CHI-ANNOUNCEMENTS Archives

ACM SIGCHI General Interest Announcements (Mailing List)

CHI-ANNOUNCEMENTS@LISTSERV.ACM.ORG

Options: Use Forum View

Use Monospaced Font
Show Text Part by Default
Condense Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Content-Type:
text/plain; charset="iso-8859-1"
Date:
Wed, 13 Jun 2012 13:41:14 +0000
Reply-To:
Gabriele LENZINI <[log in to unmask]>
Subject:
Content-Transfer-Encoding:
quoted-printable
Message-ID:
MIME-Version:
1.0
Sender:
"ACM SIGCHI General Interest Announcements (Mailing List)" <[log in to unmask]>
From:
Gabriele LENZINI <[log in to unmask]>
Parts/Attachments:
text/plain (145 lines)
----------------apologies for multiple receiving------------- 
                 
                  --- CALL FOR PARTICIPATION ---

* ********************************************************** *
*                   2nd Int. Workshop on                     *
*         Socio-Technical Aspects of Security and Trust      *                      
*           (STAST2012) - http://stast2012.uni.lu            * 
* ---------------------------------------------------------- *
*                     Co-located with                        *
*      2012 Computer Security Foundation Workshop (CSFW)     * 
*             Harvard University, Cambrigde, MA, USA         *
*                       29 June 2012                         *
* ********************************************************** *


SCOPE 
-----
Due to the huge yet increasing number of people carrying out 
sensitive Internet transactions, security threats hardly ever 
reduce to technical threats. Rather, they are socio-technical, 
as they come from adversaries who combine social
engineering practices with technical skills. 
Humans obviously cannot be treated as machines, as they take 
actions that may seem irrational although they are perfectly 
justifiable from a cognitive and a social perspective. 

Computer security hence appears to acquire more and more the 
facets of an interdisciplinary science with roots in both 
interpretive and positivist research traditions.

The workshop intends to foster an interdisciplinary discussion 
on how to model and analyse the socio-technical aspects 
of modern security systems and on how to protect such 
systems from socio-technical threats and attacks.

PROGRAMME
---------

Session 1: Keynote
-------------------
Trust Engineering via Security Protocols
- Joshua D. Guttman (Worcester Polytechnic Institute) 

Session 2: Security Ceremonies and Interactions
------------------------------------------------

SpoofKiller: You can teach people how to pay, but not
how to pay attention
- Markus Jakobsson (PayPal USA) and 
Hossein Siadati (Extricatus LLC)

Towards A Model to Support the Reconciliation of Security 
Actions across Enterprises 
- Jason R. C. Nurse and 
Jane E. Sinclair (University of Oxford)

Session 3: Security Awareness and Decision-Making
-------------------------------------------------

Improved Visual Preference Authentication - 
- Markus Jakobsson (PayPal USA) 
and Hossein Siadati (Extricatus LLC)

Using Information Trustworthiness Advice 
in Decision-Making 
- Jason R. C. Nurse, Sadie Creese, Michael Goldsmith 
(University of Oxford) and 
Koen Lamberts (University of Warwick)

Optimal Security Investments in Networks of 
Varying Size and Topology 
- Alan Nochenson and Larry Heimann 
(Carnegie Mellon University)

REGISTRATION and VENUE
----------------------
 
More information at www.stast2012.uni.lu

PROGRAM COMMITTEE 
-----------------
Bishop, Matt (Univ. of California, CA, USA)
Boyd, Colin (Queensland University of Technology, AU)
Curzon, Paul (Queen Mary, Univ. of London, UK)
Jakobsson, Markus (PayPal, USA)
Hartel, Pieter (Univ. of Twente, NL)
Koenig, Vincent (Univ. of Luxembourg, L)
Llewellyn, Morgan (IMT, IT)
Marsh, Steve (Communications Research Centre Canada, CA)
Mauw, Sjouke (Univ. of Luxembourg, L)
van Moorsel, Aad (Univ. of Newcastle, UK)
Moore, Tyler (Wellesley College, MA, USA)
Mulder, Ingrid (Rotterdam University & TU Delft, NL)
Ortlieb, Martin (Google, CH)
Probst, Christian W. (DTU, D)
Sasse, Angela (UCL, UK)
Staddon, Jessica (Google, CA, USA)
Volkamer, Melanie (TU Darmstadt, D)
Wang, Yang (Carnegie Mellon University, PA, USA)
Wash, Rick (Michigan State Univ., MI, USA)
Williams, Trish (Edith Cowan University, AU)

PROCEEDINGS 
----------- 

Post-workshop proceedings will be published by IEEE and 
available in the IEEE digital library.

ORGANIZING COMMITTEE
--------------------

*** Workshop Chairs

Giampaolo Bella (Univ. of Catania, IT)
Gabriele Lenzini (Univ. of Luxembourg, L)

*** Programme Chairs

Lizzie Coles-Kemp (Royal Holloway Univ. of London, UK)
Peter Y. A. Ryan (Univ. of Luxembourg, L)

--------------------------------------------------------------------
Dr. G. Lenzini - Associate Researcher
Interdisciplinary Centre for Security, Reliability and Trust 
University of Luxembourg
---------------------------------------------------------------------
T.: +352 466 644 5778   - F.: +352 466644 5669 
[log in to unmask]
--------------------------------------------------------------------
6, rue Richard Coudenhove-Kalergi
L-1359 Luxembourg-Kirchberg
F-Building, F 212
--------------------------------------------------------------------

    ---------------------------------------------------------------
    For news of CHI books, courses & software, join CHI-RESOURCES
     mailto: [log in to unmask]

    To unsubscribe from CHI-ANNOUNCEMENTS send an email to
     mailto:[log in to unmask]

    For further details of CHI lists see http://listserv.acm.org
    ---------------------------------------------------------------

ATOM RSS1 RSS2