skip to main content
10.1145/3046055acmotherconferencesBook PagePublication PagesstastConference Proceedingsconference-collections
STAST '16: Proceedings of the 6th Workshop on Socio-Technical Aspects in Security and Trust
ACM2016 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
STAST '16: Socio-Technical Aspects in Security and Trust Los Angeles California 5 December 2016
ISBN:
978-1-4503-4826-3
Published:
05 December 2016
Recommend ACM DL
ALREADY A SUBSCRIBER?SIGN IN

Reflects downloads up to 30 Jan 2025Bibliometrics
Skip Abstract Section
Abstract

STAST is a unique workshop that brings together researchers and practitioners to discuss the confluence of both the social and technical aspects of creating a secure computing environment that is trusted by end users. There is a dynamic that exists between the technical implementations of security and the social aspects behind how that technology is used. While this dynamic includes user interfaces, it also extends out to the cognitive, emotional and social aspects of secure behavior and its impact on policies and technology.

Skip Table Of Content Section
SESSION: Social interactions
research-article
Digital privacy and social capital on social network sites. friends or foes?

Previous1 literature indicates that SNSs users, and especially Facebook ones, are willing to share information and consequently "sacrifice" their digital privacy in order to obtain bonding or bridging social capital. Additionally, most of the previous ...

research-article
Can Johnny finally encrypt?: evaluating E2E-encryption in popular IM applications

Recently, many popular Instant-Messaging (IM) applications announced support for end-to-end encryption, claiming confidentiality even against a rogue operator. Is this, finally, a positive answer to the basic challenge of usable-security presented in ...

research-article
Influence tokens: analysing adversarial behaviour change in coloured petri nets

Social Engineers can use influential techniques to exploit human behaviour. For a security officer, simulating and analysing such attacks would provide useful insights towards possible countermeasures. We propose the notion of influence tokens, which a ...

SESSION: Physical interactions
research-article
Open Access
Case study: predicting the impact of a physical access control intervention

We investigate a planned physical security intervention at a partner organisation site, to determine the potential individual cost of security upon employees when replacing a secure door with a turnstile. Systems modelling techniques are applied to ...

research-article
Is your data gone?: measuring user perceptions of deletion

Previous studies have shown that many users do not use effective data deletion techniques upon sale or surrender of storage devices. A logical assumption is that many users are still confused concerning proper sanitization techniques of devices upon ...

research-article
Open Access
Why do people use unsecure public wi-fi?: an investigation of behaviour and factors driving decisions

Public Wi-Fi networks are now widely available in many countries. Though undoubtedly convenient, such networks have potential security and privacy risks. The aim of this study was to understand if people are aware of those risks, and - if so - why they ...

SESSION: Position papers
research-article
User trust assessment: a new approach to combat deception

Deception is rapidly on the rise on the Internet, and email is the attack vector of choice for a broad array of attacks, including ransomware distribution, enterprise-facing cons, and mass-deployed phishing attacks. It is widely believed that this is ...

research-article
"I had no idea this was a thing": on the importance of understanding the user experience of personalized transparency tools

Personalization has the potential to improve the effectiveness of "generic" privacy notices and policies, however, little is known about the user impact of the personalized transparency tools available today. While regulators consistently endorse ...

research-article
Public Access
Proposing ambient visualization and pre-attentive processing for threat detection

Computer threats have gradually become the Achilles heel of the modern world, tearing tendon from bone in high security enterprise information systems and desktop computers alike. Even the most ardent advocates of computer security acknowledge the ...

Contributors
  • University of Luxembourg
  • University of Catania
  • University of Erlangen-Nuremberg
  • Dalhousie University
  1. Proceedings of the 6th Workshop on Socio-Technical Aspects in Security and Trust

    Recommendations