LEADER 03202nam 22005295 450 001 9910987689803321 005 20250313115251.0 010 $a3-031-83072-5 024 7 $a10.1007/978-3-031-83072-3 035 $a(CKB)37877326100041 035 $a(DE-He213)978-3-031-83072-3 035 $a(MiAaPQ)EBC31958874 035 $a(Au-PeEL)EBL31958874 035 $a(EXLCZ)9937877326100041 100 $a20250313d2025 u| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSocio-Technical Aspects in Security $e12th International Workshop, STAST 2022, Copenhagen, Denmark, September 29, 2022, Revised Selected Papers /$fedited by Maryam Mehrnezhad, Simon Parkin 205 $a1st ed. 2025. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2025. 215 $a1 online resource (XI, 147 p. 34 illus., 25 illus. in color.) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v13855 311 08$a3-031-83071-7 327 $a(Work in Progress)Considering Human Factors in Collaborative Decision Making for Secure Architecture Design -- Hunting High or Low Evaluating the Effectiveness of High Interaction and Low Interaction Honeypots -- Why Most Results of Socio Technical Security User Studies Are False And What to Do About it -- Verification of the Socio Technical Aspects of Voting The Case of the Polish Postal Vote -- I feel spied on and I don?t have any control over my data User Privacy Perception, Preferences and Trade offs in University Smart Buildings -- Situation Critical Intensive Cybersecurity Care Needed -- Design and Evaluation of an Anti Phishing Artifact Based on Useful Transparency -- (Work in Progress) Brick by Brick Using a Structured Building Blocks Method to Engage Participants and Collect IT Security Insights. 330 $aThis volume LNCS 13855 book constitutes the refereed proceedings of the 12th International Workshop on Socio-Technical Aspects in Security and Trust, STAST 2022, which held in Copenhagen, Denmark, during September 26, 2022. The 6 regular papers and 2 short papers were carefully reviewed and selected from 20 submissions for inclusion in the book. The workshop focused especially on the interplay of technical and human factors in achieving or breaking computer security, privacy, and trust, in both organizational and individual settings. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v13855 606 $aData protection 606 $aData protection$xLaw and legislation 606 $aData and Information Security 606 $aPrivacy 615 0$aData protection. 615 0$aData protection$xLaw and legislation. 615 14$aData and Information Security. 615 24$aPrivacy. 676 $a005.8 702 $aMehrnezhad$b Maryam$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aParkin$b Simon$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910987689803321 996 $aSocio-technical aspects in security$92998647 997 $aUNINA