CHI-ANNOUNCEMENTS Archives

ACM SIGCHI General Interest Announcements (Mailing List)

CHI-ANNOUNCEMENTS@LISTSERV.ACM.ORG

Options: Use Forum View

Use Monospaced Font
Show Text Part by Default
Condense Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Content-Type:
text/plain; charset=utf-8; format=flowed
Date:
Thu, 30 May 2019 19:41:06 +0200
Reply-To:
Subject:
MIME-Version:
1.0
Message-ID:
Content-Transfer-Encoding:
quoted-printable
Sender:
"ACM SIGCHI General Interest Announcements (Mailing List)" <[log in to unmask]>
From:
Carmelo Ardito <[log in to unmask]>
Parts/Attachments:
text/plain (151 lines)
[Apologies for multiple postings]

**********************************************************
Human-centered cybersecurity

https://sites.google.com/view/human-centred-cybersec19/home

***********************************************************

A full day workshop to be held in conjunction with CHITALY 2019
the Biannual Conference of the Italian SIGCHI Chapter
September 23-25, 2019
University of Padova, Italy

https://www.chitaly2019.org/

***********************************************************

***********************************************************
THEME
Cyber-attacks are growing very much in recent years. According to the 
Symantec Annual Threat Report published for 2018, the total number of 
Web threats were more than 1 Billion, the 400% more than the 2014. With 
over 4 billion of mobile phone users worldwide as well as billions of 
under-protected Internet of Things (IoT) devices, there has been a 
dramatic rise in cybercrime globally perpetrated at various levels.
Many cyber-attack preventions focus on systems and technology, without 
addressing user-related issues. Users have been identified as one of the 
major security weaknesses in today’s technologies, as they may be 
unaware that their behaviour while interacting with a system may have 
security consequences. The user interface is where the users interact 
with the computer systems. It is where the user’s intention transforms 
into the system operation. It is where the semantic gap arises. And this 
is the aspect that needs more attention to further limit the 
effectiveness of cyber attacks. From the cybersecurity analysts 
perspective, advanced interactive visualization techniques may be useful 
to describe the features that characterize malware application and thus 
help the in detecting malicious apps.

***********************************************************
TOPICS OF INTEREST
Topics include, but are not limited to:
- Ethical, psychological, sociological and economic issues of security 
and privacy solutions
- Foundations of usable security and privacy
- Human factors in phishing attacks
- Human factors related to Cybersecurity
- Lessons learned from the design, development, use, or evaluation of 
security and privacy systems
- Mental models of attackers and defenders
- New applications of existing models or technology
- Reports of previously published studies and experiments, even failed 
experiences, focusing on the lessons learned from such experiences
- Testing of new or existing solutions for usable security and privacy 
research
- Usable security and privacy for professionals, like network 
administrators and developers
- Usable security/privacy evaluation of existing and/or proposed 
solutions based, for instance, on laboratory studies, field studies, 
longitudinal studies
- Usable security/privacy of the Internet of Things (IoT)
- Visualization techniques supporting cybersecurity experts and non-experts

***********************************************************
TARGET AUDIENCE AND EXPECTED OUTCOMES
This workshop is open to everyone who is interested in topics related to 
Cyber attacks, with an emphasis on the aspects related to Human-Computer 
Interaction. We invite participants to present position papers 
addressing human-related cybersecurity issues. We are also interested in 
methods, theories and tools for managing cyber attacks.
The contributions accepted for presentation in the workshop will be 
published in the conference adjunct proceedings with an ISBN.
During the workshop we also expect to discuss how to disseminate 
individual contributions to the community in the form of a special issue 
in an HCI journal.

***********************************************************
WORKSHOP FORMAT
The workshop will be one-day long.
A keynote statement will be presented by the organizers first, then 
presentations contributed by participants will follow including 
proposals for examples to be used as case studies. In the second part, 
participants will discuss the main points raised and get involved in 
group design activities and report to the final plenary session.
Based on the lessons learned, participants will be invited to draft an 
agenda of future work that can be accomplished.

***********************************************************
SUBMISSION INSTRUCTIONS
In order to attend the workshop, participants are invited to submit 
short papers (no longer than 4 pages, including an abstract of up to 150 
words) reporting original academic or industrial research relevant to 
the workshop's theme.
Submissions should be formatted in ACM-SIGCHI format. They have to be in 
PDF format.
Submissions are not anonymous and should include all author names, 
affiliations, and contact information.
All submissions will be reviewed by an international program committee.

Papers are submitted through the EasyChair website 
(https://easychair.org/my/conference?conf=hufacy19)

Upon acceptance, at least one author of each accepted position paper 
must attend the workshop.

***********************************************************
IMPORTANT DATES
Deadline for submission: June 23rd, 2019
Acceptance notification: June 30th, 2019
Workshop date: September 23rd, 2019

***********************************************************
ORGANIZERS
- Carmelo Ardito, University of Bari Aldo Moro, Italy – 
[log in to unmask]
- Giuseppe Desolda, University of Bari Aldo Moro, Italy – 
[log in to unmask]
- Francesco Di Nocera, Sapienza - Università di Roma, Italy, 
[log in to unmask]
- Mohamed Khamis, University of Glasgow, UK – [log in to unmask]
- Andrea Marrella, Sapienza - Università di Roma, Italy – 
[log in to unmask]


-- 
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Dr. Carmelo Ardito

Dipartimento di Informatica
Università degli Studi di Bari Aldo Moro
via Orabona, 4 - 70125 Bari, Italy	

E-Mail: [log in to unmask]

Tel.   +39 080 544 3289
Fax.   +39 080 544 3300

Personal Home Page: 	http://ivu.di.uniba.it/people/ardito.htm
Research Group:		http://ivu.di.uniba.it/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

    ---------------------------------------------------------------
    For news of CHI books, courses & software, join CHI-RESOURCES
     mailto: [log in to unmask]

    To unsubscribe from CHI-ANNOUNCEMENTS send an email to
     mailto:[log in to unmask]

    For further details of CHI lists see http://listserv.acm.org
    ---------------------------------------------------------------

ATOM RSS1 RSS2