Symposium On Usable Privacy and Security
CALL FOR PAPERS, POSTERS, AND PROPOSALS
The 2015 Symposium on Usable Privacy and Security (
- technical papers,
- a poster session,
- panels and invited talks,
- lightning talks and demos, and
- workshops and tutorials.
See a full list of important dates below.
We invite authors to submit original papers describing research or experience in all areas of usable privacy and security. We welcome a variety of research methods, including both qualitative and quantitative approaches. Topics include, but are not limited to:
- innovative security or privacy functionality and design,
- new applications of existing models or technology,
- field studies of security or privacy technology,
- usability evaluations of new or existing security or privacy features,
- security testing of new or existing usability features,
- longitudinal studies of deployed security or privacy features,
- studies of administrators or developers and support for security and privacy,
- the impact of organizational policy or procurement decisions, and
- lessons learned from the deployment and use of usable privacy and security features,
- reports of replicating previously published studies and experiments,
- reports of failed usable security studies or experiments, with the focus on the lessons learned from such experience.
All submissions must relate to both human aspects
Papers need to describe the purpose and goals of the work, cite related work, show how the work effectively integrates usability and security or privacy, and clearly indicate the innovative aspects of the work or lessons learned as well as the contribution of the work to the field.
Papers must use the
Submit your paper electronically at cups.cs.cmu.edu/hotcrp/soups2015.
Anonymization: Reviewing is double blind: Author names and affiliations should not appear on the title page, and papers should avoid revealing the authors' identity in the text. Any references to the authors' own work should be made in the third person. Contact the program chairs at email@example.com if you have any questions.
Submissions that violate these requirements may be rejected without review.
Registering & submitting your paper: Technical papers must be registered by 5pm,
Rebuttals: This year, authors of submitted
Accepted papers will be published by the
Authors are encouraged to review: Common Pitfalls in Writing about Security and Privacy Human Subjects Experiments, and How to Avoid Them. Note that this paper addresses research work taking an experimental and quantitative approach, with hypothesis testing and statistical inference. However,
User experiments should follow the basic principles of ethical research, e.g., beneficence (maximizing the benefits to an individual or to society while minimizing harm to the individual), minimal risk (appropriateness of the risk versus benefit ratio), voluntary consent, respect for privacy, and limited deception. Authors are encouraged to include in their submissions explanation of how ethical principles were followed, and may be asked to provide such an explanation should questions arise during the review process.
Technical Papers Committee
We seek poster abstracts describing recent or ongoing research or experience in all areas of usable privacy and security.
We also welcome authors of recent papers (2014 to 2015) on usable privacy and security to present your work at the
- the title and abstract of your conference paper,
- full bibliographical citation, and
- a link to the published (official) version, instead of the regular poster abstract.
In addition to the required poster abstract, authors are encouraged to optionally submit a draft of their poster (poster size: 32 x 40 in) to receive feedback before the conference. Please scale your poster to normal page size (A4 or letter) for submission.
To make poster presentations more interactive we also encourage you to demo your project alongside your poster. Due to space constraints, we can only support a limited number of such poster demos. If you would like to be considered for this demo option, please describe your demo requirements (e.g., a table, a power outlet) separately and submit them with your poster abstract.
This year, we will also be awarding prizes for the best posters.
Poster submission requirements:
- Use the
SOUPSposter template [ MSWord] [LaTeX]
- Poster abstract at most 2 pages including bibliography
- Poster draft (optional)
- Demo requirements (optional)
- Submit your poster using the electronic submission page: cups.cs.cmu.edu/hotcrp/soups2015_posters.
Submissions will close at 5pm,
LIGHTNING TALKS AND DEMOS
A continuing feature of
WORKSHOPS AND TUTORIALS
- Workshop on Inclusive Privacy and Security (
WIPS): Privacy and Security for Everyone, Anytime, Anywhere.
- Workshop on Usable Security and Privacy Education
- 2nd Annual Privacy Personas and Segmentation (
Workshop papers are due May 26. More details to follow.
PANELSPanel submissions have closed.
INVITED TALKSInvited talk submissions have closed.
Early registration deadline - June 19
Conference - July 22-24
Paper registration deadline - March 6, 5pm
Paper submission deadline - March 13, 5pm
Rebuttal period - April 20-24, 5pm
Notification of paper acceptance - May 19
Camera ready papers due - June 12 (authors must submit a consent form)
Submission deadline - May 26, 5pm
Notification of acceptance - June 9
Tutorials and workshops
Proposal submission deadline - January 30
Notification of proposal acceptance - February 20
Workshop paper submission deadline - May 26
Notification of workshop paper acceptance - June 9
Camera ready papers due - June 20
Panels and invited talks
Panel proposal submission deadline - January 30
Speaker suggestion submission deadline - January 30
Lightning talks and demos
Early submission deadline - May 26
Early submission notification - June 9
Submissions received after May 26 will be considered until the program is full.