Wednesday, 24 July 2013 |
10:30 – 12:30 |
S046: Security, Forensic and Legal Aspects of Human-Computer Interaction Room: Bermuda B Chair(s): Pavel Ocenasek
|
- The Practice of Global Internet Filtering
Pavel Ocenasek
- On the Secure and Safe Data Synchronization
Pavel Ocenasek, Jaromir Karmazin
- Legal Protection for Personal Information Privacy
Yinan Liu
- Ethical Issues Surrounding the Asymmetric Nature of Workplace Monitoring
John D Bustard
- A Reasonable Expectation of Privacy? Secrecy and National Security in a Democracy
Kathleen Hogan
- The Privacy Paradox Between Users' Attitudes, Stringent Legal Framework and (the Lack of) Adequate Implementation Tools
Shara Monteleone
Top |
13:30 – 15:30 |
S069: Intent Semantics: New Concept in Trust R&D Room: Bermuda B Chair(s): Ioannis Askoxylakis
|
- Towards Usable Generation and Enforcement of Trust Evidence from Programmer's Intent
Michael R.A. Huth, Jim Huan-Pu Kuo, Angela Sasse, Iacovos Kirlappos
- Cloudopsy: an Autopsy of Data Flows in the Cloud
Angeliki Zavou, Vasilis Pappas, Vasileios P. Kemerlis, Michalis Polychronakis, Georgios Portokalidis, Angelos Keromytis
- Influence of Trust Assurances in Mobile Commerce Applications on the Formation of Online Trust
Martin Hesseler, Gerhard Hartmann, Stefan Karsch
- Increasing Trust Perceptions in the Internet of Things
Trenton W Schulz, Ingvar Tjøstheim
- Supporting Human Decision-Making Online using Information-Trustworthiness Metrics
Jason R.C. Nurse, Sadie Creese, Michael Goldsmith, Syed Sadiqur Rahman
- Addressing User Privacy and Experience in Distributed Long Lifetime Systems
Scott W Cadzow
- Secure and Energy-efficient Life-logging in Wireless Pervasive Environments
Alexandros Fragkiadakis, Ioannis Askoxylakis, Elias Tragos
Top |
16:00 – 18:00 |
S092: The Soft Foundations of Cybersecurity Science Room: Bermuda B Chair(s): Theo Tryfonas, Bryan Cline
|
- Factors Influencing the Adoption of Encryption to Secure Data in the Cloud
Ken E. Stavinoha
- Strategic Interaction Analysis of Privacy-sensitive end-users use of cloud based mobile apps
Kalliopi Anastasopoulou, Theo Tryfonas, Spyros Kokolakis
- Modeling Security Policy and the Effect for End-Users
Kevin Jones, Kizito Salako
- Constructing Positive Influences for User Security Decisions to Counter Corporate or State Sponsored Computer Espionage Threats
Martyn Styles
- High-Level Design for a Secure Mobile Device Management System
Keunwoo Rhee, Sun-Ki Eun, Mi-Ri Joo, Jihoon Jeong, Dongho Won
- Recognition of Human Identity by Detection of User Activity
Giuseppe Scardino, Ignazio Infantino, Filippo Vella
- A Privacy-level Model of User-Centric Cyber-Physical Systems
Nikolaos E. Petroulakis, Ioannis Askoxylakis, Apostolos Traganitis, George Spanoudakis
Top |