SHB 2011 logo

June 17- 18, 2011
The Heinz College and CyLab at Carnegie Mellon University
Pittsburgh, PA (USA)




Alessandro Acquisti, CMU: What Can Behavioral Economics Teach Us About Privacy?; Privacy in Electronic Commerce and the Economics of Immediate Gratification

Andrew A. Adams, Meiji University: The Development of Japanese Data Protection; The Open vs Closed Debate

Idris Adjerid, CMU

Sadia Afroz, Drexel

Luis von Ahn, Carnegie Mellon University

Ross Anderson, University of Cambridge: Book chapters on psychology and terror; It's the Anthropology, Stupid

Michelle Baddeley, University of Cambridge: Information Security: Lessons from Behavioural Economics

Matt Blaze, UPenn;Toward a broader view of security protocols

Caspar Bowden, Microsoft

Laura Brandimarte, CMU

Lee Branstetter, CMU

Pam Briggs, Northumbria: Authentication, implied mistrust and social embarrassment

Jon Callas, Apple

Ryan Calo, Stanford
Jean Camp, Indiana: Privacy Framework for Older Adults
Luke Church, Cambridge

Richard Clayton, University of Cambridge
Lorrie Cranor, CMU: A Framework for Reasoning About the Human in the Loop
Eric Davis, Google

Dylan Evans, UCC: online risk intelligence test

Baruch Fischhoff, CMU

Mark Frank, Buffalo; Human Behaviour and Deception Detection

Allan Friedman, Brookings

Rachel Greenstadt, Drexel: Learning to Extract Quality Discourse in Online Communities

Jeff Hancock, Cornell: On Lying and Being Lied To: A Linguistic Analysis of Deception in Computer-Mediated Communication; Separating Fact From Fiction: An Examination of Deceptive Self-Presentation in Online Dating Profiles

Cormac Herley, Microsoft: So Long And No Thanks; Where Do Security Policies Come From

Chris Hoofnagle, UC Berkeley: Internalizing Identity Theft; Identity Theft: Making the Unknowns Known 

Nick Humphrey, Cambridge

Inka Karpinnen, UCL

Iacovos Kirlappos, UCL

Markus Jakobsson, PayPal: Fastwords -- Faster and more secure user authentication

Richard John, USC: Decision Analysis by Proxy for the Rational Terrorist

Adam Joinson, Bath: Digital Crowding; Privacy Dictionary

Eric Johnson, Dartmouth: Access Flexibility with Escalation and Audit; Security through Information Risk Management

Ben Laurie, Google

Steven Leblanc, Harvard

Jeff MacKie-Mason, U Michigan
Betsy Masiello
, Google

David Modic, Exeter

John Mueller, Ohio State:Terror, Security, and Money (Book website)

Bashar Nuseibeh, Open University: A Multi-Pronged Empirical Approach to Mobile Privacy Investigation; Security Requirements Engineering: A Framework for Representation and Analysis

Andrew Odlyzko, University of Minnesota: Providing security with insecure systems, Economics, psychology, and sociology of security; Bubbles, Gullibility, and Other Challenges for Economics, Psychology, Sociology, and Information Sciences

Sandra Petronio, IUPUI: Regulating the Privacy of Confidentiality, Unpacking the Paradoxes of Privacy in CMC Relationships: The Challenges of Blogging and Relational Communication on the Internet

Shari Pfleeger, Dartmouth: Privacy; Leveraging Human Behavior

Peter Robinson, Cambridge: Affective Computing

Sasha Romanosky, CMU

Angela Sasse, UCL: Not seeing the crime for the cameras?; The True Cost of Unusable Password Policies

Stuart Schechter, Microsoft: It's no secret; The Emperor's New Security Indicators

Bruce Schneier, Counterpane: Worst-Case Thinking Makes Us Nuts, Not Safe; Google And Facebook's Privacy Illusion; Our Reaction Is the Real Security Failure

David Livingstone Smith, University of New England: Less than Human

Ashkan Soltani, UC Berkeley

Frank Stajano, University of Cambridge: Understanding scam victims: seven principles for systems security; It's the Anthropology, Stupid

Paul Syverson, Naval Research Laboratory

Milind Tambe, USC

Terence Taylor, ICLS: Darwinian Security; Natural Security (A Darwinian Approach to a Dangerous World)

Rahul Telang, CMU

Doug Tygar, Berkeley

Claire Vishik, Intel

Melanie Volkamer

Rick Wash, Michigan State: Folk Models of Home Computer Security

Henry H. Willis, RAND: Deterring the Smuggling of Nuclear Weapons in Container Freight Through Detection and Retaliation, Measuring efforts to improve emergency response capabilities, Evaluating public health emergency preparedness programs