- Full Paper Submission:
June 30, 2019July 10, 2019
(23:59 AoE) = UTC-12 - Notification:
July 30, 2019August 10, 2019 - Camera Ready:
August 6, 2019August 16, 2019
- Workshop Date:
September 26, 2019
Previous Editions
Call for Papers
This call for papers is available in PDF and in TXT.Type of contributions
We consider the following submission types:
- Full Papers, discussing original research, answering well-defined research questions, and presenting full and stable results;
- Position Papers, original contributions discussing existing challenges and introducing and motivating new research problems;
- Case Studies, describing lessons learned from design and deployment of security mechanisms and policies in research and in industry.
- Work in Progress, describing original but unfinished research, which is nevertheless based on solid research questions or hypothesis soundly argued be innovative compared with the state of the art.
Accepted papers will be published as post-proceedings with Springer in their Lecture Notes in Computer Science series (final approval pending). See the paper submission page for paper format and instruction for authors.
Workshop Topics
Contributions should focus on the interplay of technical, organizational and human factors in breaking and in achieving computer security, for example:
- Usability and user experience in security
- Requirements for socio-technical systems
- Feasibility of policies from the socio-technical perspective
- Threat models that combine technical and human-centered strategies
- Socio-technical factors in decision making in security and privacy
- Balance between technical measures and social strategies
- Studies of real-world security incidents socio-technical perspective
- Social factors in organizations security policies and processes
- Lessons from design and deployment of security mechanisms and policies
- Models of user behaviour and user interactions with technology
- Perceptions of security and risk, as well as their influence on humans
- Interplay of law, ethics and politics with security and privacy measures
- Social engineering, persuasion, and other deception techniques
- Socio-technical analysis of security incidents
- Strategies, methodology and guidelines cyber-security intelligence analysis
We welcome qualitative and quantitative research approaches from academia and industry.
We welcome meta-analytic as well as replication studies and consider them as original research eligible for full papers. We welcome negative or null results with sound methodology.
�