posted by user: srahman || 800 views || tracked by 2 users: [display]

USEC 2018 : Workshop on Usable Security


When Feb 18, 2018 - Feb 18, 2018
Where Catamaran Resort Hotel, San Diego, USA
Abstract Registration Due Dec 15, 2017
Submission Deadline Dec 19, 2017
Notification Due Jan 19, 2018
Final Version Due Feb 5, 2018
Categories    usable security & privacy   human-centered security

Call For Papers

Ensuring effective security and privacy in real-world technology requires considering technical as well as human aspects. Enabling people to manage privacy and security necessitates giving due consideration to the users and the larger operating context within which technology is embedded. Ensuring effective security and privacy in real-world technology requires considering technical as well as human aspects. Enabling people to manage privacy and security necessitates giving due consideration to the users and the larger operating context within which technology is embedded.

We invite submissions on all aspects of human factors including adoption and usability in the context of security and privacy. USEC 2018 aims to bring together researchers already engaged in this interdisciplinary effort with other computer science researchers in areas such as visualization, artificial intelligence, machine learning, and theoretical computer science as well as researchers from other domains such as economics and psychology. We particularly encourage collaborative research from authors in multiple disciplines.

Topics include, but are not limited to:

* Usable security/privacy evaluation of existing and/or proposed solutions.
* Mental models that contribute to, or complicate, security and privacy.
* Lessons learned from designing, deploying, managing, or evaluating security and privacy technologies.
* Foundations of usable security and privacy incl. usable security and privacy patterns.
* Ethical, psychological, sociological and economic aspects of security and privacy technologies.
* Usable security and privacy research that targets information professionals (e.g. administrators or developers).
* Reports on replications of previously published studies and experiments.
* Reports on failed usable security studies or experiments, with the focus on the lessons learned from
such experience.
* Human factors related to the deployment of the Internet of Things (IoT).

It is the aim of USEC to contribute to an increase of the scientific quality of research in human factors in security and privacy. To this end, we encourage replication studies to validate previous research findings. Papers in these categories should be clearly marked as such and will not be judged against regular submissions on novelty. Rather, they will be judged based on scientific quality and value to the community. We also encourage reports of failed experiments, since their publication will serve to highlight the lessons learned and prevent others falling into the same traps.

Submission Instructions
All submissions must be original work; authors must clearly document any overlap with previously published or simultaneously submitted papers from any of the authors. We are looking for submissions of up to 10 pages, excluding references and supplementary materials using the NDSS format found at

Submitting supplementary material that adds depth to the contribution and/or contributes to the submission’s replicability is strongly encouraged. Supplemental material must be linked to in the paper in an anonymous way as we cannot support direct upload to the submission system.

Reviewing will be double-blind.

USEC 2018 is open to submissions here:


Accepted papers will be included in official proceedings published by the Internet Society after the workshop. For the workshop, a pre-print will be made available on the workshop webpage.

Important Dates (tentative)
Abstract submission: 15 December 2017
Paper submission: 19 December 2017
Acceptance Notification: 19 January 2018
Early registration: 26 January 2018
Camera-ready: 5 February 2018
Workshop: 18 February 2018 (co-located with NDSS 2018)

USEC 2018 Program Co-Chairs
Yasemin Acar, Leibniz University, Hannover
Sameer Patil, Indiana University Bloomington

USEC Steering Committee
Andrew A. Adams, Meiji University
Jim Blythe, University of Southern California
Jean Camp, Indiana University
Angela Sasse, University College London
Matthew Smith, Bonn University

USEC 2018 Program Committee
Andrew Adams, Meiji University
Adam Aviv, United States Naval Academy
Adam Bates, Cato Institute
Lujo Bauer, Carnegie Mellon University
Zinaida Benenson, University of Erlangen-Nuremberg
Matt Bishop, University of California, Davis
Pamela Briggs, Northumbria University
Marshini Chetty, Princeton University
Sascha Fahl, Leibniz University Hannover
Simson Garfinkel, US Census Bureau
Vaibhav Garg, Comcast
Jens Grossklags, Technical University of Munich
Julie Haney, University of Maryland, Baltimore County
Janne Lindqvist, Rutgers University
Heather Lipford, University of North Carolina, Charlotte
Bradley Reaves, North Carolina State University
Scott Ruoti, MIT Lincoln Laboratory
Florian Schaub, University of Michigan
Mary Theofanos, NIST
Rick Wash, Michigan State University
Charles Weir, Lancaster University
Tara Whalen, Google
Pamela Wisniewski, University of Central Florida
Melanie Volkamer, Karlstad University
Luigi Lo Iacono, Technische Hochschule Köln
Apu Kapadia, Indian University Bloomington
Heather Crawford, Florida Institute of Technology

Related Resources

FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
ETRIJ Cyber Security & AI 2019   ETRI Journal Special issue on Cyber Security and AI
EuroUSEC 2018   The 3rd European Workshop on Usable Security
CSITS 2018   International Workshop on Cyber Security for Intelligent Transportation Systems
ACNS 2019   International Conference on Applied Cryptography and Network Security
Symmetry-SI 2018   Symmetry and Asymmetry Applications for Internet of Things Security and Privacy
ACISP 2019   The 24th Australasian Conference on Information Security and Privacy
DSN 2019   Dependable Systems and Networks
SICBS 2018   2nd International Conference on Security with Intelligent Computing and Big-data Services
CRC-Botnets 2018   Botnets: Architectures, Countermeasures, and Challenges