posted by organizer: cdesolda || 878 views || tracked by 2 users: [display]

Human-centered cybersecurity 2019 : The 1st International Workshop on Human-centered cybersecurity - in conjunction with CHITALY 2019


When Sep 23, 2019 - Sep 23, 2019
Where Padova, Italy
Submission Deadline Jun 23, 2019
Notification Due Jun 30, 2019
Final Version Due Jul 5, 2019
Categories    cybersecurity   human-compter interaction   usable security

Call For Papers

[Apologies for multiple postings]

Human-centered cybersecurity


A full day workshop to be held in conjunction with CHITALY 2019
the Biannual Conference of the Italian SIGCHI Chapter
September 23-25, 2019
University of Padova, Italy


Cyber-attacks are growing very much in recent years. According to the Symantec Annual Threat Report published for 2018, the total number of Web threats were more than 1 Billion, the 400% more than the 2014. With over 4 billion of mobile phone users worldwide as well as billions of under-protected Internet of Things (IoT) devices, there has been a dramatic rise in cybercrime globally perpetrated at various levels.
Many cyber-attack preventions focus on systems and technology, without addressing user-related issues. Users have been identified as one of the major security weaknesses in today’s technologies, as they may be unaware that their behaviour while interacting with a system may have security consequences. The user interface is where the users interact with the computer systems. It is where the user’s intention transforms into the system operation. It is where the semantic gap arises. And this is the aspect that needs more attention to further limit the effectiveness of cyber attacks. From the cybersecurity analysts perspective, advanced interactive visualization techniques may be useful to describe the features that characterize malware application and thus help the in detecting malicious apps.

Topics include, but are not limited to:
- Ethical, psychological, sociological and economic issues of security and privacy solutions
- Foundations of usable security and privacy
- Human factors in phishing attacks
- Human factors related to Cybersecurity
- Lessons learned from the design, development, use, or evaluation of security and privacy systems
- Mental models of attackers and defenders
- New applications of existing models or technology
- Reports of previously published studies and experiments, even failed experiences, focusing on the lessons learned from such experiences
- Testing of new or existing solutions for usable security and privacy research
- Usable security and privacy for professionals, like network administrators and developers
- Usable security/privacy evaluation of existing and/or proposed solutions based, for instance, on laboratory studies, field studies, longitudinal studies
- Usable security/privacy of the Internet of Things (IoT)
- Visualization techniques supporting cybersecurity experts and non-experts

This workshop is open to everyone who is interested in topics related to Cyber attacks, with an emphasis on the aspects related to Human-Computer Interaction. We invite participants to present position papers addressing human-related cybersecurity issues. We are also interested in methods, theories and tools for managing cyber attacks.
The contributions accepted for presentation in the workshop will be published in the conference adjunct proceedings with an ISBN.
During the workshop we also expect to discuss how to disseminate individual contributions to the community in the form of a special issue in an HCI journal.

The workshop will be one-day long.
A keynote statement will be presented by the organizers first, then presentations contributed by participants will follow including proposals for examples to be used as case studies. In the second part, participants will discuss the main points raised and get involved in group design activities and report to the final plenary session.
Based on the lessons learned, participants will be invited to draft an agenda of future work that can be accomplished.

In order to attend the workshop, participants are invited to submit short papers (no longer than 4 pages, including an abstract of up to 150 words) reporting original academic or industrial research relevant to
the workshop's theme.
Submissions should be formatted in ACM-SIGCHI format. They have to be in PDF format.
Submissions are not anonymous and should include all author names, affiliations, and contact information.
All submissions will be reviewed by an international program committee.

Papers are submitted through the EasyChair website

Upon acceptance, at least one author of each accepted position paper
must attend the workshop.

Deadline for submission: June 23rd, 2019
Acceptance notification: June 30th, 2019
Workshop date: September 23rd, 2019

- Carmelo Ardito, University of Bari Aldo Moro, Italy –
- Giuseppe Desolda, University of Bari Aldo Moro, Italy –
- Francesco Di Nocera, Sapienza - Università di Roma, Italy,
- Mohamed Khamis, University of Glasgow, UK –
- Andrea Marrella, Sapienza - Università di Roma, Italy –

Related Resources

Federated Learning in IOT Cybersecurity 2021   PeerJ Computer Science - Federated Learning for Cybersecurity in Internet of Things
SI on ATD&IS 2021   Special Issue on Advanced Technologies in Data and Information Security, Applied Sciences, MDPI
AI in HCI 2021   International Journal of Human-Computer Interaction - Special Issue on AI in HCI
SI on AdCTI 2021   Special Issue on Advances in Cyber Threat Intelligence, Security and Communication Networks, Wiley & Hindawi
Virtual Environments for Cybersecurity 2021   SIMULATION MODELLING PRACTICE AND THEORY - Special Issue on ''Virtual Environments for Cybersecurity''
DeSForM 2022   DeSForM 2022 | Boundless: Aesthetics, Human Experience and Intelligence for the New Normal
SI: Energies - Climate Change 2021   Special Issue: Change But No Climate Change: Discourses and Approaches of Climate Change in the Energy Industry
ITNG 2022   The 19th Int'l Conf. on Information Technology: New Generations
SI: Adaptive HAR in smart spaces 2022   Special issue : Adaptive Human Activity and Behaviour Recognition Models for Context Awareness in Intelligent Environments