Full Program »
Socio-Technical Aspects in Security and Trust Workshop (STAST)
Monday, 5 December 2016
08:30 - 12:00
Salon 5
Keynote Speaker: Matt Bishop, UC Davis
Why Can't We Do Security Right?
The lack of security and assurance in our computer systems and
supporting network and system infrastructure is clear. What to do about
it is not clear. The difficulty is rooted in the social, political and
economic environment in which computing occurs. Marketing forces,
societal pressures, and most especially peoples' varying needs for
safety and security exacerbate the difficulties of applying technical
remediations to improve security. Numerous solutions have been proposed,
each dealing with one or more aspects of the problems in security but
none of which engage with what it means to be safe and secure in
contemporary society. We have to simultaneously understand security from
the societal, individual and technical perspectives and wrestle a
position on information security from those three perspectives. This
talk takes a historical position to understand how environmental forces
influence security technology, policy, and procedures. It asks how
information security grew as a practice and where it will go. It will
also provide thoughts on how to improve information security.
Workshop Papers:
Influence Tokens: Analysing Adversarial Behaviour Change in Coloured Petri Nets, Peter Carmichael, Charles Morisset and Thomas Gross (Newcastle University)
Case Study: Predicting the Impact of a Physical Access Control Intervention, Tristan Caulfield and Simon Parkin (University College London)
Is Your Data Gone? Measuring User Perceptions of Deletion, Sarah Diesburg, C. Adam Feldhaus, Mojtaba Al Fardan, Jonathan Schlicht and Nigel Ploof (University of Northern Iowa)
Position Paper: "I had no idea this was a thing'': On the Importance of Understanding the User Experience of Personalized Transparency Tools, Julia Earp and Jessica Staddon (N. C. State University)
Position Paper: Proposing Ambient Visualization and Pre-Attentive Processing for Threat Detection, Sunny Fugate, Robert Gutzwiller, Jamie Lukos (SPAWAR Systems Center, Pacific) and Christopher Lester (Naval Surface Warfare Center, Philadelphia Division)
Can Johnny Finally Encrypt? Evaluating E2E-Encryption in Popular IM Applications, Amir Herzberg and Hemi Leibowitz (Bar Ilan University)
Position Paper: User Trust Assessment: A New Approach to Combat Deception, Markus Jakobsson (Agari)
Digital Privacy and Social Capital on Social Network Sites. Friends or Foes?, Angeliki Kitsiou, Eleni Tzortzaki, Maria Sideri and Stefanos Gritzalis (University of the Aegean)
Why do people use unsecure public Wi-Fi? An investigation of behaviour and factors driving decisions, Nissy Sombatruang, Angela Sasse and Michelle Baddeley (University College London)