posted by organizer: cdesolda || 1640 views || tracked by 2 users: [display]

Human-centered cybersecurity 2019 : The 1st International Workshop on Human-centered cybersecurity - in conjunction with CHITALY 2019

FacebookTwitterLinkedInGoogle

Link: https://sites.google.com/view/human-centred-cybersec19/home
 
When Sep 23, 2019 - Sep 23, 2019
Where Padova, Italy
Submission Deadline Jun 23, 2019
Notification Due Jun 30, 2019
Final Version Due Jul 5, 2019
Categories    cybersecurity   human-compter interaction   usable security
 

Call For Papers

[Apologies for multiple postings]

**********************************************************
Human-centered cybersecurity

https://sites.google.com/view/human-centred-cybersec19/home

***********************************************************

A full day workshop to be held in conjunction with CHITALY 2019
the Biannual Conference of the Italian SIGCHI Chapter
September 23-25, 2019
University of Padova, Italy

https://www.chitaly2019.org/

***********************************************************

***********************************************************
THEME
Cyber-attacks are growing very much in recent years. According to the Symantec Annual Threat Report published for 2018, the total number of Web threats were more than 1 Billion, the 400% more than the 2014. With over 4 billion of mobile phone users worldwide as well as billions of under-protected Internet of Things (IoT) devices, there has been a dramatic rise in cybercrime globally perpetrated at various levels.
Many cyber-attack preventions focus on systems and technology, without addressing user-related issues. Users have been identified as one of the major security weaknesses in today’s technologies, as they may be unaware that their behaviour while interacting with a system may have security consequences. The user interface is where the users interact with the computer systems. It is where the user’s intention transforms into the system operation. It is where the semantic gap arises. And this is the aspect that needs more attention to further limit the effectiveness of cyber attacks. From the cybersecurity analysts perspective, advanced interactive visualization techniques may be useful to describe the features that characterize malware application and thus help the in detecting malicious apps.

***********************************************************
TOPICS OF INTEREST
Topics include, but are not limited to:
- Ethical, psychological, sociological and economic issues of security and privacy solutions
- Foundations of usable security and privacy
- Human factors in phishing attacks
- Human factors related to Cybersecurity
- Lessons learned from the design, development, use, or evaluation of security and privacy systems
- Mental models of attackers and defenders
- New applications of existing models or technology
- Reports of previously published studies and experiments, even failed experiences, focusing on the lessons learned from such experiences
- Testing of new or existing solutions for usable security and privacy research
- Usable security and privacy for professionals, like network administrators and developers
- Usable security/privacy evaluation of existing and/or proposed solutions based, for instance, on laboratory studies, field studies, longitudinal studies
- Usable security/privacy of the Internet of Things (IoT)
- Visualization techniques supporting cybersecurity experts and non-experts

***********************************************************
TARGET AUDIENCE AND EXPECTED OUTCOMES
This workshop is open to everyone who is interested in topics related to Cyber attacks, with an emphasis on the aspects related to Human-Computer Interaction. We invite participants to present position papers addressing human-related cybersecurity issues. We are also interested in methods, theories and tools for managing cyber attacks.
The contributions accepted for presentation in the workshop will be published in the conference adjunct proceedings with an ISBN.
During the workshop we also expect to discuss how to disseminate individual contributions to the community in the form of a special issue in an HCI journal.

***********************************************************
WORKSHOP FORMAT
The workshop will be one-day long.
A keynote statement will be presented by the organizers first, then presentations contributed by participants will follow including proposals for examples to be used as case studies. In the second part, participants will discuss the main points raised and get involved in group design activities and report to the final plenary session.
Based on the lessons learned, participants will be invited to draft an agenda of future work that can be accomplished.

***********************************************************
SUBMISSION INSTRUCTIONS
In order to attend the workshop, participants are invited to submit short papers (no longer than 4 pages, including an abstract of up to 150 words) reporting original academic or industrial research relevant to
the workshop's theme.
Submissions should be formatted in ACM-SIGCHI format. They have to be in PDF format.
Submissions are not anonymous and should include all author names, affiliations, and contact information.
All submissions will be reviewed by an international program committee.

Papers are submitted through the EasyChair website
(https://easychair.org/my/conference?conf=hufacy19)

Upon acceptance, at least one author of each accepted position paper
must attend the workshop.

***********************************************************
IMPORTANT DATES
Deadline for submission: June 23rd, 2019
Acceptance notification: June 30th, 2019
Workshop date: September 23rd, 2019

***********************************************************
ORGANIZERS
- Carmelo Ardito, University of Bari Aldo Moro, Italy – carmelo.ardito@uniba.it
- Giuseppe Desolda, University of Bari Aldo Moro, Italy – giuseppe.desolda@uniba.it
- Francesco Di Nocera, Sapienza - Università di Roma, Italy, dinocera@uniroma1.it
- Mohamed Khamis, University of Glasgow, UK – Mohamed.Khamis@glasgow.ac.uk
- Andrea Marrella, Sapienza - Università di Roma, Italy – marrella@diag.uniroma1.it

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
FLAIRS 2025   Florida Artificial Intelligence Research Society
Applied Sciences (MDPI) SI:Cybersecurity 2024   Applied Sciences (MDPI) Special Issue - Cybersecurity: Advances in Security and Privacy Enhancing Technology
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
ICITA 2025   19th International Conference on Information Technology and Applications
CCS 2025   ACM Conference on Computer and Communications Security 2024 (round 2)
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
CENTRIC 2025   The Eighteenth International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services
WCSE--EI 2025   2025 The 15th International Workshop on Computer Science and Engineering (WCSE 2025)
ICSC 2025   The Fifth Intelligent Cybersecurity Conference