IS2 -> Information Technology, Risk and Security | ||
Time: 10:15AM to 11:30 AM on Thursday, February 26 | ||
Place: Pulaski | ||
Session Chair: Cheryl L. Aasheim, Georgia Southern University | ||
  | ||
A Taxonomy of Android Vulnerabilities | ||
by: | Jordan D. Shropshire, University of South Alabama (Corresponding) | |
Jon W. Chapman, University of South Alabama | ||
Christopher A. Kadlec, Georgia Southern University | ||
Information Technology (IT) Risks in Healthcare - A Practitioner's Perspective | ||
by: | Elizabeth H. Lowry, (No Affiliation) (Corresponding) | |
Reconciling Enterprise Security Concerns with the BYOD Trend | ||
by: | Kevin Lee Elder, Georgia College & State University (Corresponding) | |
Mark Barnhill, Georgia College & State University | ||
John N. Dyer, Georgia Southern University | ||
Ronald J. MacKinnon, Georgia Southern University | ||
Discussants: | ||
Kevin Lee Elder, Georgia College & State University | ||
Christopher A. Kadlec, Georgia Southern University | ||
Elizabeth H. Lowry, (No Affiliation) |
Updated 02/21/2015