Programme
The workshop will take place the 29th September 2022 with the followings schedule Note: All times are according to the local time in Denmark (CEST)
08:45 - 09:00 | Welcome by the Chairs |
Simon Parkin | |
09:00 - 10:00 | Session 1 |
(Work in Progress): Considering Human Factors in Collaborative Decision Making for Secure Architecture Design | |
Brahim Hamid and Jason Jaskolka | |
Hunting High or Low: Evaluating the Effectiveness of High-Interaction and Low-Interaction Honeypots | |
Yekta Kocaogullar, Orcun Çetin, Budi Arief, Calvin Brierley, Jamie Pont and Julio Hernandez-Castro | |
10:00 - 10:30 | Break |
10:30 - 12:00 | Session 2 |
Why Most Results of Socio-Technical Security User Studies Are False--And What to Do About it | |
Thomas Gross | |
Verification of the Socio-Technical Aspects of Voting: The Case of the Polish Postal Vote | |
Wojtek Jamroga, Yan Kim and P. Y. A. Ryan | |
``I feel spied on and I don't have any control over my data": User Privacy Perception, Preferences and Trade-offs in University Smart Buildings | |
Rawan Taher, Maryam Mehrnezhad and Charles Morisset | |
12:00 - 14:00 | Break |
14:00 - 15:00 | Keynote Talk |
Finding the common ground between employees and security professionals | |
Ceri Jones, Head of Security Awareness and Community, The LEGO Group | |
Abstract: How we talk about people in security affects the way we perceive and support them. The landscape of security and security management is full of language that is for ourselves - what is rarely considered is how this information is used and interpreted by others outside of security. The talk will explore examples of how security-related human behaviour is often reported and measured, such as in management dashboard tools within organizations. Different approaches will be discussed which can bring a positive lens into security, looking forward to what can be done in security practice to embody positive engagement with users. |
|
15:00 - 15:15 | Break |
15:15- 16:45 | Session 3 |
Situation Critical: Intensive Cybersecurity Care Needed | |
Lynne Coventry, Elizabeth Sillence, Richard Brown, Dawn Branley-Bell, Pasquale Mari, Saverio Caruso, Alessandra Casaroli, Fabio Rizzoni and Sabina Magalini | |
Design and Evaluation of an Anti-Phishing Artifact Based on Useful Transparency | |
Christopher Beckmann, Benjamin Maximilian Berens, Niklas Kühl, Peter Mayer, Mattia Mossano and Melanie Volkamer | |
(Work in Progress) Brick by Brick: Using a Structured Building Blocks Method to Engage Participants and Collect IT Security Insights | |
Uta Menges, Jonas Hielscher, Annette Kluge and M. Angela Sasse | |
16:45 - 17:00 | Best Paper Award and Closing (Simon Parkin) |
Simon Parkin | |