[AISWorld] Extended Deadline - Workshop on ​Human-centered cybersecurity at CHItaly 2019

Andrea Marrella marrella at diag.uniroma1.it
Thu Jun 20 04:50:23 EDT 2019


[Apologies for multiple postings]

**********************************************************
Human-centered cybersecurity

https://sites.google.com/view/human-centred-cybersec19/home

***********************************************************

A full day workshop to be held in conjunction with CHITALY 2019 the
Biannual Conference of the Italian SIGCHI Chapter
September 23-25, 2019
University of Padova, Italy

https://www.chitaly2019.org/

***********************************************************

***********************************************************
THEME
Cyber-attacks are growing very much in recent years. According to the
Symantec Annual Threat Report published for 2018, the total number of
Web threats were more than 1 Billion, the 400% more than the 2014. With
over 4 billion of mobile phone users worldwide as well as billions of
under-protected Internet of Things (IoT) devices, there has been a
dramatic rise in cybercrime globally perpetrated at various levels.
Many cyber-attack preventions focus on systems and technology, without
addressing user-related issues. Users have been identified as one of the
major security weaknesses in today’s technologies, as they may be
unaware that their behaviour while interacting with a system may have
security consequences. The user interface is where the users interact
with the computer systems. It is where the user’s intention transforms
into the system operation. It is where the semantic gap arises. And this
is the aspect that needs more attention to further limit the
effectiveness of cyber attacks. From the cybersecurity analysts
perspective, advanced interactive visualization techniques may be useful
to describe the features that characterize malware application and thus
help the in detecting malicious apps.

***********************************************************
TOPICS OF INTEREST
Topics include, but are not limited to:
- Ethical, psychological, sociological and economic issues of security
and privacy solutions
- Foundations of usable security and privacy
- Human factors in phishing attacks
- Human factors related to Cybersecurity
- Lessons learned from the design, development, use, or evaluation of
security and privacy systems
- Mental models of attackers and defenders
- New applications of existing models or technology
- Reports of previously published studies and experiments, even failed
experiences, focusing on the lessons learned from such experiences
- Testing of new or existing solutions for usable security and privacy
research
- Usable security and privacy for professionals, like network
administrators and developers
- Usable security/privacy evaluation of existing and/or proposed
solutions based, for instance, on laboratory studies, field studies,
longitudinal studies
- Usable security/privacy of the Internet of Things (IoT)
- Visualization techniques supporting cybersecurity experts and non-experts

***********************************************************
TARGET AUDIENCE AND EXPECTED OUTCOMES
This workshop is open to everyone who is interested in topics related to
Cyber attacks, with an emphasis on the aspects related to Human-Computer
Interaction. We invite participants to present position papers
addressing human-related cybersecurity issues. We are also interested in
methods, theories and tools for managing cyber attacks.
The contributions accepted for presentation in the workshop will be
published in the conference adjunct proceedings with an ISBN.
During the workshop we also expect to discuss how to disseminate
individual contributions to the community in the form of a special issue
in an HCI journal.

***********************************************************
WORKSHOP FORMAT
The workshop will be one-day long.
A keynote statement will be presented by the organizers first, then
presentations contributed by participants will follow including
proposals for examples to be used as case studies. In the second part,
participants will discuss the main points raised and get involved in
group design activities and report to the final plenary session.
Based on the lessons learned, participants will be invited to draft an
agenda of future work that can be accomplished.

***********************************************************
SUBMISSION INSTRUCTIONS
In order to attend the workshop, participants are invited to submit
short papers (no longer than 4 pages, including an abstract of up to 150
words) reporting original academic or industrial research relevant to
the workshop's theme.
Submissions should be formatted in ACM-SIGCHI format. They have to be in
PDF format.
Submissions are not anonymous and should include all author names,
affiliations, and contact information.
All submissions will be reviewed by an international program committee.

Papers are submitted through the EasyChair website
(https://easychair.org/my/conference?conf=hufacy19)

Upon acceptance, at least one author of each accepted position paper
must attend the workshop.

***********************************************************
IMPORTANT DATES
Deadline for submission: June 30th, 2019 (Extended)
Acceptance notification: July 7th, 2019
Workshop date: September 23rd, 2019

***********************************************************
ORGANIZERS
- Carmelo Ardito, University of Bari Aldo Moro, Italy –
carmelo.ardito at uniba.it
- Giuseppe Desolda, University of Bari Aldo Moro, Italy –
giuseppe.desolda at uniba.it
- Francesco Di Nocera, Sapienza - Università di Roma, Italy,
dinocera at uniroma1.it
- Mohamed Khamis, University of Glasgow, UK – Mohamed.Khamis at glasgow.ac.uk
- Andrea Marrella, Sapienza - Università di Roma, Italy –
marrella at diag.uniroma1.it



More information about the AISWorld mailing list