HCI-CPT: HCI for Cybersecurity, Privacy and Trust - Program

HCI for Cybersecurity, Privacy and Trust - Program

The times indicated are in "Central European Summer Time - CEST (Gothenburg, Sweden)"
You can check your local time, using an online time conversion tool, such as www.timeanddate.com

The Advance Program is subject to change

(Last Updated: 9 May, 2025)
Sunday, 22 June 2025
13:30 - 15:30

Human Factors and Behavioral Insights in Cybersecurity
Chair(s): To be announced

  • Assessing BYOD Security Maturity: A Survey of Australian Hospitals
    Tafheem Ahmad Wani, Antonette Mendoza, Kathleen Gray, Australia
  • A Roadmap to Address Burnout in the Cybersecurity Profession: Outcomes from a Multifaceted Workshop
    Ann Rangarajan, Calvin Nobles, Josiah Dykstra, Margaret Cunningham, Nikki Robinson, Tammie Hollis, Celeste Lyn Paul, Charles Gulotta, United States
  • The Big Five in Action: A Systematic Review of Personality, Cyber Awareness, and Behaviors
    Saroja Roy Grandhi, Jeremiah D. Still, United States
  • The Role of Human Factors in Cybersecurity Incident Management
    Jan Kincl, Czech Republic; Marc T. P. Adam, Australia; Tanja Pavleska, Slovenia
  • The Impact of Age and Gender on Online Gaming Privacy
    Stacy NIcholson, United States
  • Capillary Static Policy Setup and Multisensory Dynamic Feedback in Modern Cars
    Giampaolo Bella, Sergio Esposito, Mirko Giuseppe Mangano, Mario Raciti, Italy
Monday, 23 June 2025
16:00 - 18:00

Enhancing Cybersecurity Awareness, Risk Management, and Decision-Making
Chair(s): To be announced

  • To Patch or Not to Patch: Motivations, Challenges, and Implications for Cybersecurity
    Jason R.C. Nurse, United Kingdom
  • Smart Home Users' Security and Privacy Perceptions and Actions Differ by Device Category: Results from a U.S. Survey
    Julie M. Haney, United States; Yasemin Acar, Germany; Anna Li, Faith Haney, United States
  • From Security Awareness and Training to Human Risk Management in Cybersecurity
    Jason R.C. Nurse, Joanna Milward, Oz Alashe, United Kingdom
  • A Prototype Tool for Incident Response Readiness Assessment
    Aseel Aldabjan, Steven Furnell, Xavier Carpent, Maria Papadaki, United Kingdom
  • Effectiveness of Video-Based Risk Communication for Online DNA Data Sharing: A User Study
    Lipsarani Sahoo, Yousra Javed, United States; Elham Al Qahtani, Saudi Arabia; Mohamed Shehab, United States
  • Method for Evaluating Cybersecurity Risk Management Frameworks
    Matheus De Andrade, Ferrucio De Franco Rosa, Amandio Ferreira Balcao Filho, Brazil
Tuesday, 24 June 2025
08:00 - 10:00

Enhancing Cybersecurity Resilience Through Socio-Technical and Human-Centric Approaches
Chair: Tafheem Ahmad Wani, Australia

  • Improving the Adoption of Physical Authentication Devices through Enhanced Usable Security Features
    Jongkil Jay Jeong, Syed W. Shah, Ashish Nanda, Robin Doss, Mohammad Reza Nosouhi, Australia
  • Human and Organizational Dynamics in Responding to Cybersecurity Incidents: Lessons from the Australian Healthcare Sector
    Hafsa Binte Umar, Tafheem Ahmad Wani, Michael Liem, Urooj Raza Khan, James Boyd, Australia
  • Inside the Threat Matrix: Using Hybrid Computer Simulations to Educate Adults on Malicious Insider Threat and Technology Misuse
    Monica T Whitty, Dinislam Abdulgalimov, Australia; Patrick Oliver, United States; Christopher Ruddy, Joshua Seguin, Garry Young, Australia
13:30 - 15:30

Designing to meet GDPR and privacy requirements
Chair: Ana Ferreira, Portugal

  • Designing Trust and Privacy: The Role of Legal Design in Ensuring Compliance with the EU AI Act
    Basak Ozan Ozparlak, Turkey; Ebru Metin, Estonia
  • Integrating Privacy by Design Principles into AI-Driven Systems for Human Activity and Health Monitoring
    Rute Almeida, Alberto Freitas, Teresa Silva, Duarte Dias, Portugal; Joyca Lacroix, Ignace De Lathauwer, Netherlands; Goreti Marreiros, Luis Conceicao, Portugal
Wednesday, 25 June 2025
08:00 - 10:00

Human-Centric AI for Strengthening Cybersecurity, Privacy, and Trust
Room: TBA
Chair: Sabarathinam Chockalingam, Norway

  • Training Users Against Human and GPT-4 Generated Social Engineering Attacks
    Tyler Malloy, Maria Jose R Ferreira, Fei Fang, Cleotilde Gonzalez, United States
  • Balancing Automation and Human Involvement in Threat Modeling for Optimal Cyber Resilience
    Gizem Erceylan, Aida Akbarzadeh, Vasileios Gkioulos, Norway
  • User Trust and AI-Enhanced Transparency: A Study on Cookie Banner UI Design
    Holger Szüsz, Germany; Ala Sarah Alaqra, Sweden
  • An Integrated and User-friendly Platform for the Deployment of Explainable Artificial Intelligence Methods Applied to Face Recognition
    Carolina Albuquerque, Pedro C. Neto, Tiago Goncalves, Ana F. Sequeira, Portugal
  • Simplifying Cybersecurity Checks for End-Users
    Alexandru Mihaila, Steven Furnell, United Kingdom
16:00 - 18:00

User Perspectives on Security and Privacy
Room: TBA
Chair: Heather Molyneaux, Canada

  • Exploring User Perspectives on Data Collection, Data Sharing Preferences, and Privacy Concerns with Remote Healthcare Technology
    Daniela Napoli, Heather Molyneaux, Helene Fournier, Sonia Chiasson, Canada
  • Older Adults and Smart Home Devices: A Legal Critique of Terms of Service and Privacy Policy Agreements of Voice-Activated Smart Home Devices
    Catherine Maddock, Christine Murad, Adam Loo, Cosmin Munteanu, Canada
  • Understanding Security and Privacy Practices around Internet of Things Devices
    Adelina Andersen, Asreen Rostami, Mareike Glöss, Donald McMillan, Sweden
  • Towards Secure, Privacy-Enhanced and Configurable Conversational Assistants: An Enterprise-Focused Approach
    Dimosthenis Natsos, Nikolaos Malamas, Andreas L. Symeonidis, Greece
Thursday, 26 June 2025
13:30 - 15:30

Usability, Training, and Ethical Challenges in Cybersecurity
Room: TBA
Chair(s): To be announced

  • The Emerging Ethical Dilemmas and Cognitive Security Concerns with Personalized Training in Cybersecurity
    Leanne N. Torgersen, Germany; Eloise Zehnder, Luxembourg; Torvald F. Ask, Norway; Stefan M. Schulz, Germany
  • The Complexity of Cyber Security in Private and Professional Everyday Life - An Ethnographic-Informatic Collaborative Approach
    Henrich C. Pöhls, Dennis Eckhardt, Nelli Feist, Sabine Pfeiffer, Dominik Herrmann, Stefan Katzenbeisser, Germany
  • Enhancing the Effectiveness of Cyber Range Training Scenarios: Impact of Video Tutorials on Mental Workload, Situational Awareness and Presence
    Jose Manuel Castillo, Marc Parenthoen, Nicolas Louveton, France
  • Integrating Gamification, Recommender System, and Chatbot in Cybersecurity Training: A User-Centered Approach for Enhanced Engagement and Motivation
    Ling Leung, Benoit Duhoux, Axel Legay, Suzanne Kieffer, Belgium
  • From Persona non Grata to Persona Imperitus: Modeling Personas to Design Usable and Secure Software Applications
    Benjamin Schooley, Tonia San Nicolas-Rocca, United States
Friday, 27 June 2025
13:30 - 15:30

Secure and Trustworthy Digital Systems and Interactions
Room: TBA
Chair(s): To be announced

  • E-Voting with Confidence: Usability Challenges in Manual Integrity Checks
    Simone Brunello, Laura Cristiano, Riccardo Longo, Chiara Spadafora, Italy
  • Investigating 3D Object Spoofing on Fundamental and Custom Objects in Virtual Reality
    Mayu Fujita, Shodai Kurasaki, Akira Kanaoka, Japan
  • Individual Technology Commitment and the Rating of Usability and Trustworthiness of Electronic Signature Systems
    Michael Hofmeier, Isabelle Haunschild, Manfred Hofmeier, Wolfgang Hommel, Germany
  • E-Commerce Fraud and Scams Prevention for Adult Consumers: A Game-Based Learning Experimental Approach
    Carina Chang, Phillip Benachour, United Kingdom

Disclaimer - Political Neutrality

The HCI International Conference respects the decisions of all its contributors, engaged in any way, regarding their institutional affiliations and designations of territories, in all material / content published in its website, taking a neutral stance in relation to any disputes or claims. Moreover, the HCI International Conference fully concurs with the Territorial Neutrality Policy of Springer Nature, Publisher of its proceedings.