From jonathan.anderson at mun.ca Wed Jan 2 12:33:59 2019 From: jonathan.anderson at mun.ca (Jonathan Anderson) Date: Wed, 02 Jan 2019 14:03:59 -0330 Subject: [Soups-announce] SPW 2019: two days left to submit Message-ID: The organizing committee of the International Workshop on Security Protocols would like to remind you that the twenty-seventh workshop will be held 10-12 April 2019 at Trinity College in Cambridge, UK. Attendance is by invitation only: we invite the submission of position papers by 4 Jan 2019, and authors of selected papers will be invited to participate in the workshop. https://www.cl.cam.ac.uk/events/spw/2019 The theme of the 2019 workshop is "security protocols for humans". Getting protocol details right is critical in the presence of a malicious adversary, but so is understanding the context in which a protocol is deployed: protocols are components of larger systems that human beings put their trust in. How can we design protocols to expose meaningful information about state and functionality to their users? What are the consequences when we don't? How can we bridge the gap between technical definitions of protocol correctness and users' security expectations? As in previous years, the theme should inspire rather than constrain: all submissions in the broad area of security protocols will be considered. Authors should submit position papers or extended abstracts to jonathan.anderson at mun.ca by 4 Jan 2019; responses will be given by 11 Feb 2019. From sam.ransbotham at bc.edu Sun Jan 6 15:44:00 2019 From: sam.ransbotham at bc.edu (Sam Ransbotham) Date: Sun, 6 Jan 2019 15:44:00 -0500 Subject: [Soups-announce] CFP: Workshop on the Economics of Information Security, 3-4 June 2019, Harvard University, Boston, MA Message-ID: <310ca111-dcfb-b7e0-ad0e-94d3acf5c5dc@bc.edu> The 18th Annual Workshop on the Economics of Information Security (WEIS 2019) https://weis2019.econinfosec.org Harvard University, Boston, Massachusetts,?June 3-4, 2019 Information security and privacy continue to grow in importance, as threats proliferate, privacy erodes, and attackers find new sources of value. Yet the security of information systems and the privacy offered by them depends on more than just technology. Each requires an understanding of the incentives and trade-offs inherent to the behavior of people and organizations. As society?s dependence on information technology has deepened, policy-makers have taken notice. Now more than ever, careful research is needed to characterize accurately threats and countermeasures, in both the public and private sectors. The Workshop on the Economics of Information Security (WEIS) is the leading forum for interdisciplinary scholarship on information security and privacy, combining expertise from the fields of economics, social science, business, law, policy, and computer science. Prior workshops have explored the role of incentives between attackers and defenders of information systems, identified market failures surrounding Internet security, quantified risks of personal data disclosure, and assessed investments in cyber-defense. The 2019 workshop will build on past efforts using empirical and analytic tools not only to understand threats, but also to strengthen security and privacy through novel evaluations of available solutions. We encourage economists, computer scientists, legal scholars, business school researchers, security and privacy specialists, as well as industry experts to submit their research and participate by attending the workshop. Suggested topics include (but are not limited to) empirical and theoretical studies of: Optimal investment in information security Models and analysis of online crime (including botnets, ransomware, and underground markets) Cyber-risk quantification and cyber-insurance Security standards and regulation Vulnerability discovery, disclosure, and patching Incentives for information sharing and cooperation Cyber-security policy Economics of privacy and anonymity Behavioral security and privacy Incentives for and against pervasive monitoring threats Cyber-defense strategy SUBMISSION Submitted manuscripts should represent significant and novel research contributions. WEIS has no formal formatting guidelines. Previous contributors spanned fields from economics and psychology to computer science and law, each with different norms and expectations about manuscript length and formatting. This year, authors have the option to submit their manuscripts in anonymized form for double-blind review. Advisable rules of thumb include: using past WEIS accepted papers as templates and adhering to your community?s publication standards. Please submit your papers via?EasyChair (https://easychair.org/conferences/?conf=weis2019). Authors whose papers appear at the workshop may be invited to submit a revised version to a special issue of the Journal of Cybersecurity, an interdisciplinary open access journal published by Oxford University Press.? Revised papers will undergo an additional round of peer review after the workshop, and accepted papers will appear in the special issue. Please note that publication charges must be paid to facilitate open access, but a publishing fund is available to authors whose institutions cannot pay. For more information please see?http://cybersecurity.oxfordjournals.org/for_authors/index.html. IMPORTANT DATES ??? Submission deadline: February 15, 2019 (by midnight EST) ??? Notification of acceptance: April 7, 2019 ??? Final papers due (revisions): May 10, 2019 ??? Workshop dates: June 3-4, 2019 CONFERENCE CHAIRS ??? Bruce Schneier, IBM Resilient ??? Sam Ransbotham, Boston College PROGRAM COMMITTEE ??? Alessandro Acquisti, Carnegie Mellon University ??? Idris Adjerid, Virginia Tech ??? Ross Anderson, Cambridge University ??? Daniel Arce, UT Dallas ??? Terrence August, UC San Diego ??? Johannes Bauer, Michigan State University ??? Jesse Bockstedt, Emory University ??? Rainer B?hme, University of Innsbruck ??? Laura Brandimarte, University of Arizona ??? Jean Camp, Indiana University ??? Jonathan Cave, RAND Europe ??? Huseyin Cavusoglu, University of Texas at Dallas ??? Nicolas Christin, Carnegie Mellon University ??? Richard Clayton, University of Cambridge ??? Ben Edelman, Harvard Business School ??? Ben Edwards, IBM Research ??? Serge Egelman, ICSI & UC Berkeley ??? Neil Gandal, Tel Aviv University ??? Dan Geer, In-Q-Tel ??? Lawrence Gordon, University of Maryland ??? Sol Greenspan, National Science Foundation ??? Jens Grossklags, TU Munich ??? Chad Heitzenrater, Air Force Research Laboratory ??? Kai-Lung Hui, HKUST ??? M. Eric Johnson, Vanderbilt University ??? Kartik Kannnan, Purdue University ??? Aron Laszka, Vanderbilt University ??? Martin Loeb, University of Maryland ??? Thomas Maillart, University of Geneva ??? Fabio Massacci, University of Trento ??? Kanta Matsuura, University of Tokyo ??? Damon McCoy, New York University ??? Sabyasachi Mitra, Georgia Tech ??? Tyler Moore, University of Tulsa ??? Frank Nagle, Harvard Business School ??? Andrew Odlyzko, University of Minnesota ??? Min-Seok Pang, Temple University ??? Wolter Pieters, TU Delft ??? Lorenzo Pupillo, CEPS ??? David Pym, University College London ??? Sasha Romanosky, RAND ??? Rahul Telang, Carnegie Mellon University ??? Catherine Tucker, MIT ??? Marie Vasek, University of New Mexico ??? Liad Wagman, Illinois Institute of Technology ??? Julian Williams, Durham University ??? Dmitry Zhdanov, Georgia State University -- Sam Ransbotham Boston College Associate Professor of Information Systems sam.ransbotham at bc.edu From elizabeth.stobert at gmail.com Thu Jan 10 20:00:22 2019 From: elizabeth.stobert at gmail.com (Elizabeth Stobert) Date: Thu, 10 Jan 2019 20:00:22 -0500 Subject: [Soups-announce] NSPW 2019 Call for Papers / Social Manipulation Through Technology Message-ID: Apologies for cross posting. NSPW 2019: Call for Papers San Carlos, Costa Rica September 23-26, 2019 www.nspw.org Submission deadline: April 12, 2019 23:59 (UTC -11) firm Format: PDF file (ACM SIG formatting) via Easychair Author responses: May 24 - June 3, 2019 Notification of acceptance: June 12, 2019 Pre-proceedings deadline: July 8, 2019 Invitations sent: July 15, 2019 Early registration: July 29, 2019 Late registration: August 5, 2019 Workshop: September 23-26, 2019 Final version: November 15, 2019 The New Security Paradigms Workshop (NSPW) seeks embryonic, disruptive, and unconventional ideas on information and cyber security that benefit from early feedback. Submissions typically address current limitations of information security, directly challenge long-held beliefs or the very foundations of security, or discuss problems from an entirely novel angle, leading to new solutions. We welcome papers both from computer science and other disciplines that study adversarial relationships, as well as from practice. The workshop is invitation-only; all accepted papers receive a 1 hour plenary time slot for presentation and discussion. In order to maximize diversity of perspectives, we particularly encourage submissions from new NSPW authors, from Ph.D. students, and from non-obvious disciplines and institutions. In 2019, NSPW invites theme submissions around ?Social manipulation through technology? next to regular submissions. Recently, a new type of concern is emerging in the cybersecurity community: how should the field deal with the possibility of manipulating societies or subgroups within a society via information and communication technology (e.g. trolling, fake news, election manipulation)? What are new paradigms that could help in this context? Possible topics include, but are not limited to: ? What are the motives, origins and characteristics of such manipulations? ? What are the effects on social systems in terms of culture, politics, communication, media, trust, power? ? What can and should our field do, if anything, to safeguard the values embedded in our societies against such manipulations? ? How do current technical and social arrangements enable or facilitate manipulation? ? What new technical or social protections might we put in place? What new social media could help, or hurt? For the theme, we particularly invite cross-disciplinary submissions that may be having trouble finding the right venue, and submissions (co-)authored by social and political scientists. NSPW 2019 will be held at Hotel Tilajari in San Carlos, Costa Rica. As in the past, this choice of venue is designed to facilitate interactions between the invited attendees throughout the workshop. Submission Instructions NSPW accepts three categories of submissions: ? Regular Submissions present a new approach (paradigm) to a security problem or critique existing approaches. While regular submissions may present research results (mathematical or experimental), unlike papers submitted to most computer security venues, these results should not be the focus of the submission; instead, the change in approach should be the focus. ? Theme Submissions are focused on ?Social manipulation through technology?, and should explain the connection with the theme in the justification statement (see below). They follow the format of a regular submission. ? Panel Proposals describe a debatable topic of interest to the security community that merits significant discussion. Proposals should describe the major perspectives on the chosen topic. They should also present the background of the panelists, explaining how they are the right people to discuss the chosen topic at NSPW. Submissions must be made in PDF format, 6-15 pages, ACM SIG formatting , through EasyChair, as linked on the NSPW site. Submissions must include a cover page with authors' names, affiliation, justification statement and attendance statement. Papers not including these risk rejection without review. The justification statement briefly explains why the submission is appropriate for NSPW and the chosen submission category. The attendance statement must specify which author(s) will attend upon acceptance/invitation. Submissions should not be blinded. Organizers and PC members are allowed to submit, but will not be involved in the evaluation of their own papers. All submissions are treated as confidential as a matter of policy. NSPW does not accept previously published or concurrently submitted papers. Authors may submit review responses during the review process indicating the changes they wish to commit to. Papers are accepted conditionally and are shepherded, with final proceedings being published after the workshop. Attendance The workshop itself is invitation-only, with typically 30-35 participants consisting of authors of about 12 accepted papers, panelists, program committee members, and organizers. One author of each accepted paper must attend; additional authors may be invited if space permits. All participants must commit to a ?social contract?: no one arrives late, no one leaves early, no electronic distractions (including laptops, tablets, and mobile devices), and all attend all sessions of the 2.5 day program, sharing meals in a group setting and complying with the code of conduct. The workshop is preceded by an evening reception allowing attendees to meet each other beforehand. Financial Aid: Financial aid may be available, especially for U.S.-based students and junior faculty. We encourage submissions from students and junior faculty, even if support is required to attend. Program Committee Co-chairs: Wolter Pieters, Delft University of Technology, w.pieters at tudelft.nl Elizabeth Stobert, National Research Council Canada, elizabeth at stobert.ca -------------- next part -------------- An HTML attachment was scrubbed... URL: From soupspublicity at gmail.com Tue Feb 12 08:36:08 2019 From: soupspublicity at gmail.com (SOUPS Publicity) Date: Tue, 12 Feb 2019 08:36:08 -0500 Subject: [Soups-announce] SOUPS Paper Registration Deadline Approaching Message-ID: [image: SOUPS.png] Just nine days remain until the paper registration deadline for the Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019) . Register your papers by *Thursday, February 21*. Paper registration is *mandatory*. See the Call for Papers for submission guidelines, requirements, and other paper deadlines. *Other Upcoming Submission Deadlines for SOUPS 2019:* - Workshop, Tutorial, and Hackathon Proposals : Monday, March 11, 2019 - Poster Submissions : Friday, May 24, 2019 - Lightning Talk Proposals (Early Deadline): Friday, May 24, 2019 SOUPS 2019 will take place August 11-13, 2019 in Santa Clara, CA, USA and is co-located with USENIX Security '19 . ___________________________ This email address is not regularly monitored. For contact information and additional details for SOUPS 2019, please visit the conference website: https://www.usenix.org/conference/soups2019 -------------- next part -------------- An HTML attachment was scrubbed... URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: SOUPS.png Type: image/png Size: 18335 bytes Desc: not available URL: From wash at msu.edu Thu Feb 14 10:24:03 2019 From: wash at msu.edu (Rick Wash) Date: Thu, 14 Feb 2019 10:24:03 -0500 Subject: [Soups-announce] PostDoc in Usable Security at Michigan State University Message-ID: The Michigan State University BITLab (http://bitlab.cas.msu.edu) seeks a Postdoctoral Research Associate to conduct research with Dr. Rick Wash ( http://rickwash.com) on projects related to usable cybersecurity. Prof. Wash is working on understanding general properties of how people make security-relevant decisions and how we can better train end users to improve those decisions. He?s recently been examining how people identify phishing messages, and how narrative stories can be used to improve security training. These studies also provide opportunities to study the cognitive and social aspects of cybersecurity. Our group?s recent research papers in this space include: * Rick Wash and Molly Cooper. ?Who Provides Phishing Training? Facts, Stories, and People Like Me? Proceedings of the ACM Conference on Human Factors in Computing (CHI). Montreal, Canada. April 2018. [Honorable Mention Award] * Rick Wash, Emilee Rader, and Chris Fennell. ?Can People Self-Report Security Accurately? Agreement Between Self-Report and Behavioral Measures? Proceedings of the ACM Conference on Human Factors in Computing (CHI). Denver, CO. May 2017. * Rick Wash, Emilee Rader, Ruthie Berman, and Zac Wellmer. ?Understanding Password Choices: How Frequently Entered Passwords are Re-used Across Websites? Proceedings of the Symposium on Usable Privacy and Security (SOUPS). Denver, Colorado. June 2016. The research associate will have access to state-of-the-art research facilities, undergraduate research assistants, and an engaging community of scholars interested in human-computer interaction, social computing, cybersecurity, technology in society, and technology policy. The pos?ition does not have a teaching requirement, but will have opportunities to teach and mentor both undergraduate and grad students. The postdoc will be viewed as a colleague, and with mentorship, will be launched to the next stage of their career. The Postdoctoral Research Associate requires a terminal degree Human-Computer Interaction, Information Science, Computer Science, Cybersecurity, or a related field, and should possess skills and interests related to human aspects of cybersecurity. Applicants should have interest in publishing research related to human factors in cybersecurity at top venues like SOUPS, CHI, or the big 4 security conferences, but experience publishing research in other high-quality peer-reviewed venues is also welcome. The ideal postdoctoral fellow will be skilled at executing high-impact research, have experience with qualitative research methods, and have a strong understanding of both technical and human issues in cybersecurity. Applicants should be excited about participating in collaborative, interdisciplinary research at MSU, and willing to move to East Lansing, Michigan. Applicants must have defended their PhD by the time of employment. *How do I apply?* To apply, please prepare 1) a cover letter stating your background, experiences, skills, interest in the position, and career objectives; 2) a curriculum vitae or resume; 3) names and contact information for two references who can write a letter on your behalf and discuss your research skills; and 4) a relevant sample of research output. Please submit these materials using the MSU careers website http://careers.msu.edu to job 561011. If you have any questions, please email Rick Wash . *How much does this position pay?* The University classifies this as a Research Associate position. This Research Associate will receive a salary of approximately US $55,000/year for full-time employment as well as full benefits ([Benefits]( https://www.hr.msu.edu/benefits/index.html)). Additional funds are available for equipment and professional travel. The position will be for one year. *What is the timeline?* Review of applicants will begin on March 1, 2019 and continue until the position is filled. The preferred start date for the position is August 15th, 2019, but we can be flexible (earlier or later) depending on other factors. *More Information* http://bitlab.cas.msu.edu/postdoc.html http://careers.msu.edu/cw/en-us/job/500853/research-associatefixed-term -------------- next part -------------- An HTML attachment was scrubbed... URL: From eredmiles at cs.umd.edu Wed Feb 20 12:50:11 2019 From: eredmiles at cs.umd.edu (Elissa Redmiles) Date: Wed, 20 Feb 2019 12:50:11 -0500 Subject: [Soups-announce] Exciting March Deadlines! Submit EuroUSEC papers March 7 and SOUPS Workshop/Hackathon/etc. proposals March 11 Message-ID: Hi lovely SOUPS friends, More click-bait from me promoting two calls for submissions: SOUPS Workshop Proposals DUE March 11 Just like last year workshops can be workshops, tutorials, hack-a-thons, design-a-thons, data-thons, and things-we-haven't-thought-of-but-are-awesome-a-thons. Please submit all your terrific ideas by March 11 and help us set up some awesome SOUPS pre-conference activities. CFP: https://www.usenix.org/conference/soups2019/call-for-workshops EuroUSEC Papers DUE March 7 This year EuroUSEC is accepting both longer 10-page papers on mature/completed work in a research track, as well as shorter 5-page papers on work in progress (or work that has yet to begin) in a vision track. Submit your work by March 7 and look forward to a workshop of in-depth discussion and feedback! CFP: https://eusec.cs.uchicago.edu Submit submit y'all! Elissa Redmiles & Daniel Zappala SOUPS Workshop Co-Chairs Max Golla & Elissa Redmiles EuroUSEC Publicity Co-Chairs -------------- next part -------------- An HTML attachment was scrubbed... URL: From soupspublicity at gmail.com Wed Feb 20 14:05:12 2019 From: soupspublicity at gmail.com (SOUPS Publicity) Date: Wed, 20 Feb 2019 14:05:12 -0500 Subject: [Soups-announce] SOUPS Paper Registration Deadline TOMORROW (February 21) Message-ID: [image: SOUPS.png] The paper registration deadline for the Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019) is *tomorrow (Thursday, February 21)*! Although the paper submission deadline is a week away, registration of your paper by tomorrow's deadline is *mandatory*. See the Call for Papers for submission guidelines, requirements, and other paper deadlines. *Other Upcoming Submission Deadlines for SOUPS 2019:* - Workshop, Tutorial, and Hackathon Proposals : Monday, March 11, 2019 - Poster Submissions : Friday, May 24, 2019 - Lightning Talk Proposals (Early Deadline): Friday, May 24, 2019 SOUPS 2019 will take place August 11-13, 2019 in Santa Clara, CA, USA and is co-located with USENIX Security '19 . ___________________________ This email address is not regularly monitored. For contact information and additional details for SOUPS 2019, please visit the conference website: https://www.usenix.org/conference/soups2019 -------------- next part -------------- An HTML attachment was scrubbed... URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: SOUPS.png Type: image/png Size: 18335 bytes Desc: not available URL: From eredmiles at cs.umd.edu Thu Mar 7 13:02:21 2019 From: eredmiles at cs.umd.edu (Elissa Redmiles) Date: Thu, 7 Mar 2019 13:02:21 -0500 Subject: [Soups-announce] SOUPS workshops submissions due March 11 + Submission Link! Message-ID: We look forward to reviewing your and your colleague's awesome submissions for SOUPS workshops / tutorials / hackathons / etc. It has just come to our attention that the workshops submission link was for some reason not available on the website. Please submit your workshops / tutorials / hackathons here: https://soups19workshops.usenix.hotcrp.com by March 11! Sincerely, Elissa Redmiles & Daniel Zappala SOUPS Workshops Co-Chairs -------------- next part -------------- An HTML attachment was scrubbed... URL: From jose.such at kcl.ac.uk Fri Mar 15 10:53:06 2019 From: jose.such at kcl.ac.uk (Such, Jose M) Date: Fri, 15 Mar 2019 14:53:06 +0000 Subject: [Soups-announce] Two Security and Privacy Faculty Positions at King's College London Message-ID: <2381195C-AB3D-487D-AA33-D2C817828A3D@kcl.ac.uk> Dears, King?s is further investing in Security and Privacy. Two new positions, which are broad in scope, including Usable Security and Privacy, are available: Lecturer (equivalent to Assistant Professor in the US): https://my.corehr.com/pls/kingrecruit/erq_jobspec_version_4.display_form?p_company=1&p_internal_external=E&p_display_in_irish=N&p_process_type=&p_applicant_no=&p_form_profile_detail=&p_display_apply_ind=Y&p_refresh_search=Y&p_recruitment_id=011506 Senior Lecturer (equivalent to Associate Professor in the US): https://my.corehr.com/pls/kingrecruit/erq_jobspec_version_4.display_form?p_company=1&p_internal_external=E&p_display_in_irish=N&p_process_type=&p_applicant_no=&p_form_profile_detail=&p_display_apply_ind=Y&p_refresh_search=Y&p_recruitment_id=011492 Please share with potentially interested candidates. I am happy to have an informal conversation with them too. Best Jose ------------------------ Dr Jose M. Such Reader (Associate Professor) in Security and Privacy Director, KCL Cybersecurity Centre, an EPSRC-NCSC Academic Centre of Excellence in Cyber Security Research (ACE-CSR) Department of Informatics King's College London A: Bush House (N) 7.17 | 30 Aldwych | London WC2B 4BG E: jose.such at kcl.ac.uk W: http://nms.kcl.ac.uk/jose.such/ -------------- next part -------------- An HTML attachment was scrubbed... URL: From elizabeth.stobert at gmail.com Fri Apr 5 09:02:32 2019 From: elizabeth.stobert at gmail.com (Elizabeth Stobert) Date: Fri, 5 Apr 2019 09:02:32 -0400 Subject: [Soups-announce] NSPW 2019 Call for Papers / Social Manipulation Through Technology Message-ID: A reminder that NSPW 2019 papers are due in one week! ~~~~~~~~~~~~~~~~~~~~~~ Apologies for cross posting. NSPW 2019: Call for Papers San Carlos, Costa Rica *September 23-26, 2019* www.nspw.org Submission deadline: *April 12, 2019 23:59 (UTC -11) firm* Format: PDF file (ACM SIG formatting) via Easychair Author responses: May 24 - June 3, 2019 Notification of acceptance: June 12, 2019 Pre-proceedings deadline: July 8, 2019 Invitations sent: July 15, 2019 Early registration: July 29, 2019 Late registration: August 5, 2019 Workshop: September 23-26, 2019 Final version: November 15, 2019 The New Security Paradigms Workshop (NSPW) seeks embryonic, disruptive, and unconventional ideas on information and cyber security that benefit from early feedback. Submissions typically address current limitations of information security, directly challenge long-held beliefs or the very foundations of security, or discuss problems from an entirely novel angle, leading to new solutions. We welcome papers both from computer science and other disciplines that study adversarial relationships, as well as from practice. The workshop is invitation-only; all accepted papers receive a 1 hour plenary time slot for presentation and discussion. In order to maximize diversity of perspectives, we particularly encourage submissions from new NSPW authors, from Ph.D. students, and from non-obvious disciplines and institutions. In 2019, NSPW invites theme submissions around ?Social manipulation through technology? next to regular submissions. Recently, a new type of concern is emerging in the cybersecurity community: how should the field deal with the possibility of manipulating *societies* or subgroups within a society via information and communication technology (e.g. trolling, fake news, election manipulation)? What are new paradigms that could help in this context? Possible topics include, but are not limited to: ? What are the motives, origins and characteristics of such manipulations? ? What are the effects on social systems in terms of culture, politics, communication, media, trust, power? ? What can and should our field do, if anything, to safeguard the values embedded in our societies against such manipulations? ? How do current technical and social arrangements enable or facilitate manipulation? ? What new technical or social protections might we put in place? What new social media could help, or hurt? For the theme, we particularly invite cross-disciplinary submissions that may be having trouble finding the right venue, and submissions (co-)authored by social and political scientists. NSPW 2019 will be held at Hotel Tilajari in San Carlos, Costa Rica. As in the past, this choice of venue is designed to facilitate interactions between the invited attendees throughout the workshop. Submission Instructions NSPW accepts three categories of submissions: ? *Regular Submissions* present a new approach (paradigm) to a security problem or critique existing approaches. While regular submissions may present research results (mathematical or experimental), unlike papers submitted to most computer security venues, these results should not be the focus of the submission; instead, the change in approach should be the focus. ? *Theme Submissions* are focused on ?Social manipulation through technology?, and should explain the connection with the theme in the justification statement (see below). They follow the format of a regular submission. ? *Panel Proposals* describe a debatable topic of interest to the security community that merits significant discussion. Proposals should describe the major perspectives on the chosen topic. They should also present the background of the panelists, explaining how they are the right people to discuss the chosen topic at NSPW. Submissions must be made in PDF format, 6-15 pages, ACM SIG formatting , through EasyChair, as linked on the NSPW site. *Submissions must include a cover page with authors' names, affiliation, justification statement and attendance statement.* Papers not including these risk rejection without review. The justification statement briefly explains why the submission is appropriate for NSPW and the chosen submission category. The attendance statement must specify which author(s) will attend upon acceptance/invitation. Submissions *should not* be blinded. Organizers and PC members are allowed to submit, but will not be involved in the evaluation of their own papers. All submissions are treated as confidential as a matter of policy. NSPW does not accept previously published or concurrently submitted papers. Authors may submit review responses during the review process indicating the changes they wish to commit to. Papers are accepted conditionally and are shepherded, with final proceedings being published after the workshop. Attendance The workshop itself is invitation-only, with typically 30-35 participants consisting of authors of about 12 accepted papers, panelists, program committee members, and organizers. One author of each accepted paper must attend; additional authors may be invited if space permits. All participants must commit to a ?social contract?: no one arrives late, no one leaves early, no electronic distractions (including laptops, tablets, and mobile devices), and all attend all sessions of the 2.5 day program, sharing meals in a group setting and complying with the code of conduct. The workshop is preceded by an evening reception allowing attendees to meet each other beforehand. *Financial Aid: *Financial aid may be available, especially for U.S.-based students and junior faculty. We encourage submissions from students and junior faculty, even if support is required to attend. Program Committee Co-chairs: Wolter Pieters, *Delft University of Technology*, w.pieters at tudelft.nl Elizabeth Stobert, *National Research Council of Canada*, elizabeth at stobert.ca -------------- next part -------------- An HTML attachment was scrubbed... URL: From wash at msu.edu Thu May 9 07:20:58 2019 From: wash at msu.edu (Rick Wash) Date: Thu, 9 May 2019 12:20:58 +0100 Subject: [Soups-announce] Postdoc in Usable Security at Michigan State University Message-ID: The Michigan State University BITLab (http://bitlab.cas.msu.edu) seeks a PostdoctoralResearch Associate to conduct research with Dr. Rick Wash ( http://rickwash.com) on projects related to usable cybersecurity. Prof. Wash is working on understanding general properties of how people make security-relevant decisions and how we can better train end users to improve those decisions. He?s recently been examining how people identify phishing messages, and how narrative stories can be used to improve security training. These studies also provide opportunities to study the cognitive and social aspects of cybersecurity. Our group?s recent research papers in this space include: * Rick Wash and Molly Cooper. ?Who Provides Phishing Training? Facts, Stories, and People Like Me? Proceedings of the ACM Conference on Human Factors in Computing (CHI). Montreal, Canada. April 2018. [Honorable Mention Award] * Rick Wash, Emilee Rader, and Chris Fennell. ?Can People Self-Report Security Accurately? Agreement Between Self-Report and Behavioral Measures? Proceedings of the ACM Conference on Human Factors in Computing (CHI). Denver, CO. May 2017. * Rick Wash, Emilee Rader, Ruthie Berman, and Zac Wellmer. ?Understanding Password Choices: How Frequently Entered Passwords are Re-used Across Websites? Proceedings of the Symposium on Usable Privacy and Security (SOUPS). Denver, Colorado. June 2016. The research associate will have access to state-of-the-art research facilities, undergraduate research assistants, and an engaging community of scholars interested in human-computer interaction, social computing, cybersecurity, technology in society, and technology policy. The pos?ition does not have a teaching requirement, but will have opportunities to teach and mentor both undergraduate and grad students. The postdoc will be viewed as a colleague, and with mentorship, will be launched to the next stage of their career. The Postdoctoral Research Associate requires a terminal degree Human-Computer Interaction, Information Science, Computer Science, Cybersecurity, or a related field, and should possess skills and interests related to human aspects of cybersecurity. Applicants should have interest in publishing research related to human factors in cybersecurity at top venues like SOUPS, CHI, or the big 4 security conferences, but experience publishing research in other high-quality peer-reviewed venues is also welcome. The ideal postdoctoral fellow will be skilled at executing high-impact research, have experience with qualitative research methods, and have a strong understanding of both technical and human issues in cybersecurity. Applicants should be excited about participating in collaborative, interdisciplinary research at MSU, and willing to move to East Lansing, Michigan. Applicants must have defended their PhD by the time of employment. *How do I apply?* To apply, please prepare 1) a cover letter stating your background, experiences, skills, interest in the position, and career objectives; 2) a curriculum vitae or resume; 3) names and contact information for two references who can write a letter on your behalf and discuss your research skills; and 4) a relevant sample of research output. Please submit these materials using the MSU careers website http://careers.msu.edu to job 561011. If you have any questions, please email Rick Wash . *How much does this position pay?* The University classifies this as a Research Associate position. This Research Associate will receive a salary of approximately US $55,000/year for full-time employment as well as full benefits ([Benefits]( https://www.hr.msu.edu/benefits/index.html)). Additional funds are available for equipment and professional travel. The position will be for one year. *What is the timeline?* Review of applicants will continue until the position is filled. The preferred start date for the position is August 15th, 2019, but we can be flexible (earlier or later) depending on other factors. *More Information* http://bitlab.cas.msu.edu/postdoc.html http://careers.msu.edu/cw/en-us/job/500853/research-associatefixed-term -------------- next part -------------- An HTML attachment was scrubbed... URL: From soupspublicity at gmail.com Sun May 12 16:57:36 2019 From: soupspublicity at gmail.com (SOUPS Publicity) Date: Sun, 12 May 2019 16:57:36 -0400 Subject: [Soups-announce] SOUPS Workshop, Poster, Lightning Talk, and Karat Award Deadlines May 24 Message-ID: [image: image.png] Get ready! Workshop, poster, lightning talk, and Karat Award deadlines are coming up on *May 24* for SOUPS 2019 : *Submit to a Workshop!* Submit your work to one of the outstanding SOUPS 2019 workshops: - *Who Are You!? Adventures in Authentication (WAY 2019) * - *Workshop on Inclusive Privacy and Security (WIPS 2019) * - *Workshop on Security Information Workers (WSIW 2019) * - *Designing for the Extremes of Risk * *Propose a Poster Abstract !* High-quality poster presentations are an integral part of SOUPS. We seek poster abstracts describing recent or ongoing research related to usable privacy and security. We look forward to an exceptionally diverse, inclusive, and interesting poster session. *Pitch a Lightning Talk (early deadline)!* Anyone is welcome to propose a five-minute lightning talk, and we strongly encourage students to do so. This is a great opportunity to present your research interests to the community, generate hallway conversation, and receive helpful feedback. *Nominate a Student for a Karat Award !* The John Karat Usable Privacy and Security Student Research Award will be presented to a graduate student based on their research in usable privacy and security, their efforts to mentor others, and their community service for usable privacy and security. SOUPS 2019 will take place August 11-13, 2019 in Santa Clara, CA, USA and is co-located with USENIX Security '19 . ___________________________ This email address is not regularly monitored. For contact information and additional details for SOUPS 2019, please visit the conference website: https://www.usenix.org/conference/soups2019 -------------- next part -------------- An HTML attachment was scrubbed... URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: image.png Type: image/png Size: 33382 bytes Desc: not available URL: From sadeh at cs.cmu.edu Sun May 12 17:32:22 2019 From: sadeh at cs.cmu.edu (Norman Sadeh) Date: Sun, 12 May 2019 17:32:22 -0400 Subject: [Soups-announce] SOUPS 2019: URGENT: Could you please confirm that you will publicize our tutorial - see email below In-Reply-To: References: <20190321201100.8802864AB4@mail.hotcrp.com> Message-ID: I just saw the SOUPS 2019 announcement. Unless I missed something it does not include any information about our tutorial. Could you urgently confirm that you will be publicizing our tutorial? At this time, people are under the impression that there are only workshops and have no idea that they could also elect to attend our tutorial. Thank you for quickly fixing this. Norman ---------- Forwarded message --------- From: Norman Sadeh Date: Sat, May 11, 2019 at 4:10 PM Subject: Re: [SOUPS 2019 Workshops, Tutorials, Hackathons] Accepted SOUPS Workshop #6 "Contextual Integrity: From Theory to..." To: Daniel Zappala , Cc: SOUPS 2019 Workshop Chairs , Serge Egelman , Helen Nissenbaum , < Heather.Lipford at uncc.edu>, Linda Moreci Hello Daniel and Elissa, As requested, attached is the text to advertise our half-day tutorial. We assume this will be hosted on the SOUPS website and that we don't have to set up our own site given that this is a tutorial and not a workshop. Thanks for confirming that we are on the same page and for letting us know if you need anything else. Once this is up on the SOUPS website, we can easily forward a link to various mailing lists we each have access to. Helen, Serge and Norman On Tue, Apr 23, 2019 at 9:07 PM Norman Sadeh wrote: > Hi Daniel, > > Please give us another couple of weeks to come up with something. > > Thank you! > > Norman > > On Tue, Apr 23, 2019 at 4:28 PM Daniel Zappala wrote: > >> Norman, >> >> That's right, no CFP will be needed then. Looks like the main thing then >> is a website that you could setup. Do you have a webpage we could point >> folks to? That should list a contact email so interested folks can get in >> touch. >> >> Regarding publicity, my understanding is that we can link to your website >> from the SOUPS website, we can advertise via the SOUPS mailing list, and we >> can ask SOUPS to promote via social media. We can also promote via social >> media on our personal accounts for you. >> >> -- Daniel Zappala >> >> >> On Tue, Apr 23, 2019 at 2:01 PM Norman Sadeh wrote: >> >>> Hi Daniel, >>> >>> Thanks for your email. We are truly excited about our upcoming tutorial >>> and are slowly getting organized. >>> Given that this is a tutorial rather than a workshop, we were not >>> planning to issue a CFP. >>> We could (and will) obviously advertise our tutorial but are assuming >>> that SOUPS/USENIX will also provide some help here. >>> Could you provide us with more details about what you will be taking >>> care of as far as publicity and other arrangements are concerned? >>> >>> Thank you! >>> >>> Norman >>> >>> On Tue, Apr 23, 2019 at 3:26 PM Daniel Zappala >>> wrote: >>> >>>> Hi folks, >>>> >>>> Checking in to see how things are going with your workshop >>>> organization. Here's my checklist: >>>> >>>> * Website >>>> * CFP finalized >>>> * Submissions website >>>> * Contact info (e.g. workshop email address) >>>> >>>> How are these coming along? We'd like to get the word out about your >>>> workshop and promote it via the SOUPS website, email list, and social >>>> media. >>>> >>>> Let me know if these are ready or your ETA so we can help you out. >>>> >>>> Thanks! >>>> >>>> -- Daniel Zappala >>>> >>>> >>>> On Thu, Mar 21, 2019 at 2:11 PM SOUPS 2019 Workshops, Tutorials, >>>> Hackathons HotCRP wrote: >>>> >>>>> Dear authors, >>>>> >>>>> The Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019 >>>>> Workshops, Tutorials, Hackathons) program committee is delighted to >>>>> inform >>>>> you that your submission #6 has been accepted to appear in the >>>>> conference. >>>>> Please see the comments appended to this email for details about any >>>>> changes we would like to see to your proposal and information about the >>>>> length assigned for your workshop. Below, we have also provided >>>>> instructions about next steps for your workshop. >>>>> >>>>> Title: Contextual Integrity: From Theory to Practice >>>>> Authors: Serge Egelman (U.C. Berkeley / ICSI) >>>>> Helen Nissenbaum (Cornell Tech) >>>>> Norman Sadeh (Carnegie Mellon University) >>>>> Site: https://soups19workshops.usenix.hotcrp.com/paper/6 >>>>> >>>>> >>>>> If you need an invitation letter to apply for a visa to attend the >>>>> conference, please contact conference at usenix.org as soon as possible. >>>>> (Visa >>>>> applications can take at least 30 working days to process.) Please >>>>> identify >>>>> yourself as a presenter and include your mailing address in your email. >>>>> >>>>> Contact soups19-workshops at usenix.org with any questions or concerns. >>>>> >>>>> Elissa Redmiles and Daniel Zappala >>>>> SOUPS 2019 Workshop & Tutorial Co-Chairs >>>>> >>>>> Review #6A >>>>> >>>>> =========================================================================== >>>>> >>>>> Comments for author >>>>> ------------------- >>>>> We're excited for this tutorial to be taught at SOUPS. This will give >>>>> participants exposure to a theory that may be new to them and could lead to >>>>> new insights in designing for privacy. The agenda is solid, but it wasn't >>>>> clear to us how much of this was lecture/discussion versus hands-on >>>>> activities. We would encourage you to do as much active learning as >>>>> possible (e.g., having participants bring research questions they are >>>>> working on to the workshop and try to design studies using CI to answer >>>>> their existing questions). This could be especially helpful for later >>>>> topics such as system design and user interface issues. >>>>> >>>>> Additionally, attendees may be from both SOUPS and USENIX Security, >>>>> and many may not have much experience with social science theories and how >>>>> to apply them, so we encourage you to provide a intro level tutorial on >>>>> Contextual Integrity and it's various applications at the beginning, to >>>>> make sure that attendees are on the same page. >>>>> >>>>> >>>>> These are the next steps in preparation of your workshop: >>>>> >>>>> 1. Decide how to accept submissions >>>>> >>>>> It is up to you how you accept submissions to your workshop. USENIX can >>>>> provide HotCRP instances to SOUPS workshops for paper management. If >>>>> you >>>>> would like to use HotCRP for your workshop, please let the workshop >>>>> chairs >>>>> know as soon as possible and latest by April 1 >>>>> (soups19-workshops at usenix.org). It may take a few days to set up >>>>> HotCRP and >>>>> you will need the URL for your final CfP. >>>>> >>>>> 2. Make a website >>>>> >>>>> Workshop and tutorial organizers are responsible for hosting their own >>>>> websites. Websites can be useful for posting your session agenda, >>>>> accepted papers, and promoting your event. >>>>> >>>>> 3. Submit final Call for Papers/Participation (due April 8) >>>>> >>>>> Submit your final CfP by April 8 so it can be posted on the SOUPS >>>>> website, >>>>> this call can include a link to your workshop . The final CfP must >>>>> include >>>>> the dates for paper submission and final papers (see below) and paper >>>>> submission instructions. It should also include a list of program >>>>> committee >>>>> members (if applicable). Tutorials may want to ask for brief >>>>> submissions, >>>>> for >>>>> example if they want to solicit ideas for hands-on sessions. >>>>> >>>>> Final CfP Submission site: >>>>> https://soups19workshops.usenix.hotcrp.com/paper/5 >>>>> >>>>> Workshop paper submission deadline: Friday, May 24, 2018 >>>>> Workshop paper acceptance notification to authors: Saturday, June 8, >>>>> 2018 >>>>> Workshop camera-ready papers due: Wednesday, June 19, 2018 >>>>> >>>>> All SOUPS workshops will use these same submission deadlines. >>>>> >>>>> 4. Advertise registration fees on website >>>>> >>>>> USENIX will be charging a registration fee ($75 per half day >>>>> tutorial/workshop, $150 for full day) this year. >>>>> >>>>> **Please email us (soups19-workshops at usenix.org) to let us know which >>>>> organizer will be receiving the registration waiver (one per event).** >>>>> >>>>> 5. Promote, promote, promote! >>>>> >>>>> Start publicizing your workshop now. The earlier you advertise, the >>>>> more >>>>> attendees and the more exciting the workshop. USENIX Security workshop >>>>> registrants will ALSO have access to SOUPS workshops, so reach out to >>>>> colleagues attending USENIX Security, as well. >>>>> >>>>> You can use the media kit here: https://go.umd.edu/soupsPromoKit >>>>> >>>> >>> >>> -- >>> >>> Prof. Norman M. Sadeh ? www.normsadeh.org >>> >>> ISR - School of Computer Science >>> >>> Carnegie Mellon University >>> >>> 5000 Forbes Avenue -- Pittsburgh, PA 15213 >>> >>> >>> Lab Manager: Ms. Linda Moreci ? laf20 at cs.cmu.edu - Tel: 412-268-9934 >>> >>> >>> > > -- > > Prof. Norman M. Sadeh ? www.normsadeh.org > > ISR - School of Computer Science > > Carnegie Mellon University > > 5000 Forbes Avenue -- Pittsburgh, PA 15213 > > > Lab Manager: Ms. Linda Moreci ? laf20 at cs.cmu.edu - Tel: 412-268-9934 > > > -- Prof. Norman M. Sadeh ? www.normsadeh.org ISR - School of Computer Science Carnegie Mellon University 5000 Forbes Avenue -- Pittsburgh, PA 15213 Lab Manager: Ms. Linda Moreci ? laf20 at cs.cmu.edu - Tel: 412-268-9934 -- Prof. Norman M. Sadeh ? www.normsadeh.org ISR - School of Computer Science Carnegie Mellon University 5000 Forbes Avenue -- Pittsburgh, PA 15213 Lab Manager: Ms. Linda Moreci ? laf20 at cs.cmu.edu - Tel: 412-268-9934 -------------- next part -------------- An HTML attachment was scrubbed... URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: SOUPS - Contextual Integrity Tutorial Proposal (publicity).docx Type: application/vnd.openxmlformats-officedocument.wordprocessingml.document Size: 15623 bytes Desc: not available URL: From sadeh at cs.cmu.edu Sun May 12 18:18:05 2019 From: sadeh at cs.cmu.edu (Norman Sadeh) Date: Sun, 12 May 2019 18:18:05 -0400 Subject: [Soups-announce] SOUPS 2019: URGENT: Could you please confirm that you will publicize our tutorial - see email below In-Reply-To: References: <20190321201100.8802864AB4@mail.hotcrp.com> Message-ID: Hi Elissa, Thanks for the prompt response. It would be fairly unusual, I believe, to expect tutorial organizers to set up a webpage. This makes more sense for people who are organizing workshops and reviewing submissions. Could you or someone else just include the tutorial publicity information we sent (see previous emails) on the SOUPS website as a separate page? Thank you! Nroman On Sun, May 12, 2019 at 6:08 PM Elissa Redmiles wrote: > Re: the soups email, as both tutorials had not provided websites these > will go out in a separate email. > > On Sun, May 12, 2019 at 6:07 PM Elissa Redmiles > wrote: > >> Hi Norman, >> >> All workshops tutorials and other events are responsible for hosting >> their own websites. Once we have a link to the website it will be added to >> the SOUPS website. >> >> Regarding publicity, we will be doing general publicity for all workshops >> and tutorials but for specific publicity this is up to the organizers. A >> promotion kit was provided in your acceptance email. >> >> Sincerely, >> Elissa >> >> On Sun, May 12, 2019 at 5:32 PM Norman Sadeh wrote: >> >>> I just saw the SOUPS 2019 announcement. Unless I missed something it >>> does not include any information about our tutorial. >>> Could you urgently confirm that you will be publicizing our tutorial? At >>> this time, people are under the impression that there are only workshops >>> and have no idea that they could also elect to attend our tutorial. >>> >>> Thank you for quickly fixing this. >>> >>> Norman >>> >>> ---------- Forwarded message --------- >>> From: Norman Sadeh >>> Date: Sat, May 11, 2019 at 4:10 PM >>> Subject: Re: [SOUPS 2019 Workshops, Tutorials, Hackathons] Accepted >>> SOUPS Workshop #6 "Contextual Integrity: From Theory to..." >>> To: Daniel Zappala , >>> Cc: SOUPS 2019 Workshop Chairs , Serge >>> Egelman , Helen Nissenbaum , >>> , Linda Moreci >>> >>> >>> Hello Daniel and Elissa, >>> >>> As requested, attached is the text to advertise our half-day tutorial. >>> We assume this will be hosted on the SOUPS website and that we don't >>> have to set up our own site given that this is a tutorial and not a >>> workshop. >>> >>> Thanks for confirming that we are on the same page and for letting us >>> know if you need anything else. >>> >>> Once this is up on the SOUPS website, we can easily forward a link to >>> various mailing lists we each have access to. >>> >>> Helen, Serge and Norman >>> >>> >>> >>> >>> On Tue, Apr 23, 2019 at 9:07 PM Norman Sadeh wrote: >>> >>>> Hi Daniel, >>>> >>>> Please give us another couple of weeks to come up with something. >>>> >>>> Thank you! >>>> >>>> Norman >>>> >>>> On Tue, Apr 23, 2019 at 4:28 PM Daniel Zappala >>>> wrote: >>>> >>>>> Norman, >>>>> >>>>> That's right, no CFP will be needed then. Looks like the main thing >>>>> then is a website that you could setup. Do you have a webpage we could >>>>> point folks to? That should list a contact email so interested folks can >>>>> get in touch. >>>>> >>>>> Regarding publicity, my understanding is that we can link to your >>>>> website from the SOUPS website, we can advertise via the SOUPS mailing >>>>> list, and we can ask SOUPS to promote via social media. We can also promote >>>>> via social media on our personal accounts for you. >>>>> >>>>> -- Daniel Zappala >>>>> >>>>> >>>>> On Tue, Apr 23, 2019 at 2:01 PM Norman Sadeh wrote: >>>>> >>>>>> Hi Daniel, >>>>>> >>>>>> Thanks for your email. We are truly excited about our upcoming >>>>>> tutorial and are slowly getting organized. >>>>>> Given that this is a tutorial rather than a workshop, we were not >>>>>> planning to issue a CFP. >>>>>> We could (and will) obviously advertise our tutorial but are assuming >>>>>> that SOUPS/USENIX will also provide some help here. >>>>>> Could you provide us with more details about what you will be taking >>>>>> care of as far as publicity and other arrangements are concerned? >>>>>> >>>>>> Thank you! >>>>>> >>>>>> Norman >>>>>> >>>>>> On Tue, Apr 23, 2019 at 3:26 PM Daniel Zappala >>>>>> wrote: >>>>>> >>>>>>> Hi folks, >>>>>>> >>>>>>> Checking in to see how things are going with your workshop >>>>>>> organization. Here's my checklist: >>>>>>> >>>>>>> * Website >>>>>>> * CFP finalized >>>>>>> * Submissions website >>>>>>> * Contact info (e.g. workshop email address) >>>>>>> >>>>>>> How are these coming along? We'd like to get the word out about your >>>>>>> workshop and promote it via the SOUPS website, email list, and social >>>>>>> media. >>>>>>> >>>>>>> Let me know if these are ready or your ETA so we can help you out. >>>>>>> >>>>>>> Thanks! >>>>>>> >>>>>>> -- Daniel Zappala >>>>>>> >>>>>>> >>>>>>> On Thu, Mar 21, 2019 at 2:11 PM SOUPS 2019 Workshops, Tutorials, >>>>>>> Hackathons HotCRP >>>>>>> wrote: >>>>>>> >>>>>>>> Dear authors, >>>>>>>> >>>>>>>> The Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019 >>>>>>>> Workshops, Tutorials, Hackathons) program committee is delighted to >>>>>>>> inform >>>>>>>> you that your submission #6 has been accepted to appear in the >>>>>>>> conference. >>>>>>>> Please see the comments appended to this email for details about any >>>>>>>> changes we would like to see to your proposal and information about >>>>>>>> the >>>>>>>> length assigned for your workshop. Below, we have also provided >>>>>>>> instructions about next steps for your workshop. >>>>>>>> >>>>>>>> Title: Contextual Integrity: From Theory to Practice >>>>>>>> Authors: Serge Egelman (U.C. Berkeley / ICSI) >>>>>>>> Helen Nissenbaum (Cornell Tech) >>>>>>>> Norman Sadeh (Carnegie Mellon University) >>>>>>>> Site: https://soups19workshops.usenix.hotcrp.com/paper/6 >>>>>>>> >>>>>>>> >>>>>>>> If you need an invitation letter to apply for a visa to attend the >>>>>>>> conference, please contact conference at usenix.org as soon as >>>>>>>> possible. (Visa >>>>>>>> applications can take at least 30 working days to process.) Please >>>>>>>> identify >>>>>>>> yourself as a presenter and include your mailing address in your >>>>>>>> email. >>>>>>>> >>>>>>>> Contact soups19-workshops at usenix.org with any questions or >>>>>>>> concerns. >>>>>>>> >>>>>>>> Elissa Redmiles and Daniel Zappala >>>>>>>> SOUPS 2019 Workshop & Tutorial Co-Chairs >>>>>>>> >>>>>>>> Review #6A >>>>>>>> >>>>>>>> =========================================================================== >>>>>>>> >>>>>>>> Comments for author >>>>>>>> ------------------- >>>>>>>> We're excited for this tutorial to be taught at SOUPS. This will >>>>>>>> give participants exposure to a theory that may be new to them and could >>>>>>>> lead to new insights in designing for privacy. The agenda is solid, but it >>>>>>>> wasn't clear to us how much of this was lecture/discussion versus hands-on >>>>>>>> activities. We would encourage you to do as much active learning as >>>>>>>> possible (e.g., having participants bring research questions they are >>>>>>>> working on to the workshop and try to design studies using CI to answer >>>>>>>> their existing questions). This could be especially helpful for later >>>>>>>> topics such as system design and user interface issues. >>>>>>>> >>>>>>>> Additionally, attendees may be from both SOUPS and USENIX Security, >>>>>>>> and many may not have much experience with social science theories and how >>>>>>>> to apply them, so we encourage you to provide a intro level tutorial on >>>>>>>> Contextual Integrity and it's various applications at the beginning, to >>>>>>>> make sure that attendees are on the same page. >>>>>>>> >>>>>>>> >>>>>>>> These are the next steps in preparation of your workshop: >>>>>>>> >>>>>>>> 1. Decide how to accept submissions >>>>>>>> >>>>>>>> It is up to you how you accept submissions to your workshop. USENIX >>>>>>>> can >>>>>>>> provide HotCRP instances to SOUPS workshops for paper management. >>>>>>>> If you >>>>>>>> would like to use HotCRP for your workshop, please let the workshop >>>>>>>> chairs >>>>>>>> know as soon as possible and latest by April 1 >>>>>>>> (soups19-workshops at usenix.org). It may take a few days to set up >>>>>>>> HotCRP and >>>>>>>> you will need the URL for your final CfP. >>>>>>>> >>>>>>>> 2. Make a website >>>>>>>> >>>>>>>> Workshop and tutorial organizers are responsible for hosting their >>>>>>>> own >>>>>>>> websites. Websites can be useful for posting your session agenda, >>>>>>>> accepted papers, and promoting your event. >>>>>>>> >>>>>>>> 3. Submit final Call for Papers/Participation (due April 8) >>>>>>>> >>>>>>>> Submit your final CfP by April 8 so it can be posted on the SOUPS >>>>>>>> website, >>>>>>>> this call can include a link to your workshop . The final CfP must >>>>>>>> include >>>>>>>> the dates for paper submission and final papers (see below) and >>>>>>>> paper >>>>>>>> submission instructions. It should also include a list of program >>>>>>>> committee >>>>>>>> members (if applicable). Tutorials may want to ask for brief >>>>>>>> submissions, >>>>>>>> for >>>>>>>> example if they want to solicit ideas for hands-on sessions. >>>>>>>> >>>>>>>> Final CfP Submission site: >>>>>>>> https://soups19workshops.usenix.hotcrp.com/paper/5 >>>>>>>> >>>>>>>> Workshop paper submission deadline: Friday, May 24, 2018 >>>>>>>> Workshop paper acceptance notification to authors: Saturday, June >>>>>>>> 8, 2018 >>>>>>>> Workshop camera-ready papers due: Wednesday, June 19, 2018 >>>>>>>> >>>>>>>> All SOUPS workshops will use these same submission deadlines. >>>>>>>> >>>>>>>> 4. Advertise registration fees on website >>>>>>>> >>>>>>>> USENIX will be charging a registration fee ($75 per half day >>>>>>>> tutorial/workshop, $150 for full day) this year. >>>>>>>> >>>>>>>> **Please email us (soups19-workshops at usenix.org) to let us know >>>>>>>> which >>>>>>>> organizer will be receiving the registration waiver (one per >>>>>>>> event).** >>>>>>>> >>>>>>>> 5. Promote, promote, promote! >>>>>>>> >>>>>>>> Start publicizing your workshop now. The earlier you advertise, the >>>>>>>> more >>>>>>>> attendees and the more exciting the workshop. USENIX Security >>>>>>>> workshop >>>>>>>> registrants will ALSO have access to SOUPS workshops, so reach out >>>>>>>> to >>>>>>>> colleagues attending USENIX Security, as well. >>>>>>>> >>>>>>>> You can use the media kit here: https://go.umd.edu/soupsPromoKit >>>>>>>> >>>>>>> >>>>>> >>>>>> -- >>>>>> >>>>>> Prof. Norman M. Sadeh ? www.normsadeh.org >>>>>> >>>>>> ISR - School of Computer Science >>>>>> >>>>>> Carnegie Mellon University >>>>>> >>>>>> 5000 Forbes Avenue -- Pittsburgh, PA 15213 >>>>>> >>>>>> >>>>>> >>>>>> Lab Manager: Ms. Linda Moreci ? laf20 at cs.cmu.edu - Tel: 412-268-9934 >>>>>> >>>>>> >>>>>> >>>> >>>> -- >>>> >>>> Prof. Norman M. Sadeh ? www.normsadeh.org >>>> >>>> ISR - School of Computer Science >>>> >>>> Carnegie Mellon University >>>> >>>> 5000 Forbes Avenue -- Pittsburgh, PA 15213 >>>> >>>> >>>> >>>> Lab Manager: Ms. Linda Moreci ? laf20 at cs.cmu.edu - Tel: 412-268-9934 >>>> >>>> >>>> >>> >>> -- >>> >>> Prof. Norman M. Sadeh ? www.normsadeh.org >>> >>> ISR - School of Computer Science >>> >>> Carnegie Mellon University >>> >>> 5000 Forbes Avenue -- Pittsburgh, PA 15213 >>> >>> >>> >>> Lab Manager: Ms. Linda Moreci ? laf20 at cs.cmu.edu - Tel: 412-268-9934 >>> >>> >>> >>> >>> -- >>> >>> Prof. Norman M. Sadeh ? www.normsadeh.org >>> >>> ISR - School of Computer Science >>> >>> Carnegie Mellon University >>> >>> 5000 Forbes Avenue -- Pittsburgh, PA 15213 >>> >>> >>> >>> Lab Manager: Ms. Linda Moreci ? laf20 at cs.cmu.edu - Tel: 412-268-9934 >>> >>> >>> -- >> -- >> Elissa Redmiles >> Ph.D. Candidate, Computer Science >> University of Maryland >> eredmiles at cs.umd.edu >> cs.umd.edu/~eredmiles >> > -- > -- > Elissa Redmiles > Ph.D. Candidate, Computer Science > University of Maryland > eredmiles at cs.umd.edu > cs.umd.edu/~eredmiles > -- Prof. Norman M. Sadeh ? www.normsadeh.org ISR - School of Computer Science Carnegie Mellon University 5000 Forbes Avenue -- Pittsburgh, PA 15213 Lab Manager: Ms. Linda Moreci ? laf20 at cs.cmu.edu - Tel: 412-268-9934 -------------- next part -------------- An HTML attachment was scrubbed... URL: From soupspublicity at gmail.com Fri May 24 01:08:08 2019 From: soupspublicity at gmail.com (SOUPS Publicity) Date: Fri, 24 May 2019 01:08:08 -0400 Subject: [Soups-announce] Deadlines Extended: SOUPS Workshops, Posters, Lightning Talks, and Karat Award Message-ID: [image: soups2019.png] SOUPS 2019 workshop, poster, lightning talk, and Karat Award deadlines have been extended to *May 31*: *Submit to a Workshop !* Submit your work to one of the outstanding SOUPS 2019 workshops! *Propose a Poster Abstract !* High-quality poster presentations are an integral part of SOUPS. We seek poster abstracts describing recent or ongoing research related to usable privacy and security. We look forward to an exceptionally diverse, inclusive, and interesting poster session. *Pitch a Lightning Talk (early deadline)!* Anyone is welcome to propose a five-minute lightning talk, and we strongly encourage students to do so. This is a great opportunity to present your research interests to the community, generate hallway conversation, and receive helpful feedback. *Nominate a Student for a Karat Award !* The John Karat Usable Privacy and Security Student Research Award will be presented to a graduate student based on their research in usable privacy and security, their efforts to mentor others, and their community service for usable privacy and security. SOUPS 2019 will take place August 11-13, 2019 in Santa Clara, CA, USA and is co-located with USENIX Security '19 . ___________________________ This email address is not regularly monitored. For contact information and additional details for SOUPS 2019, please visit the conference website: https://www.usenix.org/conference/soups2019 -------------- next part -------------- An HTML attachment was scrubbed... URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: soups2019.png Type: image/png Size: 26865 bytes Desc: not available URL: From mshehab at uncc.edu Fri May 24 06:39:38 2019 From: mshehab at uncc.edu (Mohamed Shehab) Date: Fri, 24 May 2019 06:39:38 -0400 Subject: [Soups-announce] Deadlines Extended: SOUPS Workshops, Posters, Lightning Talks, and Karat Award In-Reply-To: References: Message-ID: Can we send a poster ? Shehab -- ------------------------------------------------------- Mohamed Shehab, PhD., Associate Professor University of North Carolina at Charlotte Department of Software and Information Systems 9201 University City Blvd., Charlotte, NC 28223 Office: (704) 687-7476 Fax: (704) 687-6065 Email: mshehab at uncc.edu Web: liisp.uncc.edu/~mshehab ------------------------------------------------------- If you are not the intended recipient of this transmission or a person responsible for delivering it to the intended recipient, any disclosure, copying, distribution, or other use of any of the information in this transmission is strictly prohibited. If you have received this transmission in error, please notify me immediately by reply e-mail or by telephone at 704-687-7476. Thank you. > On May 24, 2019, at 1:08 AM, SOUPS Publicity wrote: > > > > SOUPS 2019 workshop, poster, lightning talk, and Karat Award deadlines have been extended to May 31: > > Submit to a Workshop! Submit your work to one of the outstanding SOUPS 2019 workshops! > > Propose a Poster Abstract! High-quality poster presentations are an integral part of SOUPS. We seek poster abstracts describing recent or ongoing research related to usable privacy and security. We look forward to an exceptionally diverse, inclusive, and interesting poster session. > > Pitch a Lightning Talk (early deadline)! Anyone is welcome to propose a five-minute lightning talk, and we strongly encourage students to do so. This is a great opportunity to present your research interests to the community, generate hallway conversation, and receive helpful feedback. > > Nominate a Student for a Karat Award! The John Karat Usable Privacy and Security Student Research Award will be presented to a graduate student based on their research in usable privacy and security, their efforts to mentor others, and their community service for usable privacy and security. > > SOUPS 2019 will take place August 11-13, 2019 in Santa Clara, CA, USA and is co-located with USENIX Security '19. > > ___________________________ > This email address is not regularly monitored. For contact information and additional details for SOUPS 2019, please visit the conference website: > https://www.usenix.org/conference/soups2019 > _______________________________________________ > Soups-announce mailing list > Soups-announce at mailman.srv.cs.cmu.edu > https://mailman.srv.cs.cmu.edu/mailman/listinfo/soups-announce -------------- next part -------------- An HTML attachment was scrubbed... URL: From hcrawford at fit.edu Tue May 28 10:14:43 2019 From: hcrawford at fit.edu (Heather Crawford) Date: Tue, 28 May 2019 14:14:43 +0000 Subject: [Soups-announce] WAY 2019 Deadline Extended to May 31, 2019 Message-ID: <4B0296E5-4B09-426F-8738-AEAB13989CAB@fit.edu> The deadline to submit to the Who Are You?! Adventures in Authentication Workshop co-located with SOUPS 2019 has been extended to May 31, 2019! Please consider submitting your 4-5 page paper related to authentication. The full Call for Papers can be found at the link below: https://wayworkshop.org/ We look forward to receiving your submission and seeing you at WAY 2019 in August! Regards, Heather Crawford and Maximilian Golla Program co-chairs WAY 2019 From egelman at cs.berkeley.edu Mon Jun 3 10:11:57 2019 From: egelman at cs.berkeley.edu (Serge Egelman) Date: Mon, 3 Jun 2019 16:11:57 +0200 Subject: [Soups-announce] Call for Participation: 2nd annual symposium on Applications of Contextual Integrity, August 19-20, 2019 in UC Berkeley, CA Message-ID: *CALL FOR PARTICIPATION* We are pleased to announce the 2nd annual Symposium on Applications of Contextual Integrity, taking place August 19-20, 2019, on the UC Berkeley campus. The aim of the symposium is to foster interaction among diverse communities of research and practice using contextual integrity to reason about privacy, and to design and evaluate, craft regulation, and generate formal logics for privacy. We will accept any of the following submission types: ? A 4-page position paper on work in progress (references not included in the page limit) ? An extended abstract (1-2 pages) summarizing published or mature work. Please include a short ?works cited? section situating your work within it and clarifying its contribution. If your topic is entirely novel or interdisciplinary, please indicate that as well. If your abstract is accepted, you will have the option of posting the longer paper on the symposium website. ? A 1-page description of an interesting use case to be discussed at the symposium. The workshop will not publish formal (i.e., archival) proceedings. Instead, the workshop aims to foster discussion and feedback to improve work-in-progress for subsequent publication elsewhere. With author?s permission, accepted submissions will be posted on the website, but will not be considered archival publications. Papers should be formatted using the 2019 ACM Master Article Template . For LaTeX users, *choose format=sigconf.* Submissions will be peer-reviewed by the workshop?s Program Committee and accepted based on relevance and potential to contribute to workshop discussions and goals. We encourage submissions from diverse disciplinary sources, methods, and contributions, including: ? Empirical studies (qualitative, quantitative, experimental) ? Legal, philosophical, ethical, and policy analysis ? System design and/or implementations ? Combinations of the above *Participation without submission:* If you?re interested in attending without a submission, please complete this form . We will send a confirmation upon review. *IMPORTANT DATES* Submissions Due: June 10 Notifications: June 25 Date of Symposium: August 19 and 20 *SYMPOSIUM CHAIRS:* Serge Egelman (ICSI / University of California, Berkeley) Helen Nissenbaum (Cornell Tech) Yan Shvartzshnaider (NYU and Princeton University) *CONTACT:* *Email: * privaci.research at gmail.com *Website:* http://privaci.info/ci_symposium/cfp.html *Twitter:* @privaci_way We look forward to seeing you at the symposium! Serge, Helen, Yan -- /* Serge Egelman, Ph.D. Research Director, Usable Security & Privacy International Computer Science Institute (ICSI) Research Scientist, Electrical Engineering and Computer Sciences (EECS) University of California, Berkeley */ -------------- next part -------------- An HTML attachment was scrubbed... URL: From thomas.gross at newcastle.ac.uk Tue Jun 18 10:34:04 2019 From: thomas.gross at newcastle.ac.uk (Thomas Gross) Date: Tue, 18 Jun 2019 14:34:04 +0000 Subject: [Soups-announce] CFP: Workshop on Socio-Technical Aspects in Security (STAST) References: <014A3C9B-BB8E-425C-9CD2-2A9491282798@newcastle.ac.uk> Message-ID: STAST 2019 9th International Workshop on Socio-Technical Aspects in SecuriTy 26th September 2019, Luxembourg City, Luxembourg http://stast.uni.lu/index.html Affiliated with the European Symposium on Research in Computer Security (ESORICS 2019) https://esorics2019.uni.lu/ Submission Deadline: 30th June 2019 Goals The workshop intends to stimulate an exchange of ideas and experiences on how to design systems that are secure in the real world where they interact with non-expert users. It aims at bringing together experts in various areas of computer security and in social and behavioral sciences. Workshop Topics Contributions should focus on the interplay of technical, organizational and human factors in breaking and in achieving computer security, for example: Usability and user experience in security Requirements for socio-technical systems Feasibility of policies from the socio-technical perspective Threat models that combine technical and human-centered strategies Socio-technical factors in decision making in security and privacy Balance between technical measures and social strategies Studies of real-world security incidents socio-technical perspective Social factors in organizations security policies and processes Lessons from design and deployment of security mechanisms and policies Models of user behaviour and user interactions with technology Perceptions of security, risk, and their influence on humans Interplay of law, ethics and politics with security and privacy measures Social engineering, persuasion, and other deception techniques Socio-technical analysis of security incidents Strategies, methodology and guidelines cyber-security intelligence analysis Type of contributions Full Papers, discussing original research, answering well-defined research questions, and presenting full and stable results; Position Papers, original contributions discussing existing challenges and introducing and motivating new research problems; Case Studies, describing lessons learned from design and deployment of security mechanisms and policies in research and in industry. Work in Progress, describing original but unfinished research, which is nevertheless based on solid research questions or hypothesis soundly argued be innovative compared with the state of the art. We welcome qualitative and quantitative research approaches from academia and industry. We welcome meta-analytic as well as replication studies and consider them as original research eligible for full papers. We welcome negative or null results with sound methodology. Proceedings Accepted papers will be published as post-proceedings with Springer in their Lecture Notes in Computer Science series (final approval pending). Timeline Full Paper Submission: June 30, 2019 (Anywhere on Earth) Notification: July 30, 2019 Camera Ready: August 6, 2019 Workshop Organizers Giampaolo Bella (University of Catania) Gabriele Lenzini (University of Luxembourg) Programme Chairs Theo Tryfonas (University of Bristol) Thomas Gross (Newcastle University) Programme Committee Aimeur Esma (University of Montreal) Allodi Luca (TU/e Eindhoven) Anastasopoulou Kalliopi (University of Bristol) Andriotis Panagiotis (University of the West of England) Badillo-Urquiola Karla (University of Central Florida) Bednar Peter (Portsmouth University) Benenson Zinaida (University of Erlangen-Nuremberg) Carter Michael (Queen's University) Coles-Kemp Lizzie (Royal Holloway University of London) Diesburg Sarah (University of Northern Iowa) Gross Thomas (University of Newcastle upon Tyne) Giustolisi Rosario (IT University of Copenhagen) Hartel Pieter (University of Twente) Hugl Ulrike (Innsbruck University) Jakobsson Markus (Amber Solutions) Karyda Maria (Aegean University) Kokolakis Spyros (Aegean University) Kowalski Steward (Norwegian University of Science and Technology) Krol Kat (Google UK) Li Shujun (University of Kent) Martina Jean (Universidade Federal de Santa Catarina) Mehrnezhad Maryam (University of Newcastle) Nishigaki Masakatsu (Shizuoka University) Nurse Jason (University of Kent) Radomirovic Sa?a (University of Dundee) Renaud Karen (Abertay University) Ryan, Peter Y. A. (University of Luxembourg) Stobert Elizabeth (Concordia University) Thomson Kerry-Lynn (Nelson Mandela Metropolitan University) Simon Parkin (University College London) Vigan? Luca (King's College London) Volkamer Melanie (Karlsruhe Institute of Technology) Williams Emma (University of Bristol) Wrona Konrad (NCI Agency / Military University of Technology in Warsaw) -------------- next part -------------- An HTML attachment was scrubbed... URL: From soupspublicity at gmail.com Wed Jun 26 17:41:13 2019 From: soupspublicity at gmail.com (SOUPS Publicity) Date: Wed, 26 Jun 2019 17:41:13 -0400 Subject: [Soups-announce] SOUPS 2019 Registration, Program, and Grants Message-ID: [image: soups2019.png] Registration for SOUPS 2019 is now open, and this year's program is available! SOUPS will once again feature outstanding talks, papers, and posters. Early registration ends *Tuesday, July 23*, and discounted rooms are available in the conference hotel until *Monday, July 22* (or until the block runs out). While you're at it, consider registering for this year's excellent workshops and tutorials too! Student grants and diversity grants are available for SOUPS 2019. Note the tight application deadline of *Monday, July 1*. SOUPS 2019 will take place August 11-13, 2019 in Santa Clara, CA, USA and is co-located with USENIX Security '19 . We hope to see you there! ___________________________ This email address is not regularly monitored. For contact information and additional details for SOUPS 2019, please visit the conference website: https://www.usenix.org/conference/soups2019 -------------- next part -------------- An HTML attachment was scrubbed... URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: soups2019.png Type: image/png Size: 26865 bytes Desc: not available URL: From soupspublicity at gmail.com Sat Jul 20 09:41:32 2019 From: soupspublicity at gmail.com (SOUPS Publicity) Date: Sat, 20 Jul 2019 09:41:32 -0400 Subject: [Soups-announce] SOUPS 2019 Early Registration Deadline on *Monday* Message-ID: [image: soups2019.png] The early bird registration deadline for SOUPS 2019 is *Monday, July 22*! Register now for discounts on registration fees and rooms in the conference hotel. For added motivation, check out this year's fantastic program ! While you're at it, consider registering for this year's excellent workshops and tutorials too! SOUPS 2019 will take place August 11-13, 2019 in Santa Clara, CA, USA and is co-located with USENIX Security '19 . We hope to see you there! *(Note that an earlier email incorrectly listed a different early registration date. The correct date is Monday, July 22.)* ___________________________ This email address is not regularly monitored. For contact information and additional details for SOUPS 2019, please visit the conference website: https://www.usenix.org/conference/soups2019 -------------- next part -------------- An HTML attachment was scrubbed... URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: soups2019.png Type: image/png Size: 26865 bytes Desc: not available URL: From lorrie at cmu.edu Wed Aug 28 21:58:46 2019 From: lorrie at cmu.edu (Lorrie Cranor) Date: Wed, 28 Aug 2019 21:58:46 -0400 Subject: [Soups-announce] DARPA Young Faculty Award topic: Cross-Cultural Extrapolation of Privacy-Oriented Human-Technology Interactions References: <5A286DB5-6B73-466F-98F0-43BEA465EAEF@darpa.mil> Message-ID: From: "Baron, Joshua" > Begin forwarded message: > > From: "Baron, Joshua" > Subject: DARPA YFA is posted- post on PETS listserv? > Date: August 28, 2019 at 8:53:42 PM EDT > To: "lorrie at cs.cmu.edu" > Cc: "mmazurek at cs.umd.edu" , "franzi at cs.washington.edu" , "fschaub at umich.edu" , "Bond, Timothy (contr-i2o)" > > As I briefly announced at SOUPS, there is a DARPA Young Faculty Award topic relevant to the usable security and privacy community, and it has finally been announced. > > The BAA can be found here: > https://www.fbo.gov/index.php?s=opportunity&mode=form&id=74f9691bce51a95c5a2380dad5c787b5&tab=core&_cview=0 > > Executive summaries (encouraged, not required) are due 18 September and full proposals are due 19 November. > > The relevant is topic is: > > ?12. Cross-Cultural Extrapolation of Privacy-Oriented Human-Technology Interactions > It is well understood that human-technology interactions are a critical aspect of cybersecurity and privacy. However, these studies have largely been conducted within specific socio-cultural environments (most notably, groups within the United States that enjoy relatively broad access to sophisticated technology). This effort looks to create greater understandings of human- technology interaction for privacy amongst communities that have not previously been examined. This may include foreign communities that have critical privacy needs (e.g., due to living under pervasive state surveillance). Means of quantitatively extrapolating from such studies of one population to another are of interest in order to help broaden the scope of rigorous evaluation.? > > In terms of eligibility, > ?Participation in the YFA program is limited to any current tenure-track Assistant or Associate Professors and to tenured Assistant or Associate Professors within three (3) years of their tenure appointment at a U.S. institution of higher education or equivalent at a U.S. non-profit science and technology research institution.? > See the BAA for more details. > > All the best, > Josh > > > ? > Joshua Baron, PhD > Program Manager > DARPA/I2O > Desk: (703) 526-2888 > Cell: (571) 665-1412 -------------- next part -------------- An HTML attachment was scrubbed... URL: From ljeanc at gmail.com Thu Oct 31 15:21:48 2019 From: ljeanc at gmail.com (L Jean Camp) Date: Thu, 31 Oct 2019 15:21:48 -0400 Subject: [Soups-announce] CFP: USEC2020 iis AsiaUSEC Message-ID: AsiaUSEC20: 1st Asian Workshop on Usable Security Shangri-La Tanjung Aru Resort & Spa Kota Kinabalu, Sabah, Malaysia, February 13-15, 2020 Conference website https://easychair.org/conferences/?conf=asiausec20 Submission link https://easychair.org/conferences/?conf=asiausec20 Early submission date November 30, 2019 Notification for early submissions (11/30)December 18, 2019 We accept concurrent or adjacent CHI submissions with the requirement that accepted CHI papers are withdrawn Submission deadline December 19, 2019 Submissions close December 19, 2019 Notification for submissions (> 11/30) not later than January 10, 2020 ***************************** Ensuring effective security and privacy in real-world technology requires considering not only technical but also human aspects, as well as the complex way in which these combine. technical as well as human aspects. Enabling people to manage privacy and security necessitates giving due consideration to the users and the larger operating context within which technology is embedded. It is the aim of USEC to contribute to an increase of the scientific quality of research in human factors in security and privacy. To this end, we encourage replication studies to validate previous research findings. Papers in these categories should be clearly marked as such and will not be judged against regular submissions on novelty. Rather, they will be judged based on scientific quality and value to the community. We also encourage reports of faded experiments, since their publication will serve to highlight the lessons learned and prevent others falling into the same traps. We invite submissions on all aspects of human factors including adoption and usability in the context of security and privacy. All USEC events aim to bring together researchers already engaged in this interdisciplinary effort with other computer science researchers in areas such as visualization, artificial intelligence, machine learning, and theoretical computer science as well as researchers from other domains such as economics and psychology. We particularly encourage collaborative research from authors in multiple disciplines. Submission Guidelines All submissions must be original work; authors must dearly document any overlap with previously published or simultaneously submitted papers from any of the authors. We are looking for submissions of 5 to 10 pages, excluding references and supplementary materials using the LNCS format. We encourage authors to submit papers of appropriate length for the research contribution. If your research contributions only requires 5-7 pages, please only submit 5-7 pages (plus references). Shorter papers with be reviewed like any other paper and not penalized. Papers shorter than 5 pages or longer than 10 pages {excluding references) will not be considered. Submitting supplementary material that adds depth to the contribution and/or contributes to the submission's replicability is strongly encouraged. Reviewing will be double blind. List of Topics - Usable security/privacy evaluation of existing and/or proposed solutions. - Methods and measures to improve the practice of usability analyses - Psychology of security empirical or theoretical continuations - Human factors related to the deployment of the Internet of Things (IoT) - Mental models that contribute to, complicate, or inform security and privacy design and deployment. - Lessons learned from designing, deploying, managing, or evaluating security and privacy technologies. - Design foundations of usable security and privacy including usable security and privacy patterns. - Ethical, psychological, sociological and economic aspects of security and privacy technologies. - Usable security and privacy research that targets information professionals (e.g. administrators or developers). - Reports on replications of previously published studies and experiments. - Reports on failed usable security studies or experiments, with the focus on the lessons learned from such experiments. - Anthropological approaches to security and prrvacy - Experiments including diverse populations or populations not traditionally included m usable security and privacy - Psychology of deceit or fraud empirical or theoretical continuations - Studies of acceptability, avoidance, or perspectives of surveillance - Modeling of security behaviors including patching Program Chairs L Jean Camp, Indiana University & Alana Maurushat, Western Sydney University, AU Program Committee Julian Jang-Jaccard, Massey University, NZ Vaibhav Garg, Comcast, US Julian M. Williams, Durham University, UK Paul A. Watters, LaTrobe University, AU Marthie Grobler, CSIRO, AU Heather Crawford, Florida Tech, US Nicholas Weaver, ISCI UC Berkeley, US Alisa Frik, ISCI UC Berkeley, US Shrirang Mare, U Washington & IU, US Pamela Briggs, Northumbria University, UK Karen Renaud, Rhodes University, SA and University of Glasgow, UK Julie M. Haney, NIST, US Ada Lerner, Wellesley College, US Matt Bishop, UC Davis, US Patrick Traynor, University of Florida, US Andrew A. Adams Media University, JP Tim Kelley, US Navy, US Peter Gutmann, University of Aukland, NZ Sanchari Das, American Express, US Sven Dietrich, City University of New York, US Marthie Grobler, CSIRO, AU Sanchari Das, AmEx, US -- Prof. L. Jean Camp http://www.ljean.com Research Gate: https://www.researchgate.net/profile/L_Camp DBLP: http://dblp.uni-trier.de/pers/hd/c/Camp:L=_Jean SSRN: https://papers.ssrn.com/sol3/cf_dev/AbsByAuth.cfm?per_id=262477 Scholar: https://scholar.google.com/citations?user=wJPGa2IAAAAJ Make a Difference http://www.ieeeusa.org/policy/govfel/congfel.asp -------------- next part -------------- An HTML attachment was scrubbed... URL: From lutters at umd.edu Fri Nov 8 15:42:41 2019 From: lutters at umd.edu (Wayne Lutters) Date: Fri, 8 Nov 2019 15:42:41 -0500 Subject: [Soups-announce] Job notice: U.Maryland: Sociotechnical aspects of Cybersecurity (open rank) Message-ID: *University of Maryland College of Information Studies* Open Rank Tenure / Tenure-Track Faculty (Assistant Professor, Associate Professor, or Professor) Best Consideration Date: 12/9/2019 To Apply: http://ejobs.umd.edu/postings/74571 A socio-technical approach to cybersecurity recognizes that to protect our information and critical infrastructure we must consider human, social, organizational, economic, institutional, and technical factors, as well as the complex interactions among them. Creating, maintaining, operating infrastructural systems that are resilient in the face of threats that include malicious attacks, random vandalism, natural disasters, and information warfare necessarily requires fundamental advances in our understanding of the socio-technical aspects of cybersecurity. The College of Information Studies at the University of Maryland, College Park (Maryland?s iSchool), invites applications for a tenure-track Assistant Professor or tenured Associate Professor or Professor position in socio-technical aspects of cybersecurity. The successful candidate will engage in an active program of high-impact research; provide research advising to students at all levels; develop courses and teach in the College?s undergraduate, graduate, and non-degree programs; and engage in service to the profession and shared governance within the university. *Minimum Qualifications:* The successful candidate will have a strong interest in research and teaching related to socio-technical aspects of cybersecurity. Within this broad domain are a wide range of specific topics, methodological approaches, theoretical perspectives, and disciplines. We welcome applications from scholars interested in any socio-technical aspect of cybersecurity who are working with research grounded in theory, rooted in empirical methods, and producing broadly applicable and transferable results that augment policy, knowledge, and practice. We seek exceptional candidates with high quality research and publication records in interdisciplinary fields that include or blend social and behavioral sciences, economics, science and technology studies, law, communications, informatics, information systems, and/or computer science. A Ph.D. or equivalent degree is required at the time of appointment. *Campus/College Information:* Founded in 1856, University of Maryland, College Park is the flagship institution in the University System of Maryland. Our 1,250-acre campus is just minutes away from Washington, D.C. This unique proximity to business and technology leaders, federal departments and agencies, nongovernmental organizations, and a myriad of research entities is simply unparalleled. Synergistic opportunities for our faculty and students abound in the nation?s capital and surrounding areas. The University is committed to attracting and retaining outstanding and diverse faculty and staff that will enhance our stature of preeminence in our three missions of teaching, scholarship, and full engagement in our community, the state of Maryland, and the world. The university?s College of Information Studies is one of the largest and fastest growing Information Schools in the world, with a highly dynamic undergraduate program, recognized excellence in three Masters programs (in Information Management, Information Human-Computer Interaction, and Library and Information Science), and a large and diverse doctoral program. Faculty in the College conduct research on a broad range of important questions at the intersection of people, information and technology, including, for example, policy and ethics, information retrieval and information seeking behavior, social network analysis, cybersecurity, design science, and archives and records management. *Diversity Statement:* The University of Maryland, College Park, an equal opportunity/affirmative action employer, complies with all applicable federal and state laws and regulations regarding nondiscrimination and affirmative action; all qualified applicants will receive consideration for employment. The University is committed to a policy of equal opportunity for all persons and does not discriminate on the basis of race, color, religion, sex, national origin, physical or mental disability, protected veteran status, age, gender identity or expression, sexual orientation, creed, marital status, political affiliation, personal appearance, or on the basis of rights secured by the First Amendment, in all aspects of employment, educational programs and activities, and admissions. *Required Documents:* ? Cover Letter ? Curriculum Vitae ? Research Statement ? Teaching Statement ? List of References (3) -------------- next part -------------- An HTML attachment was scrubbed... URL: From ruoti at utk.edu Wed Nov 6 10:20:13 2019 From: ruoti at utk.edu (Ruoti, Scott Isaac) Date: Wed, 6 Nov 2019 15:20:13 +0000 Subject: [Soups-announce] Tenure-Track Faculty position in Cybersecurity at the University of Tennessee Message-ID: The University of Tennessee is currently looking to hire a tenure-track faculty member in the area of cybersecurity, including usable privacy and security. I am on the search committee this year and am happy to answer any questions you might have about the position. Below you will find the job advertisement for this opportunity. Please share with students and colleagues that may be interested. Thanks, Scott Ruoti Three (3) Assistant or Associate Professor Positions in Computer Science and Computer Engineering, University of Tennessee, Knoxville, TN To apply, please visit: https://academicjobsonline.org/ajo/jobs/15198 Application deadline: December 15, 2019. Applications received after the deadline may be considered until the position is filled. The Department of Electrical Engineering and Computer Science (EECS) at The University of Tennessee, Knoxville (UTK) is seeking candidates for three (3) tenure track faculty members at the assistant or associate professor level. Applicants should have an earned Ph.D. in Computer Science, Computer Engineering, or a related field by time of appointment. The department has sustained an ambitious growth period over the past six years. This year, we are strategically targeting areas of (1) cybersecurity; (2) data analytics, machine learning, and artificial intelligence; and (3) Internet of Things (IoT), embedded systems, edge computing, and mobile computing systems. In all three cases, the area of interest is defined broadly. Applicants should have a demonstrated commitment to and knowledge of equal employment opportunity and affirmative action. UTK is the state's flagship campus and leading research institution with a strong partnership with the nearby Oak Ridge National Laboratory (ORNL), where many UTK faculty have ongoing joint positions and/or joint research projects. EECS at UTK has 49 full-time faculty members, 4 members of the National Academy of Engineering, 17 IEEE Fellows, and 12 NSF/DOE CAREER awardees. The department is housed in a new $37.5 million building completed in 2012 and has an annual research expenditure exceeding $25 million. EECS has a growing enrollment of over 825 undergraduate and 275 graduate students across the three majors of Electrical Engineering, Computer Engineering, and Computer Science. In addition, the department is offering an undergraduate minor in cybersecurity, a minor in datacenter technology and management, and developing a minor in data science. Successful faculty candidates will be expected to contribute to the continued growth and excellence of EECS. UTK is located in Knoxville TN, within an easy driving distance to Asheville, Nashville, Atlanta and the Great Smoky Mountains. The City of Knoxville is a hidden gem with an elegant and walkable downtown, rich and varied nightlife cultures, vibrant neighborhoods, eclectic restaurants, and amazing access to outdoor activities of all kinds as well as exciting cultural events throughout the year. From Knoxville's TYS Airport, Knoxville has nonstop flights to 22 major airports in the US, including direct flights to cities such as DC, NYC, Atlanta, Chicago, Denver, and Miami. Furthermore, the City of Knoxville and the surrounding areas boast great K-12 schools and one of the most highly educated populations in the entire US. >From 2007 to 2017, Tennessee's overall economy growth ranked #7 among all 50 US states. In 2019, US News ranks the State of Tennessee in the US as the #1 in fiscal stability, #12 in economy, and #13 in infrastructure. The University of Tennessee is an EEO/AA/Title VI/Title IX/Section 504/ADA/ADEA institution in the provision of its education and employment programs and services. All qualified applicants will receive equal consideration for employment and admission without regard to race, color, national origin, religion, sex, pregnancy, marital status, sexual orientation, gender identity, age, physical or mental disability, genetic information, veteran status, and parental status. All qualified applicants will receive equal consideration for employment and admission without regard to race, color, national origin, religion, sex, pregnancy, marital status, sexual orientation, gender identity, age, physical or mental disability, genetic information, veteran status, and parental status, or any other characteristic protected by federal or state law. In accordance with the requirements of Title VI of the Civil Rights Act of 1964, Title IX of the Education Amendments of 1972, Section 504 of the Rehabilitation Act of 1973, and the Americans with Disabilities Act of 1990, the University of Tennessee affirmatively states that it does not discriminate on the basis of race, sex, or disability in its education programs and activities, and this policy extends to employment by the university. Inquiries and charges of violation of Title VI (race, color, and national origin), Title IX (sex), Section 504 (disability), the ADA (disability), the Age Discrimination in Employment Act (age), sexual orientation, or veteran status should be directed to the Office of Equity and Diversity, 1840 Melrose Avenue, Knoxville, TN 37996-3560, telephone 865-974-2498. Requests for accommodation of a disability should be directed to the ADA Coordinator at the Office of Equity and Diversity. Position ID: UTK-EECS-3AORAP [#15198] Position Title: Three (3) Assistant or Associate Professor Positions in Computer Science and Computer Engineering, University of Tennessee, Knoxville, TN Position Type: Tenured/Tenure-track faculty Position Location: Knoxville, Tennessee 37996, United States Application materials include: * Cover letter * Curriculum Vitae * Research statement * Teaching statement * Three references (actual letters acceptable but not required, just names and email addresses) For more information, visit our website (http://www.eecs.utk.edu) or contact Prof. Jian Huang (huangj at utk.edu). - Dr. Scott Ruoti office: (865) 974-5449 Assistant Professor mobile: (801) 300-7013 Min H. Kao Department of email: ruoti at utk.edu Electrical Engineering and Computer Science University of Tennessee, Knoxville -------------- next part -------------- An HTML attachment was scrubbed... URL: