Conference Final Program
(Last Updated: 27 August, 2017 07:02:01 PM)
Wednesday, 12 July 2017 |
08:00 – 10:00 |
S017: Designing cyber security for people Room: 111 Chair(s): Lynne Coventry, Northumbria University, United Kingdom
|
- Walking the line: the everyday security ties that bind
Lizzie Coles-Kemp, Royal Holloway University of London, United Kingdom; René Rydhof Hansen, Aalborg University, Denmark
- Radicalisation, the Internet and Cybersecurity: Opportunities and Challenges for HCI
Joanne Hinds, Adam Joinson, University of Bath, United Kingdom
- The Design of Messages to Improve Cybersecurity
Incident Reporting
Pam Briggs, Northumbria University, United Kingdom; Debora Jeske, University College Cork, Ireland; Lynne Coventry, Northumbria University, United Kingdom
- "No Good Reason to Remove Features"
Expert Users Value Useful Apps over Secure Ones
Steve Dodier-Lazaro, Ingolf Becker, Jens Krinke, M. Angela Sasse, University College London, United Kingdom
- Visualization Technologies of Information Security Support System using Haptic Devices
Manabu Ishihara, Taiki Kanayama, National Institute of Technology, Oyama College, Japan
Top |
10:30 – 12:30 |
S037: Modelling for user behaviour: towards a formal understanding of user errors in secure systems Room: 111 Chair(s): Dana Polatin-Reuben, Jason R.C. Nurse, University of Oxford, United Kingdom
|
- Modelling Trust and Trust-Building among IT-Security Professionals - How do practitioners find out whom to work with?
Laurin B. Weissinger, University of Oxford, United Kingdom
- An Assessment of the Security and Transparency Procedural Components of the Estonian Internet Voting System
Jason R.C. Nurse, Ioannis Agrafiotis, Arnau Erola, Maria Bada, Taylor Roberts, Meredydd Williams, Michael Goldsmith, Sadie Creese, University of Oxford, United Kingdom
- Secure Peripherals in a Converged Mobile Environment
Jaco Du Toit, Ian Ellefsen, University of Johannesburg, South Africa
- Formal Modeling and Analysis with Humans in Infrastructures for IoT Health Care Systems
Florian Kammüller, Middlesex University London, United Kingdom
- Dear Password, I Know You Too Well -
A Congenial Call for Ubiquitous Authentication
Frans F. Blauw, University of Johannesburg, South Africa
- Behavioural Profiling in Cyber-Social Systems
Jason Perno, Utica Collage, United States; Christian Probst, Technical University of Denmark, Denmark
Top |
13:30 – 15:30 |
S057: Models, Techniques, and Analysis of Human Centric Systems Room: 111 Chair(s): Florian Kammüller, Middlesex University London, United Kingdom
|
- Information Security, Privacy, and Trust in
Social Robotic Assistants for Older Adults
Thomas Given-Wilson, Axel Legay, Fabrizio Biondi, Sean Sedwards, INRIA, France
- Sharing Information with Web Services - A Mental Model Approach in the Context of Optional Information
Oksana Kulyk, Benjamin Maximilian Reinheimer, TU Darmstadt, Germany; Melanie Volkamer, Karlstad University, Sweden
- System Dynamics Approach to Malicious Insider Cyber-Threat Modelling and Analysis
Tesleem Fagade, University of Bristol, United Kingdom; Theodoros Spyridopoulos, University of the West of England, United Kingdom; Nabeel Albishry, Theo Tryfonas, University of Bristol, United Kingdom
- A User-Centered Model for Usable Security and Privacy
Denis Feth, Andreas Maier, Svenja Polst, Fraunhofer IESE, Germany
- Application of Work Domain Analysis for Cybersecurity
Hao Wang, Nathan Lau, Ryan Gerdes, Virginia Tech, United States
- Developing Usable Interface for Internet of Things (IoT) Security Analysis Software
Seokjun Hong, Youngsun Kim, Gerard J. Kim, Korea University, Korea
Top |
Thursday, 13 July 2017 |
08:00 – 10:00 |
S095: Advances in Human Aspects of Cyber Security Room: 111 Chair(s): Panagiotis Andriotis, University of the West of England, United Kingdom
|
- A Comparative Study of Android Users’ Privacy Preferences under the Runtime Permission Model
Panagiotis Andriotis, Shancang Li, Theodoros Spyridopoulos, University of the West of England, United Kingdom; Gianluca Stringhini, University College London, United Kingdom
- Using Human Factor Approaches to an Organisation’s Bring Your Own Device scheme
Jodie Ward, Huseyin Dogan, Edward Apeh, Alexios Mylonas, Vasilis Katos, Bournemouth University, United Kingdom
- When Eye-tracking Meets Cognitive Modeling: Applications to Cyber Security Systems
Haiyue Yuan, Shujun Li, Patrice Rusconi, Nouf Aljaffan, University of Surrey, United Kingdom
- The impact of changing technology on international cybersecurity curricula
Huw Read, Norwich University, United States; Iain Sutherland, Noroff Education, Norway; Konstantinos Xynos, Darkmatter, United Arab Emirates; Tom Drange, Ernst Sundt, Noroff University College, Norway
- PSV (Password Security Visualizer): From Password Checking to User Education
Nouf Aljaffan, Haiyue Yuan, Shujun Li, University of Surrey, United Kingdom
- Privacy Decision-Making in the Digital Era: A Game Theoretic Review
Kalliopi Anastasopoulou, Spyros Kokolakis, University of the Aegean, Greece; Panagiotis Andriotis, University of the West of England, United Kingdom
Top |
10:30 – 12:30 |
S116: Multidisciplinary approaches to cloud crime Room: 111 Chair(s): Pam Briggs, Northumbria University, United Kingdom
|
- Identifying Changes in the Cybersecurity Threat Landscape using the LDA-Web Topic Modelling Data Search Engine
Noura Al-Moubayed, Durham University, United Kingdom; David S. Wall, University of Leeds, United Kingdom; Stephen McGough, Durham University, United Kingdom
- Social Scientific Perspectives on Cloud Cybercrime
Christopher Lawless, Durham University, United Kingdom
- Towards a Conceptualisation of Cloud (Cyber) Crime
David S. Wall, University of Leeds, United Kingdom
- How might Crime-Scripts be used to Support the Understanding and Policing of Cloud Crime?
Steve Warren, Gavin Oxburgh, Newcastle University, United Kingdom; Pam Briggs, Northumbria University, United Kingdom; David S. Wall, University of Leeds, United Kingdom
- Are the Current System Engineering Practices Sufficient to Meet Cyber Crime?
Ahto Buldas, Tallinn University of Technology, Estonia; Märt Saarepera, Independent researcher, Estonia
Top |
13:30 – 15:30 |
S137: Human Behaviour in Security and Privacy Room: 111 Chair(s): Lynsay Shepherd, Abertay University, United Kingdom
|
- “If it's urgent or it is stopping me from doing something, then I might just go straight at it”: a study into Home Data Security Decisions
Norbert Nthala, Ivan Flechais, University of Oxford, United Kingdom
- Assessing The Impact of Affective Feedback On End- User Security Awareness
Lynsay Shepherd, Jacqueline Archibald, Robert Ian Ferguson, Abertay University, United Kingdom
- “If it wasn’t secure, they would not use it in the movies” - Security Perceptions and User Acceptance of Authentication Technologies
Verena Zimmermann, Nina Gerber, Technische Universität Darmstadt, Germany
- It’s not all about the money: Self-efficacy and Motivation in Defensive and Offensive Cyber Security Professionals
Duncan Hodges, Oliver Buckley, Cranfield University, United Kingdom
- Sharing or Non-sharing Credentials: a Study of what Motivates People to be Malicious Insiders
Koichi Niihara, Michihiro Yamada, Hiroaki Kikuchi, Meiji University, Japan
Top |
Friday, 14 July 2017 |
08:00 – 10:00 |
S175: Mobile Security Room: 111 Chair(s): Duncan Hodges, Cranfield University, United Kingdom
|
- Detection and Auto-protection of Cache File Privacy Leakage for Mobile Social Networking Applications in Android
Hui Li, Wenling Liu, Bin Wang, Wen Zhang, Beijing University of Posts and Telecommunications, P.R. China
- Keystroke Inference using Smartphone Kinematics
Oliver Buckley, Duncan Hodges, Melissa Hadgkiss, Sarah Morris, Cranfield University, United Kingdom
- Android App Permission and Users’ Adoption: A Case Study of Mental Health Application
Hsiao-Ying Huang, Masooda Bashir, University of Illinois at Urbana-Champaign, United States
- Mobile Online Proficiency and Mobile Internet Use - Findings from Finland
Titiana-Petra Ertiö, Pekka Räsänen, University of Turku, Finland
- A Privacy-Driven Data Management Model for Smart Personal Assistants
Danilo Nogueira, Cristiano Maciel, Federal University of Mato Grosso (UFMT), Brazil; José Viterbo, Fluminense Federal University (UFF), Brazil; Daniel Vecchiato, Federal University of Mato Grosso (UFMT), Brazil
Top |
10:30 – 12:30 |
S195: Usable Security Approaches and Studies Room: 111 Chair(s): Stewart Kowalski, Norwegian University of Science and Technology, Norway
|
- A Case Study: Heartbleed Vulnerability Management and Swedish Municipalities
Shao-Fang Wen, Stewart Kowalski, Norwegian University of Science and Technology, Norway
- Law Infringements in Social Live Streaming Services
Franziska Zimmer, Kaja J. Fietkiewicz, Wolfgang G. Stock, Heinrich Heine University Düsseldorf, Germany
- Exploring Consumers’ Attitudes of Smart TV Related Privacy Risks
Marco Ghiglieri, Technische Universität Darmstadt, Germany; Melanie Volkamer, Karlstad University, Sweden; Karen Renaud, University of Glasgow, United Kingdom
- Overcoming fear of the threat model
Scott Cadzow, Cadzow Communications Consulting Ltd, United Kingdom
- Usable Security Management
for Network Access Rules of Critical Infrastructure
Jeong-Han Yun, SeungOh Choi, WoonYon Kim, National Security Research Institute, Korea; Hwasun Kang, Sung-Woo Kim, Kookmin University, Korea
Top |
13:30 – 15:30 |
S216: Designing and Developing Security and Privacy Room: 111 Chair(s): Kai-Uwe Loser, Ruhr-University Bochum, Germany
|
- Integrating a Practice Perspective to
Privacy by Design
Christopher Lentzsch, Kai-Uwe Loser, Ruhr-University Bochum, Germany; Martin Degeling, Carnegie Mellon University, United States; Alexander Nolte, Ruhr-University Bochum, Germany
- Live Gaze-Based Authorization and Gaming System
Quan Wang, Yale University, United States; Lelai Deng, Hao Cheng, BeiHang University, P.R. China; Hualei Fan, Beijing Runzhichina Information Technology Co., Ltd, P.R. China; Xiaoping Du, Qinghong Yang, BeiHang University, P.R. China
- Sharing the ‘Real Me’ – How Usage Motivation and Personality Relate to Privacy Protection Behavior on Facebook
Nina Gerber, Paul Gerber, Maria Hernando, Technische Universität Darmstadt, Germany
Top |