Interdisciplinary Workshop on Security and Human Behaviour (SHB 2008)
Working papers
As we prepare for the workshop, I'll be adding to each attendee's name one or
two links to papers that they might like others to look at in advance. Email me
your contributions!
Ross.Anderson@cl.cam.ac.uk
Alessandro 
Acquisti, CMU: What 
Can Behavioral Economics Teach Us About Privacy?; Privacy 
in Electronic Commerce and the Economics of Immediate Gratification
Andrew 
Adams, Reading: Regulating 
CCTV
John Adams, UCL: Three 
Framing Devices for Managing Risk
Ross Anderson, Cambridge: Information
Security Economics - and Beyond; The Memorability 
and Security of Passwords -- Some Empirical Results; book chapters on psychology and terror
Matt Blaze, UPenn; Toward a broader view of security protocols.
Bill Burns, 
Decision Research: The 
Diffusion of Fear: Modeling Community Response to a Terrorist Strike
Jon Callas, PGP: 
Improving
Message Security With a Self-Assembling PKI
Jean Camp, Indiana: Experimental Evaluation 
of Expert and Non-expert Computer Users' Mental Models of Security Risks
Ralph
Chatham, fornerly DARPA: Frank-Ekman 
Experiments Summary; Games for Training -
the Good Bad and Ugly; Training Superiority 
and Training Surprise
Luke Church, Cambridge: End
User Security: The democratisation of security usability
Dave
Clark, MIT: A social 
embedding of network security - Trust, constraint, power and control
Dick Clarke, 
former terrorism adviser to President Clinton and President Bush
Ron
Clarke, Rutgers: Situational 
Crime Prevention
Lorrie Cranor, CMU: A Framework for Reasoning 
About the Human in the Loop
Paul Ekman, UCSF: Darwin, Deception, and Facial 
Expression
Ed Felten, 
Princeton 
Mark Frank, Buffalo;
Human Behaviour and
Deception Detection
Frank Furedi, 
Kent: The 
Market in Fear; The only thing we
have to fear is the `culture of fear' itself; Thou shalt not hug
Nicholas Humphrey, LSE: papers 
from 1982 and 1998
Markus 
Jakobsson, Indiana: Social 
Phishing; Love and 
Authentication; Quantifying the 
Security of Preference-Based Authentication
Richard John, USC
Eric 
Johnson, Dartmouth: Information Security Field Study
George
Loewenstein, CMU: Searching for 
Privacy in all the Wrong Places: A behavioural economics perspective on 
individual concern for privacy
Tyler Moore, Cambridge: Information
Security Economics - and Beyond; How brain type influences online safety
Carey Morewedge, CMU: 
The Least Likely 
of Times - How Remembering the Past Biases Forecasts of the Future
John 
Mueller, Ohio State: Reacting 
to Terrorism: Probabilities, Consequences, and the Persistence of Fear
Peter Neumann, SRI: Holistic systems; Risks
Bashar Nuseibeh, Open 
University: Keeping Ubiquitous 
Computing to Yourself, Security
Requirements Engineering
Andrew Odlyzko, University 
of Minnesota: Economics, 
psychology, and sociology of security
Charles Perrow, 
Yale: Software Failures, 
Security and Cyberterrorism
Tom 
Pyszczynski, University of Colorado: Scared
to death
James Randi, James Randi 
Educational Foundation
Mike Roe, Microsoft
Sasha Romanosky, Carnegie Mellon
University: Do 
Data Breach Disclosure Laws Reduce Identity Theft?
Angela Sasse, UCL: Human 
Vulnerabilities in Security Systems, Transforming the 'weakest
link'
Stuart Schechter,
Microsoft: The Emperor's New
Security Indicators
Bruce Schneier, Counterpane: The Psychology of Security; The Evolutionary Brain Glitch That Makes Terrorism Fail
Paul 
Shambroom, photographer
Uri Simonsohn, U Penn: Friends of
Victims: Personal Experience and Prosocial Behavior
David Livingstone Smith, 
University of New England: Why
War?
Frank Stajano, Cambridge: Usability of Security Management: Defining the Permissions of Guests
Brad 
Stone, New York Times
Cass 
Sunstein, Chicago: The
Polarization of Extremes
Doug Tygar, Berleley: Why 
Johnny can't encrypt: A usability evaluation of PGP 5.0
Hal Varian, Google
and UC Berkeley: Who Signed
Up for the Do-Not-Call List? 
Alma Whitten, Google: Why 
Johnny can't encrypt: A usability evaluation of PGP 5.0
Henry 
Willis, Rand: Using Probabilistic 
Terrorism Risk Modeling For Regulatory Benefit-Cost Analysis
Richard 
Zeckhauser, Harvard: Paltering, The 
World of Transnational Threats