. Booker , Helena Trabulsi
A Framework for Continuous Compliance Monitoring of eHealth Processes Grant Middleton, Liam Peyton, Craig Kuziemsky, and Ben Eze
Development of Best Practices for Implementation of Information Technology (IT) Systems in the Healthcare Sector in Canada (short paper) Jagdeep Kaur
Paper Session #3B
Theme:Security & Practitioner paper
Room: Manchester
Chair: Nur Zincir-Heywood, Dalhousie University
Criteria for Evaluating Mobile Technologies for Crisis Response Steven Way
Securing First Response Coordination With Dynamic Attribute-Based Encryption Stefan G. Weber
Dealing with Internet Mediated Securities Fraud Jake van der Laan (Practitioner paper)
Banquet
Room: Trinity Royal
Thursday August 27, 2009
8:00
9:00 a.m.
10:30 a.m.
10:30 - 12:00 a.m.
12:00 Noon
1:30 -3:00 p.m.
Breakfast
Room: Foyer
Keynote #4
John Weigelt, Microsoft Canada
Room: Ballroom AB
Refreshment Break
Room: Foyer
Paper Session #4A
Theme: Privacy
Room: Ballroom AB
Chair: David Townsend, University of New Brunswick
A Gap in Perceived Importance of Privacy Policies between Individuals and Companies Efrim Boritz and Won Gyun No
Why Privacy Matters in Health Care Delivery: a Value Proposition Howard Simkevitz
Protecting Privacy of Sensitive Data Dissemination Using Active Bundles Lotfi Ben Othmane and Leszek Lilien
Research data in Google Earth: how do we protect privacy and meet ethical obligations? Gregory J Fleet and Micah Williamson
Paper Session: #4B
Theme: HCI
Room: Manchester
Chair: Milena Head, McMaster University
Web Authentication using Mikon Images Karen Renaud
Integrating Change Management into Clinical Health Information Technology Project Practice Margaret Leyland, Danielle Hunter, and James Dietrich
Usability Inspection of Anonymity Networks Dhiah el Diehn I. Abou-Tair, Lexi Pimenidis, Jens Schomburg and Benedikt Westermann
Luncheon andKeynote #5 Walid Hejazi, Telus and University of Toronto
Room: Ballroom AB
Paper Session: 5A
Themes: eGovernment & Trust
Room: Ballroom AB
Chair: William McIver, Jr.
Web 2.0 and E-Government at the Municipal Level Raoul J. Freeman and Peter Loo
Synergies of Different Reputation Systems: Challenges and Opportunities Le-Hung Vu, Thanasis G. Papaioannou, and Karl Aberer
Paper Session: 5B
Theme: Graduate Symposium
Room: Manchester
Chair: Wei Lu, University of New Brunswick &
Natalia Stakhanova, University of New Brunswick
Context-aware Data Association and Authenticity in Pervasive Healthcare Maksudul Alam Chowdhury and Janet Light
A Trustworthy Identity Management Architecture for e-Government Processes Sohail Khan and Amir Hayat
Trust Management in Opportunistic Networks: A Semantic Web Approach Elvira Bonilla Tamez, Isaac Woungang, Leszek Lilien, and Mieso K. Denko
Formal Analysis of Access Control Policies for Pattern-based Business Processes Vahid R. Karimi