Investigation areas

Attack and defence against threats

Data processing

Identity management

Interaction with the user: usability

Metrics

Promotion and awareness of safety

Lines of investigation

Attacker identification and location

Computation of relevant metadata

Data protection (confidentiality)

Forensic science

Identity theft

Information filtering

Integrity and Authenticity Control of Multimedia Objects

Metrics

Online fraud

Protección de datos (integridad y disponibilidad)

Secure validation methods

Usability of authentication systems

Usability of security mechanisms