STAST 2022
 
12th International Workshop on Socio-Technical Aspects in SecuriTy
https://stast.uni.lu        
 
Affiliated with the 27th European Symposium on Research in Computer Security 
(ESORICS) 2022
https://esorics2022.compute.dtu.dk/

*** IMPORTANT DATES
- Paper Submission: 04 July 2022 (AoE)
- Notification: 08 August 2022 (AoE)
- Camera Ready for pre-proceedings: 29 August 2022 (AoE)
- Camera Ready for post-proceedings: 07 October 2022 (AoE)
- Workshop Date: 26 September 2022

*** CONCEPT
Successful attacks on information systems often exploit not only IT systems and 
networks, but also the human element in the system. It is critical to limit 
technical vulnerabilities and insecure user behavior, but also poorly designed 
user interfaces, and unclear or unrealistic security policies. To improve the 
security of systems, technology and policies must consider the characteristics 
of the users, where research in social sciences and usable security has 
demonstrated that insecure behavior can be justified from cognitive, emotional, 
and social perspectives. When there is a good 'fit' of technology to users, 
workable security policies and targeted behavioral support can augment 
technical security.
 
Finding the right balance between technical and social security measures 
remains largely unexplored, which motivates the need for the STAST workshop. 
Currently, different security communities (theoretical security, systems 
security, usable security, and security management) rarely work together. There 
remains a need for focused, holistic research in socio-technical security, and 
the respective communities tend to offload on each other parts of problems that 
they consider to be out of scope, an attitude that results in deficient or 
unsuitable security solutions.
 
*** GOALS 
The workshop intends to stimulate an exchange of ideas and experiences on how 
to design systems that are secure in the real world where they interact with 
users of varying expertise and diverse needs. The workshop aims at bringing 
together experts in various areas of computer security and in social and 
behavioral sciences.
 
*** WORKSHOP TOPICS
Contributions should focus on the interplay of technical, organizational and 
human factors in achieving or breaking security, privacy, and trust, for 
example:
- Usability and user experience
- Models of user behaviour and user interactions with technology
- Perceptions of related risks, as well as their influence on humans
- Social engineering, persuasion, and other deception techniques
- Requirements for socio-technical systems
- Decision making in/for socio-technical systems
- Feasibility of policies, standards, and regulations from the socio-technical 
perspective
- Social factors in organizations' policies and processes
- Interplay of law, ethics and politics with security and privacy measures
- Balance between technical measures and social strategies
- Threat models that combine technical and human-centered strategies
- Socio-technical analysis of incidents and vulnerabilities
- Studies of real-world vulnerabilities/incidents from a socio-technical 
perspective
- Lessons from design, deployment, and enforcement of mechanisms, policies, 
standards, and regulations
- Strategies and guidelines for analysis of intelligence and data from a 
socio-technical perspective
- Marginalised and disadvantaged user groups in the lifecycle of 
socio-technical systems
- Methodologies and methodological reflections in pursuit of these goals
 
*** TYPE OF CONTRIBUTIONS
All papers must be original and not simultaneously submitted to another journal 
or conference. The following paper categories are welcome:
- Full Papers, discussing original research, answering well-defined research 
questions, and presenting full and stable results.
- Position Papers, original contributions discussing existing challenges and 
introducing and motivating new research problems.
- Work in Progress, describing original but unfinished research, which is 
nevertheless based on solid research questions or hypothesis soundly argued be 
innovative compared with the state of the art.
 
We welcome qualitative, quantitative, and combined research approaches from 
academia, industry, and regulatory bodies.
We welcome meta-analytic as well as replication studies and consider them as 
original research eligible for full papers. We welcome negative or null results 
with sound methodology.
 
 
*** PROCEEDINGS
As in previous years, accepted papers will be published as post-proceedings in 
Springer's Lecture Notes in Computer Science series. 

*** PROGRAMME CHAIRS
- Simon Parkin (Delft University of Technology)
- Maryam Mehrnezhad (Newcastle University)

*** WORKSHOP CHAIRS
- Giampaolo Bella (University of Catania)
- Gabriele Lenzini (University of Luxembourg)
_______________________________________________
uai mailing list
uai@engr.orst.edu
https://it.engineering.oregonstate.edu/mailman/listinfo/uai

Reply via email to