posted by user: pepe || 7379 views || tracked by 31 users: [display]

SOUPS 2010 : Symposium On Usable Privacy and Security 2010

FacebookTwitterLinkedInGoogle


Conference Series : Symposium On Usable Privacy and Security
 
Link: http://cups.cs.cmu.edu/soups/2010/
 
When Jul 14, 2010 - Jul 16, 2010
Where Redmond, WA USA
Submission Deadline Mar 5, 2010
Notification Due Apr 30, 2010
Final Version Due Jul 12, 2010
Categories    privacy   security   usability
 

Call For Papers

CALL FOR PAPERS -- SOUPS 2010
Symposium On Usable Privacy and Security
July 14-16, 2010
Microsoft, Redmond, WA USA
http://cups.cs.cmu.edu/SOUPS/

The 2010 Symposium on Usable Privacy and Security (SOUPS) will bring
together an interdisciplinary group of researchers and practitioners in
human computer interaction, security, and privacy. The program will
feature technical papers, a poster session, panels and invited talks,
discussion sessions, and in-depth sessions (workshops and tutorials).
Detailed information about technical paper submissions appears below.
For information about other submissions please see the SOUPS web site
http://cups.cs.cmu.edu/soups/2010/cfp.html.

TECHNICAL PAPERS

We invite authors to submit original papers describing research or
experience in all areas of usable privacy and security. Topics include,
but are not limited to:

* innovative security or privacy functionality and design,
* new applications of existing models or technology,
* field studies of security or privacy technology,
* usability evaluations of new or existing security or privacy features,
* security testing of new or existing usability features,
* longitudinal studies of deployed security or privacy features,
* the impact of organizational policy or procurement decisions, and
* lessons learned from the deployment and use of usable privacy and
security features.

All submissions must relate to both usability and either security or
privacy. Papers on security or privacy applications that do not address
usability or human factors will not be considered.

Papers need to describe the purpose and goals of the work completed
to date, cite related work, show how the work effectively integrates
usability and security or privacy, and clearly indicate the innovative
aspects of the work or lessons learned as well as the contribution of
the work to the field.

Submitted papers must not significantly overlap papers that have been
published or that are simultaneously submitted to a peer-reviewed
venue or publication. With the exception of publicly available prior work
that is documented in your related work section, any overlap between
your submitted paper and other work either under submission or
previously published must be documented in a clearly-marked
explanatory note at the front of the paper. State precisely how the two
works differ in their goals, any use of shared experiments or data
sources, and the unique contributions. If the other work is under
submission elsewhere, the program committee may ask to review that
work to evaluate the overlap. Please note that program committees
frequently share information about papers under review and reviewers
usually work on multiple conferences simultaneously. As technical
reports are not peer reviewed they are exempt from this rule. You may
also release pre-prints of your accepted work to the public at the time
of your discretion.

Accepted papers will appear in the ACM Digital Library as part of the
ACM International Conference Proceedings Series. The technical papers
committee will select an accepted paper to receive the SOUPS 2010
best paper award.

New this year, authors have the option to attach to their paper
supplemental appendices containing study materials (e.g. surveys) that
would not otherwise fit within the body of the paper. These appendices
may be included to assist reviewers who may have questions that fall
outside the stated contribution of your paper, on which your work is to
be evaluated. The body of your paper must still be self contained and
provide sufficient detail to elucidate your study methodology and results,
as reviewers are neither required nor expected to read supplemental
appendices. Accepted papers will be published online with their
supplemental appendices included.

Papers must use the SOUPS formatting template (available for MS Word
or LaTeX) and be up to 12 pages in length, exclusive of the bibliography
and any supplemental appendices described above. Submissions must
be no more than 20 pages including bibliography and appendices. If
your supplemental materials exceed this page limit, you may upload a
separate external appendix file with these materials. The external
appendix file need not conform to the SOUPS formatting template. In
that case, make sure you mention the external appendix in the body of
your paper and describe its contents. For the body of your paper, brevity
is appreciated, as evidenced by the fact that many papers in prior years
have been well under this limit. All submissions must be in PDF format
and should not be blinded. In addition, you must cut and paste an
abstract of no more than 300 words onto the submission form.

Submit your paper using the electronic submissions page for the SOUPS
2010 conference (http://cups.cs.cmu.edu/soups/2010/submit.html).
A successful submission will display a web page confirming it, and a
confirmation email is sent to the corresponding author. Please make
sure you receive that confirmation email when you submit, and follow
the directions in that email if you require any follow up.

Technical paper submissions will close at 5 PM, US Pacific time, the
evening of Friday, March 5. This is a hard deadline! Authors will
be notified of technical paper acceptance by April 30, and camera
ready final versions of technical papers are due June 12.

Authors are encouraged to review: Common Pitfalls in Writing about
Security and Privacy Human Subjects Experiments, and How to Avoid
Them.
https://cups.cs.cmu.edu/soups/2010/howtosoups.pdf


General Chair:
Lorrie Cranor, Carnegie Mellon University

Discussion Session Chair:
Heather Lipford, University of North Carolina at Charlotte

Invited Talks and Panels Chair:
Cynthia Kuo, Nokia Research Center Palo Alto / Carnegie Mellon Silicon Valley

Local Activities Chair:
Brian LaMacchia, Microsoft Research

Posters Co-Chairs:
Dirk Balfanz, Google
Konstantin Beznosov, University of British Columbia

Technical Papers Co-Chairs:
Andrew Patrick, Carleton University
Stuart Schechter, Microsoft Research

Tutorials and Workshops Chair:
Kirstie Hawkey, University of British Columbia

Technical Papers Committee
Alessandro Acquisti, CMU Heinz College
Ross Anderson, Cambridge
Steven Bellovin, Columbia University
Robert Biddle, Carleton University
Jose Brustoloni
Bill Cheswick, AT&T Research
Rachna Dhamija, Usable Security Systems
Roger Dingledine, The Tor Project
Serge Egelman, Brown University
Carl Ellison, Microsoft
Simson L. Garfinkel, Naval Postgraduate School
Harry Hochheiser, University of Pittsburgh
Markus Jakobsson, PARC
Clare-Marie Karat, Karat Consulting Group
Ponnurangam Kumaraguru (PK), IIIT Delhi, India
Linda Little, Northumbria University, UK
Andy Ozment, US Office of the Secretary of Defense
Rob Reeder, Microsoft
Karen Renaud, University of Glasgow
Angela Sasse, University College London
Diana Smetters, PARC
Paul Van Oorschot, Carleton University
Hao-Chi Wong, Intel
Mary Ellen Zurko, IBM

Related Resources

FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
IJIS-IoTSec 2018   Springer IJIS Special Issue on IoT Security and Privacy
IJOE 2018   International Journal on Organic Electronics
Symmetry-SI 2018   Symmetry and Asymmetry Applications for Internet of Things Security and Privacy
NECO 2018   7thInternational Conference of Networks and Communications
NDSS 2019   Network and Distributed System Security Symposium
CODASPY 2019   ACM Conference on Data and Application Security and Privacy
WCMC-IoT 2018   WCMC journal, Special issue on Security, Privacy, and Trust on Internet of Things
ICISSP 2019   5th International Conference on Information Systems Security and Privacy
SPIoT 2018   The 7th International Symposium on Security and Privacy on Internet of Things