Supported by





8:30-8:45 Welcome and Opening
by: Zinaida Benenson (Univ. of Erlangen-Nuremberg)
8:45-10:00 Session 1: Keynote Talk
Why Can't We Do Security Right?

Matt Bishop (Univ. of California, Davis)


The lack of security and assurance in our computer systems and supporting network and system infrastructure is clear. What to do about it is not clear. The difficulty is rooted in the social, political and economic environment in which computing occurs. Marketing forces, societal pressures, and most especially peoples' varying needs for safety and security exacerbate the difficulties of applying technical remediations to improve security. Numerous solutions have been proposed, each dealing with one or more aspects of the problems in security but none of which engage with what it means to be safe and secure in contemporary society. We have to simultaneously understand security from the societal, individual and technical perspectives and wrestle a position on information security from those three perspectives. This talk takes a historical position to understand how environmental forces influence security technology, policy, and procedures. It asks how information security grew as a practice and where it will go. It will also provide thoughts on how to improve information security.

10:00 - 10:30 Coffee Break
10:30 - 12:00 Session 2: Social Interactions (full papers)
Chair: Sarah Diesburg
Digital Privacy and Social Capital on Social Network Sites. Friends or Foes?
Angeliki Kitsiou, Eleni Tzortzaki, Maria Sideri and Stefanos Gritzalis (University of the Aegean)
Can Johnny Finally Encrypt? Evaluating E2E-Encryption in Popular IM Applications
Amir Herzberg and Hemi Leibowitz (Bar Ilan University)
Influence Tokens: Analysing Adversarial Behaviour Change in Coloured Petri Nets
Peter Carmichael, Charles Morisset and Thomas Gross (Newcastle University)
12:00 - 13:30 Lunch
13:30 - 15:00 Session 3: Physical Interactions (full papers)
Chair: Markus Jakobsson
Case Study: Predicting the Impact of a Physical Access Control Intervention
Tristan Caulfield and Simon Parkin (University College London)
Is Your Data Gone? Measuring User Perceptions of Deletion
Sarah Diesburg, C. Adam Feldhaus, Mojtaba Al Fardan, Jonathan Schlicht and Nigel Ploof (University of Northern Iowa)
Why do people use unsecure public Wi-Fi? An investigation of behaviour and factors driving decisions
Nissy Sombatruang, Angela Sasse and Michelle Baddeley (University College London)
15:00 - 15:30 Coffee Break
15:30 - 17:00 Session 4: Position Papers
Chair: Matt Bishop
User Trust Assessment - A New Approach to Combat Deception
Markus Jakobsson (Agari)
"I had no idea this was a thing'': On the Importance of Understanding the User Experience of Personalized Transparency Tools
Julia Earp and Jessica Staddon (N. C. State University)
Proposing Ambient Visualization and Pre-Attentive Processing for Threat Detection
Sunny Fugate, Robert Gutzwiller, Jamie Lukos (SPAWAR Systems Center, Pacific) and Christopher Lester (Naval Surface Warfare Center, Philadelphia Division)
17:00 - 17:15 Closing
19:00-22:00 Session 5: Dinner Out