<div dir="ltr"><div class="gmail_quote"><div link="#0563C1" vlink="#954F72" lang="DE"><div class="m_-6256645103312085373WordSection1"><p class="MsoNormal"><span style="font-size:8.0pt;font-family:"Verdana",sans-serif;color:black" lang="EN-US">HICSS-53 Call for Papers <u></u><u></u></span></p><p class="MsoNormal"><span style="font-size:8.0pt;font-family:"Verdana",sans-serif;color:black" lang="EN-US">Track: Software Technology<u></u><u></u></span></p><p class="MsoNormal"><span style="font-size:8.0pt;font-family:"Verdana",sans-serif;color:black" lang="EN-US">Minitrack: Security and Privacy Aspects of Human-Computer-Interactions<u></u><u></u></span></p><p class="MsoNormal"><span style="font-size:8.0pt;font-family:"Verdana",sans-serif;color:black" lang="EN-US">Deadline: June 15, 2019<u></u><u></u></span></p><p class="MsoNormal"><span style="font-size:8.0pt;font-family:"Verdana",sans-serif;color:#ed6e00" lang="EN-US">_____________________________________________</span><span style="font-size:11.0pt;color:black" lang="EN-US"><u></u><u></u></span></p><p class="MsoNormal"><span style="font-size:10.0pt;font-family:"Arial",sans-serif;color:black" lang="EN-US"><u></u> <u></u></span></p><p class="MsoNormal" style="margin-bottom:10.0pt;text-align:justify"><span style="font-size:11.0pt;font-family:"Arial",sans-serif;color:black" lang="EN-US">Call for Papers</span><span style="font-family:"Arial",sans-serif;color:black" lang="EN-US"><u></u><u></u></span></p><p class="MsoNormal" style="margin-bottom:10.0pt;text-align:justify"><b><span style="font-size:11.0pt;font-family:"Arial",sans-serif;color:black" lang="EN-US">Hawaii International Conference on System Sciences Minitrack on</span></b><span style="font-family:"Arial",sans-serif;color:black" lang="EN-US"><u></u><u></u></span></p><p class="MsoNormal" style="margin-bottom:10.0pt;text-align:justify"><b><span style="font-size:18.0pt;font-family:"Arial",sans-serif;color:black" lang="EN-US">Security and Privacy Aspects of Human-Computer-Interactions<u></u><u></u></span></b></p><p class="MsoNormal" style="margin-bottom:10.0pt;text-align:justify"><span style="font-family:"Arial",sans-serif;color:black" lang="EN-US"><a href="http://hicss.hawaii.edu" target="_blank"><span style="font-size:11.0pt">http://hicss.hawaii.edu</span></a><u></u><u></u></span></p><p class="MsoNormal" style="margin-bottom:10.0pt;text-align:justify"><span style="font-family:"Arial",sans-serif;color:black" lang="EN-US">With increasing digitization, the security and privacy aspects of information are a nonnegotiable factor in information system design and operation. Especially the human factor of information systems is a pivotal role in information security and increasingly relevant in establishing user-privacy concepts. More often than not, their knowledge about security aspects and ways of user-manipulation tactics are the last line of defense against cyberattacks. However, studies show users are also seen as the weakest link in information security. Therefore, they are also the primary target of attackers.<u></u><u></u></span></p><p class="MsoNormal" style="margin-bottom:10.0pt;text-align:justify"><span style="font-family:"Arial",sans-serif;color:black" lang="EN-US">In addition to the traditional forms of user-computer-interactions in the form of mouse-keyboard-input-devices, new ways of system-interactions, e.g., physiological data from fitness-trackers, eye-tracking devices or even pupillary responses indicating cognitive-load-levels, are increasingly feasible as everyday HCI-components. With the interest in data privacy increasing, are users aware how valuable those personal input data is and how do they value data privacy measures?<u></u><u></u></span></p><p class="MsoNormal" style="margin-bottom:10.0pt;text-align:justify"><span style="font-family:"Arial",sans-serif;color:black" lang="EN-US">We have identified two main aspects relevant to researchers within the domain of Software Technology:<u></u><u></u></span></p><p class="MsoNormal" style="margin-bottom:10.0pt;text-align:justify"><span style="font-family:"Arial",sans-serif;color:black" lang="EN-US">1) how to securely deal with input data (also focusing on privacy aspects)<u></u><u></u></span></p><p class="MsoNormal" style="margin-bottom:10.0pt;text-align:justify"><span style="font-family:"Arial",sans-serif;color:black" lang="EN-US">2) how this data can be utilized in order to increase secure behavior or to raise awareness among users (help the users to make better security-related decisions)<u></u><u></u></span></p><p class="MsoNormal" style="margin-bottom:10.0pt;text-align:justify"><span style="font-family:"Arial",sans-serif;color:black" lang="EN-US">In this minitrack we seek papers that explore concepts, prototypes, and evaluations of how users interact with information systems and what implications these interactions have for information security and data privacy. Further, we welcome new and innovative ways of human-computer-interaction and security-related concepts currently examined in the field.<u></u><u></u></span></p><p class="MsoNormal" style="margin-bottom:10.0pt;text-align:justify"><span style="font-family:"Arial",sans-serif;color:black" lang="EN-US">Topics of interest include but are not limited to:<u></u><u></u></span></p><p class="MsoNormal" style="margin-bottom:10.0pt;text-align:justify"><span style="font-family:"Arial",sans-serif;color:black" lang="EN-US">• Security related devices<u></u><u></u></span></p><p class="MsoNormal" style="margin-bottom:10.0pt;text-align:justify"><span style="font-family:"Arial",sans-serif;color:black" lang="EN-US">• Physiological sensors<u></u><u></u></span></p><p class="MsoNormal" style="margin-bottom:10.0pt;text-align:justify"><span style="font-family:"Arial",sans-serif;color:black" lang="EN-US">• Human-Computer-Interaction<u></u><u></u></span></p><p class="MsoNormal" style="margin-bottom:10.0pt;text-align:justify"><span style="font-family:"Arial",sans-serif;color:black" lang="EN-US">• Artificial intelligence<u></u><u></u></span></p><p class="MsoNormal" style="margin-bottom:10.0pt;text-align:justify"><span style="font-family:"Arial",sans-serif;color:black" lang="EN-US">• Sensor analysis<u></u><u></u></span></p><p class="MsoNormal" style="margin-bottom:10.0pt;text-align:justify"><span style="font-family:"Arial",sans-serif;color:black" lang="EN-US">• Data visualization<u></u><u></u></span></p><p class="MsoNormal" style="margin-bottom:10.0pt;text-align:justify"><span style="font-family:"Arial",sans-serif;color:black" lang="EN-US">• Biometrics authentication<u></u><u></u></span></p><p class="MsoNormal" style="margin-bottom:10.0pt;text-align:justify"><span style="font-family:"Arial",sans-serif;color:black" lang="EN-US">• Security and privacy awareness<u></u><u></u></span></p><p class="MsoNormal" style="margin-bottom:10.0pt;text-align:justify"><span style="font-family:"Arial",sans-serif;color:black" lang="EN-US">• Usable security design<u></u><u></u></span></p><p class="MsoNormal" style="margin-bottom:10.0pt;text-align:justify"><span style="font-family:"Arial",sans-serif;color:black" lang="EN-US">• Privacy and security by design<u></u><u></u></span></p><p class="MsoNormal" style="margin-bottom:10.0pt;text-align:justify"><span style="font-family:"Arial",sans-serif;color:black" lang="EN-US">• User valuation of privacy<u></u><u></u></span></p><p class="MsoNormal" style="margin-bottom:10.0pt;text-align:justify"><span style="font-family:"Arial",sans-serif;color:black" lang="EN-US">• Validation of user data<u></u><u></u></span></p><p class="MsoNormal" style="margin-right:0cm;margin-bottom:10.0pt;margin-left:0cm;text-align:justify"><b><span style="font-size:14.0pt;font-family:"Arial",sans-serif;color:black" lang="EN-US"><u></u> <u></u></span></b></p><p class="MsoNormal" style="margin-right:0cm;margin-bottom:10.0pt;margin-left:0cm;text-align:justify"><b><span style="font-size:14.0pt;font-family:"Arial",sans-serif;color:black" lang="EN-US">Organizers:</span></b><span style="font-family:"Arial",sans-serif;color:black" lang="EN-US"><u></u><u></u></span></p><p class="MsoNormal" style="margin-bottom:10.0pt;text-align:justify"><b><span style="font-size:11.0pt;font-family:"Arial",sans-serif;color:black" lang="EN-US">Nicholas Müller</span></b><span style="font-size:11.0pt;font-family:"Arial",sans-serif;color:black" lang="EN-US">, University of Applied Sciences Würzburg-Schweinfurt (FHWS), Germany<b><u></u><u></u></b></span></p><p class="MsoNormal" style="margin-bottom:10.0pt;text-align:justify"><b><span style="font-size:11.0pt;font-family:"Arial",sans-serif;color:black" lang="EN-US">Paul Rosenthal</span></b><span style="font-size:11.0pt;font-family:"Arial",sans-serif;color:black" lang="EN-US">, University of Rostock, Germany<b><u></u><u></u></b></span></p><p class="MsoNormal" style="margin-bottom:10.0pt;text-align:justify"><b><span style="font-size:11.0pt;font-family:"Arial",sans-serif;color:black" lang="EN-US">Kristin Weber</span></b><span style="font-size:11.0pt;font-family:"Arial",sans-serif;color:black" lang="EN-US">, University of Applied Sciences Würzburg-Schweinfurt (FHWS), Germany<b><u></u><u></u></b></span></p><p class="MsoNormal" style="margin-bottom:10.0pt;text-align:justify"><span style="font-family:"Arial",sans-serif;color:black" lang="EN-US"> <u></u><u></u></span></p><p class="MsoNormal" style="margin-right:0cm;margin-bottom:10.0pt;margin-left:0cm;text-align:justify"><b><span style="font-size:14.0pt;font-family:"Arial",sans-serif;color:black" lang="EN-US">Publication of Papers</span></b><span style="font-family:"Arial",sans-serif;color:black" lang="EN-US"><u></u><u></u></span></p><p class="MsoNormal" style="text-align:justify"><span style="font-size:11.5pt;font-family:"Arial",sans-serif;color:black" lang="EN-US">Presented papers will be included in the Proceedings of HICSS-53. </span><span style="font-family:"Arial",sans-serif;color:black" lang="EN-US"><u></u><u></u></span></p><p class="MsoNormal" style="margin-bottom:10.0pt;text-align:justify"><span style="font-size:11.0pt;font-family:"Arial",sans-serif;color:black" lang="EN-US">                                                   </span><span style="font-family:"Arial",sans-serif;color:black" lang="EN-US"><u></u><u></u></span></p><p class="MsoNormal" style="margin-right:0cm;margin-bottom:10.0pt;margin-left:0cm;text-align:justify"><b><span style="font-size:14.0pt;font-family:"Arial",sans-serif;color:black" lang="EN-US">Important Dates</span></b><span style="font-family:"Arial",sans-serif;color:black" lang="EN-US"><u></u><u></u></span></p><p class="MsoNormal" style="margin-bottom:10.0pt;text-align:justify"><b><span style="font-size:11.0pt;font-family:"Arial",sans-serif;color:black" lang="EN-US">June 15, 2019:</span></b><span style="font-size:11.0pt;font-family:"Arial",sans-serif;color:black" lang="EN-US"> Paper submission deadline (11:59 pm HST)</span><span style="font-family:"Arial",sans-serif;color:black" lang="EN-US"><u></u><u></u></span></p><p class="MsoNormal" style="margin-bottom:10.0pt;text-align:justify"><b><span style="font-size:11.0pt;font-family:"Arial",sans-serif;color:black" lang="EN-US">August 17, 2019:</span></b><span style="font-size:11.0pt;font-family:"Arial",sans-serif;color:black" lang="EN-US"> Notification of Acceptance/Rejection</span><span style="font-family:"Arial",sans-serif;color:black" lang="EN-US"><u></u><u></u></span></p><p class="MsoNormal" style="margin-bottom:10.0pt;text-align:justify"><b><span style="font-size:11.0pt;font-family:"Arial",sans-serif;color:black" lang="EN-US">September 22, 2019:</span></b><span style="font-size:11.0pt;font-family:"Arial",sans-serif;color:black" lang="EN-US"> Deadline for submission of final manuscript</span><span style="font-family:"Arial",sans-serif;color:black" lang="EN-US"><u></u><u></u></span></p><p class="MsoNormal" style="margin-bottom:10.0pt;text-align:justify"><b><span style="font-size:11.0pt;font-family:"Arial",sans-serif;color:black" lang="EN-US">October 1, 2019:</span></b><span style="font-size:11.0pt;font-family:"Arial",sans-serif;color:black" lang="EN-US"> Deadline for at least one author to register for the conference</span><span style="font-family:"Arial",sans-serif;color:black" lang="EN-US"><u></u><u></u></span></p><p class="MsoNormal" style="margin-bottom:10.0pt;text-align:justify"><span style="font-family:"Arial",sans-serif;color:black" lang="EN-US"> <u></u><u></u></span></p><p class="MsoNormal" style="margin-bottom:10.0pt;text-align:justify"><b><span style="font-size:14.0pt;font-family:"Arial",sans-serif;color:black" lang="EN-US">Conference Dates</span></b><span style="font-family:"Arial",sans-serif;color:black" lang="EN-US"><u></u><u></u></span></p><p class="MsoNormal" style="margin-bottom:10.0pt;text-align:justify"><b><span style="font-size:11.0pt;font-family:"Arial",sans-serif;color:black" lang="EN-US">January 8-10, 2020:  </span></b><span style="font-size:11.0pt;font-family:"Arial",sans-serif;color:black" lang="EN-US">Paper presentations</span><span style="font-family:"Arial",sans-serif;color:black" lang="EN-US"><u></u><u></u></span></p><p class="MsoNormal" style="margin-bottom:10.0pt;text-align:justify"><span style="font-family:"Arial",sans-serif;color:black" lang="EN-US"> <u></u><u></u></span></p><p class="MsoNormal" style="margin-bottom:10.0pt;text-align:justify"><b><span style="font-size:14.0pt;font-family:"Arial",sans-serif;color:black" lang="EN-US">Author Instructions</span></b><span style="font-family:"Arial",sans-serif;color:black" lang="EN-US"><u></u><u></u></span></p><p class="MsoNormal" style="margin-right:6.0pt;margin-bottom:6.0pt;margin-left:0cm;text-align:justify"><span style="font-family:"Arial",sans-serif;color:black" lang="EN-US"><a href="http://hicss.hawaii.edu/authors/" target="_blank"><span style="font-size:11.0pt">http://hicss.hawaii.edu/authors/</span></a><u></u><u></u></span></p><p class="MsoNormal" style="margin-right:6.0pt;margin-bottom:6.0pt;margin-left:0cm;text-align:justify"><span style="font-family:"Arial",sans-serif;color:black" lang="EN-US"> <u></u><u></u></span></p><p class="MsoNormal" style="margin-right:6.0pt;margin-bottom:6.0pt;margin-left:0cm;text-align:justify"><b><span style="font-size:14.0pt;font-family:"Arial",sans-serif;color:black" lang="EN-US">Link to Minitrack</span></b><span style="font-family:"Arial",sans-serif;color:black" lang="EN-US"><u></u><u></u></span></p><p class="MsoNormal" style="margin-right:6.0pt;margin-bottom:6.0pt;margin-left:0cm;text-align:justify"><u><span style="font-size:11.0pt;font-family:"Arial",sans-serif;color:blue" lang="EN-US"><a href="https://hicss.hawaii.edu/tracks-53/software-technology/#security-and-privacy-aspects-of-human-computer-interactions-minitrack" target="_blank">https://hicss.hawaii.edu/tracks-53/software-technology/#security-and-privacy-aspects-of-human-computer-interactions-minitrack</a><u></u><u></u></span></u></p><p class="MsoNormal"><span style="font-size:10.0pt;font-family:"Arial",sans-serif;color:black" lang="EN-US"><br></span></p></div></div>
</div></div>