AISB18-CyberSecurity: Symposium on Digital Behaviour Intervention for Cyber Security
Liverpool, UK, April 4-6, 2018
Website https://www.sspedi.co.uk/aisb2018
Submission deadline January 5, 2018
This symposium focuses on how digital technology can motivate and influence people to behave more cyber-securely. It will bring together researchers, designers, developers and cyber-security experts interested in computers designed to change cyber-security attitudes and behaviours. The symposium will cover a wide range of topics on persuasion, from behaviour intervention methods to persuasive argumentation and persuasive user interfaces.
Digital behaviour interventions have a great practical potential. They have been applied in many domains, for instance to improve health (encouraging a reduction in alcohol intake, smoking cessation, an increase in exercise, more healthy eating, and adherence to medical treatment) and to move towards sustainable living (encouraging a reduction in energy consumption, recycling, and use of public transport). There has been much progress in the research community on digital behaviour interventions, as shown a.o. by the successful Persuasive conference series, a special issue of the UMUAI journal, and a successful series of workshops on Computational Models of Natural Argument (an area overlapping with persuasion). There has also been a lot of interest in cyber-security behaviour, and policy compliance. However, most of this work has not been routed within the behaviour change literature. There is currently an emergence of work that is beginning to combine these two strands of r!
esearch, and this symposium will help to further build this community.
The symposium will take place on one day. In addition to presentation by participants, there will be discussions in smaller groups on topics determined beforehand. We are also hoping to have one or two invited speakers.
TOPICS OF INTEREST
Submissions are invited on all aspects of digital behaviour intervention for cyber-security. This includes, but is not limited to:
- Behaviour intervention methods and techniques for cyber-security
-- Methods and techniques for encouraging user education, user awareness, user compliance
Methods and techniques for improving risk perception and risk-related behaviour
-- Methods and techniques for dissuading criminal, anti-social and negligent behaviour
-- Methods and techniques for persuading senior managers to own and manage risk
-- Persuasion and deterrence
-- Social aspects of persuasion
-- Gamification
-- Peripheral, ambient, and pervasive routes of persuasion for cyber-security
-- Personalization of methods and techniques
-- Personalization of the selection of methods and techniques
- Persuasive argumentation for cyber-security
-- Generating persuasive arguments (identifying discourse goals, choosing argument structure, content selection)
-- Persuasive discourse processing: understanding what users say in terms of argumentation schemes
-- Computational models of argumentation
-- Rhetoric and affect: the role of emotions, personalities, etc. in models of argumentation
-- Enhancing receiver involvement
- User, community and context models for digital behaviour interventions for cyber-security
-- Modeling attitudes, capabilities, and current behaviour (e.g., compliance, non-compliance)
-- Modeling personality and affective state for persuasion
-- Modeling cognitive load
-- Analyis of sentiment, intention, topics and affective state to spot threats and risks
-- Modeling security policies and procedures
-- Effect of demographics, job roles, education and cultural differences on persuasion and cybersecurity
-- Effect of community/organizational culture and task context
- User-centred design and evaluation methodologies for digital behaviour interventions for cyber-security
- Persuasive User Interfaces for cyber-security
-- Use of (multiple) Embodied Conversational Agents for persuasion
-- Communication settings (e.g. direct versus indirect communication)
-- Timing of persuasive messages/ when to interrupt the user
-- Effective presentation of communications
-- Effective presentation of cyber-security data (e.g. visualisation)
-- Effective interactions
- Applications of digital behaviour interventions for cyber-security
-- Public and private sector cyber-security
-- Citizen cyber-security
-- Cyber-security across domains (e.g. somebody taking a device from work to home)
- Ethical issues of digital behaviour interventions for cyber-security
- Privacy and trust issues for digital behaviour interventions for cyber-security
Submissions
Please submit your papers in PDF format via EasyChair (https://easychair.org/conferences/?conf=aisb18cybersecurity). We invite both long papers of up to 8 pages on substantial research results, and short papers of up to 4 pages on more polemic, work-in-progress, burning issue or system description topics. Accepted papers will be published in the AISB proceedings, with an ISBN number. Authors of papers must sign a non-exclusive copyright declaration which gives AISB the right to publish the paper, but does not prevent the author from also publishing it in other venues after. Papers must be formatted using the ACM SIG CHI proceedings template: http://www.acm.org/publications/proceedings-template (the paper format, not the extended abstract format).
ORGANIZERS
Prof Judith Masthoff, Department of Computing Science, University of Aberdeen, j.masthoff(AT)abdn.ac.uk
Dr Matthew Collinson, Department of Computer Science, University of Aberdeen, matthew.collinson(AT)abdn.ac.uk
Dr John Paul Vargheese, Department of Computer Science, University of Aberdeen, jpvargheese(AT)acm.org
PROGRAMME COMMITTEE
Chenghua Lin, University of Aberdeen
Aneesha Sethi, University of Southampton
Karen Renaud, Abertay University
Jaap Ham, Eindhoven University of Technology
Ganna Pogrebna, Birmingham Business School
Shujun Li, University of Kent
Manfred Tscheligi, University of Salzburg
Roeland Kegel, University of Twente
Fabio Massacci, University of Trento
Tom Crick, Cardiff Metropolitan University
Alice Toniolo, University of St Andrews
Kovila Coopamootoo, Newcastle University
|