CHI-ANNOUNCEMENTS Archives

ACM SIGCHI General Interest Announcements (Mailing List)

CHI-ANNOUNCEMENTS@LISTSERV.ACM.ORG

Options: Use Forum View

Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Gabriele LENZINI <[log in to unmask]>
Reply To:
Gabriele LENZINI <[log in to unmask]>
Date:
Tue, 19 Feb 2013 08:32:54 +0000
Content-Type:
text/plain
Parts/Attachments:
text/plain (133 lines)
Apologies for multiple copies.
        

                 ---  CALL FOR PAPERS ---
* ********************************************************** *
* 		3rd Int. Workshop on                     *
* 	Socio-Technical Aspects of Security and Trust         *
* 			29 June 2013                           *
* 	(STAST) - http://www.stast2013.uni.lu            *
* ---------------------------------------------------------- *
* 			Co-located with                         *
* 	Computer Security Foundation Symposium (CSF)       *
*	   Tulane University, New Orleans, LA, USA          *
* ********************************************************** *

IMPORTANT DATES 
----------------
Paper submission: 14 April 2013
Notification: 15 May  2013
Pre-proceeding version: 10 June 2013
Post-workshop camera ready: 14 July 2013

SCOPE 
---------------------
Today, security threats are hardly sheer technical. They are
rather socio-technical threats and come from adversaries who
combine social engineering practices with technical skills to
circumvent the defenses of information systems. Socio-technical
attacks often succeed by exploiting the users' ill-understanding
of security mechanisms or loopholes in poorly designed user
interfaces and unclear security policies. In securing systems
against these threats, humans obviously cannot be treated as
machines. 

Humans have peculiar decision making processes. But they actions
and behavioural patterns, despite apparently irrational, are
perfectly justifiable from a cognitive and a social perspective.
Computer security hence appears to acquire more and more the
facets of an interdisciplinary science with roots in both
interpretive and positivist research traditions.

The workshop intends to foster an interdisciplinary discussion
on how to model and analyse the socio-technical aspects
of modern security systems and on how to protect such
systems from socio-technical threats and attacks.

We welcome experts from all involved and interested communities,
including but by no means limited to social and behavioral
sciences, philosophy and psychology and computer science.

WORKSHOP TOPICS
--------------
Relevant topics include but are not limited to:

* Usability Analysis
* System-User Interfaces
* Psychology of Deception
* Socio-Technical Attacks and Defenses
* User Perception of Security and Trust
* Cognitive Aspect in Human Computer Interaction
* Human Practice and Behavioural Models
* Design and Analysis of Socio-Technical Secure Systems
* Social Engineering
* Ceremonies and Workflows
* Game Theoretical Approaches to Security
* Cyber Crime Science
* Threat and Adversary Models
* Social Informatics and Networks
* Security Ethics 
* Effects of Technology on Trust Building Behaviour
* Socio-Technical Experiences and Test Cases

PROGRAM COMMITTEE 
-----------------
Matt Bishop (University California, CA, USA)
Lizzie Coles-Kemp (Royal Holloway, UK)
Vaibhav Garg (University Indiana, USA)
Pieter Hartel (University Twente, NL)
Cormac Herley (Microsoft Research, USA)
Markus Jakobsson (PayPal, USA) 	
Florian Kammueller (Middlesex University, UK)
Vincent Koenig (University Luxembourg, L)
Jean  Martina (Univ. Fed. de Santa Catarina, BR)
Sjouke Mauw (University Luxembourg, L)
Andrew Moore (CERT/SEI, USA)
Tyler Moore (Southern Methodist University, USA)
Martin Ortlieb (Google, CH)
Wolter Pieters (University Twente & TU Delft, NL)
Peter Y. A. Ryan (University Luxembourg, L)
Jessica Staddon (Google, CA, USA)
Luca Vigano (University Verona, IT)
Melanie Volkamer (TU Darmstadt, D)
Jeff Yan (University Newcastle, UK)

PAPER SUBMISSION
----------------
Contributions should be at most 8 pages, including
the bibliography and well-marked appendices, and
should follow the IEEE 8.5" x 11" Two-Columns Format.
Both theoretical and applied research papers are welcome.

Please visit our web site for more submission guidelines.

PROCEEDINGS 
----------- 
Pre-proceedings will be made available at the venue.
Authors will be given the opportunity to review their manuscripts,
for the final post-proceedings, which will be
published IEEE in the IEEE digital library after the workshop.

ORGANIZING COMMITTEE
--------------------

*** Workshop Chairs

Giampaolo Bella (Univ. of Catania, IT)
Gabriele Lenzini (Univ. of Luxembourg, L)

*** Programme Chairs

Christian W. Probst (Technical University of Denmark, DK)
Trish Williams (Edith Cowan University, AU)

    ---------------------------------------------------------------
    For news of CHI books, courses & software, join CHI-RESOURCES
     mailto: [log in to unmask]

    To unsubscribe from CHI-ANNOUNCEMENTS send an email to
     mailto:[log in to unmask]

    For further details of CHI lists see http://listserv.acm.org
    ---------------------------------------------------------------

ATOM RSS1 RSS2