posted by organizer: cdesolda || 1241 views || tracked by 2 users: [display]

Human-centered cybersecurity 2019 : The 1st International Workshop on Human-centered cybersecurity - in conjunction with CHITALY 2019


When Sep 23, 2019 - Sep 23, 2019
Where Padova, Italy
Submission Deadline Jun 23, 2019
Notification Due Jun 30, 2019
Final Version Due Jul 5, 2019
Categories    cybersecurity   human-compter interaction   usable security

Call For Papers

[Apologies for multiple postings]

Human-centered cybersecurity


A full day workshop to be held in conjunction with CHITALY 2019
the Biannual Conference of the Italian SIGCHI Chapter
September 23-25, 2019
University of Padova, Italy


Cyber-attacks are growing very much in recent years. According to the Symantec Annual Threat Report published for 2018, the total number of Web threats were more than 1 Billion, the 400% more than the 2014. With over 4 billion of mobile phone users worldwide as well as billions of under-protected Internet of Things (IoT) devices, there has been a dramatic rise in cybercrime globally perpetrated at various levels.
Many cyber-attack preventions focus on systems and technology, without addressing user-related issues. Users have been identified as one of the major security weaknesses in today’s technologies, as they may be unaware that their behaviour while interacting with a system may have security consequences. The user interface is where the users interact with the computer systems. It is where the user’s intention transforms into the system operation. It is where the semantic gap arises. And this is the aspect that needs more attention to further limit the effectiveness of cyber attacks. From the cybersecurity analysts perspective, advanced interactive visualization techniques may be useful to describe the features that characterize malware application and thus help the in detecting malicious apps.

Topics include, but are not limited to:
- Ethical, psychological, sociological and economic issues of security and privacy solutions
- Foundations of usable security and privacy
- Human factors in phishing attacks
- Human factors related to Cybersecurity
- Lessons learned from the design, development, use, or evaluation of security and privacy systems
- Mental models of attackers and defenders
- New applications of existing models or technology
- Reports of previously published studies and experiments, even failed experiences, focusing on the lessons learned from such experiences
- Testing of new or existing solutions for usable security and privacy research
- Usable security and privacy for professionals, like network administrators and developers
- Usable security/privacy evaluation of existing and/or proposed solutions based, for instance, on laboratory studies, field studies, longitudinal studies
- Usable security/privacy of the Internet of Things (IoT)
- Visualization techniques supporting cybersecurity experts and non-experts

This workshop is open to everyone who is interested in topics related to Cyber attacks, with an emphasis on the aspects related to Human-Computer Interaction. We invite participants to present position papers addressing human-related cybersecurity issues. We are also interested in methods, theories and tools for managing cyber attacks.
The contributions accepted for presentation in the workshop will be published in the conference adjunct proceedings with an ISBN.
During the workshop we also expect to discuss how to disseminate individual contributions to the community in the form of a special issue in an HCI journal.

The workshop will be one-day long.
A keynote statement will be presented by the organizers first, then presentations contributed by participants will follow including proposals for examples to be used as case studies. In the second part, participants will discuss the main points raised and get involved in group design activities and report to the final plenary session.
Based on the lessons learned, participants will be invited to draft an agenda of future work that can be accomplished.

In order to attend the workshop, participants are invited to submit short papers (no longer than 4 pages, including an abstract of up to 150 words) reporting original academic or industrial research relevant to
the workshop's theme.
Submissions should be formatted in ACM-SIGCHI format. They have to be in PDF format.
Submissions are not anonymous and should include all author names, affiliations, and contact information.
All submissions will be reviewed by an international program committee.

Papers are submitted through the EasyChair website

Upon acceptance, at least one author of each accepted position paper
must attend the workshop.

Deadline for submission: June 23rd, 2019
Acceptance notification: June 30th, 2019
Workshop date: September 23rd, 2019

- Carmelo Ardito, University of Bari Aldo Moro, Italy –
- Giuseppe Desolda, University of Bari Aldo Moro, Italy –
- Francesco Di Nocera, Sapienza - Università di Roma, Italy,
- Mohamed Khamis, University of Glasgow, UK –
- Andrea Marrella, Sapienza - Università di Roma, Italy –

Related Resources

HUMAN 2023   Human Factors in Hypertext
IoTE 2023   4th International Conference on Internet of Things & Embedded Systems
EAI AICSEC 2023   EAI International Conference on Artificial Intelligence for CyberSecurity
ISHCI 2023   2023 International Conference on Intelligent Systems and Human-Computer Interaction
Electronics SI 2022   Electronics: Special Issue on Cybersecurity and Privacy Issues in Cyber-Physical Systems and Industrial Control Systems
BCYIoT 2023   International Conference on Blockchain, Cybersecurity and Internet of Things
NordSec 2023   28th Nordic Conference on Secure IT systems (NordSec) 2023
TransAI 2023   IEEE International Conference on Transdisciplinary AI
HICSS AI4Cyber and Cyber4AI 2024   HICSS 57 Mini-Track: Cybersecurity in the Age of Artificial Intelligence, AI for Cybersecurity, and Cybersecurity for AI
iWOAR 2023   8th international Workshop on Sensor-Based Activity Recognition and Artificial Intelligence