Introduction to the Minitrack on Security and Privacy Aspects of Human-Computer-Interactions
Proceedings of the 54th Hawaii International Conference on System Sciences
Special-Track Introduction With increasing digitization, the security and privacy aspects of information are a non-negotiable factor in information system design and operation. Especially the human factor of information systems is a pivotal role in information security and increasingly relevant in establishing user-privacy concepts. More often than not, their knowledge about security aspects and ways of user-manipulation tactics are the last line of defense against cyber-attacks. However,
... s show users are also seen as the weakest link in information security. Therefore, they are also the primary target of attackers. In addition to the traditional forms of user-computerinteractions in the form of mouse-keyboard-inputdevices, new ways of system-interactions, e.g., physiological data from fitness-trackers, eye-tracking devices or even pupillary responses indicating cognitive-load-levels, are increasingly feasible as everyday HCI-components. With the interest in data privacy increasing, are users aware how valuable those personal input data is and how do they value data privacy measures? Therefore, we have identified two main aspects relevant to researchers within the domain of Software Technology: 1) how to securely deal with input data (also focusing on privacy aspects) 2) how this data can be utilized in order to increase secure behavior or to raise awareness among users (help the users to make better securityrelated decisions) In this minitrack we sought papers that explore concepts, prototypes and evaluations of how users interact with information systems and what implications these interactions have for information security and privacy. Further, we welcomed new and innovative ways of human-computer-interaction and securityrelated concepts currently examined in the field. This year four papers will be discussed within this minitrack which cover the above-mentioned facets of security aspects.