Programme
8:30-8:45 | Welcome and Opening by: Zinaida Benenson (Univ. of Erlangen-Nuremberg) |
8:45-10:00 | Session 1: Keynote Talk |
Why Can't We Do Security Right? | |
Matt Bishop (Univ. of California, Davis) Abstract The lack of security and assurance in our computer systems and supporting network and system infrastructure is clear. What to do about it is not clear. The difficulty is rooted in the social, political and economic environment in which computing occurs. Marketing forces, societal pressures, and most especially peoples' varying needs for safety and security exacerbate the difficulties of applying technical remediations to improve security. Numerous solutions have been proposed, each dealing with one or more aspects of the problems in security but none of which engage with what it means to be safe and secure in contemporary society. We have to simultaneously understand security from the societal, individual and technical perspectives and wrestle a position on information security from those three perspectives. This talk takes a historical position to understand how environmental forces influence security technology, policy, and procedures. It asks how information security grew as a practice and where it will go. It will also provide thoughts on how to improve information security. |
|
10:00 - 10:30 | Coffee Break |
10:30 - 12:00 | Session 2: Social Interactions (full papers) Chair: Sarah Diesburg |
Digital Privacy and Social Capital on Social Network Sites. Friends or Foes? | |
Angeliki Kitsiou, Eleni Tzortzaki, Maria Sideri and Stefanos Gritzalis (University of the Aegean) | |
Can Johnny Finally Encrypt? Evaluating E2E-Encryption in Popular IM Applications | |
Amir Herzberg and Hemi Leibowitz (Bar Ilan University) | |
Influence Tokens: Analysing Adversarial Behaviour Change in Coloured Petri Nets | |
Peter Carmichael, Charles Morisset and Thomas Gross (Newcastle University) | |
12:00 - 13:30 | Lunch |
13:30 - 15:00 | Session 3: Physical Interactions (full papers) Chair: Markus Jakobsson |
Case Study: Predicting the Impact of a Physical Access Control Intervention | |
Tristan Caulfield and Simon Parkin (University College London) | |
Is Your Data Gone? Measuring User Perceptions of Deletion | |
Sarah Diesburg, C. Adam Feldhaus, Mojtaba Al Fardan, Jonathan Schlicht and Nigel Ploof (University of Northern Iowa) | Why do people use unsecure public Wi-Fi? An investigation of behaviour and factors driving decisions |
Nissy Sombatruang, Angela Sasse and Michelle Baddeley (University College London) | |
15:00 - 15:30 | Coffee Break |
15:30 - 17:00 | Session 4: Position Papers Chair: Matt Bishop |
User Trust Assessment - A New Approach to Combat Deception | |
Markus Jakobsson (Agari) | |
"I had no idea this was a thing'': On the Importance of Understanding the User Experience of Personalized Transparency Tools | |
Julia Earp and Jessica Staddon (N. C. State University) | |
Proposing Ambient Visualization and Pre-Attentive Processing for Threat Detection | |
Sunny Fugate, Robert Gutzwiller, Jamie Lukos (SPAWAR Systems Center, Pacific) and Christopher Lester (Naval Surface Warfare Center, Philadelphia Division) | 17:00 - 17:15 | Closing |
19:00-22:00 | Session 5: Dinner Out |