HAS 2015 - 3rd International Conference on Human Aspects of Information Security, Privacy and Trust
Date2015-08-02 - 2015-08-07
Deadline2014-12-16
VenueLos Angeles, USA - United States
Keywords
Websitehttps://www.hcii2015.org
Topics/Call fo Papers
Indicative topics/keywords of the broad spectrum of issues to be addressed:
Ambient, non-intrusive security, privacy and trust mechanisms
Balancing user friendliness and strong security
Computer ethics and security
Cyber security awareness raising, education and training programs
Cyber security policies and user behavior
Economics of cyber security
Effects of security systems upon user, corporate, and governmental behavior
End-user interactions with trusted platforms
Formulation and impacts of national cyber security strategies, policies and standards
Human behavior in cyber security and privacy
Human cyber forensics
Human factors in cyber security incident response
Human factors of Privacy Enhancing Technologies
Human vulnerabilities in network and system security
Intelligence-driven cyber security
Leveraging behavioral science for cyber security risk mitigation
Marketing models for end user security
Patterns of security, privacy and trust practices in human-computer interactions
Secure and trustworthy life-logging
Security and privacy in social networking
Security of cyber-physical-human systems and human-in-the-loop cyber-physical systems
Simplifying risk management and threat assessment
Social engineering and other human-related risks
The role of end users on cyber security risks and their mitigation
The role of security, privacy and trust in human-computer interactions
Trustworthy biometric security
Usable security and privacy
User acceptance of security policies and technologies
User psychology and social influence in security and privacy decisions
User security and privacy by design
Ambient, non-intrusive security, privacy and trust mechanisms
Balancing user friendliness and strong security
Computer ethics and security
Cyber security awareness raising, education and training programs
Cyber security policies and user behavior
Economics of cyber security
Effects of security systems upon user, corporate, and governmental behavior
End-user interactions with trusted platforms
Formulation and impacts of national cyber security strategies, policies and standards
Human behavior in cyber security and privacy
Human cyber forensics
Human factors in cyber security incident response
Human factors of Privacy Enhancing Technologies
Human vulnerabilities in network and system security
Intelligence-driven cyber security
Leveraging behavioral science for cyber security risk mitigation
Marketing models for end user security
Patterns of security, privacy and trust practices in human-computer interactions
Secure and trustworthy life-logging
Security and privacy in social networking
Security of cyber-physical-human systems and human-in-the-loop cyber-physical systems
Simplifying risk management and threat assessment
Social engineering and other human-related risks
The role of end users on cyber security risks and their mitigation
The role of security, privacy and trust in human-computer interactions
Trustworthy biometric security
Usable security and privacy
User acceptance of security policies and technologies
User psychology and social influence in security and privacy decisions
User security and privacy by design
Other CFPs
- 3rd International Conference on Distributed, Ambient and Pervasive Interactions
- 4th International Conference on Design, User Experience and Usability
- 6th International Conference on Digital Human Modeling and Applications in Health, Safety, Ergonomics and Risk Management
- 9th International Conference on Augmented Cognition
- 7th International Conference on Social Computing and Social Media
Last modified: 2014-07-26 13:13:59