Hello:

Thanks for sharing, sounds interesting =)

Regards,

On Wed, Oct 15, 2014 at 4:12 PM, L Jean Camp <lje...@gmail.com> wrote:
> This call is well-aligned with some of the recent discussions:
>
> Allow me also to point yu to the USEC call for papers for 2015:
> http://www.internetsociety.org/events/ndss-symposium-2015/usec-workshop-call-papers
>
> USEC Workshop - Call for Papers
>
> NDSS Workshop on Usable Security 2015
>
> Co-located with Network and Distributed System Security (NDSS) Symposium
> 2015
>
> Workshop date: February 8, 2015
>
>
> Important Dates
> Submission deadline: November 24, 11:59pm PST, 2014
> Notification: December 18, 2014
> Camera ready: January 15, 2015
> Workshop: February 8, 2015
>
>
> Program Committee Chair
> Jens Grossklags, The Pennsylvania State University
>
>
> Overview
>
> Many aspects of information security combine technical and human factors. If
> a highly secure system is unusable, users will try to circumvent the system
> or move entirely to less secure but more usable systems. Problems with
> usability are a major contributor to many high-profile security failures
> today.
>
> However, usable security is not well-aligned with traditional usability for
> three reasons. First, security is rarely the desired goal of the individual.
> In fact, security is usually orthogonal and often in opposition to the
> actual goal. Second, security information is about risk and threats. Such
> communication is most often unwelcome. Increasing unwelcome interaction is
> not a goal of usable design. Third, since individuals must trust their
> machines to implement their desired tasks, risk communication itself may
> undermine the value of the networked interaction. For the individual,
> discrete technical problems are all understood under the rubric of online
> security (e.g., privacy from third parties use of personally identifiable
> information, malware). A broader conception of both security and usability
> is therefore needed for usable security.
>
> The Workshop on Usable Security invites submissions on all aspects of human
> factors and usability in the context of security and privacy. USEC 2015 aims
> to bring together researchers already engaged in this interdisciplinary
> effort with other computer science researchers in areas such as
> visualization, artificial intelligence and theoretical computer science as
> well as researchers from other domains such as economics or psychology.
>
> We particularly encourage collaborative research from authors in multiple
> fields. Topics include, but are not limited to:
>
> Evaluation of usability issues of existing security and privacy models or
> technology
> Design and evaluation of new security and privacy models or technology
> Impact of organizational policy or procurement decisions
> Lessons learned from designing, deploying, managing or evaluating security
> and privacy technologies
> Foundations of usable security and privacy
> Methodology for usable security and privacy research
> Ethical, psychological, sociological and economic aspects of security and
> privacy technologies
>
> We further encourage submissions that contribute to the research community’s
> knowledge base:
>
> Reports of replicating previously published studies and experiments
> Reports of failed usable security studies or experiments, with the focus on
> the lessons learned from such experience.
>
> It is the aim of USEC to contribute to an increase of the scientific quality
> of usable security and privacy research. To this end, we encourage the use
> of replication studies to validate research findings. This important and
> often very insightful branch of research is sorely underrepresented in
> usable security and privacy research to date. Papers in these categories
> should be clearly marked as such and will not be judged against regular
> submissions on novelty. Rather, they will be judged based on scientific
> quality and value to the community.
>
>
>
> Prof. L. Jean Camp
> http://www.ljean.com
> Human-Centered Security
> http://usablesecurity.net/
> Economics of Security
> http://www.infosecon.net/
> Congressional Fellow
> http://www.ieeeusa.org/policy/govfel/congfel.asp
>
> --
> Liberationtech is public & archives are searchable on Google. Violations of
> list guidelines will get you moderated:
> https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe,
> change to digest, or change password by emailing moderator at
> compa...@stanford.edu.



-- 
Eduardo Robles Elvira     @edulix             skype: edulix2
http://agoravoting.org       @agoravoting     +34 634 571 634
-- 
Liberationtech is public & archives are searchable on Google. Violations of 
list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.

Reply via email to