HCI International 2015
Los Angeles, CA, USA
2-7 August 2015

Navigation Menu

Human Aspects of Information Security, Privacy and Trust


Conference Final Program
(Last Updated: 4 August, 2015)


Wednesday, 5 August 2015
08:00 – 10:00

S018: Mobile authentication and access control: Security and usability of smartphones, sensors and embedded systems
Chair(s): Theo Tryfonas, University of Bristol, United Kingdom
Room: SAN FERNANDO

  • Real-time Monitoring of Privacy Abuses and Intrusion Detection in Android System
    Shancang Li, Edinburgh Napier University, United Kingdom; Junhua Chen, Theodoros Spyridopoulos, Panagiotis Andriotis, University of Bristol, United Kingdom; Robert Ludwiniak, Gordon Russell, Edinburgh Napier University, United Kingdom.
  • Messaging Activity Reconstruction with Sentiment Polarity Identification
    Panagiotis Andriotis, George Oikonomou, University of Bristol, United Kingdom.
  • Exploring the Adoption of Physical Security Controls in Smartphones
    Nasser Alshammari, Staffordshire University, Saudi Arabia; Alexios Mylonas, Mohamed Sedky, Justin Champion, Carolin Bauer, Staffordshire University, United Kingdom.
  • Predicting Graphical Passwords
    Matthieu Devlin, Jason Nurse, University of Oxford, United Kingdom; Duncan Hodges, Cranfield University, United Kingdom; Michael Goldsmith, Sadie Creese, University of Oxford, United Kingdom.
  • An Extensible Platform for the Forensic Analysis of Social Media Data
    Huw Read, Konstantinos Xynos, University of South Wales, Pontypridd, CF37 1DL, UK, United Kingdom; Iain Sutherland, Noroff University, Norway; Frode Roarson, Noroff University College, 4608 Kristiansand, Norway, United Kingdom; Panagiotis Andriotis, George Oikonomou, University of Bristol, United Kingdom.

Top

10:30 – 12:30

S041: Considering Privacy & Security in Health, Education, Communication, and E-commerce: Approaches to Design and Policy Development
Chair(s): Theo Tryfonas, University of Bristol, United Kingdom
Room: SAN FERNANDO

  • Do Graphical Cues Effectively Inform Users? A Socio-technical Security Study in Accessing WiFi Networks
    Ana Ferreira, Jean-Louis Huynen, Vincent Koenig, Gabriele Lenzini, Salvador Rivas, University of Luxembourg, Luxembourg.
  • Opinions or Algorithms: An Investigation of Trust in People Versus Automation in App Store Security
    David Schuster, Mary Still, Jeremiah Still, San José State University, United States; Ji Jung Lim, Intel Security, United States; Cary Feria, San José State University, United States; Christian P. Rohrer, Intel Security, United States.
  • Pervasive Monitoring as an Insider Threat: An Adapted Model
    Dana Polatin-Reuben, University of Oxford, United Kingdom.
  • An Identification of Variables Influencing the Establishment of Information Security Culture
    Emad Sherif, Steven Furnell, Nathan Clarke, Plymouth University, United Kingdom.
  • Factors Contributing to Performance for Cyber Security Forensic Analysis
    Shelby Hopkins, Andrew Wilson, Austin Silva, Chris Forsythe, Sandia National Laboratories, United States.

Top

13:30 – 15:30

S065: The Future of Voting: Integrating Usability and Security
Chair(s): Mary Frances Theofanos, Shanee Dawkins, National Institute of Standards and Technology (NIST), United States
Room: SAN FERNANDO

  • Personalized Voting: The Intersection of Cloud and Mobility
    Shanee Dawkins, National Institute of Standards and Technology (NIST), United States; Sharon Laskowski, National Institute of Standards and Technology, United States.
  • Users’ Mental Models for Three End-To-End Voting Systems: Helios, Prêt à Voter, and Scantegrity II
    Claudia Acemyan, Philip Kortum, Mike Byrne, Dan Wallach, Rice University, United States.
  • Poll Workers and Election Integrity: Security as if People Mattered
    Whitney Quesenbery, Dana Chisnell, Center for Civic Design, United States.
  • Framework for Cloud Usability
    Brian Stanton, Mary Frances Theofanos, National Institute of Standards and Technology (NIST), United States; Karuna Joshi, University of Maryland Baltimore County, United States.
  • Televoting: Secure, Overseas Voting
    Chris Crawford, Naja Mack, Wanda Eugene, Juan Gilbert, University of Florida, United States.
  • Security Implications for Personal Assistive Technology in Voting
    Sarah Swierenga, Rebecca Zantjer, James E Jackson, Jennifer Ismirle, Stephen Blosser, Graham L Pierce, Michigan State University, United States.
  • An Extension and Validation of the Task-Technology Fit: A Case of a Mobile Phone Voting System
    Noluntu Mpekoa, Aaron Bere, Central University of Technology, South Africa.

Top

16:00 – 18:00

S086: Innovative Risk Management Methodologies and Tools for Critical Information Infrastructures (CII)
Chair(s): Despoina Polemi, University of Pireaus, Greece
Room: SAN FERNANDO

  • Using Logical Error Detection in Software Controlling Remote-Terminal Units to Predict Critical Information Infrastructures Failures
    Georgios Stergiopoulos, Athens University of Economics & Business, Greece; Marianthi Theocharidou, EC Joint Research Centre, Italy; Dimitris Gritzalis, Athens University of Economics & Business, Greece.
  • Risk Modeling and Analysis of Interdependencies of Critical Infrastructures Using Colored Timed Petri Nets
    Chrysovalandis Agathangelou, Chryssis Georgiou, Ileana Papailiou, Anna Philippou, Loukas Pouis, Georgios Tertytchny, Despina Vakana, University of Cyprus, Cyprus.
  • Towards a Successful Exercise Implementation – A Case Study of Exercise Methodologies
    George Makrodimitris, University of Piraeus, Greece; Christos Douligeris, University of Pireaus, Greece.
  • CYSM: An Innovative Physical/Cyber Security Management System for Ports
    Spyros Papastergiou, Despoina Polemi, University of Pireaus, Greece; Athanasios Karantjias, SingularLogic S.A, Greece.
  • Business and Threat Analysis of Ports’ Supply Chain Services
    Spyros Papastergiou, Despoina Polemi, University of Pireaus, Greece; Ioannis Papagianopoulos, Pireaus Port Authority, Greece.
  • XACML Privacy Policy Editor for Critical Infrastructures
    Nils Ulltveit-Moe, University of Agder, Norway; Henrik Nergaard, University of Agder, Grimstad, Norway; Terje Gjøsæter, University of Agder, Norway; Jennifer Betts, Queens University Belfast, United Kingdom.

Top



Thursday, 6 August 2015
08:00 – 10:00

S108: Operational Trustworthiness Enabling Technologies
Chair(s): Ioannis G. Askoxylakis, Foundation for Research & Technology - Hellas (FORTH), Greece
Room: SAN FERNANDO

  • Usable Trust: Grasping Trust Dynamics for Online Security as a Service
    Shenja Van der Graaf, IMINDS, Belgium; Wim Vanobberghen, VUB, Belgium; Michalis Kanakakis, Costas Kalogiros, AUEB, Greece.
  • Profit-Maximizing Trustworthiness Level of Composite Systems
    Costas Kalogiros, Michalis Kanakakis, AUEB, Greece; Shenja Van der Graaf, IMINDS, Belgium; Wim Vanobberghen, VUB, Belgium.
  • From V2X to Control2Trust - Why Trust and Control are Major Attributes in Vehicle2x Technologies
    Teresa Schmidt, Ralf Philipsen, Martina Ziefle, RWTH Aachen University, Germany.
  • RT-SPDM: Real-time Security, Privacy & Dependability Management of Heterogeneous Systems
    Konstantinos Fysarakis, George Hatzivasilis, Technical University of Crete, Greece; Ioannis G. Askoxylakis, Foundation for Research & Technology - Hellas (FORTH), Greece; Charalampos Manifavas, Technological Educational Institute of Crete, Greece.
  • SafetyPIN: Secure PIN Entry through Eye Tracking
    Mythreya Seetharama, Ostwestfalen-Lippe University of Applied Sciences / Fraunhofer, Germany; Volker Paelke, Fraunhofer, Germany; Carsten Röcker, Ostwestfalen-Lippe University of Applied Sciences / Fraunhofer, Germany.
    (Presentation Canceled)

Top

10:30 – 12:30

S132: Human Aspects of Information Security, Privacy and Trust for Smart Buildings
Chair(s): Steffen Wendzel, Fraunhofer, Germany
Room: SAN FERNANDO

  • Applying the ACPO guidelines to Building Automation Systems
    Iain Sutherland, Noroff University, Norway; Theodoros Spyridopoulos, University of Bristol, United Kingdom; Huw Read, University of South Wales, Pontypridd, CF37 1DL, UK, United Kingdom; Andy Jones, University of South Wales, United Kingdom; Graeme Sutherland, North Building Technologies, United Kingdom; Mikhaila Burgess, Noroff University College, Norway.
  • Analysis of Human Awareness of Security and Privacy Threats in Smart Environments
    Luca Caviglione, National Research Council (CNR), Italy; Jean-Francois Lalande, INRIA / INSA Centre Val de Loire, France; Wojciech Mazurczyk, Warsaw University of Technology, Poland; Steffen Wendzel, Fraunhofer, Germany.
  • Adjustable Fusion to Support Cyber Security Operators
    François-Xavier Aguessy, Olivier Bettan, Thales Solutions de Securité & Services, France; Romuald Dobigny, Claire Laudy, Gaëlle Lortal, David Faure, Thales Research & Technology, France.
  • Visualizing BACnet Data to Facilitate Humans in Building-Security Decision-Making
    Jernej Tonejc, Jaspreet Kaur, Fraunhofer FKIE, Germany; Adrian Karsten, University of Bonn, Germany; Steffen Wendzel, Fraunhofer, Germany.
  • Perceptions of Personal Privacy in Smart Home Technologies: Do User Assessments Vary Depending on the Research Method?
    Wiktoria Wilkowska, Martina Ziefle, RWTH Aachen University, Germany; Simon Himmel, RWTH Aachen U, Germany.
  • Privacy Principles in Design of Smart Homes Systems in Elderly Care
    Ella Kolkowska, Örebro University, Sweden.

Top

13:30 – 15:30

S155: Security, privacy and trust in human-computer interactions
Chair(s): Noluntu Mpekoa, Central University of Technology, South Africa
Room: SAN FERNANDO

  • Information Presentation: Considering On-Line User Confidence for Effective Engagement
    Elahe Kani-Zabihi, University of West London, United Kingdom; Lizzie Coles-Kemp, Royal Holloway - University of London, United Kingdom; Martin Helmhout, University of Oxford, United Kingdom.
  • Usable-Security Evaluation
    Yasser Hausawi, Institute of Public Administration, Saudi Arabia; William H. Allen, Florida Institute of Technology, United States.
  • Factors that Influence Information Security Behaviour: An Australian Web-based Study
    Malcolm Pattinson, The University of Adelaide, Australia; Marcus Butavicius, Defence, Science & Technology Organisation (DSTO), Australia; Kathryn Parsons, Defence, Science Technology Organisation (DSTO), Australia; Agata McCormac, Dragana Calic, Defence, Science & Technology Organisation (DSTO), Australia; Cate Jerram, University of Adelaide, Australia.
  • Usability of Activity-Based and Image-Based Challenge Questions in Online Student Authentication
    Abrar Ullah, Wales Deanery, United Kingdom; Hannan Xiao, Trevor Barker, University of Hertfordshire, United Kingdom.
  • Hobson’s Choice: Security and Privacy Permissions in Android and iOS Devices
    John Haggerty, Thomas Hughes-Roberts, Nottingham Trent University, United Kingdom; Robert Hegarty, Manchester Metropolitan University, United Kingdom.

Top

16:00 – 18:00

S176: Human Factors of Authentication
Chair(s): Yee-Yin Choong, National Institute of Standards and Technology, United States ; Kristen Greene, National Institute of Standards and Technology (NIST), United States
Room: SAN FERNANDO

  • Privacy and Security in the Brave New World: The Use of Multiple Mental Models
    Sandra Spickard Prettyman, Culture Catalyst, United States; Susanne Furman, National Institute of Standards and Technology, United States; Mary Frances Theofanos, Brian Stanton, National Institute of Standards and Technology (NIST), United States.
  • What 4,500+ People Can Tell You – Employees' Attitudes toward Organizational Password Policy Do Matter
    Yee-Yin Choong, National Institute of Standards and Technology, United States; Mary Frances Theofanos, National Institute of Standards and Technology (NIST), United States.
  • Password Policy Languages: Usable Translation from the Informal to the Formal
    Michelle Steves, Mary Frances Theofanos, Celia Paulsen, National Institute of Standards and Technology (NIST), United States; Athos Ribeiro, Universidale de Brasilia, Brazil.
  • Human Generated Passwords – the Impacts of Password Requirements and Presentation Styles
    Paul Lee, Yee-Yin Choong, National Institute of Standards and Technology, United States.
  • Effects of Password Permutation on Subjective Usability Across Platforms
    Kristen Greene, National Institute of Standards and Technology (NIST), United States.
  • The Authentication Equation: A Tool to Visualize the Convergence of Security and Usability of Text-Based Passwords
    Cathryn Ploehn, National Institute of Standards and Technology, United States; Kristen Greene, National Institute of Standards and Technology (NIST), United States.

Top



Friday, 7 August 2015
10:30 – 12:30

S218: Malicious Insider Threat
Chair(s): Ulrike Hugl, University of Innsbruck, Austria
Room: SAN FERNANDO

  • Insider Threats: the Major Challenge to Security Risk Management
    Teresa Pereira, Polytechnic Institute of Viana do Castelo, Portugal; Henrique Santos, University of Minho, Portugal.
  • Identifying Blind Spots in IS Security Risk Management Processes using Qualitative Model Analysis
    Christian Sillaber, Ruth Breu, University of Innsbruck, Austria.
  • The Effects of Awareness Programs on Information Security in Banks: The Roles of Protection Motivation and Monitoring
    Stefan Bauer, Edward W.N. Bernroider, Vienna University of Economics and Business, Austria.
  • KYPO: A Tool for Collaborative Study of Cyberattacks in Safe Cloud Environment
    Zdenek Eichler, Masaryk University Faculty of Informatics, Czech Republic; Radek Ošlejšek, Dalibor Toth, Masaryk University, Czech Republic.
  • Re-Designing Permission Requirements to Encourage BYOD Policy Adherence
    Lotus Lee, Jeremiah Still, San José State University, United States.
  • Putting a Hat on a Hen? Learnings for Malicious Insider Threat Prevention from the Background of German White-collar Crime Research
    Ulrike Hugl, University of Innsbruck, Austria.
  • A Probabilistic Analysis Framework for Malicious Insider Threats
    Taolue Chen, Florian Kammueller, Middlesex University London, United Kingdom; Ibrahim Nemli, Technical University Denmark, Denmark; Christian. W. Probst, Technical University of Denmark, Denmark.

Top

13:30 – 15:30

S234: Usable Authentication
Chair(s): Theo Tryfonas, University of Bristol, United Kingdom
Room: SAN FERNANDO

  • Chimera CAPTCHA: A Proposal of CAPTCHA using Strangeness in Merged Objects
    Masahiro Fujita, Yuki Ikeya, Junya Kani, Masakatsu Nishigaki, Shizuoka University, Japan.
  • Investigating the Use of Gesture-based Passwords by the Seniors
    Lakshmidevi Sreeramareddy, Pewu Mulbah, Jinjuan Heidi Feng, Towson University, United States.
  • “Too Taxing on the Mind!” Authentication Grids are not for Everyone
    Kat Krol, Constantinos Papanicolaou, University College London, United Kingdom; Alexei Vernitski, University of Essex, United Kingdom; Angela Sasse, University College London, United Kingdom.
  • Principles of Persuasion in Social Engineering and their Use in Phishing
    Ana Ferreira, University of Luxembourg, Luxembourg; Lynne Coventry, Northumbria University, United Kingdom; Gabriele Lenzini, University of Luxembourg, Luxembourg.
  • Single Trial Authentication with Mental Password Writing
    Sarah Abdulkader, Ayman Atia, Mostafa-Sami Mostafa, Helwan University, Egypt.
  • Leap Motion Controller for Authentication via Hand Geometry and Gestures
    Alexander Chan, Hunter College High School, United States; Tzipora Halevi, Nasir Memon, New York University Polytechnic School of Engineering, United States.

Top

16:00 – 18:00

S252: Ethics, Privacy and Security in Social Media
Chair(s): Lynne Coventry, Northumbria University, United Kingdom
Room: SAN FERNANDO

  • Signs of Time: Designing Social Networking Site Profile Interfaces with Temporal Contextual Integrity
    Alexander Novotny, Vienna University of Economics and Business, Austria.
  • Hey, I Have a Problem in the System. Who can Help Me? An Investigation of Facebook Users Interaction When Facing Privacy Problems
    Marília Mendes, Federal University of Ceará, Brazil; Elizabeth Furtado, University of Fortaleza (Unifor), Brazil; Guido Militão, University of Fortaleza, Brazil; Miguel De Castro, Federal University of Ceará, Brazil.
  • An Investigation of the Factors that Predict an Internet User’s Perception of Anonymity on the Web
    Shruti Devaraj, Myrtede Alfred, Kapil Chalil Madathil, Anand Gramopadhye, Clemson University, United States.
  • Legal Issues and User Experience in Ubiquitous Systems from a Privacy Perspective
    Patricia De Souza, Federal University of Mato Grosso, Brazil; Cristiano Maciel, Universidade Federal de Mato Grosso (UFMT), Brazil.
  • Reminding Users of their Privacy at the Point of Interaction: the Effect of Privacy Salience on Disclosure Behaviour
    Thomas Hughes-Roberts, Nottingham Trent University, United Kingdom.

Top



follow us Icon Link: Follow us on Facebook Icon Link: Follow us on Twitter