posted by organizer: m42smith || 7434 views || tracked by 14 users: [display]

USEC 2014 : NDSS Workshop on Usable Security

FacebookTwitterLinkedInGoogle

Link: http://www.usecap.org/usec14.html
 
When Feb 23, 2014 - Feb 23, 2014
Where NDSS San Diego, California.
Submission Deadline Dec 13, 2013
Notification Due Jan 18, 2014
Final Version Due Jan 26, 2014
Categories    security   usability   human computer interaction   privacy
 

Call For Papers

==================================================
USEC'14 - Workshop on Usable Security @ NDSS'14
==================================================

USEC'14 will be held on the 23rd February 2014 co-located with NDSS'14
San Diego, California.

Many aspects of information security combine technical and human factors. If a highly secure system is unusable, users will try to circumvent the system or move entirely to less secure but more usable systems. Problems with usability are a major contributor to many high-profile security failures today.

However, usable security is not well-aligned with traditional usability for three reasons. First, security is rarely the desired goal of the individual. In fact, security is usually orthogonal and often in opposition to the actual goal. Second, security information is about risk and threats. Such communication is often unwelcome. Increasing unwelcome interaction is not a goal of usable design. Third, since individuals must trust their machines to implement their desired tasks, risk communication itself may undermine the value of the networked interaction. For the individual, discrete technical problems are all understood under the rubric of online security (e.g., privacy from third parties use of personally identifiable information, malware). A broader conception of both security and usability is therefore needed for usable security.

http://www.usecap.org/usec14.html

==================================================
TOPICS
==================================================

The workshop on Usable Security invites submissions on all aspects of human factors and usability in the context of security and privacy. USEC'14 aims to bring together researchers already engaged in this interdisciplinary effort with other computer science researchers in areas such as visualization, artificial intelligence and theoretical computer science as well as researchers from other domains such as economics or psychology.

We invite authors to submit original papers describing research or experience in all areas of usable privacy and security. We particularly encourage collaborative research from authors in multiple fields.

Topics include, but are not limited to:
- Evaluation of usability issues of existing security & privacy models or technology
- Design and evaluation of new security & privacy models or technology
- Impact of organizational policy or procurement decisions
- Lessons learned from designing, deploying, managing or evaluating security & privacy technologies
- Foundations of usable security & privacy
- Methodology for usable security & privacy research
- Ethical, psychological, sociological and economic aspects of security & privacy technologies

------------------------------------
NEW AT USEC'14
------------------------------------

- Reports of replicating previously published studies and experiments
- Reports of failed or negative usable security studies or experiments, with the focus on the lessons learned from such experience.
- Reports on deploying usable security & privacy technology in industry


It is the aim of USEC to increase the scientific quality of usable security and privacy research. To this end we encourage the use of replication studies to validate research findings. This important and often very insightful branch of research is sorely underrepresented in usable security and privacy research to date. Papers in these categories should be clearly marked as such and will not be judged against regular submissions on novelty. Rather they will be judged based on scientific quality and value to the community. Please contact the chairs in advance of submitting such work.

--------------------------------------------
KEYNOTE SPEAKER
--------------------------------------------

Serge Egelman, UC Berkeley

====================================
IMPORTANT DATES
====================================

Submission site: https://usec2014.cs.berkeley.edu/
Submissions deadline: 6th of November 2013
Notification: 5th January 2014
Camera ready: 15th January 2014

--------------------------------------------
CHAIRS
--------------------------------------------

Matthew Smith (LUH) and David Wagner (UC Berkeley)

--------------------------------------------
REPLICATION STUDY CHAIR
--------------------------------------------

Marian Harbach (LUH)

--------------------------------------------
PROGRAM COMMITTEE
--------------------------------------------

Alessandro Acquisti, CMU Heinz College
Andrew A. Adams, Meiji University, Tokyo
Ross Anderson, University of Cambridge
Pamela Briggs, Northumbria University
Dirk Balfanz, Google
Lorrie Faith Cranor, CMU
Sunny Consolvo, Google
Alexander De Luca, LMU
Serge Egelman, UC Berkeley
Sascha Fahl, LUH
Neil Gandal, Tel Aviv University
Peter Gutmann, University of Auckland
Seda G├╝rses, K.U. Leuven
Tiffany Hyun-Jin Kim, CMU
Maritza Johnson, Facebook
Yoshi Kohno, University of Washington
Sameer Patil, Helsinki Institute for Information Technology
Andrew Patrick, Carleton University
Rob Reeder, Google
Hovav Shacham, UC San Diego
Sara Sinclair, Google
Douglas Stebila, Queensland University of Technology
Kami Vaniea, Michigan State University
Eugene Y. Vasserman, Kansas State University
Rick Wash, Michigan State University

http://www.usecap.org/usec14.html

Related Resources

SP 2020   IEEE Symposium on Security and Privacy
NDSS 2019   Network and Distributed System Security Symposium
NDSS 2020   Network and Distributed System Security Symposium
SPTM 2020   8th International Conference of Security, Privacy and Trust Management
IEEE COINS 2020   Internet of Things IoT | Artificial Intelligence | Machine Learning | Big Data | Blockchain | Edge & Cloud Computing | Security | Embedded Systems | Circuit and Systems | WSN | 5G
ASIACCS 2020   ACM ASIACCS 2020 : The 15th ACM ASIA Conference on Computer and Communications Security
IEEE Euro S&P 2020   5th IEEE European Symposium on Security and Privacy
Cyber Security 2020   IEEE International Conference on Cyber Security and Protection of Digital Services
ICCSEA 2019   9th International Conference on Computer Science, Engineering and Applications
SOUPS 2019   Fifteenth Symposium on Usable Privacy and Security