--- FIRST CALL FOR PAPERS --- * ********************************************************** * * 2nd Int. Workshop on * * Socio-Technical Aspects of Security and Trust * * (STAST) - http://www.stast2012.uni.lu * * ---------------------------------------------------------- * * Co-located with * * Computer Security Foundation Symposium * * Harvard University, Cambridge MA, USA * * ********************************************************** * IMPORTANT DATES ---------------- Papers: 23 April 2012 (extended) Notification of Acceptance: 18 May 2012 Pre-proceeding version due: 23 June 2012 Workshop: 29 June 2012 SCOPE --------------------- Due to the huge yet increasing number of people carrying out sensitive Internet transactions, security threats hardly ever reduce to technical threats. Rather, they are socio-technical, as they come from adversaries who combine social engineering practices with technical skills. Humans obviously cannot be treated as machines, as they take actions that may seem irrational although they are perfectly justifiable from a cognitive and a social perspective. Computer security hence appears to acquire more and more the facets of an interdisciplinary science with roots in both interpretive and positivist research traditions. The workshop intends to foster an interdisciplinary discussion on how to model and analyse the socio-technical aspects of modern security systems and on how to protect such systems from socio-technical threats and attacks. We welcome experts in computer science, in social and behavioral sciences, philosophy and psychology. WORKSHOP TOPICS -------------- Relevant topics include but are not limited to: * Usability Analysis * System-User Interfaces * Psychology of Deception * Socio-Technical Attacks and Defenses * User Perception of Security and Trust * Design of Socio-Technical Secure Systems * Cognitive Aspect in Human Computer Interaction * Human Practice * Behavioural Models * Social Engineering * Modelling and Analysis of Security * Ceremonies and Workflows * Game Theoretical Approaches to Security * Cyber Crime Science * Security Properties Specification and Verification * Threat and Adversary Models * Social Informatics and Networks * Effects of Technology on Trust Building Behaviour * Experiences and Test Cases PROGRAM COMMITTEE ------------------- Bishop, Matt (\uni California, USA) Boyd, Colin (QUT, AU) Curzon, Paul (Queen Mary. \uni London, UK) Hartel, Pieter (\uni Twente, NL) Jakobsson, Markus (PayPal, USA) Koenig, Vincent (\uni Luxembourg, L) Llewellyn, Morgan (IMT, IT) Marsh, Stephen (Comm. Research Centre, CA) Mauw, Sjouke (\uni Luxembourg, L) & Moore, Tyler (Wellesley College, MA, USA) Mulder, Ingrid (\uni Rotterdam \& TU Delft, NL) Ortlieb, Martin (Google, CH) Probst, W. Christian (DTU, DK) Sasse, Angela (UCL, UK) Staddon, Jessica (Google, CA, USA) van Moorsel, Aad (\uni Newcastle, UK) Volkamer, Melanie (TU Darmstadt, D) Wang, Yang (CMU, PA, USA) Wash, Rick (MSU, MI, USA) Williams, Trish (Edith Cowan University, AU) PAPER SUBMISSION ---------------- Contributions should be at most 8 pages, including the bibliography and well-marked appendices, and should follow the IEEE 8.5" x 11" Two-Columns Format. Both theoretical and applied research papers are welcome. Please visit our web site for more submission guidelines. PROCEEDINGS ----------- Pre-proceedings will be made available at the venue. Authors will be given the opportunity to review their manuscripts, for the final post-proceedings, which will be published IEEE in the IEEE digital library after the workshop. ORGANIZING COMMITTEE -------------------- *** Workshop Chairs Giampaolo Bella (Univ. of Catania, IT) Gabriele Lenzini (Univ. of Luxembourg, L) *** Programme Chairs Lizzie Coles-Kemp (Royal Holloway Univ. of London, UK) Peter Y. A. Ryan (Univ. of Luxembourg, L)