1.

Record Nr.

UNINA9910987689803321

Titolo

Socio-Technical Aspects in Security : 12th International Workshop, STAST 2022, Copenhagen, Denmark, September 29, 2022, Revised Selected Papers / / edited by Maryam Mehrnezhad, Simon Parkin

Pubbl/distr/stampa

Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025

ISBN

3-031-83072-5

Edizione

[1st ed. 2025.]

Descrizione fisica

1 online resource (XI, 147 p. 34 illus., 25 illus. in color.)

Collana

Lecture Notes in Computer Science, , 1611-3349 ; ; 13855

Disciplina

005.8

Soggetti

Data protection

Data protection - Law and legislation

Data and Information Security

Privacy

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Nota di contenuto

(Work in Progress)Considering Human Factors in Collaborative Decision Making for Secure Architecture Design -- Hunting High or Low Evaluating the Effectiveness of High Interaction and Low Interaction Honeypots -- Why Most Results of Socio Technical Security User Studies Are False And What to Do About it -- Verification of the Socio Technical Aspects of Voting The Case of the Polish Postal Vote -- I feel spied on and I don’t have any control over my data User Privacy Perception, Preferences and Trade offs in University Smart Buildings -- Situation Critical Intensive Cybersecurity Care Needed -- Design and Evaluation of an Anti Phishing Artifact Based on Useful Transparency -- (Work in Progress) Brick by Brick Using a Structured Building Blocks Method to Engage Participants and Collect IT Security Insights.

Sommario/riassunto

This volume LNCS 13855 book constitutes the refereed proceedings of the 12th International Workshop on Socio-Technical Aspects in Security and Trust, STAST 2022, which held in Copenhagen, Denmark, during September 26, 2022. The 6 regular papers and 2 short papers were carefully reviewed and selected from 20 submissions for inclusion in the book. The workshop focused especially on the interplay of technical and human factors in achieving or breaking computer security, privacy,



and trust, in both organizational and individual settings.