| Wednesday, 24 July 2013 | 
| 10:30 – 12:30 | 
S046: Security, Forensic and Legal Aspects of Human-Computer Interaction Room: Bermuda B Chair(s): Pavel Ocenasek
   | 
- The Practice of Global Internet Filtering
 Pavel Ocenasek
  - On the Secure and Safe Data Synchronization
 Pavel Ocenasek, Jaromir Karmazin
  - Legal Protection for Personal Information Privacy
 Yinan Liu
  - Ethical Issues Surrounding the Asymmetric Nature of Workplace Monitoring
 John D Bustard
  - A Reasonable Expectation of Privacy? Secrecy and National Security in a Democracy
 Kathleen Hogan
  - The Privacy Paradox Between Users' Attitudes, Stringent Legal Framework and (the Lack of) Adequate Implementation Tools
 Shara Monteleone
  
 Top  | 
| 13:30 – 15:30 | 
S069: Intent Semantics: New Concept in Trust R&D Room: Bermuda B Chair(s): Ioannis Askoxylakis
   | 
- Towards Usable Generation and Enforcement of Trust Evidence from Programmer's Intent
 Michael R.A. Huth, Jim Huan-Pu Kuo, Angela Sasse, Iacovos Kirlappos
  - Cloudopsy: an Autopsy of Data Flows in the Cloud
 Angeliki Zavou, Vasilis Pappas, Vasileios P. Kemerlis, Michalis Polychronakis, Georgios Portokalidis, Angelos Keromytis
  - Influence of Trust Assurances in Mobile Commerce Applications on the Formation of Online Trust
 Martin Hesseler, Gerhard Hartmann, Stefan Karsch
  - Increasing Trust Perceptions in the Internet of Things
 Trenton W Schulz, Ingvar Tjøstheim
  - Supporting Human Decision-Making Online using Information-Trustworthiness Metrics
 Jason R.C. Nurse, Sadie Creese, Michael Goldsmith, Syed Sadiqur Rahman
  - Addressing User Privacy and Experience in Distributed Long Lifetime Systems
 Scott W Cadzow
  - Secure and Energy-efficient Life-logging in Wireless Pervasive Environments 
 Alexandros Fragkiadakis, Ioannis Askoxylakis, Elias Tragos
  
 Top  | 
| 16:00 – 18:00 | 
S092: The Soft Foundations of Cybersecurity Science Room: Bermuda B Chair(s): Theo Tryfonas, Bryan Cline
   | 
- Factors Influencing the Adoption of Encryption to Secure Data in the Cloud
 Ken E. Stavinoha
  - Strategic Interaction Analysis of Privacy-sensitive end-users use of cloud based mobile apps
 Kalliopi Anastasopoulou, Theo Tryfonas, Spyros Kokolakis
  - Modeling Security Policy and the Effect for End-Users
 Kevin Jones, Kizito Salako
  - Constructing Positive Influences for User Security Decisions to Counter Corporate or State Sponsored Computer Espionage Threats
 Martyn Styles
  - High-Level Design for a Secure Mobile Device Management System
 Keunwoo Rhee, Sun-Ki Eun, Mi-Ri Joo, Jihoon Jeong, Dongho Won
  - Recognition of Human Identity by Detection of User Activity
 Giuseppe Scardino, Ignazio Infantino, Filippo Vella
  - A Privacy-level Model of User-Centric Cyber-Physical Systems
 Nikolaos E. Petroulakis, Ioannis Askoxylakis, Apostolos Traganitis, George Spanoudakis
  
 Top  |