HCI for Cybersecurity, Privacy and Trust - Program
The times indicated are in "Central European Summer Time - CEST (Gothenburg, Sweden)"
You can check your local time, using an online time conversion tool, such as www.timeanddate.com
The Advance Program is subject to change
(Last Updated: 9 May, 2025)
Sunday, 22 June 2025 |
---|
13:30 - 15:30 |
Human Factors and Behavioral Insights in Cybersecurity Chair(s): To be announced |
- Assessing BYOD Security Maturity: A Survey of Australian Hospitals
Tafheem Ahmad Wani, Antonette Mendoza, Kathleen Gray, Australia
- A Roadmap to Address Burnout in the Cybersecurity Profession: Outcomes from a Multifaceted Workshop
Ann Rangarajan, Calvin Nobles, Josiah Dykstra, Margaret Cunningham, Nikki Robinson, Tammie Hollis, Celeste Lyn Paul, Charles Gulotta, United States
- The Big Five in Action: A Systematic Review of Personality, Cyber Awareness, and Behaviors
Saroja Roy Grandhi, Jeremiah D. Still, United States
- The Role of Human Factors in Cybersecurity Incident Management
Jan Kincl, Czech Republic; Marc T. P. Adam, Australia; Tanja Pavleska, Slovenia
- The Impact of Age and Gender on Online Gaming Privacy
Stacy NIcholson, United States
- Capillary Static Policy Setup and Multisensory Dynamic Feedback in Modern Cars
Giampaolo Bella, Sergio Esposito, Mirko Giuseppe Mangano, Mario Raciti, Italy
|
Monday, 23 June 2025 |
---|
16:00 - 18:00 |
Enhancing Cybersecurity Awareness, Risk Management, and Decision-Making Chair(s): To be announced |
- To Patch or Not to Patch: Motivations, Challenges, and Implications for Cybersecurity
Jason R.C. Nurse, United Kingdom
- Smart Home Users' Security and Privacy Perceptions and Actions Differ by Device Category: Results from a U.S. Survey
Julie M. Haney, United States; Yasemin Acar, Germany; Anna Li, Faith Haney, United States
- From Security Awareness and Training to Human Risk Management in Cybersecurity
Jason R.C. Nurse, Joanna Milward, Oz Alashe, United Kingdom
- A Prototype Tool for Incident Response Readiness Assessment
Aseel Aldabjan, Steven Furnell, Xavier Carpent, Maria Papadaki, United Kingdom
- Effectiveness of Video-Based Risk Communication for Online DNA Data Sharing: A User Study
Lipsarani Sahoo, Yousra Javed, United States; Elham Al Qahtani, Saudi Arabia; Mohamed Shehab, United States
- Method for Evaluating Cybersecurity Risk Management Frameworks
Matheus De Andrade, Ferrucio De Franco Rosa, Amandio Ferreira Balcao Filho, Brazil
|
Tuesday, 24 June 2025 |
---|
08:00 - 10:00 |
Enhancing Cybersecurity Resilience Through Socio-Technical and Human-Centric Approaches Chair: Tafheem Ahmad Wani, Australia
|
- Improving the Adoption of Physical Authentication Devices through Enhanced Usable Security Features
Jongkil Jay Jeong, Syed W. Shah, Ashish Nanda, Robin Doss, Mohammad Reza Nosouhi, Australia
- Human and Organizational Dynamics in Responding to Cybersecurity Incidents: Lessons from the Australian Healthcare Sector
Hafsa Binte Umar, Tafheem Ahmad Wani, Michael Liem, Urooj Raza Khan, James Boyd, Australia
- Inside the Threat Matrix: Using Hybrid Computer Simulations to Educate Adults on Malicious Insider Threat and Technology Misuse
Monica T Whitty, Dinislam Abdulgalimov, Australia; Patrick Oliver, United States; Christopher Ruddy, Joshua Seguin, Garry Young, Australia
|
13:30 - 15:30 |
Designing to meet GDPR and privacy requirements Chair: Ana Ferreira, Portugal
|
- Designing Trust and Privacy: The Role of Legal Design in Ensuring Compliance with the EU AI Act
Basak Ozan Ozparlak, Turkey; Ebru Metin, Estonia
- Integrating Privacy by Design Principles into AI-Driven Systems for Human Activity and Health Monitoring
Rute Almeida, Alberto Freitas, Teresa Silva, Duarte Dias, Portugal; Joyca Lacroix, Ignace De Lathauwer, Netherlands; Goreti Marreiros, Luis Conceicao, Portugal
|
Wednesday, 25 June 2025 |
---|
08:00 - 10:00 |
Human-Centric AI for Strengthening Cybersecurity, Privacy, and Trust Room: TBA Chair: Sabarathinam Chockalingam, Norway
|
- Training Users Against Human and GPT-4 Generated Social Engineering Attacks
Tyler Malloy, Maria Jose R Ferreira, Fei Fang, Cleotilde Gonzalez, United States
- Balancing Automation and Human Involvement in Threat Modeling for Optimal Cyber Resilience
Gizem Erceylan, Aida Akbarzadeh, Vasileios Gkioulos, Norway
- User Trust and AI-Enhanced Transparency: A Study on Cookie Banner UI Design
Holger Szüsz, Germany; Ala Sarah Alaqra, Sweden
- An Integrated and User-friendly Platform for the Deployment of Explainable Artificial Intelligence Methods Applied to Face Recognition
Carolina Albuquerque, Pedro C. Neto, Tiago Goncalves, Ana F. Sequeira, Portugal
- Simplifying Cybersecurity Checks for End-Users
Alexandru Mihaila, Steven Furnell, United Kingdom
|
16:00 - 18:00 |
User Perspectives on Security and Privacy Room: TBA Chair: Heather Molyneaux, Canada
|
- Exploring User Perspectives on Data Collection, Data Sharing Preferences, and Privacy Concerns with Remote Healthcare Technology
Daniela Napoli, Heather Molyneaux, Helene Fournier, Sonia Chiasson, Canada
- Older Adults and Smart Home Devices: A Legal Critique of Terms of Service and Privacy Policy Agreements of Voice-Activated Smart Home Devices
Catherine Maddock, Christine Murad, Adam Loo, Cosmin Munteanu, Canada
- Understanding Security and Privacy Practices around Internet of Things Devices
Adelina Andersen, Asreen Rostami, Mareike Glöss, Donald McMillan, Sweden
- Towards Secure, Privacy-Enhanced and Configurable Conversational Assistants: An Enterprise-Focused Approach
Dimosthenis Natsos, Nikolaos Malamas, Andreas L. Symeonidis, Greece
|
Thursday, 26 June 2025 |
---|
13:30 - 15:30 |
Usability, Training, and Ethical Challenges in Cybersecurity Room: TBA Chair(s): To be announced |
- The Emerging Ethical Dilemmas and Cognitive Security Concerns with Personalized Training in Cybersecurity
Leanne N. Torgersen, Germany; Eloise Zehnder, Luxembourg; Torvald F. Ask, Norway; Stefan M. Schulz, Germany
- The Complexity of Cyber Security in Private and Professional Everyday Life - An Ethnographic-Informatic Collaborative Approach
Henrich C. Pöhls, Dennis Eckhardt, Nelli Feist, Sabine Pfeiffer, Dominik Herrmann, Stefan Katzenbeisser, Germany
- Enhancing the Effectiveness of Cyber Range Training Scenarios: Impact of Video Tutorials on Mental Workload, Situational Awareness and Presence
Jose Manuel Castillo, Marc Parenthoen, Nicolas Louveton, France
- Integrating Gamification, Recommender System, and Chatbot in Cybersecurity Training: A User-Centered Approach for Enhanced Engagement and Motivation
Ling Leung, Benoit Duhoux, Axel Legay, Suzanne Kieffer, Belgium
- From Persona non Grata to Persona Imperitus: Modeling Personas to Design Usable and Secure Software Applications
Benjamin Schooley, Tonia San Nicolas-Rocca, United States
|
Friday, 27 June 2025 |
---|
13:30 - 15:30 |
Secure and Trustworthy Digital Systems and Interactions Room: TBA Chair(s): To be announced |
- E-Voting with Confidence: Usability Challenges in Manual Integrity Checks
Simone Brunello, Laura Cristiano, Riccardo Longo, Chiara Spadafora, Italy
- Investigating 3D Object Spoofing on Fundamental and Custom Objects in Virtual Reality
Mayu Fujita, Shodai Kurasaki, Akira Kanaoka, Japan
- Individual Technology Commitment and the Rating of Usability and Trustworthiness of Electronic Signature Systems
Michael Hofmeier, Isabelle Haunschild, Manfred Hofmeier, Wolfgang Hommel, Germany
- E-Commerce Fraud and Scams Prevention for Adult Consumers: A Game-Based Learning Experimental Approach
Carina Chang, Phillip Benachour, United Kingdom
|
Disclaimer - Political Neutrality
The HCI International Conference respects the decisions of all its contributors, engaged in any way, regarding their institutional affiliations and designations of territories, in all material / content published in its website, taking a neutral stance in relation to any disputes or claims. Moreover, the HCI International Conference fully concurs with the Territorial Neutrality Policy of Springer Nature, Publisher of its proceedings.