40 years of HCI International. Join us in Washington DC to celebrate

HCI-CPT: 6TH INTERNATIONAL CONFERENCE ON HCI FOR CYBERSECURITY, PRIVACY AND TRUST

Cybersecurity is exponentially growing, evolving, and expanding in all its dimensions. New security risks emerge with the continuous increase of Internet interconnections and the Internet of Things development. Cyberattacks endanger individuals, companies, and vital public services and infrastructures. Confronted with spreading and evolving cyber threats, organizations and individuals need to catch up in defending their systems and networks, and they often need to implement and effectively use basic cybersecurity and privacy practices and technologies. The 6th International Conference on HCI for Cybersecurity, Privacy, and Trust (HCI-CPT) intends to help, promote and encourage research in this field by providing a forum for interaction and exchanges among researchers, academics, and practitioners in the fields of HCI and cyber security. The Conference addresses HCI principles, methods, and tools to address the numerous and complex threats which put at risk computer-mediated human activities in today’s society, which is progressively becoming more and more intertwined with and dependent on interactive technologies.

"Selected papers from the HCII2024 / HCI-CPT conference might be invited to submit extended versions for publication in the Information & Computer Security Journal. Such submissions should contain at least 70% of new material with respect to the initial publication in the conference proceedings. Accepted papers should clearly indicate in a footnote that an earlier version of the paper was published in the HCII2024 / HCI-CPT conference proceedings. It should be noted that such submissions should follow the required guidelines and deadlines for publication of the ICS Journal."

Call for participation leaflet (115KB)

Submit your Paper Proposal

(Please create an account to the Conference Management System before you proceed with the submission)

The related topics include, but are not limited to:

  • Authentication and identification
    • Adaptive access control
    • Context-aware authentication and authorization
    • Frictionless authentication
    • Security and usability of combinations of authentication factors
    • Remote identity proofing
    • Privacy implications of authentication technologies
    • Obtaining informed consent in the federated login
    • Preservation of privacy in the federated login
    • Security and usability of derived credentials
    • Web of trust
  • Biometrics
    • Privacy and security implications of biometric architectures
    • Detection of biometric presentation attacks
    • Emerging biometric modalities
    • Fusion of biometric modalities
    • Behavioral biometrics
    • Revocable biometrics
  • Applications of cryptography to cybersecurity, privacy, and trust
    • Cryptographic authentication
    • Applications of anonymous credentials and group signatures
    • Identification with selective disclosure of attributes
    • Mitigation of fraudulent credential sharing
    • Usability of TLS client certificates
    • Usability of encrypted messaging
    • BYOK: Bringing your own key to the cloud
  • Human factors
    • User acceptance of security and privacy technologies
    • Cyber Hygiene
    • Identification through peer-to-peer vouching
    • End-user best practices for malware avoidance
    • Mitigation of phishing attacks
    • Mitigation of social engineering attacks
    • Mitigation of insider threats
    • Behavior-based cybersecurity
    • Communication of security risks to end-users
    • Human identification of websites
    • Human detection of trusted execution
    • Non-repudiation and repudiability
  • Cybersecurity, privacy and trust in computing areas
    • Web technologies
    • Mobile computing
    • Cloud computing
    • Enterprise computing
    • Peer-to-peer networking
    • Honeypots
    • Insecure Web Services
    • Threat Assessment
    • Blockchains, distributed ledgers, and gossip protocols
    • Internet of Things
    • SCADA: Supervisory control and data acquisition
    • Ubiquitous computing
    • VR/AR systems
  • Cybersecurity, privacy and trust in application areas
    • Electronic payments
    • Social networks
    • Smart cities
    • Connected Cars and Autonomous Driving
    • Smart home
    • Healthcare and patient monitoring
    • Wearables
    • Smart environments
    • Security Vulnerabilities Automated Driving
  • Legal, ethical, economic and societal issues in cybersecurity
    • Ethnic bias in face recognition accuracy
    • Trust frameworks
    • Tracking
    • Privacy by design & default
    • Fake news
    • Bots in social networks
    • Cyberwarfare
    • Attacks against elections
    • Surveillance
    • Money laundering and black markets
    • User privacy and data protection regulations
    • Big data impact on user privacy
  • Cyber Psychology
    • Big data impact on user privacy
    • Social Media
    • Security Vulnerability of Artificial Intelligence
    • Biases in AI system
    • Consumer Behavior online
    • Behavior-based cybersecurity
    • User awareness of privacy threats
    • Well-being and cybercrime
  • Fake News and social media
    • Media manipulation
    • Societal and political manipulation
    • Fake news and social conflict suppression
    • Fake news and cyber propaganda
  • Cyber Security Application and Technology
    • Evaluation
    • Design
    • User Experience
  • Artificial Intelligence (AI)
    • Large language model (LLM)
    • ChatCPT
    • Open AI
  • Program Chair

    Abbas Moallem

    Charles W. Davidson College of Engineering,
    San Jose State University, USA

  • Board Members

  • Mostafa Al-Emran
    The British University in Dubai, United Arab Emirates
  • Mohd Anwar
    North Carolina A&T State University, United States
  • Joyram Chakraborty
    Towson University, United States
  • Ulku Yaylacicegi Clark
    University of North Carolina Wilmington, United States
  • Francisco Corella
    Pomcor, United States
  • Ana Ferreira
    CINTESIS, Portugal
  • Steven Furnell
    University of Nottingham, United Kingdom
  • Akira Kanaoka
    Toho University, Japan
  • Mazaher Kianpour
    Norwegian University of Science and Technology (NTNU), Norway
  • Nathan Lau
    Virginia Tech, United States
  • Wai Sze Leung
    University of Johannesburg, South Africa
  • Luca Mazzola
    HSLU - Hochschule Luzern, Switzerland
  • Heather Molyneaux
    National Research Council Canada, Canada
  • Phillip Morgan
    Cardiff University, United Kingdom
  • Calvin Nobles
    Illinois Institute of Technology, United States
  • Jason R.C. Nurse
    University of Kent, United Kingdom
  • Henrich C. Pöhls
    University of Passau, Germany
  • David Schuster
    San José State University, United States
  • David Stevens
    University of Hawaiʻi Kapiʻolani Community College, United States
  • Kerry-Lynn Thomson
    Nelson Mandela University, South Africa
  • Daniel Wilusz
    Poznan University of Economics and Business, Poland
  • Adam Wojtowicz
    Poznan University of Economics and Business, Poland
  • Temechu Girma Zewdie
    University of the District of Columbia, United States

Disclaimer - Political Neutrality

The HCI International Conference respects the decisions of all its contributors, engaged in any way, regarding their institutional affiliations and designations of territories, in all material / content published in its website, taking a neutral stance in relation to any disputes or claims. Moreover, the HCI International Conference fully concurs with the Territorial Neutrality Policy of Springer Nature, Publisher of its proceedings.