posted by system || 7895 views || tracked by 22 users: [display]

SOUPS 2013 : Symposium On Usable Privacy and Security (SOUPS)

FacebookTwitterLinkedInGoogle


Conference Series : Symposium On Usable Privacy and Security
 
Link: http://cups.cs.cmu.edu/soups/2013/
 
When Jul 24, 2013 - Jul 26, 2013
Where Newcastle, UK
Submission Deadline Mar 8, 2013
Notification Due May 27, 2013
Final Version Due Jun 24, 2013
Categories    security   privacy   usability
 

Call For Papers

Symposium On Usable Privacy and Security 2013
http://cups.cs.cmu.edu/soups/

CALL FOR PAPERS
http://cups.cs.cmu.edu/soups/2013/cfp.html

The 2013 Symposium on Usable Privacy and Security (SOUPS) will bring
together an interdisciplinary group of researchers and practitioners
in human computer interaction, security, and privacy. The program will
feature technical papers, a poster session, panels and invited talks,
lightning talks and demos, and workshops and tutorials. This year
SOUPS will be held at Northumbria University in Newcastle, UK.

TECHNICAL PAPERS
(see the SOUPS website for details on other types of submissions)

We invite authors to submit original papers describing research or
experience in all areas of usable privacy and security. Topics
include, but are not limited to:

- innovative security or privacy functionality and design,
- new applications of existing models or technology,
- field studies of security or privacy technology,
- usability evaluations of new or existing security or privacy features,
- security testing of new or existing usability features,
- longitudinal studies of deployed security or privacy features,
- the impact of organizational policy or procurement decisions, and
- lessons learned from the deployment and use of usable privacy and
security features,
- reports of replicating previously published studies and experiments,
- reports of failed usable security studies or experiments, with the
focus on the lessons learned from such experience.

All submissions must relate to both usability and either security or
privacy. Papers on security or privacy applications that do not
address usability or human factors will not be considered.

Papers need to describe the purpose and goals of the work, cite
related work, show how the work effectively integrates usability and
security or privacy, and clearly indicate the innovative aspects of
the work or lessons learned as well as the contribution of the work to
the field.

Papers must use the SOUPS formatting template (available for MS Word
or LaTeX) and be up to 12 pages in length, excluding the bibliography
and any supplemental appendices. Authors have the option to attach to
their paper supplemental appendices containing study materials
(e.g. surveys) that would not otherwise fit within the body of the
paper. These appendices may be included to assist reviewers who may
have questions that fall outside the stated contribution of your
paper, on which your work is to be evaluated. Reviewers are not
required to read any appendices so your paper should be self contained
without them. Accepted papers will be published online with their
supplemental appendices included. Submissions must be no more than 20
pages including bibliography and appendices. For the body of your
paper, brevity is appreciated, as evidenced by the fact that many
papers in prior years have been well under this limit. All submissions
must be in PDF format and should not be blinded.

Submit your paper electronically at http://cups.cs.cmu.edu/crp/soups2013/.

Technical paper submissions will close at 5 pm, US Pacific time,
Friday, March 8. This is a hard deadline! Authors will be notified of
technical paper acceptance by May 27, and camera-ready final versions
of technical papers are due June 24.

Accepted papers will appear in the ACM Digital Library as part of the
ACM International Conference Proceedings Series. They will also be
freely available on the SOUPS website. Submitted papers must not
significantly overlap papers that have been published or that are
simultaneously submitted to a peer-reviewed venue or publication. Any
overlap between your submitted paper and other work either under
submission or previously published must be documented in a
clearly-marked explanatory note at the front of the paper. State
precisely how the two works differ in their goals, any use of shared
experiments or data sources, and the unique contributions. If the
other work is under submission elsewhere, the program committee may
ask to review that work to evaluate the overlap. Please note that
program committees frequently share information about papers under
review and reviewers usually work on multiple conferences
simultaneously. As technical reports are not peer reviewed they are
exempt from this rule. You may also release pre-prints of your
accepted work to the public at your discretion.

User experiments should follow the basic principles of ethical
research, e.g., beneficence (maximizing the benefits to an individual
or to society while minimizing harm to the individual), minimal risk
(appropriateness of the risk versus benefit ratio), voluntary consent,
respect for privacy, and limited deception. Authors are encouraged to
include in their submissions explanation of how ethical principles
were followed, and may be asked to provide such an explanation should
questions arise during the review process.

Technical Papers Committee

Lujo Bauer, Carnegie Mellon University, USA (Co-chair)
Konstantin Beznosov, University of British Columbia, Canada (Co-chair)
Alessandro Acquisti, Carnegie Mellon University, USA
Dirk Balfanz, Google, USA
Robert Biddle, Carleton University, Canada
Sunny Consolvo, Google, USA
Rachna Dhamija, Usable Security Systems, USA
Serge Egelman, University of California, Berkeley, USA
David Evans, University of Virginia, USA
Cormac Herley, Microsoft Research, USA
Heinrich Hussmann, Technische Universität München, Germany
Apu Kapadia, Indiana University, USA
Heather Lipford, University of North Carolina at Charlotte, USA
Sebastian Müller, Technische Universität Berlin and Telekom Innovation Laboratories, Germany
Paul Van Oorschot, Carleton University, Canada
Sameer Patil, Helsinki Institute for Information Technology, Finland, and Indiana University, USA
Emilee Rader, Michigan State University, USA
Robert W. Reeder, Microsoft, USA
Michael K. Reiter, University of North Carolina at Chapel Hill, USA
Stuart Schechter, Microsoft Research, USA
David Wagner, University of California, Berkeley, USA
Rick Wash, Michigan State University, USA


SOUPS 2013 IMPORTANT DATES
Early registration deadline - June 12
Conference - July 24-26

Technical papers
Submission deadline - March 8, 5 pm US Pacific time (hard deadline!)
Notification of paper acceptance - May 27
Camera ready papers due - June 24

Posters and demos
Submission deadline - May 30, 5 pm US Pacific time
Notification of acceptance - June 10

Tutorials and workshops
In-depth session proposal submission deadline - January 18
Notification of in-depth session proposal acceptance - February 1
Workshop paper submission deadline - May 30
Notification of workshop paper acceptance - June 10
Camera ready papers due - June 24

Panels and invited talks
Panel proposal submission deadline - January 18
Speaker suggestion submission deadline - January 18

Lightning talks
Early submission deadline - June 14
Early submission notification - June 21
Submissions received after June 14 will be considered until the program is full

Related Resources

TrustCom 2018   The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
SOUPS 2017   Symposium on Usable Privacy and Security
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
Future_Internet-SI 2017   Futute Internet - Special Issue on Security and Privacy in Wireless and Mobile Networks
Cyber Security 2018   IEEE International Conference on Cyber Security and Protection of Digital Services
MathSJ 2017   Applied Mathematics and Sciences: An International Journal
DISP 2018   Special Issue on Data Intelligence in Security and Privacy, Journal of Information Security and Applications
IH&MMSec 2018   ACM Workshop on Information Hiding and Multimedia Security
ICSS 2017   3rd International Conference on Software Security
WEIS 2018   Workshop on the Economics of Information Security