CHI-ANNOUNCEMENTS Archives

ACM SIGCHI General Interest Announcements (Mailing List)

CHI-ANNOUNCEMENTS@LISTSERV.ACM.ORG

Options: Use Forum View

Use Proportional Font
Show HTML Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Niels Raabjerg Mathiasen <[log in to unmask]>
Reply To:
Niels Raabjerg Mathiasen <[log in to unmask]>
Date:
Wed, 25 Aug 2010 09:29:52 +0200
Content-Type:
text/plain
Parts/Attachments:
text/plain (134 lines)
Extended deadline: Understanding Friend and Family based Security and Privacy issues

A One Day Workshop for NordCHi 2010 Sunday 17th October 2010

We have extended the submission deadline due to popular demand.

New deadline is September 6, 2010.  

http://www.cs.au.dk/security-workshop/

-----------------------

Understanding Friend and Family based Security and Privacy issues

A One Day Workshop for NordCHi 2010 Sunday 17th October 2010

Organised by:  Susanne Bødker, Marianne Graves Pedersen, Niels Mathiassen, Lynne Coventry , Linda Little and Prof. Pam Briggs.

Privacy and security research has mainly focussed on the role of third parties to secure the privacy of confidential information within a business setting, such as financial accounts or the role of security systems to prevent viruses and other malware attacking computer systems. Social networking sites, mobile phones and location based tracking all bring new opportunities for interaction and communication however, they also create new challenges  for privacy, security and trust which warrant further investigation.  The role of security and privacy within a social context is a more recent research topic and the consequences for the family are particularly under-researched but of vital importance as more young children and their grandparents utilise more communication technologies.

The relationship between IT systems and users is all about rules, regulations and policies and there are calls for better conceptual models of IT-security as these could be the key to better security. What do we know about the conceptual model held by security expert versus technology expert versus the wider population of general IT users extending to young children and  the silver surfers using interactive games and social networking for the first time and not fully conversant with the issues of privacy, security and trust.  This workshop will explore what is known about conceptual models but also what insights have been generated from HCI research in this area.

Our goal is to broaden and deepen the conversation about usable security and privacy, to go beyond the user interface, toward developing an understanding of trust, security and privacy within an everyday use of IT context, not just business use.  We will bring together a multidisciplinary community, within the context of everyday  use of technology to:-

·       share understanding between  disciplines

·       discuss existing solutions

·       create new design solutions

·       Identify research gaps


The workshop will work to produce an overview of understanding of User Centered Security, to be published e.g. in ACM Interactions.  Additionally it will provide the opportunity for

·       New collaborations

·       New design ideas

·       Ideas for future research

We invite participants to bring forth contributions such as

·       empirical studies of privacy and security technology in use, 

·       user-centered security design cases 

·       experience-based, human-centered or value-based perspectives on security

·       discussions regarding theoretical foundations for user-centered security

·       specific design methods, patterns and principles.



We would expect to host approximately 20 participants from a variety of backgrounds. Participants will be selected based on submission of a 2-4 page position paper. These position papers will include their top 10 references relevant to the workshop.

Please send your submission to Dr. Lynne Coventry. Email: [log in to unmask]
   ---------------------------------------------------------------
               To unsubscribe, send an empty email to
    mailto:[log in to unmask]
   For further details of CHI lists see http://listserv.acm.org
   ---------------------------------------------------------------

Fra: Niels Raabjerg Mathiasen <[log in to unmask]>
Dato: 25. aug 2010 09.25.22 CEST
Til: [log in to unmask]
Emne: Extended deadline: Understanding Friend and Family based Security and Privacy issues


Extended deadline: Understanding Friend and Family based Security and Privacy issues

A One Day Workshop for NordCHi 2010 Sunday 17th October 2010

We have extended the submission deadline due to popular demand.

New deadline is September 6, 2010.  

http://www.cs.au.dk/security-workshop/

-----------------------

Understanding Friend and Family based Security and Privacy issues

A One Day Workshop for NordCHi 2010 Sunday 17th October 2010

Organised by:  Susanne Bødker, Marianne Graves Pedersen, Niels Mathiassen, Lynne Coventry , Linda Little and Prof. Pam Briggs.

Privacy and security research has mainly focussed on the role of third parties to secure the privacy of confidential information within a business setting, such as financial accounts or the role of security systems to prevent viruses and other malware attacking computer systems. Social networking sites, mobile phones and location based tracking all bring new opportunities for interaction and communication however, they also create new challenges  for privacy, security and trust which warrant further investigation.  The role of security and privacy within a social context is a more recent research topic and the consequences for the family are particularly under-researched but of vital importance as more young children and their grandparents utilise more communication technologies.

The relationship between IT systems and users is all about rules, regulations and policies and there are calls for better conceptual models of IT-security as these could be the key to better security. What do we know about the conceptual model held by security expert versus technology expert versus the wider population of general IT users extending to young children and  the silver surfers using interactive games and social networking for the first time and not fully conversant with the issues of privacy, security and trust.  This workshop will explore what is known about conceptual models but also what insights have been generated from HCI research in this area.

Our goal is to broaden and deepen the conversation about usable security and privacy, to go beyond the user interface, toward developing an understanding of trust, security and privacy within an everyday use of IT context, not just business use.  We will bring together a multidisciplinary community, within the context of everyday  use of technology to:-

·       share understanding between  disciplines

·       discuss existing solutions

·       create new design solutions

·       Identify research gaps


The workshop will work to produce an overview of understanding of User Centered Security, to be published e.g. in ACM Interactions.  Additionally it will provide the opportunity for

·       New collaborations

·       New design ideas

·       Ideas for future research

We invite participants to bring forth contributions such as

·       empirical studies of privacy and security technology in use, 

·       user-centered security design cases 

·       experience-based, human-centered or value-based perspectives on security

·       discussions regarding theoretical foundations for user-centered security

·       specific design methods, patterns and principles.



We would expect to host approximately 20 participants from a variety of backgrounds. Participants will be selected based on submission of a 2-4 page position paper. These position papers will include their top 10 references relevant to the workshop.

Please send your submission to Dr. Lynne Coventry. Email: [log in to unmask]
    ---------------------------------------------------------------
                To unsubscribe, send an empty email to
     mailto:[log in to unmask]
    For further details of CHI lists see http://listserv.acm.org
    ---------------------------------------------------------------

ATOM RSS1 RSS2