HCI International 2017
Vancouver, Canada, 9 - 14 July 2017
Vancouver Convention Centre
Navigation Menu

Human Aspects of Information Security, Privacy and Trust

Conference Final Program
(Last Updated: 27 August, 2017 07:02:01 PM)


Wednesday, 12 July 2017
08:00 – 10:00

S017: Designing cyber security for people
Room: 111
Chair(s): Lynne Coventry, Northumbria University, United Kingdom

  • Walking the line: the everyday security ties that bind
    Lizzie Coles-Kemp, Royal Holloway University of London, United Kingdom; René Rydhof Hansen, Aalborg University, Denmark
  • Radicalisation, the Internet and Cybersecurity: Opportunities and Challenges for HCI
    Joanne Hinds, Adam Joinson, University of Bath, United Kingdom
  • The Design of Messages to Improve Cybersecurity Incident Reporting
    Pam Briggs, Northumbria University, United Kingdom; Debora Jeske, University College Cork, Ireland; Lynne Coventry, Northumbria University, United Kingdom
  • "No Good Reason to Remove Features" Expert Users Value Useful Apps over Secure Ones
    Steve Dodier-Lazaro, Ingolf Becker, Jens Krinke, M. Angela Sasse, University College London, United Kingdom
  • Visualization Technologies of Information Security Support System using Haptic Devices
    Manabu Ishihara, Taiki Kanayama, National Institute of Technology, Oyama College, Japan

Top

10:30 – 12:30

S037: Modelling for user behaviour: towards a formal understanding of user errors in secure systems
Room: 111
Chair(s): Dana Polatin-Reuben, Jason R.C. Nurse, University of Oxford, United Kingdom

  • Modelling Trust and Trust-Building among IT-Security Professionals - How do practitioners find out whom to work with?
    Laurin B. Weissinger, University of Oxford, United Kingdom
  • An Assessment of the Security and Transparency Procedural Components of the Estonian Internet Voting System
    Jason R.C. Nurse, Ioannis Agrafiotis, Arnau Erola, Maria Bada, Taylor Roberts, Meredydd Williams, Michael Goldsmith, Sadie Creese, University of Oxford, United Kingdom
  • Secure Peripherals in a Converged Mobile Environment
    Jaco Du Toit, Ian Ellefsen, University of Johannesburg, South Africa
  • Formal Modeling and Analysis with Humans in Infrastructures for IoT Health Care Systems
    Florian Kammüller, Middlesex University London, United Kingdom
  • Dear Password, I Know You Too Well - A Congenial Call for Ubiquitous Authentication
    Frans F. Blauw, University of Johannesburg, South Africa
  • Behavioural Profiling in Cyber-Social Systems
    Jason Perno, Utica Collage, United States; Christian Probst, Technical University of Denmark, Denmark

Top

13:30 – 15:30

S057: Models, Techniques, and Analysis of Human Centric Systems
Room: 111
Chair(s): Florian Kammüller, Middlesex University London, United Kingdom

  • Information Security, Privacy, and Trust in Social Robotic Assistants for Older Adults
    Thomas Given-Wilson, Axel Legay, Fabrizio Biondi, Sean Sedwards, INRIA, France
  • Sharing Information with Web Services - A Mental Model Approach in the Context of Optional Information
    Oksana Kulyk, Benjamin Maximilian Reinheimer, TU Darmstadt, Germany; Melanie Volkamer, Karlstad University, Sweden
  • System Dynamics Approach to Malicious Insider Cyber-Threat Modelling and Analysis
    Tesleem Fagade, University of Bristol, United Kingdom; Theodoros Spyridopoulos, University of the West of England, United Kingdom; Nabeel Albishry, Theo Tryfonas, University of Bristol, United Kingdom
  • A User-Centered Model for Usable Security and Privacy
    Denis Feth, Andreas Maier, Svenja Polst, Fraunhofer IESE, Germany
  • Application of Work Domain Analysis for Cybersecurity
    Hao Wang, Nathan Lau, Ryan Gerdes, Virginia Tech, United States
  • Developing Usable Interface for Internet of Things (IoT) Security Analysis Software
    Seokjun Hong, Youngsun Kim, Gerard J. Kim, Korea University, Korea

Top



Thursday, 13 July 2017
08:00 – 10:00

S095: Advances in Human Aspects of Cyber Security
Room: 111
Chair(s): Panagiotis Andriotis, University of the West of England, United Kingdom

  • A Comparative Study of Android Users’ Privacy Preferences under the Runtime Permission Model
    Panagiotis Andriotis, Shancang Li, Theodoros Spyridopoulos, University of the West of England, United Kingdom; Gianluca Stringhini, University College London, United Kingdom
  • Using Human Factor Approaches to an Organisation’s Bring Your Own Device scheme
    Jodie Ward, Huseyin Dogan, Edward Apeh, Alexios Mylonas, Vasilis Katos, Bournemouth University, United Kingdom
  • When Eye-tracking Meets Cognitive Modeling: Applications to Cyber Security Systems
    Haiyue Yuan, Shujun Li, Patrice Rusconi, Nouf Aljaffan, University of Surrey, United Kingdom
  • The impact of changing technology on international cybersecurity curricula
    Huw Read, Norwich University, United States; Iain Sutherland, Noroff Education, Norway; Konstantinos Xynos, Darkmatter, United Arab Emirates; Tom Drange, Ernst Sundt, Noroff University College, Norway
  • PSV (Password Security Visualizer): From Password Checking to User Education
    Nouf Aljaffan, Haiyue Yuan, Shujun Li, University of Surrey, United Kingdom
  • Privacy Decision-Making in the Digital Era: A Game Theoretic Review
    Kalliopi Anastasopoulou, Spyros Kokolakis, University of the Aegean, Greece; Panagiotis Andriotis, University of the West of England, United Kingdom

Top

10:30 – 12:30

S116: Multidisciplinary approaches to cloud crime
Room: 111
Chair(s): Pam Briggs, Northumbria University, United Kingdom

  • Identifying Changes in the Cybersecurity Threat Landscape using the LDA-Web Topic Modelling Data Search Engine
    Noura Al-Moubayed, Durham University, United Kingdom; David S. Wall, University of Leeds, United Kingdom; Stephen McGough, Durham University, United Kingdom
  • Social Scientific Perspectives on Cloud Cybercrime
    Christopher Lawless, Durham University, United Kingdom
  • Towards a Conceptualisation of Cloud (Cyber) Crime
    David S. Wall, University of Leeds, United Kingdom
  • How might Crime-Scripts be used to Support the Understanding and Policing of Cloud Crime?
    Steve Warren, Gavin Oxburgh, Newcastle University, United Kingdom; Pam Briggs, Northumbria University, United Kingdom; David S. Wall, University of Leeds, United Kingdom
  • Are the Current System Engineering Practices Sufficient to Meet Cyber Crime?
    Ahto Buldas, Tallinn University of Technology, Estonia; Märt Saarepera, Independent researcher, Estonia

Top

13:30 – 15:30

S137: Human Behaviour in Security and Privacy
Room: 111
Chair(s): Lynsay Shepherd, Abertay University, United Kingdom

  • “If it's urgent or it is stopping me from doing something, then I might just go straight at it”: a study into Home Data Security Decisions
    Norbert Nthala, Ivan Flechais, University of Oxford, United Kingdom
  • Assessing The Impact of Affective Feedback On End- User Security Awareness
    Lynsay Shepherd, Jacqueline Archibald, Robert Ian Ferguson, Abertay University, United Kingdom
  • “If it wasn’t secure, they would not use it in the movies” - Security Perceptions and User Acceptance of Authentication Technologies
    Verena Zimmermann, Nina Gerber, Technische Universität Darmstadt, Germany
  • It’s not all about the money: Self-efficacy and Motivation in Defensive and Offensive Cyber Security Professionals
    Duncan Hodges, Oliver Buckley, Cranfield University, United Kingdom
  • Sharing or Non-sharing Credentials: a Study of what Motivates People to be Malicious Insiders
    Koichi Niihara, Michihiro Yamada, Hiroaki Kikuchi, Meiji University, Japan

Top



Friday, 14 July 2017
08:00 – 10:00

S175: Mobile Security
Room: 111
Chair(s): Duncan Hodges, Cranfield University, United Kingdom

  • Detection and Auto-protection of Cache File Privacy Leakage for Mobile Social Networking Applications in Android
    Hui Li, Wenling Liu, Bin Wang, Wen Zhang, Beijing University of Posts and Telecommunications, P.R. China
  • Keystroke Inference using Smartphone Kinematics
    Oliver Buckley, Duncan Hodges, Melissa Hadgkiss, Sarah Morris, Cranfield University, United Kingdom
  • Android App Permission and Users’ Adoption: A Case Study of Mental Health Application
    Hsiao-Ying Huang, Masooda Bashir, University of Illinois at Urbana-Champaign, United States
  • Mobile Online Proficiency and Mobile Internet Use - Findings from Finland
    Titiana-Petra Ertiö, Pekka Räsänen, University of Turku, Finland
  • A Privacy-Driven Data Management Model for Smart Personal Assistants
    Danilo Nogueira, Cristiano Maciel, Federal University of Mato Grosso (UFMT), Brazil; José Viterbo, Fluminense Federal University (UFF), Brazil; Daniel Vecchiato, Federal University of Mato Grosso (UFMT), Brazil

Top

10:30 – 12:30

S195: Usable Security Approaches and Studies
Room: 111
Chair(s): Stewart Kowalski, Norwegian University of Science and Technology, Norway

  • A Case Study: Heartbleed Vulnerability Management and Swedish Municipalities
    Shao-Fang Wen, Stewart Kowalski, Norwegian University of Science and Technology, Norway
  • Law Infringements in Social Live Streaming Services
    Franziska Zimmer, Kaja J. Fietkiewicz, Wolfgang G. Stock, Heinrich Heine University Düsseldorf, Germany
  • Exploring Consumers’ Attitudes of Smart TV Related Privacy Risks
    Marco Ghiglieri, Technische Universität Darmstadt, Germany; Melanie Volkamer, Karlstad University, Sweden; Karen Renaud, University of Glasgow, United Kingdom
  • Overcoming fear of the threat model
    Scott Cadzow, Cadzow Communications Consulting Ltd, United Kingdom
  • Usable Security Management for Network Access Rules of Critical Infrastructure
    Jeong-Han Yun, SeungOh Choi, WoonYon Kim, National Security Research Institute, Korea; Hwasun Kang, Sung-Woo Kim, Kookmin University, Korea

Top

13:30 – 15:30

S216: Designing and Developing Security and Privacy
Room: 111
Chair(s): Kai-Uwe Loser, Ruhr-University Bochum, Germany

  • Integrating a Practice Perspective to Privacy by Design
    Christopher Lentzsch, Kai-Uwe Loser, Ruhr-University Bochum, Germany; Martin Degeling, Carnegie Mellon University, United States; Alexander Nolte, Ruhr-University Bochum, Germany
  • Live Gaze-Based Authorization and Gaming System
    Quan Wang, Yale University, United States; Lelai Deng, Hao Cheng, BeiHang University, P.R. China; Hualei Fan, Beijing Runzhichina Information Technology Co., Ltd, P.R. China; Xiaoping Du, Qinghong Yang, BeiHang University, P.R. China
  • Sharing the ‘Real Me’ – How Usage Motivation and Personality Relate to Privacy Protection Behavior on Facebook
    Nina Gerber, Paul Gerber, Maria Hernando, Technische Universität Darmstadt, Germany

Top



follow us Icon Link: Follow us on Facebook Icon Link: Follow us on Twitter