USEC 2015 - Workshop on Usable Security 2015
Topics/Call fo Papers
Many aspects of information security combine technical and human factors. If a highly secure system is unusable, users will try to circumvent the system or move entirely to less secure but more usable systems. Problems with usability are a major contributor to many high-profile security failures today.
However, usable security is not well-aligned with traditional usability for three reasons. First, security is rarely the desired goal of the individual. In fact, security is usually orthogonal and often in opposition to the actual goal. Second, security information is about risk and threats. Such communication is most often unwelcome. Increasing unwelcome interaction is not a goal of usable design. Third, since individuals must trust their machines to implement their desired tasks, risk communication itself may undermine the value of the networked interaction. For the individual, discrete technical problems are all understood under the rubric of online security (e.g., privacy from third parties use of personally identifiable information, malware). A broader conception of both security and usability is therefore needed for usable security.
The Workshop on Usable Security invites submissions on all aspects of human factors and usability in the context of security and privacy. USEC 2015 aims to bring together researchers already engaged in this interdisciplinary effort with other computer science researchers in areas such as visualization, artificial intelligence and theoretical computer science as well as researchers from other domains such as economics or psychology.
We particularly encourage collaborative research from authors in multiple fields. Topics include, but are not limited to:
Evaluation of usability issues of existing security and privacy models or technology
Design and evaluation of new security and privacy models or technology
Impact of organizational policy or procurement decisions
Lessons learned from designing, deploying, managing or evaluating security and privacy technologies
Foundations of usable security and privacy
Methodology for usable security and privacy research
Ethical, psychological, sociological and economic aspects of security and privacy technologies
We further encourage submissions that contribute to the research community’s knowledge base:
Reports of replicating previously published studies and experiments
Reports of failed usable security studies or experiments, with the focus on the lessons learned from such experience.
It is the aim of USEC to contribute to an increase of the scientific quality of usable security and privacy research. To this end, we encourage the use of replication studies to validate research findings. This important and often very insightful branch of research is sorely underrepresented in usable security and privacy research to date. Papers in these categories should be clearly marked as such and will not be judged against regular submissions on novelty. Rather, they will be judged based on scientific quality and value to the community.
However, usable security is not well-aligned with traditional usability for three reasons. First, security is rarely the desired goal of the individual. In fact, security is usually orthogonal and often in opposition to the actual goal. Second, security information is about risk and threats. Such communication is most often unwelcome. Increasing unwelcome interaction is not a goal of usable design. Third, since individuals must trust their machines to implement their desired tasks, risk communication itself may undermine the value of the networked interaction. For the individual, discrete technical problems are all understood under the rubric of online security (e.g., privacy from third parties use of personally identifiable information, malware). A broader conception of both security and usability is therefore needed for usable security.
The Workshop on Usable Security invites submissions on all aspects of human factors and usability in the context of security and privacy. USEC 2015 aims to bring together researchers already engaged in this interdisciplinary effort with other computer science researchers in areas such as visualization, artificial intelligence and theoretical computer science as well as researchers from other domains such as economics or psychology.
We particularly encourage collaborative research from authors in multiple fields. Topics include, but are not limited to:
Evaluation of usability issues of existing security and privacy models or technology
Design and evaluation of new security and privacy models or technology
Impact of organizational policy or procurement decisions
Lessons learned from designing, deploying, managing or evaluating security and privacy technologies
Foundations of usable security and privacy
Methodology for usable security and privacy research
Ethical, psychological, sociological and economic aspects of security and privacy technologies
We further encourage submissions that contribute to the research community’s knowledge base:
Reports of replicating previously published studies and experiments
Reports of failed usable security studies or experiments, with the focus on the lessons learned from such experience.
It is the aim of USEC to contribute to an increase of the scientific quality of usable security and privacy research. To this end, we encourage the use of replication studies to validate research findings. This important and often very insightful branch of research is sorely underrepresented in usable security and privacy research to date. Papers in these categories should be clearly marked as such and will not be judged against regular submissions on novelty. Rather, they will be judged based on scientific quality and value to the community.
Other CFPs
- IEEE Int. Symposium on Hardware-Oriented Security and Trust
- 11th Software Engineering Institute (SEI) Architecture Technology User Network (SATURN)
- 2015 : Web Information Systems Engineering
- 7th International Symposium on Cyberspace Safety and Security (CSS 2015)
- International Journal of Computing and Network Technology (IJCNT)
Last modified: 2014-10-12 16:38:25