posted by organizer: cdesolda || 499 views || tracked by 2 users: [display]

Human-centered cybersecurity 2019 : The 1st International Workshop on Human-centered cybersecurity - in conjunction with CHITALY 2019


When Sep 23, 2019 - Sep 23, 2019
Where Padova, Italy
Submission Deadline Jun 23, 2019
Notification Due Jun 30, 2019
Final Version Due Jul 5, 2019
Categories    cybersecurity   human-compter interaction   usable security

Call For Papers

[Apologies for multiple postings]

Human-centered cybersecurity


A full day workshop to be held in conjunction with CHITALY 2019
the Biannual Conference of the Italian SIGCHI Chapter
September 23-25, 2019
University of Padova, Italy


Cyber-attacks are growing very much in recent years. According to the Symantec Annual Threat Report published for 2018, the total number of Web threats were more than 1 Billion, the 400% more than the 2014. With over 4 billion of mobile phone users worldwide as well as billions of under-protected Internet of Things (IoT) devices, there has been a dramatic rise in cybercrime globally perpetrated at various levels.
Many cyber-attack preventions focus on systems and technology, without addressing user-related issues. Users have been identified as one of the major security weaknesses in today’s technologies, as they may be unaware that their behaviour while interacting with a system may have security consequences. The user interface is where the users interact with the computer systems. It is where the user’s intention transforms into the system operation. It is where the semantic gap arises. And this is the aspect that needs more attention to further limit the effectiveness of cyber attacks. From the cybersecurity analysts perspective, advanced interactive visualization techniques may be useful to describe the features that characterize malware application and thus help the in detecting malicious apps.

Topics include, but are not limited to:
- Ethical, psychological, sociological and economic issues of security and privacy solutions
- Foundations of usable security and privacy
- Human factors in phishing attacks
- Human factors related to Cybersecurity
- Lessons learned from the design, development, use, or evaluation of security and privacy systems
- Mental models of attackers and defenders
- New applications of existing models or technology
- Reports of previously published studies and experiments, even failed experiences, focusing on the lessons learned from such experiences
- Testing of new or existing solutions for usable security and privacy research
- Usable security and privacy for professionals, like network administrators and developers
- Usable security/privacy evaluation of existing and/or proposed solutions based, for instance, on laboratory studies, field studies, longitudinal studies
- Usable security/privacy of the Internet of Things (IoT)
- Visualization techniques supporting cybersecurity experts and non-experts

This workshop is open to everyone who is interested in topics related to Cyber attacks, with an emphasis on the aspects related to Human-Computer Interaction. We invite participants to present position papers addressing human-related cybersecurity issues. We are also interested in methods, theories and tools for managing cyber attacks.
The contributions accepted for presentation in the workshop will be published in the conference adjunct proceedings with an ISBN.
During the workshop we also expect to discuss how to disseminate individual contributions to the community in the form of a special issue in an HCI journal.

The workshop will be one-day long.
A keynote statement will be presented by the organizers first, then presentations contributed by participants will follow including proposals for examples to be used as case studies. In the second part, participants will discuss the main points raised and get involved in group design activities and report to the final plenary session.
Based on the lessons learned, participants will be invited to draft an agenda of future work that can be accomplished.

In order to attend the workshop, participants are invited to submit short papers (no longer than 4 pages, including an abstract of up to 150 words) reporting original academic or industrial research relevant to
the workshop's theme.
Submissions should be formatted in ACM-SIGCHI format. They have to be in PDF format.
Submissions are not anonymous and should include all author names, affiliations, and contact information.
All submissions will be reviewed by an international program committee.

Papers are submitted through the EasyChair website

Upon acceptance, at least one author of each accepted position paper
must attend the workshop.

Deadline for submission: June 23rd, 2019
Acceptance notification: June 30th, 2019
Workshop date: September 23rd, 2019

- Carmelo Ardito, University of Bari Aldo Moro, Italy –
- Giuseppe Desolda, University of Bari Aldo Moro, Italy –
- Francesco Di Nocera, Sapienza - Università di Roma, Italy,
- Mohamed Khamis, University of Glasgow, UK –
- Andrea Marrella, Sapienza - Università di Roma, Italy –

Related Resources

HCIS 2020   14th International Conference on Human-Centered Intelligent Systems (Formally known as IIMSS)
PST 2020   18th Annual International Conference on Privacy, Security, and Trust (PST2020)
exAI @ CD-MAKE 2020   Explainable AI
CISIS 2020   13th International Conference on Computational Intelligence in Security for Information Systems
IAIT 2020   The 11th International Conference on Advances in Information Technology (IAIT2020)
FMEC 2020   The Fifth IEEE International Conference on Fog and Mobile Edge Computing
NordiCHI 2020   NordiCHI - 11th Nordic Conference on Human-Computer Interaction
BSCI 2020   The 2nd ACM International Symposium on Blockchain and Secure Critical Infrastructure
MLHMI--Ei and Scopus 2020   2020 International Conference on Machine Learning and Human-Computer Interaction (MLHMI 2020)--Ei Compendex and Scopus
DIS 2020   ACM Designing Interactive Systems 2020