HuSCy:ASM 2016 - 1st Workshop on The Human side of Cybersecurity: assessment, measurement and modelling (HuSCy:ASM16)
Topics/Call fo Papers
This workshop intends to pay a closer look into the concept of securing end users as they interact with today’s online technologies. Understanding users’ behaviour in the context of how they are manipulated within the norms and practices of their ecosystems as opposed to technologies in place to provide the protection is the central issue for this workshop. As humans need to be at the centre of such secure systems, the need to understand the characteristics of the interaction between humans and systems is evident. The human aspects of the interaction with systems is predominately visual, auditory and textual. The need to understand how humans fail to secure themselves and protect their well-being is paramount. To constrain a product confines innovation considerably and unexpected and unplanned use of technology has merits, hence security needs to be integrated within technologies to pre-empt possible cyberattacks. Such technologies need to learn and embed user behaviours and learn the ever changing face of cyberattacks.
The scope of this workshop encourages researchers in the areas of cybersecurity, data mining, natural text processing, machine learning, HCI, cognitive psychology, sensors (eye tracking, EEG, ECG, etc.), neuroscience, game theory, criminology and law among others to contribute to this important and evolving area of research.
Authors of best papers accepted for the conference will be encouraged to submit expanded versions of the papers to be included in an edited book by Springer shortly after the conference.
The scope of this workshop encourages researchers in the areas of cybersecurity, data mining, natural text processing, machine learning, HCI, cognitive psychology, sensors (eye tracking, EEG, ECG, etc.), neuroscience, game theory, criminology and law among others to contribute to this important and evolving area of research.
Authors of best papers accepted for the conference will be encouraged to submit expanded versions of the papers to be included in an edited book by Springer shortly after the conference.
Other CFPs
- ACM International Workshop on Timing Issues in the Specification and Synthesis of Digital Systems
- ACM Workshop on Attribute Based Access Control
- ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization
- International Workshop on Security And Privacy Analytics
- Seventh ACM Conference on Data and Application Security and Privacy
Last modified: 2016-08-18 23:50:01