ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

ICHASEEIT 2017 - International Conference on Human Aspects of Software Engineering and Electro Information Technology

Date2017-11-11 - 2017-11-12

Deadline2017-08-10

VenueRome, Italy Italy

KeywordsSoftware Engineering; Information Technology; Human Computing

Websitehttps://www.ichaseeit.iisrcrcc.com

Topics/Call fo Papers

Software design or engineering philosophies, practices, and tools;
Adapting tools or processes to accommodate a range of organizational and cultural situations;
Sociological or cultural characterizations of software engineering (e.g., trust, conflicts, norms);
Psychological or cognitive aspects of software design or engineering (e.g., motivation, rewards, personality);
Managerial or organizational aspects focused on people and their interactions;
Collaborative or cooperative aspects of design or engineering within multidisciplinary teams;
Teamwork, collaboration, or cooperation in or across various development methodologies;
Community-based software development (e.g., Open Source, crowdsourcing, and public-private partnerships);
Coordination, mutual awareness, and knowledge sharing at different scales (e.g., distributed teams, semi-anonymous collaboration, “borderless” teams);
Stakeholder participation within and across phases;
Processes and tools to support communication, collaboration, and cooperation among stakeholders over the lifetime of a system.
Ambient, non-intrusive security, privacy and trust mechanisms
Balancing user friendliness and strong security
Computer ethics and security
Cyber insurance and actuarial services
Cyber security awareness raising, education and training programs
Cyber security policies and user behavior
Economics of cyber security
Effects of security systems upon user, corporate, and governmental behavior
End-user interactions with trusted platforms
Formulation and impacts of national cyber security strategies, policies and standards
Game-theoretic approaches to cyber security
Human factors in cyber security incident response
Human factors of Authentication
Human factors of Privacy and Privacy Enhancing Technologies
Human vulnerabilities in network and system security
Leveraging behavioral science for cyber security risk mitigation
Passwordless authentication methods

Last modified: 2017-04-08 15:07:57