Workshop on Security and Human Behaviour (SHB 2014)
June 9-10, Cambridge — Schedule
Here is the list of attendees
with links to their position papers and home pages.
We are exremely grateful to Bromium, Facebook, Google, Trustonic and Good for generously sponsoring
this event.
Sunday June 8th
Punt party, Scudamores, Granta Place at 4pm
Welcome reception and registration in the Old Kitchen, Queens College, from 5.30 – 7.30.
Monday June 9th
Sessions in Lecture Theatre 2 of the Computer Laboratory, JJ Thomson Avenue, Cambridge.
- Session 1 (0900-1030): Deception and Fraud (Chair: Ian Pratt)
- Mark Frank, Buffalo: Mythperceptions: deception and security
- Jussi Palomaki, Newcastle: Deception, Machiavellianism and poker
- Frank Stajano, Cambridge: Understanding scam victims – seven principles for systems security
- Sophie van der Zee, Cambridge: When lying feels the right thing to do
- Aldert Vrij, Portsmouth: A Cognitive Approach to Elicit Nonverbal and Verbal Cues to Deceit
- Session 2 (1100-1230): Foundations I (Chair: Nick Humphrey)
- Bonnie Anderson, BYU: How Users Perceive and Respond to Security Messages: A NeuroIS Research Agenda
- Michelle Baddeley: A Behavioural Analysis of Online Privacy and Security
- Bhismadev Chakrabarti, Reading: What determines who we mimic spontaneously? Impact of reward on empathy
- Diego Gambetta, EUI: Natural and Strategic Generosity as Signals of Trustworthiness
- Brian Glass, UCL: Modelling Misrepresentation in Online Seller-Buyer Interactions
- Session 3 (1400-1530): Engineering (Chair: Jon Callas)
- Harold Thimbleby, Swansea: Improving safety in medical devices and systems
- Nicolas Christin, CMU: It's All About the Benjamins – An Empirical Study on Incentivizing Users to Ignore Security Advice
- Cormac Herley, Microsoft: Is Everything We Know About Password Stealing Wrong?
- Richard Harper, Microsoft: glancephones, wayve devices and the cloud mouse
- John Lyle, Facebook: The User Is Not The Enemy, But They May Be An Accomplice – Understanding Human-Transmitted Malware
- Tyler Moore, SMU: Increasing the impact of voluntary action against cybercrime
- Session 4 (1600-1730): Culture, risk and fear (Chair: Peter Robinson)
- Scott Atran, John Jay College, CNRS and University of Michigan: Sacred values and cultural conflict
- Chris Cocking, Brighton: Collective insecurity? Overcoming society’s fear of the crowd
- Shannon French, Case Western: The Obligation of Officers to Preserve the Humanity of their Troops
- David Modic, Cambridge: We Will Make You Like Our Research
Conference banquet (1930-2200): Queens College
Tuesday June 10th
- Session 5 (0900-1030): Usability (Chair: Bruce Schneier)
- Serge Egelman, Berkeley: Individualizing Privacy and Security Mechanisms
- Yuliy Pisetski, Facebook: OAuth2: Sharing (Not So) Secrets
- Angela Sasse, UCL: Usable Security - Time for a Reboot
- Stuart Schechter, Microsoft: Storing 56 bit-keys in human memory
- Jeff Yan, Newcastle: Security and usability of CAPTCHAs
- Session 6 (1100-1230): Privacy (Chair: Jon Geater)
- Alessandro Acquisti, CMU: Are there evolutionary roots to privacy concerns?
- Laura Brandimarte, CMU: Privacy Trade-Offs of Geo-Location – General Population Concerns and an Application to the 2020 US Census
- David Murakami Wood, Queens: Vanishing Security and Ambient Government
- Masashi Crete-Nishihata, Toronto: Targeted Threats against Human Rights Groups
- Peter Swire, Georgia Tech: The Declining Half-life of Secrets and the Future of Signals Intelligence
- Session 7 (1400-1530): Foundations II (Chair: Richard Clayton)
- David Livingstone Smith, Maine: Making monsters
- Wojtek Przepiorka, Oxford: Charitable giving as a signal of trustworthiness
- Jodok Troy, Innsbruck: Urbanization and security – challenges for international politics
- Rick Wash, Michigan State: Betrayed By Updates – Stories as Informal Lessons About Security
- Session 8 (1600-1730): How do we fix the world? (Chair: Dave Clark)
- Ross Anderson, Cambridge: Reading this May Harm Your Computer
- Andrew Adams, Meiji: Ownership, Neutrality, Privacy and Security: The right to choose one's /p/a/r/t/n/e/r/s feudal overlords
- Jean Camp, Indiana: Aligning Authentication with Human Cognition, aka Making Passwords Work
- John Kaag, UML: The moral hazard of drones
- Bruce Schneier, Harvard Law School: Our Security Models with Never Work – No Matter What We Do
Dinner (1930-2200): Moeller Centre,
Churchill College
For what happened at the 2008-2013 workshops, see the liveblogs.