• Full Paper Submission:
    June 30, 2019 July 10, 2019
    (23:59 AoE) = UTC-12
  • Notification:
    July 30, 2019 August 10, 2019
  • Camera Ready:
    August 6, 2019 August 16, 2019
  • Workshop Date:
    September 26, 2019

Previous Editions

STAST 2018

STAST 2017

STAST 2016

STAST 2015

STAST 2014

STAST 2013

STAST 2012

STAST 2011

Stay connected





Call for Papers

This call for papers is available in PDF and in TXT.

Type of contributions

We consider the following submission types:

  • Full Papers, discussing original research, answering well-defined research questions, and presenting full and stable results;
  • Position Papers, original contributions discussing existing challenges and introducing and motivating new research problems;
  • Case Studies, describing lessons learned from design and deployment of security mechanisms and policies in research and in industry.
  • Work in Progress, describing original but unfinished research, which is nevertheless based on solid research questions or hypothesis soundly argued be innovative compared with the state of the art.

Accepted papers will be published as post-proceedings with Springer in their Lecture Notes in Computer Science series (final approval pending). See the paper submission page for paper format and instruction for authors.

Workshop Topics

Contributions should focus on the interplay of technical, organizational and human factors in breaking and in achieving computer security, for example:

  • Usability and user experience in security
  • Requirements for socio-technical systems
  • Feasibility of policies from the socio-technical perspective
  • Threat models that combine technical and human-centered strategies
  • Socio-technical factors in decision making in security and privacy
  • Balance between technical measures and social strategies
  • Studies of real-world security incidents socio-technical perspective
  • Social factors in organizations security policies and processes
  • Lessons from design and deployment of security mechanisms and policies
  • Models of user behaviour and user interactions with technology
  • Perceptions of security and risk, as well as their influence on humans
  • Interplay of law, ethics and politics with security and privacy measures
  • Social engineering, persuasion, and other deception techniques
  • Socio-technical analysis of security incidents
  • Strategies, methodology and guidelines cyber-security intelligence analysis

We welcome qualitative and quantitative research approaches from academia and industry.

We welcome meta-analytic as well as replication studies and consider them as original research eligible for full papers. We welcome negative or null results with sound methodology.