[PET] CFP: USEC2020 is AsiaUSEC

L Jean Camp ljeanc at gmail.com
Thu Oct 31 19:26:17 GMT 2019

Please note that usable privacy and privacy studies are more than

AsiaUSEC20: 1st Asian Workshop on Usable Security
Shangri-La Tanjung Aru Resort & Spa
Kota Kinabalu, Sabah, Malaysia, February 13-15, 2020
(in cooperation with FC http://www.ifca.ai/ )

Conference website https://easychair.org/conferences/?conf=asiausec20
Submission link https://easychair.org/conferences/?conf=asiausec20
Early submission date November 30, 2019
Notification for early submissions (11/30)December 18, 2019

We accept concurrent or adjacent CHI submissions with the requirement that
accepted CHI papers are withdrawn

Submission deadline December 19, 2019
Submissions close December 19, 2019
Notification for submissions (> 11/30) not later than January 10, 2020


Ensuring effective security and privacy in real-world technology requires
considering not only technical but also human aspects, as well as the
complex way in which these combine. technical as well as human aspects.
Enabling people to manage privacy and security necessitates giving due
consideration to the users and the larger operating context within which
technology is embedded.

It is the aim of USEC to contribute to an increase of the scientific
quality of research in human factors in security and privacy. To this end,
we encourage replication studies to validate previous research findings.
Papers in these categories should be clearly marked as such and will not be
judged against regular submissions on novelty. Rather, they will be judged
based on scientific quality and value to the community. We also encourage
reports of faded experiments, since their publication will serve to
highlight the lessons learned and prevent others falling into the same

We invite submissions on all aspects of human factors including adoption
and usability in the context of security and privacy.   All USEC events aim
to bring together researchers already engaged in this interdisciplinary
effort with other computer science researchers in areas such as
visualization, artificial intelligence, machine learning, and theoretical
computer science as well as researchers from other domains such as
economics and psychology. We particularly encourage collaborative research
from authors in multiple disciplines.

Submission Guidelines

All submissions must be original work; authors must dearly document any
overlap with previously published or simultaneously submitted papers from
any of the authors. We are looking for submissions of 5 to 10 pages,
excluding references and supplementary materials using the LNCS format.

We encourage authors to submit papers of appropriate length for the
research contribution. If your research contributions only requires 5-7
pages, please only submit 5-7 pages (plus references). Shorter papers with
be reviewed like any other paper and not penalized. Papers shorter than 5
pages or longer than 10 pages {excluding references) will not be
considered. Submitting supplementary material that adds depth to the
contribution and/or contributes to the submission's replicability is
strongly encouraged.   Reviewing will be double blind.

List of Topics

   - Usable security/privacy evaluation of existing and/or proposed
   - Methods and measures to improve the practice of usability analyses
   - Psychology of security empirical or theoretical continuations
   - Human factors related to the deployment of the Internet of Things (IoT)
   - Mental models that contribute to, complicate, or inform security and
   privacy design and deployment.
   - Lessons learned from designing, deploying, managing, or evaluating
   security and privacy technologies.
   - Design foundations of usable security and privacy including usable
   security and privacy patterns.
   - Ethical, psychological, sociological and economic aspects of security
   and privacy technologies.
   - Usable security and privacy research that targets information
   professionals (e.g. administrators or developers).
   - Reports on replications of previously published studies and
   - Reports on failed usable security studies or experiments, with the
   focus on the lessons learned from such experiments.
   - Anthropological approaches to security and prrvacy
   - Experiments including diverse populations or populations not
   traditionally included m usable security and privacy
   - Psychology of deceit or fraud empirical or theoretical continuations
   - Studies of acceptability, avoidance, or perspectives of surveillance
   - Modeling of security behaviors including patching

Program Chairs
L Jean Camp, Indiana University & Alana Maurushat, Western Sydney
University, AU

Program Committee
Julian Jang-Jaccard, Massey University, NZ
Vaibhav Garg, Comcast, US
Julian M. Williams, Durham University, UK
Paul A. Watters, LaTrobe University, AU
Marthie Grobler, CSIRO, AU
Heather Crawford, Florida Tech, US
Nicholas Weaver, ISCI UC Berkeley, US
Alisa Frik, ISCI UC Berkeley, US
Shrirang Mare, U Washington & IU, US
Pamela Briggs, Northumbria University, UK
Karen Renaud,  Rhodes University, SA and University of Glasgow, UK
Julie M. Haney, NIST, US
Ada Lerner, Wellesley College, US
Matt Bishop, UC Davis, US
Patrick Traynor, University of Florida, US
Tim Kelley, US Navy, US
Peter Gutmann, University of Aukland, NZ
Sanchari Das, American Express, US
Sven Dietrich, City University of New York, US
Marthie Grobler, CSIRO, AU
Sanchari Das, AmEx, US
Andrew A. Adams Media University, JP

Prof. L. Jean Camp

Research Gate: https://www.researchgate.net/profile/L_Camp
DBLP: http://dblp.uni-trier.de/pers/hd/c/Camp:L=_Jean
SSRN: https://papers.ssrn.com/sol3/cf_dev/AbsByAuth.cfm?per_id=262477
Scholar: https://scholar.google.com/citations?user=wJPGa2IAAAAJ
Make a Difference
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.links.org/pipermail/pet/attachments/20191031/02b92894/attachment-0001.html>

More information about the PET mailing list