AISB logo

April 4-6, 2018
Liverpool, UK

Symposium on Digital Behaviour Intervention
for Cyber Security

In conjunction with the AISB 2018 Convention
Artificial Intelligence and Simulation for Behaviour

Judith Masthoff
Department of Computing Science
University of Aberdeen
j.masthoff(AT)abdn.ac.uk

Matthew Collinson
Department of Computer Science
University of Aberdeen
matthew.collinson(AT)abdn.ac.uk

John Paul Vargheese
Department of Computer Science
University of Aberdeen
jpvargheese(AT)acm.org

Key Dates

Paper Submission: 5 January 2018
Notification: 5 February 2018
Final Copy Due: 5 March 2018
Symposium Date: April 2018
This symposium focuses on how digital technology can motivate and influence people to behave more cyber-securely. It will bring together researchers, designers, developers and cyber-security experts interested in computers designed to change cyber-security attitudes and behaviours. The symposium will cover a wide range of topics on persuasion, from behaviour intervention methods to persuasive argumentation and persuasive user interfaces.

Call for papers     Topics of Interest     Schedule     Programme Committee

Call for papers

Digital behaviour interventions have a great practical potential. They have been applied in many domains, for instance to improve health (encouraging a reduction in alcohol intake, smoking cessation, an increase in exercise, more healthy eating, and adherence to medical treatment) and to move towards sustainable living (encouraging a reduction in energy consumption, recycling, and use of public transport). There has been much progress in the research community on digital behaviour interventions, as shown a.o. by the successful Persuasive conference series, a special issue of the UMUAI journal, and a successful series of workshops on Computational Models of Natural Argument (an area overlapping with persuasion). There has also been a lot of interest in cyber-security behaviour, and policy compliance. However, most of this work has not been routed within the behaviour change literature. There is currently an emergence of work that is beginning to combine these two strands of research, and this symposium will help to further build this community

The symposium will take place on one day. In addition to presentation by participants, there will be discussions in smaller groups on topics determined beforehand. We are also hoping to have one or two invited speakers.

Topics of interest

Submissions are invited on all aspects of Persuasive Technology. This includes, but is not limited to:
  • Behaviour intervention methods and techniques for cyber-security
    • Methods and techniques for encouraging user education, user awareness, user compliance
    • Methods and techniques for improving risk perception and risk-related behaviour
    • Methods and techniques for dissuading criminal, anti-social and negligent behaviour
    • Methods and techniques for persuading senior managers to own and manage risk
    • Persuasion and deterrence
    • Social aspects of persuasion
    • Gamification
    • Peripheral, ambient, and pervasive routes of persuasion for cyber-security
    • Personalization of methods and techniques
    • Personalization of the selection of methods and techniques
  • Persuasive argumentation for cyber-security
    • Generating persuasive arguments (identifying discourse goals, choosing argument structure, content selection)
    • Persuasive discourse processing: understanding what users say in terms of argumentation schemes
    • Computational models of argumentation
    • Rhetoric and affect: the role of emotions, personalities, etc. in models of argumentation
    • Enhancing receiver involvement
  • User, community and context models for digital behaviour interventions for cyber-security
    • Modeling attitudes, capabilities, and current behaviour (e.g., compliance, non-compliance)
    • Modeling personality and affective state for persuasion
    • Modeling cognitive load
    • Analyis of sentiment, intention, topics and affective state to spot threats and risks
    • Modeling security policies and procedures
    • Effect of demographics, job roles, education and cultural differences on persuasion and cybersecurity
    • Effect of community/organizational culture and task context
  • User-centred design and evaluation methodologies for digital behaviour interventions for cyber-security
  • Persuasive User Interfaces for cyber-security
    • Use of (multiple) Embodied Conversational Agents for persuasion
    • Communication settings (e.g. direct versus indirect communication)
    • Timing of persuasive messages/ when to interrupt the user
    • Effective presentation of communications
    • Effective presentation of cyber-security data (e.g. visualisation)
    • Effective interactions
  • Applications of digital behaviour interventions for cyber-security
    • Public and private sector cyber-security
    • Citizen cyber-security
    • Cyber-security across domains (e.g. somebody taking a device from work to home)
  • Ethical issues of digital behaviour interventions for cyber-security
  • Privacy and trust issues for digital behaviour interventions for cyber-security

Submissions

Please submit your papers in PDF format via EasyChair: https://easychair.org/conferences/?conf=aisb18cybersecurity. We invite both long papers of up to 8 pages on substantial research results, and short papers of up to 4 pages on more polemic, work-in-progress, burning issue or system description topics. Accepted papers will be published in the AISB proceedings, with an ISBN number. Authors of papers must sign a non-exclusive copyright declaration which gives AISB the right to publish the paper, but does not prevent the author from also publishing it in other venues after. Papers must be formatted using the ACM SIG CHI proceedings template: http://www.acm.org/publications/proceedings-template (the paper format, not the extended abstract format).

Schedule

To be added after paper review.

Programme Committee

Chenghua Lin
University of Aberdeen

Aneesha Sethi
University of Southampton

Karen Renaud
Abertay University

Jaap Ham
Eindhoven University of Technology

Ganna Pogrebna
Birmingham Business School

Shujun Li
University of Kent

Manfred Tscheligi
University of Salzburg

Roeland Kegel
University of Twente

Fabio Massacci
University of Trento

Tom Crick
Cardiff Metropolitan University

Alice Toniolo
University of St Andrews

Kovila Coopamootoo
University of Newcastle