posted by user: nathanclarke || 9741 views || tracked by 12 users: [display]

HAISA 2012 : Sixth International Symposium on Human Aspects of Information Security & Assurance

FacebookTwitterLinkedInGoogle

Link: http://www.haisa.org
 
When Jun 6, 2012 - Jun 8, 2012
Where Crete, Greece
Submission Deadline Feb 13, 2012
Notification Due Apr 30, 2012
Final Version Due Apr 30, 2012
Categories    security   information security   information assurance   ethics
 

Call For Papers

Symposium Concept

It is commonly acknowledged that security requirements cannot be addressed by technical means alone, and that a significant aspect of protection comes down to the attitudes, awareness, behaviour and capabilities of the people involved. Indeed, people can potentially represent a key asset in achieving security, but at present, factors such as lack of awareness and understanding, combined with unreasonable demands from security technologies, can dramatically impede their ability to do so. Ensuring appropriate attention and support for the needs of users should therefore be seen as a vital element of a successful security strategy.

People at all levels (i.e. from organisations to domestic environments; from system administrators to end-users) need to understand security concepts, how the issues may apply to them, and how to use the available technology to protect their systems. In addition, the technology itself can make a contribution by reducing the demands upon users, simplifying protection measures, and automating a variety of safeguards.

With the above in mind, this symposium specifically addresses information security issues that relate to people. It concerns the methods that inform and guide users' understanding of security, and the technologies that can benefit and support them in achieving protection.



Themes

The symposium welcomes papers addressing research and case studies in relation to any aspect of information security that pertains to the attitudes, perceptions and behaviour of people, and how human characteristics or technologies may be positively modified to improve the level of protection. Indicative themes include:

Information security culture
Awareness and education methods
Enhancing risk perception
Public understanding of security
Usable security
Psychological models of security software usage
User acceptance of security policies and technologies
User-friendly authentication methods
Biometric technologies and impacts
Automating security functionality
Non-intrusive security
Assisting security administration
Impacts of standards, policies, compliance requirements
Organizational governance for information assurance
Simplifying risk and threat assessment
Understanding motivations for misuse
Social engineering and other human-related risks
Privacy attitudes and practices
Computer ethics and security

Related Resources

IMCOM 2025   19th International Conference on Ubiquitous Information Management and Communication
WWW 2025   The Web Conference
IEEE BDAI 2025   IEEE--2025 the 8th International Conference on Big Data and Artificial Intelligence (BDAI 2025)
BIBC 2024   5th International Conference on Big Data, IOT and Blockchain
ICISPP--Ei 2025   2025 6th International Conference on Information Security and Privacy Protection (ICISPP 2025)
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
EEI 2024   10th International Conference on Emerging Trends in Electrical, Electronics & Instrumentation Engineering
SPIE-Ei/Scopus-CMLDS 2025   2025 2nd International Conference on Computing, Machine Learning and Data Science (CMLDS 2025) -EI Compendex & Scopus
ICITS 2025   2025 The 13th International Conference on Information Technology and Science (ICITS 2025)
ACM AICCC 2024   ACM--2024 7th Artificial Intelligence and Cloud Computing Conference (AICCC 2024)