Upcoming Courses

go to course
Emotional Design: How to make products people will love
Starts tomorrow LAST CALL!
go to course
UI Design Patterns for Successful Software
86% booked. Starts in 9 days
 
 

Get our complete calendar!

Switch our complete calendar on and off alongside your private calendar

Get our calendar
 
 

SOUPS 2013 - Symposium on Usable Privacy and Security 2013

 

Topics of SOUPS include, but are not limited to; innovative security or privacy functionality and design, new applications of existing models or technology, field studies of security or privacy technology, usability evaluations of security or privacy features or security testing of usability features, and lessons learned from deploying and using usable privacy and security features.

Request a discount...
Add to...
Add to your calendarOutlook
Add to your calendarApple iCal
Add to your calendarGoogle Calendar
Add to your calendarAll other calendars

For other calendar software, simply
import this URL.

Share with...
Facebook
Twitter
LinkedIn

or another sharing service

 

Call For Participation (CfP)

We invite authors to submit original papers describing research or experience in all areas of usable privacy and security. Topics include, but are not limited to:

-innovative security or privacy functionality and design,
-new applications of existing models or technology,
-field studies of security or privacy technology,
-usability evaluations of new or existing security or privacy features,
-security testing of new or existing usability features,
longitudinal studies of deployed security or privacy features,
-the impact of organizational policy or procurement decisions, and
-lessons learned from the deployment and use of usable privacy and security features,
-reports of replicating previously published studies and experiments,
-reports of failed usable security studies or experiments, with the focus on the lessons learned from such experience.

All submissions must relate to both usability and either security or privacy. Papers on security or privacy applications that do not address usability or human factors will not be considered.

Papers need to describe the purpose and goals of the work, cite related work, show how the work effectively integrates usability and security or privacy, and clearly indicate the innovative aspects of the work or lessons learned as well as the contribution of the work to the field.

Papers must use the SOUPS formatting template (available for MS Word or LaTeX) and be up to 12 pages in length, excluding the bibliography and any supplemental appendices. Authors have the option to attach to their paper supplemental appendices containing study materials (e.g. surveys) that would not otherwise fit within the body of the paper. These appendices may be included to assist reviewers who may have questions that fall outside the stated contribution of your paper, on which your work is to be evaluated. Reviewers are not required to read any appendices so your paper should be self contained without them. Accepted papers will be published online with their supplemental appendices included. Submissions must be no more than 20 pages including bibliography and appendices. For the body of your paper, brevity is appreciated, as evidenced by the fact that many papers in prior years have been well under this limit. All submissions must be in PDF format and should not be blinded.

Technical paper submissions will close at 5 pm, US Pacific time, Friday, March 8. This is a hard deadline! Authors will be notified of technical paper acceptance by May 27, and camera-ready final versions of technical papers are due June 24.

Authors are encouraged to review: Common Pitfalls in Writing about Security and Privacy Human Subjects Experiments, and How to Avoid Them.

User experiments should follow the basic principles of ethical research, e.g., beneficence (maximizing the benefits to an individual or to society while minimizing harm to the individual), minimal risk (appropriateness of the risk versus benefit ratio), voluntary consent, respect for privacy, and limited deception. Authors are encouraged to include in their submissions explanation of how ethical principles were followed, and may be asked to provide such an explanation should questions arise during the review process.

More information on submitting a technical paper can be found at http://cups.cs.cmu.edu/crp/soups2013/.


Other events in this series

 

2005

Proceedings of the 2005 Symposium on Usable Privacy and Security 2005.

View conference publications and more > > >
 

2006

Proceedings of the 2006 Symposium on Usable Privacy and Security 2006.

View conference publications and more > > >
 

2007

Proceedings of the 2007 Symposium on Usable Privacy and Security 2007.

View conference publications and more > > >
 

2008

Proceedings of the 2008 Symposium on Usable Privacy and Security 2008.

View conference publications and more > > >
 

2009

Proceedings of the 2009 Symposium on Usable Privacy and Security 2009.

View conference publications and more > > >
 

2010

Proceedings of the 2010 Symposium on Usable Privacy and Security 2010.

View conference publications and more > > >
 

2011

Proceedings of the 2011 Symposium on Usable Privacy and Security 2011.

View conference publications and more > > >
 

2012

Proceedings of the 2012 Symposium on Usable Privacy and Security 2012.

View conference publications and more > > >
 
 

Page Information

Author(s): Mads Soegaard
This is a tablet-optimized version of http://www.interaction-design.org/calendar/soups_2013_-_symposium_on_usable_privacy_and_security_2013.html