Search Mailing List Archives


Limit search to: Subject & Body Subject Author
Sort by: Reverse Sort
Limit to: All This Week Last Week This Month Last Month
Select Date Range     through    

[liberationtech] CfP: Socio-Technical Aspects in Security & Trust - STAST2013

Yosem Companys companys at stanford.edu
Wed Mar 6 21:38:31 PST 2013


From: Gabriele LENZINI <Gabriele.Lenzini at uni.lu>

                 ---  CALL FOR PAPERS ---
* ********************************************************** *
*                   3rd Int. Workshop on                     *
*      Socio-Technical Aspects of Security and Trust         *
*                     29 June 2013                           *
*           (STAST) - http://www.stast2013.uni.lu            *
* ---------------------------------------------------------- *
*                    Co-located with                         *
*         Computer Security Foundation Symposium (CSF)       *
*           Tulane University, New Orleans, LA, USA          *
* ********************************************************** *

IMPORTANT DATES
----------------
Paper submission: 14 April 2013
Notification: 15 May  2013
Pre-proceeding version: 10 June 2013
Post-workshop camera ready: 14 July 2013

SCOPE
---------------------
Today, security threats are hardly sheer technical. They are
rather socio-technical threats and come from adversaries who
combine social engineering practices with technical skills to
circumvent the defenses of information systems. Socio-technical
attacks often succeed by exploiting the users' ill-understanding
of security mechanisms or loopholes in poorly designed user
interfaces and unclear security policies. In securing systems
against these threats, humans obviously cannot be treated as
machines.

Humans have peculiar decision making processes. But they actions
and behavioural patterns, despite apparently irrational, are
perfectly justifiable from a cognitive and a social perspective.
Computer security hence appears to acquire more and more the
facets of an interdisciplinary science with roots in both
interpretive and positivist research traditions.

The workshop intends to foster an interdisciplinary discussion
on how to model and analyse the socio-technical aspects
of modern security systems and on how to protect such
systems from socio-technical threats and attacks.

We welcome experts from all involved and interested communities,
including but by no means limited to social and behavioral
sciences, philosophy and psychology and computer science.

WORKSHOP TOPICS
--------------
Relevant topics include but are not limited to:

* Usability Analysis
* System-User Interfaces
* Psychology of Deception
* Socio-Technical Attacks and Defenses
* User Perception of Security and Trust
* Cognitive Aspect in Human Computer Interaction
* Human Practice and Behavioural Models
* Design and Analysis of Socio-Technical Secure Systems
* Social Engineering
* Ceremonies and Workflows
* Game Theoretical Approaches to Security
* Cyber Crime Science
* Threat and Adversary Models
* Social Informatics and Networks
* Security Ethics
* Effects of Technology on Trust Building Behaviour
* Socio-Technical Experiences and Test Cases

PROGRAM COMMITTEE
-----------------
Matt Bishop (University California, CA, USA)
Lizzie Coles-Kemp (Royal Holloway, UK)
Vaibhav Garg (University Indiana, USA)
Pieter Hartel (University Twente, NL)
Cormac Herley (Microsoft Research, USA)
Markus Jakobsson (PayPal, USA)
Florian Kammueller (Middlesex University, UK)
Vincent Koenig (University Luxembourg, L)
Jean  Martina (Univ. Fed. de Santa Catarina, BR)
Sjouke Mauw (University Luxembourg, L)
Andrew Moore (CERT/SEI, USA)
Tyler Moore (Southern Methodist University, USA)
Martin Ortlieb (Google, CH)
Wolter Pieters (University Twente & TU Delft, NL)
Peter Y. A. Ryan (University Luxembourg, L)
Jessica Staddon (Google, CA, USA)
Luca Vigano (University Verona, IT)
Melanie Volkamer (TU Darmstadt, D)
Jeff Yan (University Newcastle, UK)

PAPER SUBMISSION
----------------
Contributions should be at most 8 pages, including
the bibliography and well-marked appendices, and
should follow the IEEE 8.5" x 11" Two-Columns Format.
Both theoretical and applied research papers are welcome.

Please visit our web site for more submission guidelines.

PROCEEDINGS
-----------
Pre-proceedings will be made available at the venue.
Authors will be given the opportunity to review their manuscripts,
for the final post-proceedings, which will be
published IEEE in the IEEE digital library after the workshop.

ORGANIZING COMMITTEE
--------------------

*** Workshop Chairs

Giampaolo Bella (Univ. of Catania, IT)
Gabriele Lenzini (Univ. of Luxembourg, L)

*** Programme Chairs

Christian W. Probst (Technical University of Denmark, DK)
Trish Williams (Edith Cowan University, AU)


More information about the liberationtech mailing list