HAS 2016 - 4th International Conference on Human Aspects of Information Security, Privacy and Trust
Topics/Call fo Papers
Indicative topics/keywords of the broad spectrum of issues to be addressed:
Ambient, non-intrusive security, privacy and trust mechanisms
Balancing user friendliness and strong security
Computer ethics and security
Cyber insurance and actuarial services
Cyber security awareness raising, education and training programs
Cyber security policies and user behavior
Economics of cyber security
Effects of security systems upon user, corporate, and governmental behavior
End-user interactions with trusted platforms
Formulation and impacts of national cyber security strategies, policies and standards
Game-theoretic approaches to cyber security
Human factors in cyber security incident response
Human factors of Authentication
Human factors of Privacy and Privacy Enhancing Technologies
Human vulnerabilities in network and system security
Leveraging behavioral science for cyber security risk mitigation
Passwordless authentication methods
Patterns of security, privacy and trust practices in human-computer interactions
Research methods for user-centric studies in cyber security
Risk and uncertainty management approaches
Security and privacy in social networking
Security of cyber-physical-human systems and human-in-the-loop cyber-physical systems
Simplifying risk management and threat assessment
Social engineering and other human-related risks
Social networks and influence analysis
Surveillance in cyberspace
Usable security and privacy
User acceptance of security policies and technologies
User psychology and social influence in security and privacy decisions
User security and privacy by design
Ambient, non-intrusive security, privacy and trust mechanisms
Balancing user friendliness and strong security
Computer ethics and security
Cyber insurance and actuarial services
Cyber security awareness raising, education and training programs
Cyber security policies and user behavior
Economics of cyber security
Effects of security systems upon user, corporate, and governmental behavior
End-user interactions with trusted platforms
Formulation and impacts of national cyber security strategies, policies and standards
Game-theoretic approaches to cyber security
Human factors in cyber security incident response
Human factors of Authentication
Human factors of Privacy and Privacy Enhancing Technologies
Human vulnerabilities in network and system security
Leveraging behavioral science for cyber security risk mitigation
Passwordless authentication methods
Patterns of security, privacy and trust practices in human-computer interactions
Research methods for user-centric studies in cyber security
Risk and uncertainty management approaches
Security and privacy in social networking
Security of cyber-physical-human systems and human-in-the-loop cyber-physical systems
Simplifying risk management and threat assessment
Social engineering and other human-related risks
Social networks and influence analysis
Surveillance in cyberspace
Usable security and privacy
User acceptance of security policies and technologies
User psychology and social influence in security and privacy decisions
User security and privacy by design
Other CFPs
- 4th International Conference on Distributed, Ambient and Pervasive Interactions
- 5th International Conference on Design, User Experience and Usability
- 7th International Conference on Digital Human Modeling and Applications in Health, Safety, Ergonomics and Risk Management
- 10th International Conference on Augmented Cognition
- 8th International Conference on Social Computing and Social Media
Last modified: 2016-03-22 22:48:40