AISB logo

April 5, 2018
Liverpool, UK

Symposium on Digital Behaviour Intervention
for Cyber Security

In conjunction with the AISB 2018 Convention
Artificial Intelligence and Simulation for Behaviour

Judith Masthoff
Department of Computing Science
University of Aberdeen

Matthew Collinson
Department of Computer Science
University of Aberdeen

John Paul Vargheese
Department of Computer Science
University of Aberdeen

Key Dates

Paper Submission: 15 January 2018
Notification: 12 February 2018
Final Copy Due: 5 March 2018
Symposium Date: 5 April 2018
This symposium focuses on how digital technology can motivate and influence people to behave more cyber-securely. It will bring together researchers, designers, developers and cyber-security experts interested in computers designed to change cyber-security attitudes and behaviours. The symposium will cover a wide range of topics on persuasion, from behaviour intervention methods to persuasive argumentation and persuasive user interfaces.

Call for papers     Topics of Interest     Schedule     Programme Committee

Call for papers

Digital behaviour interventions have a great practical potential. They have been applied in many domains, for instance to improve health (encouraging a reduction in alcohol intake, smoking cessation, an increase in exercise, more healthy eating, and adherence to medical treatment) and to move towards sustainable living (encouraging a reduction in energy consumption, recycling, and use of public transport). There has been much progress in the research community on digital behaviour interventions, as shown a.o. by the successful Persuasive conference series, a special issue of the UMUAI journal, and a successful series of workshops on Computational Models of Natural Argument (an area overlapping with persuasion). There has also been a lot of interest in cyber-security behaviour, and policy compliance. However, most of this work has not been routed within the behaviour change literature. There is currently an emergence of work that is beginning to combine these two strands of research, and this symposium will help to further build this community

The symposium will take place on one day. In addition to presentation by participants, there will be discussions in smaller groups on topics determined beforehand. We are also hoping to have one or two invited speakers.

Topics of interest

Submissions are invited on all aspects of Persuasive Technology. This includes, but is not limited to:
  • Behaviour intervention methods and techniques for cyber-security
    • Methods and techniques for encouraging user education, user awareness, user compliance
    • Methods and techniques for improving risk perception and risk-related behaviour
    • Methods and techniques for dissuading criminal, anti-social and negligent behaviour
    • Methods and techniques for persuading senior managers to own and manage risk
    • Persuasion and deterrence
    • Social aspects of persuasion
    • Gamification
    • Peripheral, ambient, and pervasive routes of persuasion for cyber-security
    • Personalization of methods and techniques
    • Personalization of the selection of methods and techniques
  • Persuasive argumentation for cyber-security
    • Generating persuasive arguments (identifying discourse goals, choosing argument structure, content selection)
    • Persuasive discourse processing: understanding what users say in terms of argumentation schemes
    • Computational models of argumentation
    • Rhetoric and affect: the role of emotions, personalities, etc. in models of argumentation
    • Enhancing receiver involvement
  • User, community and context models for digital behaviour interventions for cyber-security
    • Modeling attitudes, capabilities, and current behaviour (e.g., compliance, non-compliance)
    • Modeling personality and affective state for persuasion
    • Modeling cognitive load
    • Analyis of sentiment, intention, topics and affective state to spot threats and risks
    • Modeling security policies and procedures
    • Effect of demographics, job roles, education and cultural differences on persuasion and cybersecurity
    • Effect of community/organizational culture and task context
  • User-centred design and evaluation methodologies for digital behaviour interventions for cyber-security
  • Persuasive User Interfaces for cyber-security
    • Use of (multiple) Embodied Conversational Agents for persuasion
    • Communication settings (e.g. direct versus indirect communication)
    • Timing of persuasive messages/ when to interrupt the user
    • Effective presentation of communications
    • Effective presentation of cyber-security data (e.g. visualisation)
    • Effective interactions
  • Applications of digital behaviour interventions for cyber-security
    • Public and private sector cyber-security
    • Citizen cyber-security
    • Cyber-security across domains (e.g. somebody taking a device from work to home)
  • Ethical issues of digital behaviour interventions for cyber-security
  • Privacy and trust issues for digital behaviour interventions for cyber-security


Please submit your papers in PDF format via EasyChair: We invite both long papers of up to 8 pages on substantial research results, and short papers of up to 4 pages on more polemic, work-in-progress, burning issue or system description topics. Accepted papers will be published in the AISB proceedings, with an ISBN number. Authors of papers must sign a non-exclusive copyright declaration which gives AISB the right to publish the paper, but does not prevent the author from also publishing it in other venues after. Papers must be formatted using the ACM SIG CHI proceedings template: (the paper format, not the extended abstract format).

Preliminary Programme

Location: Seminar Room 3 of the Liverpool University Management School

11:00 - 11:15: Welcome and Introduction

11:15 - 11:45: Faheem: Explaining URLs to people using a Slack bot by Kholoud Althobaiti, Kami Vaniea and Serena Zheng

11:45 - 12:15: Preparing for GDPR: Helping EU SMEs to Manage Data Breaches by Keshav Kapoor, Karen Renaud and Jacqueline Archibald

12:15 - 12:30: Caught by Phishing Emails? How can Argumentation Schemes be Used to Protect Users? by Rosemary J. Thomas, Matthew Collinson and Judith Masthoff

13:30 - 14:15: Keynote Address: Lynne Coventry, Director of PaCT Lab, Northumbria University

14:15 - 14:45: How to Design Browser Security and Privacy Alerts by Lynsay Shepherd and Karen Renaud

14:45 - 15:00: The Development of Intervention E-Learning Materials and Implementation Techniques For Cyber-Security Behaviour Change by Tiffany Skinner, Jacqui Taylor, John Dale and John McAlaney

15:30 - 15:45: How can persuasion reduce user cyber security vulnerabilities? by John Paul Vargheese, Matthew Collinson and Judith Masthoff

15:45 - 17:00: Activity: Learning Cafe


Bursaries are available for students and participants on a low income. Details are here and deadline for applying is March 18th.

Programme Committee

Chenghua Lin
University of Aberdeen

Aneesha Sethi
University of Southampton

Karen Renaud
Abertay University

Jaap Ham
Eindhoven University of Technology

Ganna Pogrebna
Birmingham Business School

Shujun Li
University of Kent

Manfred Tscheligi
University of Salzburg

Roeland Kegel
University of Twente

Fabio Massacci
University of Trento

Tom Crick
Cardiff Metropolitan University

Alice Toniolo
University of St Andrews

Kovila Coopamootoo
University of Newcastle