HCI for Cybersecurity, Privacy and Trust - Program
The times indicated are in "Eastern Daylight Time - EDT (Washington DC, USA)"
You can check your local time, using an online time conversion tool, such as www.timeanddate.com
(Last Updated: 3 July, 2024)
Saturday, 29 June 2024 |
---|
10:30 - 12:30 |
S032: Security Training and Data Privacy Protection Solutions Chair(s): To be announced |
- Alert Interaction Service Design for AI Face Swap Video Scams
Jing Luo, Xin Zhang, Fang Fu, Hanxiao Geng, P.R. China
- Are UK Parents Empowered to Act on Their Cybersecurity Education Responsibilities?
Suzanne Prior, Karen Renaud, United Kingdom
- Revolutionizing Social Engineering Awareness Raising, Education and Training: Generative AI-powered Investigations in the Maritime Domain
Michail Loupasakis, Greece; Georgios Potamos, Eliana Stavrou, Cyprus
- Legal Protection for the Personal Data in Indonesia and Malaysia
Nanik Prasetyoningsih, Indonesia; Nazli Ismail Nawang, Malaysia; Windy Virdinia Putri, Muhammad Nur Rifqi Amirullah, Indonesia
- Towards a Harmonised Approach for Security and Privacy Management in Smart Home Contexts
Samiah Alghamdi, Steven Furnell, Steven Bagley, United Kingdom
- Enhancing Cyber Hygiene and Literacy via Interactive Mini-Games
Cameron Gray, Steven Furnell, United Kingdom
|
Sunday, 30 June 2024 |
---|
13:30 - 15:30 |
S087: Understanding Users, Visualizing Threats, and Mitigating Risks Chair: Christian Kurtz, Germany
|
- Seek and Locate? Examining the Accessibility of Cybersecurity Features
Arwa Binsedeeq, Steven Furnell, Xavier Carpent, Nicholas Gervassis, United Kingdom
- Exploring User Understanding of Wireless Connectivity and Security on Smartphones
Ezgi Tugcu, Steven Furnell, United Kingdom
- To Bot or Not to Bot?: Analysing Mental Health Data Disclosures
Deborah Taylor, Clare Melvin, Hane Aung, Rameez Asif, United Kingdom
- Competencies Required for the Offensive Cyber Operations Planners
Marko Arik, Ricardo Gregorio Lugo, Rain Ottis, Adrian Nicholas Venables, Estonia
- Unraveling the Real-World Impacts of Cyber Incidents on Individuals
Danielle Renee Jacobs, Nicole Darmawaskita, Troy McDaniel, United States
- Multi-Role Actors and Rebounding Effects Across User Interfaces - Exploring Big Tech’s Privacy Scandals and GDPR Limitations in Data Ecosystems
Christian Kurtz, Fabian Burmeister, Germany
|
Tuesday, 2 July 2024 |
---|
13:30 - 15:30 |
S174: Human Factors in Cybersecurity of Cyber-Physical Systems Room: Jefferson West Chair: Nathan Lau, United States
|
- Shared mental model in cybersecurity of cyber-physical systems
Po-Yu Chen, Nathan Lau, Hao Wang, United States; Sabarathinam Chockalingam, John Eidar Simensen, Norway
- Human Factors and Security in Digital Twins: Challenges and Future Prospects
Sanjay Misra, Norway; Kousik Barik, Spain; Harald P.-J. Thunem, Sabarathinam Chockalingam, Norway
- Decoding the Human Element in APT Attacks: Unveiling Attention Diversion Techniques in Cyber-Physical System Security
Aida Akbarzadeh, Laszlo Erdodi, Siv Hilde Houmb, Tore Geir Soltvedt, Norway
- Paralyzed Or Compromised: A Case Study of Decisions in Cyber-Physical Systems
Havard Jakobsen Ofte, Sokratis Katsikas, Norway
- Training and Security Awareness Under the Lens of Practitioners: A DevSecOps Perspective Towards Risk Management
Xhesika Ramaj, Mary Sanchez-Gordon, Norway; Ricardo Colomo-Palacios, Spain; Vasileios Gkioulos, Norway
- Cognitive Digital Twins for Improving Security in IT-OT Enabled Healthcare Applications
Sandeep Pirbhulal, Sabarathinam Chockalingam, Habtamu Abie, Norway; Nathan Lau, United States
|
Wednesday, 3 July 2024 |
---|
08:00 - 10:00 |
S201: Awareness and Action?: Privacy and Security Threats and User Acceptance of Technologies Room: Columbia2 Chair: Heather Molyneaux, Canada
|
- "I'm not planning on dying any time soon": A Survey of Digital Legacy Planning
Paola Marmorato, Clarissa Fernandes, Canada; Lydia Kraus, Czech Republic; Elizabeth Stobert, Canada
- Privacy-Conscious Design Requirements to Support Older Adults' Health Information Seeking
Yomna Aly, Cosmin Munteanu, Canada
- Japanese Users’ (Mis)understandings of Technical Terms Used in Privacy Policies and the Privacy Protection Law
Sachiko Kanamori, Miho Ikeda, Kumiko Kameishi, Ayako A. Hasegawa, Japan
- Expert Perspectives on Information Security Awareness Programs in Medical Care Institutions in Germany
Jan Tolsdorf, Luigi Lo Iacono, Germany
- Legal, Technical and User Perspectives on the Right to Modify
Rene Richard, Margaret McKay, Heather Molyneaux, Canada
|
16:00 - 18:00 |
S241: Sociotechnical Security, Risk Assessment, and User Awareness Room: Lincoln West Chair: Nicholas Fair, United Kingdom
|
- With or Without U(sers): A Journey to Integrate UX Activities in Cybersecurity
Daniela Azevedo, Justine Ramelot, Axel Legay, Suzanne Kieffer, Belgium
- Hidden in Onboarding: Cyber Hygiene Training and Assessment
Alex Katsarakes, Thomas Morris, Jeremiah D. Still, United States
- The Clash of Service Provider and Service User Expectations: How Causal Models Highlight Stakeholder Data-Protection Tussles
Brian Pickering, Nicholas Fair, Stephen Phillips, Dan Shearer, United Kingdom
- BYOD Security Practices in Australian Hospitals – A Qualitative Study
Tafheem Ahmad Wani, Antonette Mendoza, Kathleen Gray, Australia
- Gaming Privacy Concerns in an Online Social Networking Environment from a User Perspective
Stacy Nicholson, Robert J. Hammell II, United States
- Using a Digital Transformation to Improve Enterprise Security: A Case Study
David Brookshire Conner, United States
|
Thursday, 4 July 2024 |
---|
08:00 - 10:00 |
S253: Emerging technologies for Secure User Interaction, Data Visualization, and Threat Mitigation Room: Columbia1 Chair: Jeremiah D. Still, United States
|
- Investigating University QR Code Interactions
Jeremiah D. Still, Thomas Morris, Morgan Edwards, United States
- Whisper+AASIST for DeepFake Audio Detection
Qian Luo, Kalyani Vinayagam Sivasundari, United States
- Electrical Muscle Stimulation System for Automatic Reproduction of Secret Information Without Exposing Biometric Data
Takumi Takaiwa, Shinnosuke Nozaki, Kota Numada, Tsubasa Shibata, Sana Okumura, Soichi Takigawa, Tetsushi Ohki, Masakatsu Nishigaki, Japan
- Authentication Method Using Opening Gestures
Shogo Sekiguchi, Shingo Kato, Yoshiki Nishikawa, Buntarou Shizuki, Japan
- Exploring ICS/SCADA Network Vulnerabilities
Hala Strohmier, Aaryan R Londhe, Chris A. Clark, Ronit Pawar, Brian Kram, United States
|
13:30 - 15:30 |
S278: Privacy Protection and Effective Education on Cybersecurity Room: Columbia1 Chair: Denis Gracanin, United States
|
- Why Do Organizations Fail to Practice Cyber Resilience?
Rick Van der Kleij, Tineke Hof, Netherlands
- Experiential Learning through Immersive XR: Cybersecurity Education for Critical Infrastructures
Anthony Lee, Kenneth King, Denis Gracanin, Mohamed Azab, United States
- Visualizing Cybersecurity Diagrams: An Empirical Analysis of Common Weakness Enumeration Images
Benjamin Schooley, Derek Hansen, Ethan James Richmond, Malaya Jordan Canite, Nimrod Max Huaira Reyna, United States
- Privacy Perceptions and Behaviors of Google Personal Account Holders in Saudi Arabia
Eman Alashwali, Saudi Arabia; Lorrie Cranor, United States
|
Disclaimer - Political Neutrality
The HCI International Conference respects the decisions of all its contributors, engaged in any way, regarding their institutional affiliations and designations of territories, in all material / content published in its website, taking a neutral stance in relation to any disputes or claims. Moreover, the HCI International Conference fully concurs with the Territorial Neutrality Policy of Springer Nature, Publisher of its proceedings.