AsiaUSEC20: 1st Asia USEC - Workshop on Usable Security Shangri-La Tanjung Aru Resort & Spa Kota Kinabalu, Sabah, Malaysia, February 13-15, 2020 |
Conference website | https://easychair.org/cfp/AsiaUSEC20 |
Submission link | https://easychair.org/conferences/?conf=asiausec20 |
Early submission date | November 30, 2019 |
Notification for early submissions (11/30) | December 18, 2019 |
Submission deadline | December 19, 2019 |
Submissions close | December 19, 2019 |
Notification for submissions (> 11/30) not later than | January 10, 2020 |
Ensuring effective security and privacy in real-world technology requires considering not only technical but also human aspects, as well as the complex way in which these combine. technical as well as human aspects. Enabling people to manage privacy and security necessitates giving due consideration to the users and the larger operating context within which technology is embedded.
It is the aim of USEC to contribute to an increase of the scientific quality of research in human factors in security and privacy. To this end, we encourage replication studies to validate previous research findings. Papers in these categories should be clearly marked as such and will not be judged against regular submissions on novelty. Rather, they will be judged based on scientific quality and value to the community. We also encourage reports of faded experiments, since their publication will serve to highlight the lessons learned and prevent others falling into the same traps.
We invite submissions on all aspects of human factors including adoption and usability in the context of security and privacy. All USEC events aim to bring together researchers already engaged in this interdisciplinary effort with other computer science researchers in areas such as visualization, artificial intelligence, machine learning, and theoretical computer science as well as researchers from other domains such as economics and psychology. We particularly encourage collaborative research from authors in multiple disciplines.
Submission Guidelines
All submissions must be original work; authors must dearly document any overlap with previously published or simultaneously submitted papers from any of the authors. We are looking for submissions of 5 to 10 pages, excluding references and supplementary materials using the LNCS format.
We encourage authors to submit papers of appropriate length for the research contribution. If your research contributions only requires 5-7 pages, please only submit 5-7 pages (plus references). Shorter papers with be reviewed like any other paper and not penalized. Papers shorter than 5 pages or longer than 10 pages {excluding references) will not be considered. Submitting supplementary material that adds depth to the contribution and/or contributes to the submission's replicability is strongly encouraged. Reviewing will be double blind.
Concurrent CHI submissions are invited. It is requested but not requires that you register the paper’s abstract by the paper deadline (30 Nov) .
Since the CHI notification is late in the AsiaUSEC reviewing timeline, we have implemented a second round of reviews. These papers will be added to the reviews and online discussion for AsisUSEC with a later notification. Any work accepted at CHI or a CHI workshop will not be included in USEC.
Templats and sample files are available at https://www.springer.com/gp/computer-science/lncs/conference-proceedings-guidelines
List of Topics
- Usable security/privacy evaluation of existing and/or proposed solutions.
- Methods and measures to improve the practice of usability analyses
- Psychology of security empirical or theoretical continuations
- Human factors related to the deployment of the Internet of Things (IoT)
- Mental models that contribute to, complicate, or inform security and privacy design and deployment.
- Lessons learned from designing, deploying, managing, or evaluating security and privacy technologies.
- Design foundations of usable security and privacy including usable security and privacy patterns.
- Ethical, psychological, sociological and economic aspects of security and privacy technologies.
- Usable security and privacy research that targets information professionals (e.g. administrators or developers).
- Reports on replications of previously published studies and experiments.
- Reports on failed usable security studies or experiments, with the focus on the lessons learned from such experiments.
- Anthropological approaches to security and prrvacy
- Experiments including diverse populations or populations not traditionally included m usable security and privacy
- Psychology of deceit or fraud empirical or theoretical continuations
- Studies of acceptability, avoidance, or perspectives of surveillance
- Modeling of security behaviors including patching
Committees
Program Chairs
L Jean Camp, Indiana University, US
Alana Maurushat, Western Sydney University, AU
Program Committee
- Abdulmajeed Alqhatani, UNC Charlotte, US
- Ada Lerner, Wellesley College, US
- Alisa Frik, ICSI, University of California at Berkeley, US
- Andrew Adams, Meiji University, JP
- Hamza Sellak, ENSAM, Moulay Ismaïl University, MA
- Heather Crawford, Florida Institute of Technology, US
- Julian Jang-Jaccard, Massey University, NZ
- Julian Williams, Durham University, UK
- Julie Haney, National Institute of Standards and Technology, US
- Karen Renaud, Rhodes University, SA & University of Glasgow, UK
- Mahdi Nasrullah, Al-Ameen, Utah State University, US
- Maija Poikela, Fraunhofer AISEC, DE
- Marthie Grobler, CSIRO, AU
- Matt Bishop, University of California of Davis, US
- Mohan Baruwal Chhetri, CSIRO, AU
- Nicholas Weaver, ISCI
- Pamela Briggs, Northumbria University, UK
- Patrick Traynor, University of Florida, US
- Paul Watters, La Trobe University AU
- Peter Gutmann, University of Auckland, AU
- Sanchari Das, American Express, US
- Shigeng Zhang, Central South University, CN
- Shrirang, Mare, University of Washington, US
- Sid Stamm, Rose-Hulman Institute of Technology, US
- Sven Dietrich, City University of New York, US
- Ruth Shillair, Michigan State University, US
- Tim Kelley, Naval Surface Warfare Center Crane Division, US
- Vaibhav Garg, Comcast Cable, US
- Wendy Seltzer, MIT, US
- Zinaida Benenson, University of Erlangen-Nuremberg, DE
Publication
AsiaUSEC20 proceedings will be published either as part of the Financial Cryptography (http://fc20.ifca.ai/) proceedings under the IFCA copyright license or the author may choose not to have this as an archival publication. FC proceedings are published as part of the Springer Lecture Notes in Computer Science series. Authors will have an opportunity to provide polished print ready versions for the proceedings. Again, templats and sample files are available at https://www.springer.com/gp/computer-science/lncs/conference-proceedings-guidelines.
Venue
The conference will be held in conjunctions with Financial Cryptography, http://fc20.ifca.ai/.
February 10–14, 2020
Shangri-La Tanjung Aru Resort & Spa
Kota Kinabalu, Sabah, Malaysia
Contact
All questions about submissions should be emailed to chairs@ljean.com