Information security is the practice of protecting information from unauthorized access, disclosure, alteration, destruction, or disruption. It focuses on preserving confidentiality, integrity, and availability of information, whether it is in physical or digital form. As the digital ecosystem and threat landscape continue to expand, the need for robust and effective information security measures becomes increasingly critical. Organizations like the European Union Agency for Cybersecurity (ENISA) emphasize the need for comprehensive security training. However, a gap persists in aligning traditional education methods with the dynamic demands of modern information security. Despite the increasing importance of this field, existing training methods often overlook the role of the learner's perspective and active participation. Learner-centered approaches are essential for equipping individuals with the practical skills and understanding necessary to address evolving security challenges effectively. Drawing from our experience in designing and delivering education and training programs, we recognize the transformative potential of focusing on learner-centric methodologies to bridge these gaps. The goal of the 1st Workshop on Learner-Centered Information Security Training Methods (LISTE) is to advance the field of information security education by fostering discussions, sharing innovations, and promoting learner-centered approaches. The workshop aims to create a collaborative platform for researchers, educators, and practitioners to exchange ideas, address training challenges, and build a network of experts dedicated to improving the effectiveness of information security training. Ultimately, the workshop seeks to enhance educational practices to better equip individuals with the skills and knowledge required to address the evolving demands of information security. As a result, the workshop is expected to improve information security training practices.
Rūta Pirta, ruta.pirta@rtu.lv
Agnė Brilingaitė, agne.brilingaite@mif.vu.lt
Nalin Asanka Gamagedara Arachchilage, nalin.arachchilage@rmit.edu.au
The ASPIRING workshop will seek to explore the state-of-the-art methods for engineering USP solutions with special emphasis on the human factors in such solutions. ASPIRING covers research in methods, tools and techniques for the elicitation, analysis and modeling of USP requirements, techniques for empowering end-users to specify their USP requirements, the consideration of users' experience, demographics, etc. in USP requirements engineering activities, measures and metrics for the assessment of USP design, validation and verification techniques for USP requirements/solutions, the integration of Privacy-By-Design and Privacy-By-Default principles into Human-Centered Design approaches for USP, the impact of USP on User Experience (UX) in practice, the interplay between USP and Human-Computer Interaction (HCI), USP and informational self-determination, AI for USP, the role of USP in preventing social engineering and cyber-attacks, guidelines and design principles for USP, experience reports and case studies concerning the USP in practice, and USP education and training.
Website: https://aspiring-workshop.github.io/2025/
Mohamad Gharib, mohamad.gharib@ut.ee
Katrien De Moor, katrien.demoor@ntnu.no
Tong Li, litong@bjut.edu.cn
Raian Ali, raali2@hbku.edu.qa
A Cyber-Physical System (CPS) is composed of the physical, networking, and computational elements controlled or monitored by algorithms. CPS must include requirements for security, safety, privacy, reliability, resilience, and the processing of massive amounts of information. According to NIST, "CPS will bring advances in personalized health care, emergency response, traffic flow management, and electric power generation and delivery, as well as in many other areas now just being envisioned. Therefore, such systems' economic and social potential is huge, and large investments are being made worldwide to develop these systems. The world is confronting numerous challenges that should be dealt with in the near future, such as tackling climate change and environmental degradation, producing affordable and clean energy, eliminating poverty, and ensuring education, health, and social protection for all. CPS can be relevant in addressing social, environmental, economic, and governance sustainability. Regarding social sustainability, it is imperative to identify early development approaches for CPS systems that promote strong and fair communities, such as social and health equity, community development, human rights, and social justice. These human and social characteristics and interactions are brought into the CPS due to the human-centric computation shift to the Cyber-Physical Social System (CPSS), which is the target of our workshop. The workshop aims to provide a forum for researchers and practitioners i) to discuss their current work focusing on requirements, design, frameworks, and empirical studies about emerging opportunities and challenges of CPSS for sustainability, ii) to define a research agenda on the topic of CPSS for sustainability.
Website: https://sites.google.com/view/cpss4sus2025/home
Isabel Sofia Brito isabel.sofia@ipbeja.pt
Ivan Machado ivan.machado@ufba.br
João Paulo Barros joao.barros@ipbeja.pt
Continuous and incessant data production has transformed data ownership into an increasingly important asset for companies. However, the value assigned to data sets is a direct consequence of how the data can be used and shared between data owners and stakeholders. Given the increasing demand for data, this requires sophisticated mechanisms for discovering suitable data sets, as well as for transforming and consuming data in highly distributed architectures. To that extent, there exists an urging gap for automation frameworks that simplify data exchange between providers and consumers, namely for: (i) publishing data sets, (ii) generation of data usage agreements or contracts between parties, (iii) safe and contractual data exchange, and (iv) monitoring both during the exchange and during the consumer’s use of the data obtained. The purpose of the workshop is to bring together researchers and practitioners in the field of data architecture and data management with the aim of sharing ideas, perspectives and new solutions for scalable data sharing.
Website: https://ise-tu-berlin.github.io/TruSDaSh/
Pierluigi Plebani; pierluigi.plebani@polimi.it
Boris Sedlak; boris.sedlak@dsg.tuwien.ac.at
Sebastian Werner; werner@tu-berlin.de
The BPMS2 workshop explores how social interactions integrate with business process management and how business process management may profit from this integration. The social and human aspects of Business Process Management (BPM) refer to the consideration of people within the framework of BPM practices. This encompasses how individuals interact with each other within business processes, how they are affected by those processes, and how their behavior and social interactions influence the design, management, and improvement of business processes. Here are a few key points: (i) Human-Centric BPM, (ii) Social Interactions and Platforms, (iii) Human-AI Collaboration in BPM, (iv) Organizational Culture, (v) Ethical Considerations, Diversity and Inclusion.
Pursuing the previous editions BPMS2, the goal of the BPMS2’2025 workshop is to promote the integration of business process management with social software and to enlarge the community working on this theme.
Website: https://www.bpms2.org/
Rainer Schmidt, rainer.Schmidt@hm.edu
Selmin Nurcan, selmin.nurcan@univ-paris1.fr