From lorrie at cs.cmu.edu Wed Jan 2 10:54:16 2013 From: lorrie at cs.cmu.edu (Lorrie Faith Cranor) Date: Wed, 2 Jan 2013 10:54:16 -0500 Subject: [Soups-announce] reminder - call for SOUPS Workshops and Tutorials - January 18, 2013 References: <00bc01cde8ff$c0b27dc0$42177940$@scs.carleton.ca> Message-ID: <73D2CE07-625D-48A7-895A-57DE2E5B264E@cs.cmu.edu> > From: "Sonia Chiasson" > Subject: call for SOUPS Workshops and Tutorials - January 18, 2013 > Date: January 2, 2013 10:42:20 AM EST > > Hello everyone, > > The deadline for the SOUPS Workshop and Tutorial proposals is Friday January > 18, 2013. That's just over 2 weeks away. > > The CFP is here: > http://cups.cs.cmu.edu/soups/2013/cfp.html > > If there's a topic you'd like to see covered in-depth, something you think > would be interesting to discuss, a past workshop that you'd like to see > continued, or a new upcoming topic to address - let us know! > > Feel free to send any questions my way, > Happy New Year, > Sonia > ---------------------------------------------------------- > ------------- > Sonia Chiasson, PhD > Canada Research Chair in Human Oriented Computer Security > Assistant Professor, School of Computer Science > Carleton University, Ottawa, Canada > chiasson at scs.carleton.ca > http://www.scs.carleton.ca/people/~chiasson > ---------------------------------------------------------- > ------------- > > __._,_.___ -------------- next part -------------- An HTML attachment was scrubbed... URL: From lorrie at cs.cmu.edu Wed Jan 30 22:48:09 2013 From: lorrie at cs.cmu.edu (Lorrie Faith Cranor) Date: Wed, 30 Jan 2013 22:48:09 -0500 Subject: [Soups-announce] SOUPS 2013 technical papers CFP, March 8 deadline Message-ID: <24EDE43A-A149-486E-8D99-105C9BD69132@cs.cmu.edu> Symposium On Usable Privacy and Security 2013 http://cups.cs.cmu.edu/soups/ CALL FOR PAPERS http://cups.cs.cmu.edu/soups/2013/cfp.html The 2013 Symposium on Usable Privacy and Security (SOUPS) will bring together an interdisciplinary group of researchers and practitioners in human computer interaction, security, and privacy. The program will feature technical papers, a poster session, panels and invited talks, lightning talks and demos, and workshops and tutorials. This year SOUPS will be held at Northumbria University in Newcastle, UK. TECHNICAL PAPERS (see the SOUPS website for details on other types of submissions) We invite authors to submit original papers describing research or experience in all areas of usable privacy and security. Topics include, but are not limited to: - innovative security or privacy functionality and design, - new applications of existing models or technology, - field studies of security or privacy technology, - usability evaluations of new or existing security or privacy features, - security testing of new or existing usability features, - longitudinal studies of deployed security or privacy features, - the impact of organizational policy or procurement decisions, and - lessons learned from the deployment and use of usable privacy and security features, - reports of replicating previously published studies and experiments, - reports of failed usable security studies or experiments, with the focus on the lessons learned from such experience. All submissions must relate to both usability and either security or privacy. Papers on security or privacy applications that do not address usability or human factors will not be considered. Papers need to describe the purpose and goals of the work, cite related work, show how the work effectively integrates usability and security or privacy, and clearly indicate the innovative aspects of the work or lessons learned as well as the contribution of the work to the field. Papers must use the SOUPS formatting template (available for MS Word or LaTeX) and be up to 12 pages in length, excluding the bibliography and any supplemental appendices. Authors have the option to attach to their paper supplemental appendices containing study materials (e.g. surveys) that would not otherwise fit within the body of the paper. These appendices may be included to assist reviewers who may have questions that fall outside the stated contribution of your paper, on which your work is to be evaluated. Reviewers are not required to read any appendices so your paper should be self contained without them. Accepted papers will be published online with their supplemental appendices included. Submissions must be no more than 20 pages including bibliography and appendices. For the body of your paper, brevity is appreciated, as evidenced by the fact that many papers in prior years have been well under this limit. All submissions must be in PDF format and should not be blinded. Submit your paper electronically at http://cups.cs.cmu.edu/crp/soups2013/. Technical paper submissions will close at 5 pm, US Pacific time, Friday, March 8. This is a hard deadline! Authors will be notified of technical paper acceptance by May 27, and camera-ready final versions of technical papers are due June 24. Accepted papers will appear in the ACM Digital Library as part of the ACM International Conference Proceedings Series. They will also be freely available on the SOUPS website. Submitted papers must not significantly overlap papers that have been published or that are simultaneously submitted to a peer-reviewed venue or publication. Any overlap between your submitted paper and other work either under submission or previously published must be documented in a clearly-marked explanatory note at the front of the paper. State precisely how the two works differ in their goals, any use of shared experiments or data sources, and the unique contributions. If the other work is under submission elsewhere, the program committee may ask to review that work to evaluate the overlap. Please note that program committees frequently share information about papers under review and reviewers usually work on multiple conferences simultaneously. As technical reports are not peer reviewed they are exempt from this rule. You may also release pre-prints of your accepted work to the public at your discretion. User experiments should follow the basic principles of ethical research, e.g., beneficence (maximizing the benefits to an individual or to society while minimizing harm to the individual), minimal risk (appropriateness of the risk versus benefit ratio), voluntary consent, respect for privacy, and limited deception. Authors are encouraged to include in their submissions explanation of how ethical principles were followed, and may be asked to provide such an explanation should questions arise during the review process. Technical Papers Committee Lujo Bauer, Carnegie Mellon University, USA (Co-chair) Konstantin Beznosov, University of British Columbia, Canada (Co-Chair) Alessandro Acquisti, Carnegie Mellon University, USA Dirk Balfanz, Google, USA Robert Biddle, Carleton University, Canada Sunny Consolvo, Google, USA Rachna Dhamija, Usable Security Systems, USA Serge Egelman, University of California, Berkeley, USA David Evans, University of Virginia, USA Cormac Herley, Microsoft Research, USA Heinrich Hussmann, Technische Universit?t M?nchen, Germany Apu Kapadia, Indiana University, USA Heather Lipford, University of North Carolina at Charlotte, USA Sebastian M?ller, Technische Universit?t Berlin and Telekom Innovation Laboratories, Germany Paul Van Oorschot, Carleton University, Canada Sameer Patil, Helsinki Institute for Information Technology, Finland, and Indiana University, USA Emilee Rader, Michigan State University, USA Robert W. Reeder, Microsoft, USA Michael K. Reiter, University of North Carolina at Chapel Hill, USA Stuart Schechter, Microsoft Research, USA David Wagner, University of California, Berkeley, USA Rick Wash, Michigan State University, USA SOUPS 2013 IMPORTANT DATES Early registration deadline - June 12 Conference - July 24-26 Technical papers Submission deadline - March 8, 5 pm US Pacific time (hard deadline!) Notification of paper acceptance - May 27 Camera ready papers due - June 24 Posters and demos Submission deadline - May 30, 5 pm US Pacific time Notification of acceptance - June 10 Tutorials and workshops In-depth session proposal submission deadline - January 18 Notification of in-depth session proposal acceptance - February 1 Workshop paper submission deadline - May 30 Notification of workshop paper acceptance - June 10 Camera ready papers due - June 24 Panels and invited talks Panel proposal submission deadline - January 18 Speaker suggestion submission deadline - January 18 Lightning talks Early submission deadline - June 14 Early submission notification - June 21 Submissions received after June 14 will be considered until the program is full From jthughes at privacyassociation.org Thu Jan 31 10:00:35 2013 From: jthughes at privacyassociation.org (Trevor Hughes) Date: Thu, 31 Jan 2013 09:00:35 -0600 Subject: [Soups-announce] SOUPS 2013 technical papers CFP, March 8 deadline In-Reply-To: <24EDE43A-A149-486E-8D99-105C9BD69132@cs.cmu.edu> References: <24EDE43A-A149-486E-8D99-105C9BD69132@cs.cmu.edu> Message-ID: <28C74088072DCF46AAEC7654DB03B4380258A71C04@MBX20.exg5.exghost.com> Lorrie, Would it be possible for the IAPP to share the news about the Westin Research Fellowships at the IAPP at your SOUPS event? I think some of your audience will have students who will be interested. The attached is a DRAFT and not for publication yet (please do not share). But it gives you a sense of the program we are building. J. Trevor Hughes, CIPP jthughes at privacyassociation.org -----Original Message----- From: soups-announce-bounces at mailman.srv.cs.cmu.edu [mailto:soups-announce-bounces at mailman.srv.cs.cmu.edu] On Behalf Of Lorrie Faith Cranor Sent: Wednesday, January 30, 2013 10:48 PM To: soups-announce at cups.cs.cmu.edu Subject: [Soups-announce] SOUPS 2013 technical papers CFP, March 8 deadline Symposium On Usable Privacy and Security 2013 http://cups.cs.cmu.edu/soups/ CALL FOR PAPERS http://cups.cs.cmu.edu/soups/2013/cfp.html The 2013 Symposium on Usable Privacy and Security (SOUPS) will bring together an interdisciplinary group of researchers and practitioners in human computer interaction, security, and privacy. The program will feature technical papers, a poster session, panels and invited talks, lightning talks and demos, and workshops and tutorials. This year SOUPS will be held at Northumbria University in Newcastle, UK. TECHNICAL PAPERS (see the SOUPS website for details on other types of submissions) We invite authors to submit original papers describing research or experience in all areas of usable privacy and security. Topics include, but are not limited to: - innovative security or privacy functionality and design, - new applications of existing models or technology, - field studies of security or privacy technology, - usability evaluations of new or existing security or privacy features, - security testing of new or existing usability features, - longitudinal studies of deployed security or privacy features, - the impact of organizational policy or procurement decisions, and - lessons learned from the deployment and use of usable privacy and security features, - reports of replicating previously published studies and experiments, - reports of failed usable security studies or experiments, with the focus on the lessons learned from such experience. All submissions must relate to both usability and either security or privacy. Papers on security or privacy applications that do not address usability or human factors will not be considered. Papers need to describe the purpose and goals of the work, cite related work, show how the work effectively integrates usability and security or privacy, and clearly indicate the innovative aspects of the work or lessons learned as well as the contribution of the work to the field. Papers must use the SOUPS formatting template (available for MS Word or LaTeX) and be up to 12 pages in length, excluding the bibliography and any supplemental appendices. Authors have the option to attach to their paper supplemental appendices containing study materials (e.g. surveys) that would not otherwise fit within the body of the paper. These appendices may be included to assist reviewers who may have questions that fall outside the stated contribution of your paper, on which your work is to be evaluated. Reviewers are not required to read any appendices so your paper should be self contained without them. Accepted papers will be published online with their supplemental appendices included. Submissions must be no more than 20 pages including bibliography and appendices. For the body of your paper, brevity is appreciated, as evidenced by the fact that many papers in prior years have been well under this limit. All submissions must be in PDF format and should not be blinded. Submit your paper electronically at http://cups.cs.cmu.edu/crp/soups2013/. Technical paper submissions will close at 5 pm, US Pacific time, Friday, March 8. This is a hard deadline! Authors will be notified of technical paper acceptance by May 27, and camera-ready final versions of technical papers are due June 24. Accepted papers will appear in the ACM Digital Library as part of the ACM International Conference Proceedings Series. They will also be freely available on the SOUPS website. Submitted papers must not significantly overlap papers that have been published or that are simultaneously submitted to a peer-reviewed venue or publication. Any overlap between your submitted paper and other work either under submission or previously published must be documented in a clearly-marked explanatory note at the front of the paper. State precisely how the two works differ in their goals, any use of shared experiments or data sources, and the unique contributions. If the other work is under submission elsewhere, the program committee may ask to review that work to evaluate the overlap. Please note that program committees frequently share information about papers under review and reviewers usually work on multiple conferences simultaneously. As technical reports are not peer reviewed they are exempt from this rule. You may also release pre-prints of your accepted work to the public at your discretion. User experiments should follow the basic principles of ethical research, e.g., beneficence (maximizing the benefits to an individual or to society while minimizing harm to the individual), minimal risk (appropriateness of the risk versus benefit ratio), voluntary consent, respect for privacy, and limited deception. Authors are encouraged to include in their submissions explanation of how ethical principles were followed, and may be asked to provide such an explanation should questions arise during the review process. Technical Papers Committee Lujo Bauer, Carnegie Mellon University, USA (Co-chair) Konstantin Beznosov, University of British Columbia, Canada (Co-Chair) Alessandro Acquisti, Carnegie Mellon University, USA Dirk Balfanz, Google, USA Robert Biddle, Carleton University, Canada Sunny Consolvo, Google, USA Rachna Dhamija, Usable Security Systems, USA Serge Egelman, University of California, Berkeley, USA David Evans, University of Virginia, USA Cormac Herley, Microsoft Research, USA Heinrich Hussmann, Technische Universit?t M?nchen, Germany Apu Kapadia, Indiana University, USA Heather Lipford, University of North Carolina at Charlotte, USA Sebastian M?ller, Technische Universit?t Berlin and Telekom Innovation Laboratories, Germany Paul Van Oorschot, Carleton University, Canada Sameer Patil, Helsinki Institute for Information Technology, Finland, and Indiana University, USA Emilee Rader, Michigan State University, USA Robert W. Reeder, Microsoft, USA Michael K. Reiter, University of North Carolina at Chapel Hill, USA Stuart Schechter, Microsoft Research, USA David Wagner, University of California, Berkeley, USA Rick Wash, Michigan State University, USA SOUPS 2013 IMPORTANT DATES Early registration deadline - June 12 Conference - July 24-26 Technical papers Submission deadline - March 8, 5 pm US Pacific time (hard deadline!) Notification of paper acceptance - May 27 Camera ready papers due - June 24 Posters and demos Submission deadline - May 30, 5 pm US Pacific time Notification of acceptance - June 10 Tutorials and workshops In-depth session proposal submission deadline - January 18 Notification of in-depth session proposal acceptance - February 1 Workshop paper submission deadline - May 30 Notification of workshop paper acceptance - June 10 Camera ready papers due - June 24 Panels and invited talks Panel proposal submission deadline - January 18 Speaker suggestion submission deadline - January 18 Lightning talks Early submission deadline - June 14 Early submission notification - June 21 Submissions received after June 14 will be considered until the program is full _______________________________________________ Soups-announce mailing list Soups-announce at mailman.srv.cs.cmu.edu https://mailman.srv.cs.cmu.edu/mailman/listinfo/soups-announce -------------- next part -------------- A non-text attachment was scrubbed... Name: The Westin Privacy Research Fellowships.docx Type: application/vnd.openxmlformats-officedocument.wordprocessingml.document Size: 22300 bytes Desc: The Westin Privacy Research Fellowships.docx URL: From Gabriele.Lenzini at uni.lu Wed Feb 20 09:27:37 2013 From: Gabriele.Lenzini at uni.lu (Gabriele LENZINI) Date: Wed, 20 Feb 2013 14:27:37 +0000 Subject: [Soups-announce] C4P: STAST 2013, socio-technical aspects in security and trust Message-ID: --- CALL FOR PAPERS --- * ********************************************************** * * 3rd Int. Workshop on * * Socio-Technical Aspects of Security and Trust * * 29 June 2013 * * (STAST) - http://www.stast2013.uni.lu * * ---------------------------------------------------------- * * Co-located with * * Computer Security Foundation Symposium (CSF) * * Tulane University, New Orleans, LA, USA * * ********************************************************** * IMPORTANT DATES ---------------- Paper submission: 14 April 2013 Notification: 15 May 2013 Pre-proceeding version: 10 June 2013 Post-workshop camera ready: 14 July 2013 SCOPE --------------------- Today, security threats are hardly sheer technical. They are rather socio-technical threats and come from adversaries who combine social engineering practices with technical skills to circumvent the defenses of information systems. Socio-technical attacks often succeed by exploiting the users' ill-understanding of security mechanisms or loopholes in poorly designed user interfaces and unclear security policies. In securing systems against these threats, humans obviously cannot be treated as machines. Humans have peculiar decision making processes. But they actions and behavioural patterns, despite apparently irrational, are perfectly justifiable from a cognitive and a social perspective. Computer security hence appears to acquire more and more the facets of an interdisciplinary science with roots in both interpretive and positivist research traditions. The workshop intends to foster an interdisciplinary discussion on how to model and analyse the socio-technical aspects of modern security systems and on how to protect such systems from socio-technical threats and attacks. We welcome experts from all involved and interested communities, including but by no means limited to social and behavioral sciences, philosophy and psychology and computer science. WORKSHOP TOPICS -------------- Relevant topics include but are not limited to: * Usability Analysis * System-User Interfaces * Psychology of Deception * Socio-Technical Attacks and Defenses * User Perception of Security and Trust * Cognitive Aspect in Human Computer Interaction * Human Practice and Behavioural Models * Design and Analysis of Socio-Technical Secure Systems * Social Engineering * Ceremonies and Workflows * Game Theoretical Approaches to Security * Cyber Crime Science * Threat and Adversary Models * Social Informatics and Networks * Security Ethics * Effects of Technology on Trust Building Behaviour * Socio-Technical Experiences and Test Cases PROGRAM COMMITTEE ----------------- Matt Bishop (University California, CA, USA) Lizzie Coles-Kemp (Royal Holloway, UK) Vaibhav Garg (University Indiana, USA) Pieter Hartel (University Twente, NL) Cormac Herley (Microsoft Research, USA) Markus Jakobsson (PayPal, USA) Florian Kammueller (Middlesex University, UK) Vincent Koenig (University Luxembourg, L) Jean Martina (Univ. Fed. de Santa Catarina, BR) Sjouke Mauw (University Luxembourg, L) Andrew Moore (CERT/SEI, USA) Tyler Moore (Southern Methodist University, USA) Martin Ortlieb (Google, CH) Wolter Pieters (University Twente & TU Delft, NL) Peter Y. A. Ryan (University Luxembourg, L) Jessica Staddon (Google, CA, USA) Luca Vigano (University Verona, IT) Melanie Volkamer (TU Darmstadt, D) Jeff Yan (University Newcastle, UK) PAPER SUBMISSION ---------------- Contributions should be at most 8 pages, including the bibliography and well-marked appendices, and should follow the IEEE 8.5" x 11" Two-Columns Format. Both theoretical and applied research papers are welcome. Please visit our web site for more submission guidelines. PROCEEDINGS ----------- Pre-proceedings will be made available at the venue. Authors will be given the opportunity to review their manuscripts, for the final post-proceedings, which will be published IEEE in the IEEE digital library after the workshop. ORGANIZING COMMITTEE -------------------- *** Workshop Chairs Giampaolo Bella (Univ. of Catania, IT) Gabriele Lenzini (Univ. of Luxembourg, L) *** Programme Chairs Christian W. Probst (Technical University of Denmark, DK) Trish Williams (Edith Cowan University, AU) -------------------------------------------------------------------- Dr. G. Lenzini Interdisciplinary Centre for Security, Reliability and Trust (SnT) --------------------------------------------------------------------- University of Luxembourg 4 rue Alphonse Weicker L-2721 Luxembourg-Kirchberg --------------------------------------------------------------------- T.: +352 466 644 5778?? -?F.: +352 466644 5669 Gabriele.Lenzini at Uni.Lu -------------------------------------------------------------------- From lorrie at cs.cmu.edu Wed Feb 27 21:56:54 2013 From: lorrie at cs.cmu.edu (Lorrie Faith Cranor) Date: Wed, 27 Feb 2013 21:56:54 -0500 Subject: [Soups-announce] CFP: Workshop on Risk Perception in IT Security and Privacy at SOUPS Message-ID: Workshop on Risk Perception in IT Security and Privacy A workshop of the Symposium On Usable Privacy and Security (SOUPS) http://cups.cs.cmu.edu/soups/2013/ For full details, please see: http://cups.cs.cmu.edu/soups/2013/risk.html This workshop is an opportunity to bring together researchers and practitioners to share experiences, concerns and ideas about how to address the gap between user perception of IT risks and security / organizational requirements for security and privacy. Important Dates: Submission Deadline: May 30, 2013, 5pm PDT Notification Deadline: June 10, 2013 5pm PDT Anonymization: Papers are NOT to be anonymized Length: 1-2 page position statements SCOPE AND FOCUS Willingness to perform actions for security purposes is strongly determined by the costs and perceived benefit to the individual. When end-users' perceptions of risk are not aligned with organization or system, there is a mismatch in perceived benefit, leading to poor user acceptance of the technology. For example, organizations face complex decisions when pushing valuable information across the network to mobile devices, web clients, automobiles and other embedded systems. This may impose burdensome security decisions on employees and clients due to the risks of devices being lost or stolen, shoulder surfing, eavesdropping, etc. Effective risk communication can provide a shared understanding of the need for, and benefits of secure approaches and practices. While risk perception has been studied in non-IT contexts, how well people perceive and react to IT risk is less well understood. How systems measure IT risk, how it is best communicated to users, and how to best align these often misaligned perspectives is poorly understood. Risk taking decisions (policies) are increasingly being pushed out to users who are frequently ill prepared to make complex technical security decisions based on limited information about the consequences of their actions. In other risk domains we know that non-experts think and respond to risk very differently than experts. Non-experts often rely on affect, and may be unduly influenced by the perceived degree of damage that will be caused. Experts, and risk evaluation systems, use statistical reasoning to assess risk. The purpose of this workshop is to bring together researchers and practitioners to share experiences, concerns and ideas about how to address the gap between user perception of IT risks and security / organizational requirements for security and privacy. Topics of interest include: ? Human decision and different attack types: Malware, eavesdropping, inadvertent loss / disclosure of information, phishing, browser attacks, etc. ? Research methods and metrics for assessing perception of risk ? Assessing value of assets and resources at risk ? Communicating and portrayal of risk - security indicators, status indicators, etc. ? Organizational versus personal risk ? The psychology of risk perception ? Behavioral aspects of risk perception ? Real versus perceived risk ? Other topics related to measuring IT risk and/or user perception of IT risk The goal of this workshop is to explore these and related topics across the broad range of IT security contexts, including enterprise system, personal systems, and especially mobile and embedded systems. This workshop provides an informal and interdisciplinary setting that includes the intersection of security, psychological, and behavioral science. Everyone who attends the workshop participates. Panel discussions will be organized around topics of interest where the workshop participants will be given an opportunity to give brief presentations, which may include current or prior work in this area, as well as pose challenges in IT security and privacy risk perception. SUBMISSIONS We are soliciting 1-2 page position statements that express the nature of your interest in the workshop, the aspects of risk perception of interest to you including the topic(s) that you would like to discuss during the workshop, including the panel discussions. Email inquiries may be sent to to: RiskPerception2013 at gmail.com. IMPORTANT DATES Paper submission deadline - May 30, 2013, 5pm PDT Notification of paper acceptance - June 10, 2013 5pm PDT ORGANIZERS Larry Koved, IBM T. J. Watson Research Center L Jean Camp, Indiana University From kapadia at indiana.edu Tue Mar 19 01:06:55 2013 From: kapadia at indiana.edu (Apu Kapadia) Date: Tue, 19 Mar 2013 01:06:55 -0400 Subject: [Soups-announce] CFP: PETools: Workshop on Privacy Enhancing Tools Message-ID: Hello, Please consider submitting abstracts to PETools (a pre-PETS workshop). Regards, Apu Kapadia -------------------------------------------------------------------------- **** Submission deadline for 2-page abstracts: Wednesday May 15, 2013 **** Call for Papers PETools: Workshop on Privacy Enhancing Tools July 9, 2013, Bloomington, Indiana, USA Held in conjunction with PETS 2013 http://petools.soic.indiana.edu/ The goal of this workshop is to discuss the design of privacy tools aimed at real-world deployments. This workshop will bring together privacy practitioners and researchers with the aim to spark dialog and collaboration between these communities. Existing privacy enhancing tools range from web browser plugins to specialized software, and are all aimed at empowering users to better control their privacy. For widespread adoption and continued effectiveness, however, these tools need to be made usable and be continually refined and examined by researchers and developers. While certain tools such as Tor have successfully received such attention, this workshop seeks to stimulate such collaborative efforts for a plethora of privacy enhancing tools and discuss the continued evolution of privacy enhancing tools in the real world. Topics of interest include researcher and developer efforts on real-world tools related to: * usability * human factors * privacy plugins and extensions * encryption software * email * health * advertising * steganography * anonymizers * identity management * social networking * cloud computing and storage * Internet telephony * mobile and pervasive computing (e.g., smartphones and home automation) * attacks on real-world PETools (aimed at improving these PETools) * Anti-PETools (tools that attack privacy, spurring discussion on PETools to counter such Anti-PETools) * and more Important dates: PETools submission deadline for abstracts: May 15, 2013, 23:59 UTC (8pm EDT) PETools notification: June 5, 2013 PETools deadline for revised abstracts (for the online program): June 14, 2013 Submission: This workshop seeks submissions of two-page abstracts (excluding bibliography and appendices; with 11pt font and reasonable margins) of talks related to the improvement of privacy-enhancing tools aimed at real-world deployments. Submissions should not be anonymized. Submission types include: * original scientific work * preliminary research results * recent results published elsewhere * position papers * research surveys Submissions must be made in PDF format using EasyChair: https://www.easychair.org/conferences/?conf=petools2013 No proceedings: The PETools Workshop has no official proceedings, and accepted abstracts will not be included in the PETS proceedings. Since there are no formal or archival proceedings, acceptance at this workshop does not preclude publication at other venues. Accepted abstracts will be made available online on this website to support discussion by the workshop attendees. Organizing Committee: Apu Kapadia (Chair), Indiana University Bloomington Kelly Caine, Clemson University L. Jean Camp, Indiana University Bloomington Adam J. Lee, University of Pittsburgh Sameer Patil, Helsinki Institute for Information Technology (HIIT) Michael Reiter, University of North Carolina at Chapel Hill Jessica Staddon, Google You may contact the organizers at petools (AT) cs.indiana.edu -------------------------------------------------------------------------- -- Apu Kapadia, Ph.D. Assistant Professor School of Informatics and Computing Indiana University Bloomington http://www.cs.indiana.edu/~kapadia/ From lorrie at cs.cmu.edu Wed Apr 3 13:37:13 2013 From: lorrie at cs.cmu.edu (Lorrie Faith Cranor) Date: Wed, 3 Apr 2013 13:37:13 -0400 Subject: [Soups-announce] U-PriSM 2 cfp - May 10 deadline Message-ID: U-PriSM 1 was held at SOUPS 2012. U-PrisM 2 will be at MobileHCI 2013 From: Sonia Chiasson [mailto:chiasson at scs.carleton.ca] Sent: Wednesday, April 03, 2013 1:06 PM Subject: U-PriSM 2 cfp - May 10 deadline Hello, The 2nd Usable Privacy and Security for Mobile Devices (U-PriSM 2) workshop will be co-located with MobileHCI 2013. It will be held August 27, 2013 in Munich, Germany. New this year: The best paper, as chosen by the organizers, will be included in a Special Issue of the International Journal of Mobile HCI (IJMHCI). More details can be found on the workshop website: http://hotsoft.carleton.ca/~sonia/uprism2/ ---------------------------- Call For Participation: --------------------------- Paper submission deadline: May 10, 2013 5pm PST The workshop, which is co-located with MobileHCI 2013, seeks two types of original submissions: (1) short papers describing new research outcomes and (2) position papers describing new research challenges and worthy topics to discuss in all areas of usable privacy and security of mobile devices. Topics may include (but are not limited to): User authentication on mobile devices Permission management for applications Secure mobile payment Security indicators and features for mobile web browsing Do-not-track on mobile devices Protecting location privacy of mobile users Physical security of mobile devices (against loss or theft) New security or privacy functionality and design for mobile devices User testing of mobile security or privacy features Lessons learned from deployment of mobile security or privacy features Comparisons of usable privacy or security features between mobile platforms The best paper, as chosen by the organizers, will be included in a Special Issue of the International Journal of Mobile HCI (IJMHCI). We solicit papers describing research results, work in progress, and practitioner/industry or experience reports focused on any workshop topic. Papers should describe the purpose and goals of the work, cite related work, and clearly state the (expected) contributions to the field (innovation, lessons learned). Work in progress is encouraged to provide participants a chance to receive feedback and discuss ideas during the workshop. We also encourage position papers presenting an arguable opinion about an issue. A position paper may include new ideas or discussions of topics at various stages of completeness. Position papers that present speculative or creative out-of-the-box ideas are welcome and encouraged. While completed work is not required, position papers should still provide reasonable evidence to support their claims. The full-day workshop will be divided into several sessions consisting of brief presentations followed by group discussion and feedback from the audience. Presentations and themes will be chosen from among the submissions received, with the intention of including those that have higher potential for interactive discussion and participation from the audience. At least one author of accepted papers needs to register for the workshop and for the MobileHCI conference itself. -- Hope to see you there, Sonia ---------------------------------------------------------------------------- ------------- Sonia Chiasson, PhD Canada Research Chair in Human Oriented Computer Security Assistant Professor, School of Computer Science Carleton University, Ottawa, Canada chiasson at scs.carleton.ca http://www.scs.carleton.ca/people/~chiasson ---------------------------------------------------------------------------- ------------- From hochleitner at cure.at Mon Mar 4 20:15:25 2013 From: hochleitner at cure.at (Christina Hochleitner) Date: Tue, 05 Mar 2013 01:15:25 -0000 Subject: [Soups-announce] CfP WS: A Turn for the Worse: Trustbusters for User Interfaces Message-ID: *** Apologies if you receive this call more than once *** A TURN FOR THE WORSE: TRUSTBUSTERS FOR USER INTERFACES A workshop at the Symposium On Usable Privacy and Security (SOUPS) http://cups.cs.cmu.edu/soups/2013/ IMPORTANT DATES Workshop paper submission deadline: May 30, 2013 Notification of workshop paper acceptance: June 10, 2013 Camera-ready submission deadline: June 24, 2013 This workshop is an opportunity to bring together HCI researchers and practitioners from different disciplines to create, explore, evaluate, and discuss possibilities for evoking distrust through UI design. SCOPE AND FOCUS The number of situations that require us to enter and process private, personal, and confidential information has grown exponentially. Security measures are developed in order to keep this information safe. Nevertheless, there is another human factor involved in the implementation of these security measures: trust. While privacy and security are also the focus of the design community through the provision of principles and guidelines, there is little knowledge available on the design for trust. In particular knowledge about what not to do when designing for trust is scarce. Since there are many pitfalls and few guidelines, we propose closing this gap by creating a list of trustbusters - factors that indicate what is to be avoided when designing for trust. We will take a negative approach to trust and investigate the main factors responsible for destroying the users' trust in interactive systems. We will define distrust as concepts from interdisciplinary perspectives and conduct hands-on sessions to explore factors evoking distrust through interface design. We aim to bring together HCI researchers and practitioners from different disciplines to create, explore, evaluate, and discuss possibilities for evoking distrust through UI design. Those interested in presenting should submit distrust portfolios consisting of worst-case examples including - a position, research, or anecdotal paper on critical or negative use of design to create distrust (e.g. interfaces that faced trust challenges because of their design), - screenshots of design leading to distrust, or - videos or audio material to demonstrate how design approaches can evoke distrust. These examples will then be discussed and presented during the workshop and serve as input for the formulation of anti-guidelines, anti-heuristics, and anti-patterns. The outcome of this workshop should aid the community by showing them how not to design trustworthy UIs and how to learn from mistakes in a provocative, memorable, and comprehensible way. We plan to maintain the discussion as part of an ongoing community of researchers interested in trust aspects of user experience. Authors of accepted papers will be invited to present their ideas at the workshop. Accepted workshop papers will be available on the SOUPS website, but will not be included in the ACM Digital library. SUBMISSIONS We invite authors to submit original papers in PDF format. Papers should use the SOUPS formatting template (LaTeX or MS Word). Submissions should be 2 to 6 pages in length, not counting appendices. The paper should be self-contained without requiring that readers also read the appendices. The appendices need not conform to the formatting template. Submissions should not be blinded. Supplemental material as screenshots and videos should be made available in downloadable format. Email inquiries and submissions to: hochleitner at cure.at (Note: There is a 10MB size limit on email attachments to this address; for larger submissions, please provide a link to downloadable content.) For further information and submissions please refer to http://cups.cs.cmu.edu/soups/2013/trustbusters.html ORGANIZERS Christina Hochleitner (CURE) Sameer Patil (HIIT, Indiana University) Trenton Schulz (Norwegian Computing Center) Rob Reeder (Microsoft Research) Marc Busch (CURE) Manfred Tscheligi (University of Salzburg) ___CURE - Center for Usability Research & Engineering______ Cand. Scient. Christina Hochleitner Msc Senior HCI Researcher CURE - Center for Usability Research & Engineering Businesspark MARXIMUM Modecenterstra?e 17 / Objekt 2 1110 Vienna, Austria [Tel] +4317435451205 [Fax] +431743545130 [Mail] hochleitner at cure.at [Web] http://www.cure.at Wichtiger Hinweis: Dieses E-Mail kann Betriebs- oder Gesch?ftsgeheimnisse oder sonstige vertrauliche Informationen enthalten. Sollten Sie diese E-Mail irrt?mlich erhalten haben, ist Ihnen eine Kenntnisnahme des Inhalts, eine Vervielf?ltigung oder Weitergabe der E-Mail ausdr?cklich untersagt. Bitte benachrichtigen Sie uns und vernichten Sie die empfangene E-Mail. Vielen Dank f?r Ihre Kooperation. Important Note: This e-mail may contain trade secrets or privileged, undisclosed or otherwise confidential information. If you have received this e-mail in error, you are hereby notified that any review, copying or distribution of it is strictly prohibited. Please inform us immediately and destroy the original transmittal. Thank you for your cooperation. -------------- next part -------------- An HTML attachment was scrubbed... URL: From lorrie at cs.cmu.edu Thu Apr 18 08:16:38 2013 From: lorrie at cs.cmu.edu (Lorrie Faith Cranor) Date: Thu, 18 Apr 2013 08:16:38 -0400 Subject: [Soups-announce] SOUPS 2013 - Call for Posters, Lightning Talks & Demos Message-ID: <47D80A30-DFA3-4909-8DF6-6232BE85C77F@cs.cmu.edu> Symposium On Usable Privacy and Security 2013 http://cups.cs.cmu.edu/soups/ CALL FOR POSTERS, LIGHTNING TALKS & DEMOS http://cups.cs.cmu.edu/soups/2013/cfp.html The 2013 Symposium on Usable Privacy and Security (SOUPS) will bring together an interdisciplinary group of researchers and practitioners in human computer interaction, security, and privacy. The program will feature technical papers, a poster session, panels and invited talks, lightning talks and demos, and workshops and tutorials. This year SOUPS will be held at Northumbria University in Newcastle, UK. POSTERS We seek poster abstracts describing recent or ongoing research or experience in all areas of usable privacy and security. Submissions should use the SOUPS poster template [MS Word] [LaTeX] and be at most two pages including bibliography. Submissions should not be blinded. Accepted poster abstracts will be distributed to symposium participants and made available on the symposium web site. Please follow the final submission formatting instructions when preparing your poster abstract to avoid the need to revise poster abstracts after acceptance decisions are made. In addition, SOUPS will include a poster session in which authors will exhibit their posters. Note, poster abstracts should be formatted like short papers, not like posters. Authors of accepted posters will be sent information about how to prepare and format posters for the conference. Submit your poster using the electronic submissions page. We also welcome authors of recent papers (2012 to 2013) on usable privacy and security to present your work at the SOUPS poster session. Please submit in a PDF file: (1) the title and abstract of your conference paper, (2) full bibliographical citation, and (3) a link to the published (official) version, instead of the regular poster abstract. Submissions will close at 5pm, US Pacific time, May 30. LIGHTNING TALKS AND DEMOS A continuing feature of SOUPS is a session of 5-minute talks. These could include emerging hot topics, preliminary research results, practical problems encountered by end users or industry practitioners, a lesson learned, a research challenge that could benefit from feedback, a war story, ongoing research, a success, a failure, a future experiment, tips and tricks, a pitfall to avoid, etc. If you would like to participate in the lightning talk session, please email sessions at cups.cs.cmu.edu by June 14, with your name, affiliation, the title, and a brief abstract (up to 200 words) of your lightning talk. Confirmations of a lightning talk slot will be given by June 21. Additional proposals will be accepted after the deadline if there is still room on the program. You will need to deliver your slides for the 5-minute talk to the Interactive Sessions Chair via the same email address by July 9. SOUPS is planning to include a demo session, in which participants will have the opportunity to interactively introduce to the full SOUPS audience their new, cool, and exciting visualization, user interface, or interaction paradigm related to security and privacy. Demo presentations will be 5 to 10 minutes in length, and should convey the main idea of the interface and one or more scenarios or use cases. To be considered for a presentation, a proposal describing the demonstration should be emailed to sessions at cups.cs.cmu.edu by June 14. Demo proposals should be no longer than two pages, and should use the formatting guidelines described above for poster abstracts. Confirmations of demo slots will be given by June 21. -- Mike Just, PhD Senior Lecturer and Associate Director Interactive and Trustworthy Technologies Research Group Department of Computer, Communications and Interactive Systems Glasgow Caledonian University Web: http://www.gcu.ac.uk/ebe/staff/drmikejust/ Twitter: https://twitter.com/itt_group_gcu From kapadia at indiana.edu Thu May 9 16:13:08 2013 From: kapadia at indiana.edu (Apu Kapadia) Date: Thu, 9 May 2013 16:13:08 -0400 Subject: [Soups-announce] (Deadline approaching) PETools: Workshop on Privacy Enhancing Tools Message-ID: <3F2CC3B7-AE4A-4623-B001-CEDAC74D89F6@indiana.edu> Hi all, The PETools Workshop (held in conjunction with PETS) deadline is approaching. Please consider submitting and/or attending! Regards, Apu [Apologies if you receive multiple copies] -------------------------------------------------------------------------- **** Submission deadline for 2-page abstracts: Wednesday May 15, 2013 **** CALL FOR PAPERS ************************************************************ PETools: Workshop on Privacy Enhancing Tools Bloomington, Indiana, USA. July 9th, 2013 Held in conjunction with PETS 2013 http://petools.soic.indiana.edu/ ************************************************************ The goal of this workshop is to discuss the design of privacy tools aimed at real-world deployments. This workshop will bring together privacy practitioners and researchers with the aim to spark dialog and collaboration between these communities. Existing privacy enhancing tools range from web browser plugins to specialized software, and are all aimed at empowering users to better control their privacy. For widespread adoption and continued effectiveness, however, these tools need to be made usable and be continually refined and examined by researchers and developers. While certain tools such as Tor have successfully received such attention, this workshop seeks to stimulate such collaborative efforts for a plethora of privacy enhancing tools and discuss the continued evolution of privacy enhancing tools in the real world. Topics of interest include researcher and developer efforts on real-world tools related to: * usability * human factors * privacy plugins and extensions * encryption software * email * health * advertising * steganography * anonymizers * identity management * social networking * cloud computing and storage * Internet telephony * mobile and pervasive computing (e.g., smartphones and home automation) * attacks on real-world PETools (aimed at improving these PETools) * Anti-PETools (tools that attack privacy, spurring discussion on PETools to counter such Anti-PETools) * and more Important dates: PETools submission deadline for abstracts: May 15, 2013, 23:59 UTC (8pm EDT) PETools notification: June 5, 2013 PETools deadline for revised abstracts (for the online program): June 14, 2013 Submission: This workshop seeks submissions of two-page abstracts (excluding bibliography and appendices; with 11pt font and reasonable margins) of talks related to the improvement of privacy-enhancing tools aimed at real-world deployments. Submissions should not be anonymized. Submission types include: * original scientific work * preliminary research results * recent results published elsewhere * position papers * research surveys Submissions must be made in PDF format using EasyChair: https://www.easychair.org/conferences/?conf=petools2013 No proceedings: The PETools Workshop has no official proceedings, and accepted abstracts will not be included in the PETS proceedings. Since there are no formal or archival proceedings, acceptance at this workshop does not preclude publication at other venues. Accepted abstracts will be made available online on this website to support discussion by the workshop attendees. Organizing Committee: Apu Kapadia (Chair), Indiana University Bloomington Kelly Caine, Clemson University L. Jean Camp, Indiana University Bloomington Adam J. Lee, University of Pittsburgh Sameer Patil, Helsinki Institute for Information Technology (HIIT) Michael Reiter, University of North Carolina at Chapel Hill Jessica Staddon, Google You may contact the organizers at petools (AT) cs.indiana.edu -------------------------------------------------------------------------- -- Apu Kapadia, Ph.D. Assistant Professor School of Informatics and Computing Indiana University Bloomington http://www.cs.indiana.edu/~kapadia/ IU Privacy Lab: http://private.soic.indiana.edu/ From lorrie at cs.cmu.edu Fri May 10 23:30:40 2013 From: lorrie at cs.cmu.edu (Lorrie Faith Cranor) Date: Fri, 10 May 2013 23:30:40 -0400 Subject: [Soups-announce] SOUPS 2013 - Call for Posters, Lightning Talks & Demos Message-ID: <1B284FA8-2374-456B-B8FD-2AD136D3D03A@cs.cmu.edu> Symposium On Usable Privacy and Security 2013 http://cups.cs.cmu.edu/soups/ CALL FOR POSTERS, LIGHTNING TALKS & DEMOS http://cups.cs.cmu.edu/soups/2013/cfp.html The 2013 Symposium on Usable Privacy and Security (SOUPS) will bring together an interdisciplinary group of researchers and practitioners in human computer interaction, security, and privacy. The program will feature technical papers, a poster session, panels and invited talks, lightning talks and demos, and workshops and tutorials. This year SOUPS will be held at Northumbria University in Newcastle, UK. POSTERS We seek poster abstracts describing recent or ongoing research or experience in all areas of usable privacy and security. Submissions should use the SOUPS poster template [MS Word] [LaTeX] and be at most two pages including bibliography. Submissions should not be blinded. Accepted poster abstracts will be distributed to symposium participants and made available on the symposium web site. Please follow the final submission formatting instructions when preparing your poster abstract to avoid the need to revise poster abstracts after acceptance decisions are made. In addition, SOUPS will include a poster session in which authors will exhibit their posters. Note, poster abstracts should be formatted like short papers, not like posters. Authors of accepted posters will be sent information about how to prepare and format posters for the conference. Submit your poster using the electronic submissions page. We also welcome authors of recent papers (2012 to 2013) on usable privacy and security to present your work at the SOUPS poster session. Please submit in a PDF file: (1) the title and abstract of your conference paper, (2) full bibliographical citation, and (3) a link to the published (official) version, instead of the regular poster abstract. Submissions will close at 5pm, US Pacific time, May 30. LIGHTNING TALKS AND DEMOS A continuing feature of SOUPS is a session of 5-minute talks. These could include emerging hot topics, preliminary research results, practical problems encountered by end users or industry practitioners, a lesson learned, a research challenge that could benefit from feedback, a war story, ongoing research, a success, a failure, a future experiment, tips and tricks, a pitfall to avoid, etc. If you would like to participate in the lightning talk session, please email sessions at cups.cs.cmu.edu by June 14, with your name, affiliation, the title, and a brief abstract (up to 200 words) of your lightning talk. Confirmations of a lightning talk slot will be given by June 21. Additional proposals will be accepted after the deadline if there is still room on the program. You will need to deliver your slides for the 5-minute talk to the Interactive Sessions Chair via the same email address by July 9. SOUPS is planning to include a demo session, in which participants will have the opportunity to interactively introduce to the full SOUPS audience their new, cool, and exciting visualization, user interface, or interaction paradigm related to security and privacy. Demo presentations will be 5 to 10 minutes in length, and should convey the main idea of the interface and one or more scenarios or use cases. To be considered for a presentation, a proposal describing the demonstration should be emailed to sessions at cups.cs.cmu.edu by June 14. Demo proposals should be no longer than two pages, and should use the formatting guidelines described above for poster abstracts. Confirmations of demo slots will be given by June 21. -- Mike Just, PhD Senior Lecturer and Associate Director Interactive and Trustworthy Technologies Research Group Department of Computer, Communications and Interactive Systems Glasgow Caledonian University Web: http://www.gcu.ac.uk/ebe/staff/drmikejust/ Twitter: https://twitter.com/itt_group_gcu From lorrie at cs.cmu.edu Thu May 16 10:38:20 2013 From: lorrie at cs.cmu.edu (Lorrie Faith Cranor) Date: Thu, 16 May 2013 10:38:20 -0400 Subject: [Soups-announce] Workshop on Home Usable Privacy and Security (HUPS) Message-ID: <9772369A-7F65-43DD-8112-BAB1D1A280FC@cs.cmu.edu> Workshop on Home Usable Privacy and Security (HUPS) CALL FOR PAPERS http://cups.cs.cmu.edu/soups/2013/hups.html ================================================================= The HUPS workshop is an opportunity for researchers and practitioners to discuss research challenges and experiences around the usable privacy and security of smart homes (e.g., home automation systems; smart appliances in the home; smart meters; domestic healthcare devices). -------------------------------------------------------------- Submission Deadline: May 30, 2013, 5pm PDT Notification Deadline: June 10, 2013 5pm PDT Anonymization: Papers are NOT to be anonymized Papers: <= 6 pages excluding bibliography & appendices Formatting: Use SOUPS MS Word or LaTeX templates Workshop Date: July 24, 2013 -------------------------------------------------------------- STUDENT TRAVEL GRANTS --------------------- The HUPS workshop committee is pleased to announce that we will provide travel support to graduate students or post-doctoral scholars who otherwise have financial hardship to attend the workshop. The travel support is sponsored by Microsoft Connections. The amount of support depends on the type of attendee and available funding but we expect to support at least 3 to 5 students. Qualified attendees are encouraged to apply and a priority will be given to students who submitted a paper to the workshop. How to apply: Email jjung at microsoft.com by May 31, 2013 5pm PDT with the subject [HUPS student travel grant application] and provide a few paragraphs on how the workshop would benefit you and your research, as well as how the community would benefit from your involvement in the workshop. Please indicate whether you have submitted a paper to HUPS and if so include the title of the paper. Notification: Submissions will be reviewed by a committee. We will respond by June 7, 2013 5pm PDT. Note that travel grant awards *partially* cover the cost of attending HUPS. The only reimbursable expenses are air travel, hotel and SOUPS/HUPS registration. The amount of support provided may vary. SCOPE AND FOCUS --------------- The workshop seeks two types of original submissions: (1) short papers describing research outcomes and (2) position papers describing new research challenges and worthy topics to discuss in all areas of usable privacy and security of smart homes. Submissions should relate to both human factors and either privacy or security in smart homes. Topics may include (but are not limited to): - potential security attacks against in-home technologies and their impact on residents - access control for home data sharing (e.g., photos, documents) - access control for shared data among neighbors (e.g., smart meter data, security camera data) - user authentication on devices in the home - understanding user privacy concerns/expectations regarding sensing and inference systems in the home - designing privacy notifications for recording devices in the home - user testing of home security or privacy features Short papers may cover research results, work in progress, or experience reports focused on any workshop topic. Papers should describe the purpose and goals of the work, cite related work, and clearly state the contributions to the field (innovation, lessons learned). Position papers present an arguable opinion about an issue. A position paper may include new ideas or discussions of topics at various stages of completeness. Position papers that present speculative or creative out-of-the-box ideas are welcome. While completed work is not required, position papers should still provide reasonable evidence to support their claims. Workshop papers will be available on the SOUPS website (if chosen by the authors), but will not be included in the ACM Digital library. This means that the works will not be considered peer-reviewed publications from the perspective of SOUPS/HUPS and hence should not preclude subsequent publication at another venue. Authors of accepted papers will be invited to present their work at the workshop. SUBMISSIONS ------------ We invite authors to submit papers using the SOUPS 2-column formatting template using the following guidelines: (available for MS Word [http://cups.cs.cmu.edu/soups/2012/soups2012-proceedings-template.doc] or LaTeX [http://cups.cs.cmu.edu/soups/2012/soups2012-latex-templates.zip]): Submissions should be 1 to 6 pages in length, excluding references and appendices. The paper should be self-contained without requiring that readers also read the appendices. All submissions must be in PDF format and should not be blinded. Papers should be submitted using the electronic submission system available from the Workshop website. Authors are encouraged to review: Common Pitfalls in Writing about Security and Privacy Human Subjects Experiments, and How to Avoid Them. [https://cups.cs.cmu.edu/soups/2010/howtosoups.pdf] User experiments should follow the basic principles of ethical research, e.g., beneficence (maximizing the benefits to an individual or to society while minimizing harm to the individual), minimal risk (appropriateness of the risk versus benefit ratio), voluntary consent, respect for privacy, and limited deception. Authors may be asked to include explanation of how ethical principles were followed in their final papers should questions arise during the review process. Email inquiries to: jjung at microsoft.com or yoshi at cs.washington.edu ORGANIZERS ------------- Lujo Bauer | Carnegie Mellon University, USA Rainer B?hme | Universit?t M?nster, DE A.J. Brush | Microsoft Research, Redmond Tamara Denning | University of Washington, USA Jason Hong | Carnegie Mellon University, USA Jaeyeon Jung | Microsoft Research, USA (co-chair) Tadayoshi Kohno | University of Washington, USA (co-chair) Anmol Sheth | Technicolor, USA From lorrie at cs.cmu.edu Thu May 16 11:00:34 2013 From: lorrie at cs.cmu.edu (Lorrie Faith Cranor) Date: Thu, 16 May 2013 11:00:34 -0400 Subject: [Soups-announce] student travel grants and lots of SOUPS deadlines Message-ID: Lots of SOUPS deadlines coming up on May 30! Student travel scholarships, funded by the US National Science Foundation, are available to students who attend US universities. Apply online by May 30. Funds are limited so we will not be able to cover the entire cost of your trip, but we expect to be able to award scholarships of between $500 and $1000. We have three fantastic SOUPS workshops this year? submit your workshop paper by May 30: ? Workshop on Home Usable Privacy and Security (HUPS) - student travel grants now available! ? Workshop on Risk Perception in IT Security and Privacy ? A Turn for the Worse: Trustbusters for User Interfaces Workshop And SOUPS posters are due May 30. We seek poster abstracts describing recent or ongoing research or experience in all areas of usable privacy and security. Submissions should use the SOUPS poster template and be at most two pages including bibliography. Submissions should not be blinded. Accepted poster abstracts will be distributed to symposium participants and made available on the symposium web site. We also welcome authors of recent papers (2012 to 2013) on usable privacy and security to present your work at the SOUPS poster session. Please submit in a PDF file: (1) the title and abstract of your conference paper, (2) full bibliographical citation, and (3) a link to the published (official) version, instead of the regular poster abstract. More details on all of the above at http://cups.cs.cmu.edu/soups/2013/ From lorrie at cs.cmu.edu Thu May 30 12:14:34 2013 From: lorrie at cs.cmu.edu (Lorrie Faith Cranor) Date: Thu, 30 May 2013 12:14:34 -0400 Subject: [Soups-announce] SOUPS Deadlines: student travel grants, posters, workshops , lightning talks and demos Message-ID: Lots of SOUPS deadlines coming up. We have three fabulous workshops? their submission deadlines have been extended to June 7. We have student travel grants for students at US universities. Deadline is TODAY! The Workshop on Home Usable Privacy and Security (HUPS) also has travel grants, not just for US, and also for postdocs. Deadline is June 7. Posters are due today! Lightning talks and demos are due June 14 (additional talks and demos will be accepted later if space permits) http://cups.cs.cmu.edu/soups/ for all the details?. See you in Newcastle! From lorrie at cs.cmu.edu Wed Jun 5 20:34:12 2013 From: lorrie at cs.cmu.edu (Lorrie Faith Cranor) Date: Wed, 5 Jun 2013 20:34:12 -0400 Subject: [Soups-announce] workshop deadlines June 7 Message-ID: <5AAEFEFF-6F5D-4B0F-9C04-5CB1E5C4A60F@cs.cmu.edu> SOUPS 2013 workshop submissions are due June 7! ? Workshop on Home Usable Privacy and Security (HUPS) - student travel grants now available! ? Workshop on Risk Perception in IT Security and Privacy ? A Turn for the Worse: Trustbusters for User Interfaces Workshop Note that the server for submitting HUPS workshop submissions is currently down? we expect to have it back up Thursday afternoon. Sorry for those of you who have been trying unsuccessfully to submit. Check the SOUPS website for all the workshop CFPs, and don't forget to book your SOUPS hotel soon! http://cups.cs.cmu.edu/soups/2013/ From kapadia at indiana.edu Thu Jun 6 13:48:47 2013 From: kapadia at indiana.edu (Apu Kapadia) Date: Thu, 6 Jun 2013 13:48:47 -0400 Subject: [Soups-announce] Call for Participation: Privacy Enhancing Technologies Symposium (PETS 2013) Message-ID: <324A5D3B-AF47-4DA3-BB1A-50F0B8099E81@indiana.edu> Dear Colleague, Please consider attending PETS and/or PETools, which will be held in Bloomington, IN, USA (at Indiana University). *** Early registration (and hotel block) deadline: June 13, 2013 *** Regards, Apu Kapadia ------------------------------ (apologies if you received duplicate copies of this call for participation) CALL FOR PARTICIPATION The 13th Privacy Enhancing Technologies Symposium (PETS 2013) July 10-12, 2013 Bloomington, Indiana, USA http://petsymposium.org/ Registration for PETS 2013 is now *OPEN* at http://petsymposium.org/2013/registration.php *** Early registration (and hotel block) deadline: June 13, 2013 *** As the amount and the sensitivity of information disseminated in the online world grow, so do related privacy concerns. Extensive surveillance and massive tracking of users on the Web are only some of today?s threats to individual privacy. In the big data era, information increasingly equals power and money, and organizations are thus motivated to collect and retain large quantities of personal and, increasingly, contextual information. The Privacy Enhancing Technologies Symposium (PETS) aims to advance the state of the art and foster a worldwide community of researchers and practitioners to discuss innovation and new perspectives. It brings together privacy experts from around the world to discuss recent advances and new perspectives. PETS announces novel research efforts toward designing and building systems for privacy and anonymity protection as well as analyzing challenges and threats. The full program for the event can be found at http://petsymposium.org/2013/program.php: it includes 13 accepted papers, two panels, a rump session, and a keynote talk by Prof. Lorrie Cranor (Carnegie Mellon University). Additionally, PETS will feature a one-day workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs 2013). The ambition of the workshop is to foster new ideas, spirited debates, as well as controversial perspectives on privacy (and lack thereof). The program is available at http://petsymposium.org/2013/hotpets.php and includes 9 accepted papers and a keynote talk by Prof. Helen Nissenbaum (New York University). General Chair: XiaoFeng Wang, Indiana University Bloomington Program Chairs: Emiliano De Cristofaro, PARC Matthew Wright, University of Texas at Arlington HotPETs Chairs: Prateek Mittal, UC Berkeley Reza Shokri, EPFL Local Arrangements Committee: Apu Kapadia, Indiana University Bloomington Raquel Hill, Indiana University Bloomington Haixu Tang, Indiana University Bloomington PETS will also feature a ?Pre-PETS? workshop on July 9th: PETools: Workshop on Privacy Enhancing Tools http://petools.soic.indiana.edu You can register for PETools on the PETS registration page. -- Apu Kapadia, Ph.D. Assistant Professor School of Informatics and Computing Indiana University Bloomington http://www.cs.indiana.edu/~kapadia/ IU Privacy Lab: http://private.soic.indiana.edu/ From kapadia at indiana.edu Sun Jun 9 16:51:30 2013 From: kapadia at indiana.edu (Apu Kapadia) Date: Sun, 9 Jun 2013 16:51:30 -0400 Subject: [Soups-announce] Call for Participation: PETools: Workshop on Privacy Enhancing Tools Message-ID: <185A9BBC-C41B-4EC4-AA09-4BD252DEC64D@indiana.edu> (apologies if you received duplicate copies of this call for participation) CALL FOR PARTICIPATION PETools: Workshop on Privacy Enhancing Tools July 9, 2013 Bloomington, Indiana, USA http://petools.soic.indiana.edu Registration for PETools 2013 is now *OPEN* at http://petsymposium.org/2013/registration.php *** Early registration (and hotel block) deadline: June 13, 2013 *** The goal of this workshop is to discuss the design of privacy tools aimed at real-world deployments. This workshop will bring together privacy practitioners and researchers with the aim to spark dialog and collaboration between these communities. Existing privacy enhancing tools range from web browser plugins to specialized software, and are all aimed at empowering users to better control their privacy. For widespread adoption and continued effectiveness, however, these tools need to be made usable and be continually refined and examined by researchers and developers. While certain tools such as Tor have successfully received such attention, this workshop seeks to stimulate such collaborative efforts for a plethora of privacy enhancing tools and discuss the continued evolution of privacy enhancing tools in the real world. The full program is available at http://petools.soic.indiana.edu/program/ and features several talks based on submitted abstracts, and three invited talks by Kelly Caine (Clemson University), Roger Dingledine (The Tor Project), and Sid Stamm (Mozilla). Organizing Committee Apu Kapadia (Chair), Indiana University Bloomington Kelly Caine, Clemson University L. Jean Camp, Indiana University Bloomington Adam J. Lee, University of Pittsburgh Sameer Patil, Helsinki Institute for Information Technology (HIIT) Michael Reiter, University of North Carolina at Chapel Hill Jessica Staddon, Google We also encourage you to register for the main PETS conference starting the day after PETools: The 13th Privacy Enhancing Technologies Symposium (PETS 2013) July 10-12, 2013 Bloomington, Indiana, USA http://petsymposium.org/ -- Apu Kapadia, Ph.D. Assistant Professor School of Informatics and Computing Indiana University Bloomington http://www.cs.indiana.edu/~kapadia/ IU Privacy Lab: http://private.soic.indiana.edu/ From kapadia at indiana.edu Mon Jun 10 21:50:00 2013 From: kapadia at indiana.edu (Apu Kapadia) Date: Mon, 10 Jun 2013 21:50:00 -0400 Subject: [Soups-announce] Call for Participation: Privacy Enhancing Technologies Symposium (PETS 2013) Message-ID: <9E448577-28DB-4C39-AABA-776068C4AFBE@indiana.edu> Dear Colleagues, Please consider attending PETS and/or PETools. Early registration ends in 3 days! STIPENDS: Additionally we still have some room for student stipends, so please encourage your students to send in their applications as soon as possible: http://petsymposium.org/2013/stipends.php Regards, Apu Kapadia ------------------------------ (apologies if you received duplicate copies of this call for participation) CALL FOR PARTICIPATION The 13th Privacy Enhancing Technologies Symposium (PETS 2013) July 10-12, 2013 Bloomington, Indiana, USA http://petsymposium.org/ Registration for PETS 2013 is now *OPEN* at http://petsymposium.org/2013/registration.php *** Early registration (and hotel block) deadline: June 13, 2013 *** As the amount and the sensitivity of information disseminated in the online world grow, so do related privacy concerns. Extensive surveillance and massive tracking of users on the Web are only some of today?s threats to individual privacy. In the big data era, information increasingly equals power and money, and organizations are thus motivated to collect and retain large quantities of personal and, increasingly, contextual information. The Privacy Enhancing Technologies Symposium (PETS) aims to advance the state of the art and foster a worldwide community of researchers and practitioners to discuss innovation and new perspectives. It brings together privacy experts from around the world to discuss recent advances and new perspectives. PETS announces novel research efforts toward designing and building systems for privacy and anonymity protection as well as analyzing challenges and threats. The full program for the event can be found at http://petsymposium.org/2013/program.php: it includes 13 accepted papers, two panels, a rump session, and a keynote talk by Prof. Lorrie Cranor (Carnegie Mellon University). Additionally, PETS will feature a one-day workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs 2013). The ambition of the workshop is to foster new ideas, spirited debates, as well as controversial perspectives on privacy (and lack thereof). The program is available at http://petsymposium.org/2013/hotpets.php and includes 9 accepted papers and a keynote talk by Prof. Helen Nissenbaum (New York University). General Chair: XiaoFeng Wang, Indiana University Bloomington Program Chairs: Emiliano De Cristofaro, PARC Matthew Wright, University of Texas at Arlington HotPETs Chairs: Prateek Mittal, UC Berkeley Reza Shokri, EPFL Local Arrangements Committee: Apu Kapadia, Indiana University Bloomington Raquel Hill, Indiana University Bloomington Haixu Tang, Indiana University Bloomington PETS will also feature a ?Pre-PETS? workshop on July 9th: PETools: Workshop on Privacy Enhancing Tools http://petools.soic.indiana.edu You can register for PETools on the PETS registration page. -- Apu Kapadia, Ph.D. Assistant Professor School of Informatics and Computing Indiana University Bloomington http://www.cs.indiana.edu/~kapadia/ IU Privacy Lab: http://private.soic.indiana.edu/ From lorrie at cs.cmu.edu Tue Jun 11 16:35:58 2013 From: lorrie at cs.cmu.edu (Lorrie Faith Cranor) Date: Tue, 11 Jun 2013 16:35:58 -0400 Subject: [Soups-announce] Symposium On Usable Privacy and Security preliminary program Message-ID: Symposium On Usable Privacy and Security 2013 http://cups.cs.cmu.edu/soups/ July 24-26, 2013 Newcastle, UK Registration for SOUPS 2013 is open and the early registration deadline is June 17. We've posted a preliminary program at http://cups.cs.cmu.edu/soups/2013/program.html There is still time to submit lightning talk and demo proposals. See http://cups.cs.cmu.edu/soups/2013/cfp.html#lightning Some program highlights: Three Wednesday workshops: ? Workshop on Home Usable Privacy and Security (HUPS) ? Workshop on Risk Perception in IT Security and Privacy ? A Turn for the Worse: Trustbusters for User Interfaces Workshop A poster session and dinner reception featuring 29 usable privacy and security posters Keynote speaker: Harold Thimbleby, Swansea University Security & safety overlaps Panel: Who Sets the Privacy Bar? And, of course, technical papers: (Some of these papers have been only provisionally accepted and may not appear in the final program.) CASA: Context-Aware Scalable Authentication Eiji Hayashi, Sauvik Das, Shahriyar Amini, and Jason Hong (Carnegie Mellon University) and Ian Oakley (University of Madeira) What Matters to Users? Factors that Affect Users' Willingness to Share Information with Online Advertisers Pedro G. Leon and Blase Ur (Carnegie Mellon University), Yang Wang (Syracuse University), Manya Sleeper, Rebecca Balebako, Richard Shay, and Lujo Bauer (Carnegie Mellon University), Mihai Christodorescu (Qualcomm Research Silicon Valley), and Lorrie Faith Cranor (Carnegie Mellon University) A Lot of Little Brothers: Raising Awareness of Data Leaks on Smartphones Rebecca Balebako (Carnegie Mellon University), Jaeyeon Jung (Microsoft Research), Wei Lu (Microsoft), Lorrie Cranor (Carnegie Mellon University), and Carolyn Nguyen (Microsoft) Your Attention Please: Designing security-decision UIs to make genuine risks harder to ignore Cristian Bravo-Lillo, Lorrie Faith Cranor, Julie Downs, Saranga Komanduri, and Robert W. Reeder (Carnegie Mellon University), Stuart Schechter (Microsoft Research), and Manya Sleeper (Carnegie Mellon University) Retrospective Privacy: Managing Longitudinal Privacy in Online Social Networks Oshrat Ayalon and Eran Toch (Department of Industrial Engineering , Tel Aviv University) When It's Better to Ask Forgiveness than Get Permission: Designing Usable Audit Mechanisms for Mobile Permissions Christopher Thompson, Maritza Johnson, Serge Egelman, David Wagner, and Jennifer King (UC Berkeley) Modifying Smartphone User Locking Behavior Dirk Van Bruggen, Shu Liu, Mitch Kajzer, Aaron Striegel, and Charles R. Crowell (University of Notre Dame) and John D'Arcy (University of Delaware) Exploring the Design Space of Graphical Passwords on Smartphones Florian Schaub, Marcel Walch, Bastian K?nings, and Michael Weber (Ulm University) Sleights of Privacy: Framing, Disclosures, and the Limits of Transparency Idris Adjerid, Alessandro Acquisti, Laura Brandimarte, and George Loewenstein (Carnegie Mellon University) Usability and Security Evaluation of GeoPass: a Geographic Location-Password Scheme Julie Thorpe and Brent MacRae (University of Ontario Institute of Technology) and Amirali Salehi-Abari (University of Toronto) Clueless Johnny: Why Automatic Encryption Leads to Confusion and Mistakes Scott Ruoti, Nathan Kim, Ben Burgon, Timothy W. van der Horst, and Kent E. Seamons (Brigham Young University) Memory Retrieval and Graphical Passwords Elizabeth Stobert and Robert Biddle (Carleton University) Stop Embarrassing Me: Re-Evaluating User Concerns for Third-Party Tracking and Online Advertising Lalit Agarwal, Nisheeth Shrivastava, Sharad Jaiswal, and Saurabh Panjwani (Bell Labs India) On The Ecological Validity of a Password Study Sascha Fahl, Matthew Smith, and Marian Harbach (DCSEC, Leibniz University Hannover) Formal Definitions for Usable Access Control Rule Sets - From Goals to Metrics Mathias Beckerle (Technische Universit?t Darmstadt) and Leonardo Augusto Martucci (Karlstad University) From kapadia at indiana.edu Thu Jun 13 22:03:04 2013 From: kapadia at indiana.edu (Apu Kapadia) Date: Thu, 13 Jun 2013 22:03:04 -0400 Subject: [Soups-announce] PETS: Extended early registration deadline: June 20th Message-ID: Dear Colleagues, Please consider attending PETS and/or PETools. Early registration has been extended by 1 week (to June 20th). Hotel block ends June 16th. STIPENDS: Additionally we still have some room for student stipends, so please encourage your students to send in their applications as soon as possible: http://petsymposium.org/2013/stipends.php Regards, Apu Kapadia ------------------------------ (apologies if you received duplicate copies of this call for participation) CALL FOR PARTICIPATION The 13th Privacy Enhancing Technologies Symposium (PETS 2013) July 10-12, 2013 Bloomington, Indiana, USA http://petsymposium.org/ Registration for PETS 2013 is now *OPEN* at http://petsymposium.org/2013/registration.php *** Early registration deadline: June 20, 2013 *** As the amount and the sensitivity of information disseminated in the online world grow, so do related privacy concerns. Extensive surveillance and massive tracking of users on the Web are only some of today?s threats to individual privacy. In the big data era, information increasingly equals power and money, and organizations are thus motivated to collect and retain large quantities of personal and, increasingly, contextual information. The Privacy Enhancing Technologies Symposium (PETS) aims to advance the state of the art and foster a worldwide community of researchers and practitioners to discuss innovation and new perspectives. It brings together privacy experts from around the world to discuss recent advances and new perspectives. PETS announces novel research efforts toward designing and building systems for privacy and anonymity protection as well as analyzing challenges and threats. The full program for the event can be found at http://petsymposium.org/2013/program.php: it includes 13 accepted papers, two panels, a rump session, and a keynote talk by Prof. Lorrie Cranor (Carnegie Mellon University). Additionally, PETS will feature a one-day workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs 2013). The ambition of the workshop is to foster new ideas, spirited debates, as well as controversial perspectives on privacy (and lack thereof). The program is available at http://petsymposium.org/2013/hotpets.php and includes 9 accepted papers and a keynote talk by Prof. Helen Nissenbaum (New York University). General Chair: XiaoFeng Wang, Indiana University Bloomington Program Chairs: Emiliano De Cristofaro, PARC Matthew Wright, University of Texas at Arlington HotPETs Chairs: Prateek Mittal, UC Berkeley Reza Shokri, EPFL Local Arrangements Committee: Apu Kapadia, Indiana University Bloomington Raquel Hill, Indiana University Bloomington Haixu Tang, Indiana University Bloomington PETS will also feature a ?Pre-PETS? workshop on July 9th: PETools: Workshop on Privacy Enhancing Tools http://petools.soic.indiana.edu You can register for PETools on the PETS registration page. -- Apu Kapadia, Ph.D. Assistant Professor School of Informatics and Computing Indiana University Bloomington http://www.cs.indiana.edu/~kapadia/ IU Privacy Lab: http://private.soic.indiana.edu/ From Gabriele.Lenzini at uni.lu Tue Jun 18 03:42:41 2013 From: Gabriele.Lenzini at uni.lu (Gabriele LENZINI) Date: Tue, 18 Jun 2013 07:42:41 +0000 Subject: [Soups-announce] C4Participation - STAST 2013: Socio-Technical Aspects in Security and Trust Message-ID: ----------------Apologies for multiple receiving------------- --- CALL FOR PARTICIPATION --- * ********************************************************** * * 3rd Int. Workshop on * * Socio-Technical Aspects of Security and Trust * * (STAST2013) - http://stast2013.uni.lu * * ---------------------------------------------------------- * * Co-located with * * 2013 Computer Security Foundation Workshop (CSFW) * * Tulane University, New Orleans, LU, USA * * 29 June 2012 * * ********************************************************** * SCOPE ----- Due to the huge yet increasing number of people carrying out sensitive Internet transactions, security threats hardly ever reduce to technical threats. Rather, they are socio-technical, as they come from adversaries who combine social engineering practices with technical skills. Humans obviously cannot be treated as machines, as they take actions that may seem irrational although they are perfectly justifiable from a cognitive and a social perspective. Computer security hence appears to acquire more and more the facets of an interdisciplinary science with roots in both interpretive and positivist research traditions. The workshop intends to foster an interdisciplinary discussion on how to model and analyse the socio-technical aspects of modern security systems and on how to protect such systems from socio-technical threats and attacks. PROGRAMME --------- Session 1: Keynote ------------------- The ever changing Threat Model - A social-technical perspective - Jean E. Martina (Universidade Federal de Santa Catarina, Brasil) Session 2: Assessments and Perception of Risks ------------------------------------------------ Applying the Lost-Letter Technique to Assess IT Risk Appetite - Elmer Lastdrager, Lorena Montoya, Pieter Hartel and Marianne Junger (University of Twente) How Privacy Flaws Affect Consumer Perception - Sadia Afroz, Aylin C. Islam, Jordan Santell, Aaron Chapin and Rachel Greenstadt (Drexel University) Transparency enhancing tools (TETs): an overview - Milena Janic, Jan P. Wijbenga and Thijs Veugen (TNO) Session 3: Security Properties and Cultural Differences ------------------------------------------------- Toward an Ontology for Insider Threat Research: Varieties of Insider Threat Definition - Carly Huth (CERT/SEI and CMU), David Mundie and Sam Perl (CERT/SEI) American and Indian Conceptualizations of Phishing - Rucha Tembe, Kyung W. Hong, Christopher Mayhorn, Emerson Murphy-Hill and Christopher Kelley (North Carolina State University) Adopting the CMU/APWG Anti-Phishing Landing Page idea for Germany - Melanie Volkamer, Simon Stockhardt, Steffen Bartsch and Michaela Kauer (TU Darmstadt) REGISTRATION and VENUE ---------------------- More information at www.stast2013.uni.lu PROGRAM COMMITTEE ----------------- Bishop, Matt (Univ. of California, CA, USA) Boyd, Colin (Queensland University of Technology, AU) Coles-Kemp, Lizzie (RHUL, UK) Garg, Vaibhav (Univ. of Indiana, USA) Jakobsson, Markus (PayPal, USA) Hartel, Pieter (Univ. of Twente, NL) Herley, Cormac (Microsoft Research, USA) Kammueller, Florian (Middlesex Univ., UK) Koenig, Vincent (Univ. of Luxembourg, L) Martina, Jean (Univ. Federal de Santa Catarina, BR) Mauw, Sjouke (Univ. of Luxembourg, L) Moore, Andrew P. (CERT/SEI, USA) Moore, Tyler (SMU, TX, USA) Ortlieb, Martin (Google, CH) Pieters, Wolters (Univ. of Twente and TU Delft, NL) Ryan, Peter Y. A. (Univ. of Luxembourg, LU) Staddon, Jessica (Google, CA, USA) Vigan?, Luca (Univ. of Verona, IT) Volkamer, Melanie (TU Darmstadt, D) Yan, Jeff (Newcastle Univ., UK) -------------------- ORGANIZERS *** Workshop Chairs Giampaolo Bella (Univ. of Catania, IT) Gabriele Lenzini (Univ. of Luxembourg, L) *** Programme Chairs Christian W. Probst (DTU, DK) Trish Williams (Edith Cowan University, AU) -------------- next part -------------- A non-text attachment was scrubbed... Name: stast2012_c4part.pdf Type: application/pdf Size: 117737 bytes Desc: stast2012_c4part.pdf URL: From kapadia at indiana.edu Wed Jun 19 22:40:59 2013 From: kapadia at indiana.edu (Apu Kapadia) Date: Wed, 19 Jun 2013 22:40:59 -0400 Subject: [Soups-announce] PETS: Extended early registration deadline: June 20th Message-ID: <4399B109-2013-4CBC-98A6-F0D839E208D1@indiana.edu> Dear Colleagues, Please consider attending PETS and/or PETools. Early registration ends soon: Thursday June 20th. Regards, Apu Kapadia ------------------------------ (apologies if you received duplicate copies of this call for participation) CALL FOR PARTICIPATION The 13th Privacy Enhancing Technologies Symposium (PETS 2013) July 10-12, 2013 Bloomington, Indiana, USA http://petsymposium.org/ Registration for PETS 2013 is now *OPEN* at http://petsymposium.org/2013/registration.php *** Early registration deadline: June 20, 2013 *** As the amount and the sensitivity of information disseminated in the online world grow, so do related privacy concerns. Extensive surveillance and massive tracking of users on the Web are only some of today?s threats to individual privacy. In the big data era, information increasingly equals power and money, and organizations are thus motivated to collect and retain large quantities of personal and, increasingly, contextual information. The Privacy Enhancing Technologies Symposium (PETS) aims to advance the state of the art and foster a worldwide community of researchers and practitioners to discuss innovation and new perspectives. It brings together privacy experts from around the world to discuss recent advances and new perspectives. PETS announces novel research efforts toward designing and building systems for privacy and anonymity protection as well as analyzing challenges and threats. The full program for the event can be found at http://petsymposium.org/2013/program.php: it includes 13 accepted papers, two panels, a rump session, and a keynote talk by Prof. Lorrie Cranor (Carnegie Mellon University). Additionally, PETS will feature a one-day workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs 2013). The ambition of the workshop is to foster new ideas, spirited debates, as well as controversial perspectives on privacy (and lack thereof). The program is available at http://petsymposium.org/2013/hotpets.php and includes 9 accepted papers and a keynote talk by Prof. Helen Nissenbaum (New York University). General Chair: XiaoFeng Wang, Indiana University Bloomington Program Chairs: Emiliano De Cristofaro, PARC Matthew Wright, University of Texas at Arlington HotPETs Chairs: Prateek Mittal, UC Berkeley Reza Shokri, EPFL Local Arrangements Committee: Apu Kapadia, Indiana University Bloomington Raquel Hill, Indiana University Bloomington Haixu Tang, Indiana University Bloomington PETS will also feature a ?Pre-PETS? workshop on July 9th: PETools: Workshop on Privacy Enhancing Tools http://petools.soic.indiana.edu You can register for PETools on the PETS registration page. -- Apu Kapadia, Ph.D. Assistant Professor School of Informatics and Computing Indiana University Bloomington http://www.cs.indiana.edu/~kapadia/ IU Privacy Lab: http://private.soic.indiana.edu/