40 years of HCI International. Join us in Washington DC to celebrate

HCI-CPT: HCI for Cybersecurity, Privacy and Trust - Program

HCI for Cybersecurity, Privacy and Trust - Program

The times indicated are in "Eastern Daylight Time - EDT (Washington DC, USA)"
You can check your local time, using an online time conversion tool, such as www.timeanddate.com

(Last Updated: 3 July, 2024)
Saturday, 29 June 2024
10:30 - 12:30

S032: Security Training and Data Privacy Protection Solutions
Chair(s): To be announced

  • Alert Interaction Service Design for AI Face Swap Video Scams
    Jing Luo, Xin Zhang, Fang Fu, Hanxiao Geng, P.R. China
  • Are UK Parents Empowered to Act on Their Cybersecurity Education Responsibilities?
    Suzanne Prior, Karen Renaud, United Kingdom
  • Revolutionizing Social Engineering Awareness Raising, Education and Training: Generative AI-powered Investigations in the Maritime Domain
    Michail Loupasakis, Greece; Georgios Potamos, Eliana Stavrou, Cyprus
  • Legal Protection for the Personal Data in Indonesia and Malaysia
    Nanik Prasetyoningsih, Indonesia; Nazli Ismail Nawang, Malaysia; Windy Virdinia Putri, Muhammad Nur Rifqi Amirullah, Indonesia
  • Towards a Harmonised Approach for Security and Privacy Management in Smart Home Contexts
    Samiah Alghamdi, Steven Furnell, Steven Bagley, United Kingdom
  • Enhancing Cyber Hygiene and Literacy via Interactive Mini-Games
    Cameron Gray, Steven Furnell, United Kingdom
Sunday, 30 June 2024
13:30 - 15:30

S087: Understanding Users, Visualizing Threats, and Mitigating Risks
Chair: Christian Kurtz, Germany

  • Seek and Locate? Examining the Accessibility of Cybersecurity Features
    Arwa Binsedeeq, Steven Furnell, Xavier Carpent, Nicholas Gervassis, United Kingdom
  • Exploring User Understanding of Wireless Connectivity and Security on Smartphones
    Ezgi Tugcu, Steven Furnell, United Kingdom
  • To Bot or Not to Bot?: Analysing Mental Health Data Disclosures
    Deborah Taylor, Clare Melvin, Hane Aung, Rameez Asif, United Kingdom
  • Competencies Required for the Offensive Cyber Operations Planners
    Marko Arik, Ricardo Gregorio Lugo, Rain Ottis, Adrian Nicholas Venables, Estonia
  • Unraveling the Real-World Impacts of Cyber Incidents on Individuals
    Danielle Renee Jacobs, Nicole Darmawaskita, Troy McDaniel, United States
  • Multi-Role Actors and Rebounding Effects Across User Interfaces - Exploring Big Tech’s Privacy Scandals and GDPR Limitations in Data Ecosystems
    Christian Kurtz, Fabian Burmeister, Germany
Tuesday, 2 July 2024
13:30 - 15:30

S174: Human Factors in Cybersecurity of Cyber-Physical Systems
Room: Jefferson West
Chair: Nathan Lau, United States

  • Shared mental model in cybersecurity of cyber-physical systems
    Po-Yu Chen, Nathan Lau, Hao Wang, United States; Sabarathinam Chockalingam, John Eidar Simensen, Norway
  • Human Factors and Security in Digital Twins: Challenges and Future Prospects
    Sanjay Misra, Norway; Kousik Barik, Spain; Harald P.-J. Thunem, Sabarathinam Chockalingam, Norway
  • Decoding the Human Element in APT Attacks: Unveiling Attention Diversion Techniques in Cyber-Physical System Security
    Aida Akbarzadeh, Laszlo Erdodi, Siv Hilde Houmb, Tore Geir Soltvedt, Norway
  • Paralyzed Or Compromised: A Case Study of Decisions in Cyber-Physical Systems
    Havard Jakobsen Ofte, Sokratis Katsikas, Norway
  • Training and Security Awareness Under the Lens of Practitioners: A DevSecOps Perspective Towards Risk Management
    Xhesika Ramaj, Mary Sanchez-Gordon, Norway; Ricardo Colomo-Palacios, Spain; Vasileios Gkioulos, Norway
  • Cognitive Digital Twins for Improving Security in IT-OT Enabled Healthcare Applications
    Sandeep Pirbhulal, Sabarathinam Chockalingam, Habtamu Abie, Norway; Nathan Lau, United States
Wednesday, 3 July 2024
08:00 - 10:00

S201: Awareness and Action?: Privacy and Security Threats and User Acceptance of Technologies
Room: Columbia2
Chair: Heather Molyneaux, Canada

  • "I'm not planning on dying any time soon": A Survey of Digital Legacy Planning
    Paola Marmorato, Clarissa Fernandes, Canada; Lydia Kraus, Czech Republic; Elizabeth Stobert, Canada
  • Privacy-Conscious Design Requirements to Support Older Adults' Health Information Seeking
    Yomna Aly, Cosmin Munteanu, Canada
  • Japanese Users’ (Mis)understandings of Technical Terms Used in Privacy Policies and the Privacy Protection Law
    Sachiko Kanamori, Miho Ikeda, Kumiko Kameishi, Ayako A. Hasegawa, Japan
  • Expert Perspectives on Information Security Awareness Programs in Medical Care Institutions in Germany
    Jan Tolsdorf, Luigi Lo Iacono, Germany
  • Legal, Technical and User Perspectives on the Right to Modify
    Rene Richard, Margaret McKay, Heather Molyneaux, Canada
16:00 - 18:00

S241: Sociotechnical Security, Risk Assessment, and User Awareness
Room: Lincoln West
Chair: Nicholas Fair, United Kingdom

  • With or Without U(sers): A Journey to Integrate UX Activities in Cybersecurity
    Daniela Azevedo, Justine Ramelot, Axel Legay, Suzanne Kieffer, Belgium
  • Hidden in Onboarding: Cyber Hygiene Training and Assessment
    Alex Katsarakes, Thomas Morris, Jeremiah D. Still, United States
  • The Clash of Service Provider and Service User Expectations: How Causal Models Highlight Stakeholder Data-Protection Tussles
    Brian Pickering, Nicholas Fair, Stephen Phillips, Dan Shearer, United Kingdom
  • BYOD Security Practices in Australian Hospitals – A Qualitative Study
    Tafheem Ahmad Wani, Antonette Mendoza, Kathleen Gray, Australia
  • Gaming Privacy Concerns in an Online Social Networking Environment from a User Perspective
    Stacy Nicholson, Robert J. Hammell II, United States
  • Using a Digital Transformation to Improve Enterprise Security: A Case Study
    David Brookshire Conner, United States
Thursday, 4 July 2024
08:00 - 10:00

S253: Emerging technologies for Secure User Interaction, Data Visualization, and Threat Mitigation
Room: Columbia1
Chair: Jeremiah D. Still, United States

  • Investigating University QR Code Interactions
    Jeremiah D. Still, Thomas Morris, Morgan Edwards, United States
  • Whisper+AASIST for DeepFake Audio Detection
    Qian Luo, Kalyani Vinayagam Sivasundari, United States
  • Electrical Muscle Stimulation System for Automatic Reproduction of Secret Information Without Exposing Biometric Data
    Takumi Takaiwa, Shinnosuke Nozaki, Kota Numada, Tsubasa Shibata, Sana Okumura, Soichi Takigawa, Tetsushi Ohki, Masakatsu Nishigaki, Japan
  • Authentication Method Using Opening Gestures
    Shogo Sekiguchi, Shingo Kato, Yoshiki Nishikawa, Buntarou Shizuki, Japan
  • Exploring ICS/SCADA Network Vulnerabilities
    Hala Strohmier, Aaryan R Londhe, Chris A. Clark, Ronit Pawar, Brian Kram, United States
13:30 - 15:30

S278: Privacy Protection and Effective Education on Cybersecurity
Room: Columbia1
Chair: Denis Gracanin, United States

  • Why Do Organizations Fail to Practice Cyber Resilience?
    Rick Van der Kleij, Tineke Hof, Netherlands
  • Experiential Learning through Immersive XR: Cybersecurity Education for Critical Infrastructures
    Anthony Lee, Kenneth King, Denis Gracanin, Mohamed Azab, United States
  • Visualizing Cybersecurity Diagrams: An Empirical Analysis of Common Weakness Enumeration Images
    Benjamin Schooley, Derek Hansen, Ethan James Richmond, Malaya Jordan Canite, Nimrod Max Huaira Reyna, United States
  • Privacy Perceptions and Behaviors of Google Personal Account Holders in Saudi Arabia
    Eman Alashwali, Saudi Arabia; Lorrie Cranor, United States

Disclaimer - Political Neutrality

The HCI International Conference respects the decisions of all its contributors, engaged in any way, regarding their institutional affiliations and designations of territories, in all material / content published in its website, taking a neutral stance in relation to any disputes or claims. Moreover, the HCI International Conference fully concurs with the Territorial Neutrality Policy of Springer Nature, Publisher of its proceedings.