STAST 2011 - 2011 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST)
Topics/Call fo Papers
Due to the huge yet increasing number of people carrying out sensitive Internet transactions, security threats hardly ever reduce to sheer technical threats at present. Rather, they are socio-technical, as they come from adversaries who combine social engineering practices with technical skills to circumvent the defenses of information systems, often by exploiting the users' ill-understanding of security mechanisms, of poorly designed user interfaces, and of unusable security policies. Humans obviously cannot be treated as machines, as they take actions that may seem irrational although they are perfectly justifiable from a cognitive and a social perspective. Computer security hence appears to acquire more and more the facets of an interdisciplinary science with roots in both interpretive and positivist research traditions.
Goals
The workshop intends to foster an interdisciplinary discussion on how to model and analyse the socio-technical aspects of modern security systems and on how to protect such systems from socio-technical threats and attacks. It aims to stimulate an active exchange of ideas and experiences from different communities of researchers in order to identify weaknesses potentially emerging from poor usability designs and policies, from social engineering, and from deficiencies hidden in flawed interfaces and implementations. It will bring together experts in computer security and in cognitive, social, and behavioral sciences; it will collect the state of the art, identify open and emerging problems, and propose future research directions.
Goals
The workshop intends to foster an interdisciplinary discussion on how to model and analyse the socio-technical aspects of modern security systems and on how to protect such systems from socio-technical threats and attacks. It aims to stimulate an active exchange of ideas and experiences from different communities of researchers in order to identify weaknesses potentially emerging from poor usability designs and policies, from social engineering, and from deficiencies hidden in flawed interfaces and implementations. It will bring together experts in computer security and in cognitive, social, and behavioral sciences; it will collect the state of the art, identify open and emerging problems, and propose future research directions.
Other CFPs
- 2011 Symposium on Application Accelerators in High-Performance Computing (SAAHPC)
- 2013 IEEE International Pulsed Power and Plasma Science Conference
- 2013 IEEE 25th Symposium on Fusion Engineering (SOFE)
- 2011 2nd International Conference on Intelligent Control and Information Processing (ICICIP)
- 2011 Academic International Symposium on Optoelectronics and Microelectronics Technology (AISOMT)
Last modified: 2011-04-16 14:18:30