Hello: Thanks for sharing, sounds interesting =)
Regards, On Wed, Oct 15, 2014 at 4:12 PM, L Jean Camp <lje...@gmail.com> wrote: > This call is well-aligned with some of the recent discussions: > > Allow me also to point yu to the USEC call for papers for 2015: > http://www.internetsociety.org/events/ndss-symposium-2015/usec-workshop-call-papers > > USEC Workshop - Call for Papers > > NDSS Workshop on Usable Security 2015 > > Co-located with Network and Distributed System Security (NDSS) Symposium > 2015 > > Workshop date: February 8, 2015 > > > Important Dates > Submission deadline: November 24, 11:59pm PST, 2014 > Notification: December 18, 2014 > Camera ready: January 15, 2015 > Workshop: February 8, 2015 > > > Program Committee Chair > Jens Grossklags, The Pennsylvania State University > > > Overview > > Many aspects of information security combine technical and human factors. If > a highly secure system is unusable, users will try to circumvent the system > or move entirely to less secure but more usable systems. Problems with > usability are a major contributor to many high-profile security failures > today. > > However, usable security is not well-aligned with traditional usability for > three reasons. First, security is rarely the desired goal of the individual. > In fact, security is usually orthogonal and often in opposition to the > actual goal. Second, security information is about risk and threats. Such > communication is most often unwelcome. Increasing unwelcome interaction is > not a goal of usable design. Third, since individuals must trust their > machines to implement their desired tasks, risk communication itself may > undermine the value of the networked interaction. For the individual, > discrete technical problems are all understood under the rubric of online > security (e.g., privacy from third parties use of personally identifiable > information, malware). A broader conception of both security and usability > is therefore needed for usable security. > > The Workshop on Usable Security invites submissions on all aspects of human > factors and usability in the context of security and privacy. USEC 2015 aims > to bring together researchers already engaged in this interdisciplinary > effort with other computer science researchers in areas such as > visualization, artificial intelligence and theoretical computer science as > well as researchers from other domains such as economics or psychology. > > We particularly encourage collaborative research from authors in multiple > fields. Topics include, but are not limited to: > > Evaluation of usability issues of existing security and privacy models or > technology > Design and evaluation of new security and privacy models or technology > Impact of organizational policy or procurement decisions > Lessons learned from designing, deploying, managing or evaluating security > and privacy technologies > Foundations of usable security and privacy > Methodology for usable security and privacy research > Ethical, psychological, sociological and economic aspects of security and > privacy technologies > > We further encourage submissions that contribute to the research community’s > knowledge base: > > Reports of replicating previously published studies and experiments > Reports of failed usable security studies or experiments, with the focus on > the lessons learned from such experience. > > It is the aim of USEC to contribute to an increase of the scientific quality > of usable security and privacy research. To this end, we encourage the use > of replication studies to validate research findings. This important and > often very insightful branch of research is sorely underrepresented in > usable security and privacy research to date. Papers in these categories > should be clearly marked as such and will not be judged against regular > submissions on novelty. Rather, they will be judged based on scientific > quality and value to the community. > > > > Prof. L. Jean Camp > http://www.ljean.com > Human-Centered Security > http://usablesecurity.net/ > Economics of Security > http://www.infosecon.net/ > Congressional Fellow > http://www.ieeeusa.org/policy/govfel/congfel.asp > > -- > Liberationtech is public & archives are searchable on Google. Violations of > list guidelines will get you moderated: > https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, > change to digest, or change password by emailing moderator at > compa...@stanford.edu. -- Eduardo Robles Elvira @edulix skype: edulix2 http://agoravoting.org @agoravoting +34 634 571 634 -- Liberationtech is public & archives are searchable on Google. Violations of list guidelines will get you moderated: https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, change to digest, or change password by emailing moderator at compa...@stanford.edu.