-------- Forwarded Message --------
[Apologies for multiple postings]
**********************************************************
Human-centered cybersecurity
https://sites.google.com/view/human-centred-cybersec19/home
***********************************************************
A full day workshop to be held in conjunction with CHITALY 2019
the Biannual Conference of the Italian SIGCHI Chapter
September 23-25, 2019
University of Padova, Italy
https://www.chitaly2019.org/
***********************************************************
***********************************************************
THEME
Cyber-attacks are growing very much in recent years. According to
the
Symantec Annual Threat Report published for 2018, the total number
of
Web threats were more than 1 Billion, the 400% more than the 2014.
With
over 4 billion of mobile phone users worldwide as well as billions
of
under-protected Internet of Things (IoT) devices, there has been a
dramatic rise in cybercrime globally perpetrated at various
levels.
Many cyber-attack preventions focus on systems and technology,
without
addressing user-related issues. Users have been identified as one
of the
major security weaknesses in today’s technologies, as they may be
unaware that their behaviour while interacting with a system may
have
security consequences. The user interface is where the users
interact
with the computer systems. It is where the user’s intention
transforms
into the system operation. It is where the semantic gap arises.
And this
is the aspect that needs more attention to further limit the
effectiveness of cyber attacks. From the cybersecurity analysts
perspective, advanced interactive visualization techniques may be
useful
to describe the features that characterize malware application and
thus
help the in detecting malicious apps.
***********************************************************
TOPICS OF INTEREST
Topics include, but are not limited to:
- Ethical, psychological, sociological and economic issues of
security
and privacy solutions
- Foundations of usable security and privacy
- Human factors in phishing attacks
- Human factors related to Cybersecurity
- Lessons learned from the design, development, use, or evaluation
of
security and privacy systems
- Mental models of attackers and defenders
- New applications of existing models or technology
- Reports of previously published studies and experiments, even
failed
experiences, focusing on the lessons learned from such experiences
- Testing of new or existing solutions for usable security and
privacy
research
- Usable security and privacy for professionals, like network
administrators and developers
- Usable security/privacy evaluation of existing and/or proposed
solutions based, for instance, on laboratory studies, field
studies,
longitudinal studies
- Usable security/privacy of the Internet of Things (IoT)
- Visualization techniques supporting cybersecurity experts and
non-experts
***********************************************************
TARGET AUDIENCE AND EXPECTED OUTCOMES
This workshop is open to everyone who is interested in topics
related to
Cyber attacks, with an emphasis on the aspects related to
Human-Computer
Interaction. We invite participants to present position papers
addressing human-related cybersecurity issues. We are also
interested in
methods, theories and tools for managing cyber attacks.
The contributions accepted for presentation in the workshop will
be
published in the conference adjunct proceedings with an ISBN.
During the workshop we also expect to discuss how to disseminate
individual contributions to the community in the form of a special
issue
in an HCI journal.
***********************************************************
WORKSHOP FORMAT
The workshop will be one-day long.
A keynote statement will be presented by the organizers first,
then
presentations contributed by participants will follow including
proposals for examples to be used as case studies. In the second
part,
participants will discuss the main points raised and get involved
in
group design activities and report to the final plenary session.
Based on the lessons learned, participants will be invited to
draft an
agenda of future work that can be accomplished.
***********************************************************
SUBMISSION INSTRUCTIONS
In order to attend the workshop, participants are invited to
submit
short papers (no longer than 4 pages, including an abstract of up
to 150
words) reporting original academic or industrial research relevant
to
the workshop's theme.
Submissions should be formatted in ACM-SIGCHI format. They have to
be in
PDF format.
Submissions are not anonymous and should include all author names,
affiliations, and contact information.
All submissions will be reviewed by an international program
committee.
Papers are submitted through the EasyChair website
(
https://easychair.org/my/conference?conf=hufacy19)
Upon acceptance, at least one author of each accepted position
paper
must attend the workshop.
***********************************************************
IMPORTANT DATES
Deadline for submission: June 23rd, 2019
Acceptance notification: June 30th, 2019
Workshop date: September 23rd, 2019
***********************************************************
ORGANIZERS
- Carmelo Ardito, University of Bari Aldo Moro, Italy –
carmelo.ardito@uniba.it
- Giuseppe Desolda, University of Bari Aldo Moro, Italy –
giuseppe.desolda@uniba.it
- Francesco Di Nocera, Sapienza - Università di Roma, Italy,
dinocera@uniroma1.it
- Mohamed Khamis, University of Glasgow, UK –
Mohamed.Khamis@glasgow.ac.uk
- Andrea Marrella, Sapienza - Università di Roma, Italy –
marrella@diag.uniroma1.it
_______________________________________________
AISWorld mailing list
AISWorld@lists.aisnet.org