ACM SIGCHI General Interest Announcements (Mailing List)


Options: Use Forum View

Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
"Lipford, Heather" <[log in to unmask]>
Reply To:
Lipford, Heather
Fri, 18 Jul 2014 23:22:59 +0000
text/plain (73 lines)

Workshop on Security Information Workers 

In conjunction with the ACM Conference on Computer and Communications Security (CCS)
November 7, 2014, Scottsdale, AZ 


Further details at: 


The human element is often considered the weakest element in security. Although many kinds of humans interact with systems that are designed to be secure, one particular type of human is especially important, the security information worker. Security information workers include: 

*Software developers, who design and build software that manages and protects sensitive information; 
*System administrators, who deploy and manage security-sensitive software and hardware systems; and *Intelligence analysts, who collect and analyze data about security matters to understand information and make predictions. 

This workshop aims to develop and stimulate discussion about security information workers. We will consider papers including, but not limited to: 
*Empirical studies of security information workers, including experiments, field studies, and surveys; 
*New tools designed to assist security information workers; 
*Infrastructure for better understanding security information workers; 
*Techniques designed to help security information workers do their jobs; 
*Evaluations of tools and techniques for security information workers. 

Much security research could be considered about security information workers; for instance, tools that automatically find defects in program code could be construed to help software developers. However, successful submissions to this workshop will explicitly be informed by an understanding of how security information workers do their jobs, and the results will explicitly address how we understand security information workers. 

We invite original paper submissions in PDF format. Papers should use the ACM double-column format ( proceedings-templates). Full paper submissions should be at most 8 pages, including bibliography and appendices, while short papers should be at most 4 pages. Submissions should not be anonymized. Submissions should be made to the submission website at 

Proceedings of the workshop will be published by ACM on a CD, available to the workshop attendees and will be included in the ACM Digital Library. Each accepted paper must be presented by an author, who will have to be registered by the early-bird registration deadline. Email questions or inquiries to [log in to unmask] 

*Submission deadline: July 22, 2014
*Notification of acceptance: August 25, 2014 
*Camera-ready submission: September 5, 2014 


Emerson Murphy-Hill, North Carolina State University 
Heather Lipford, University of North Carolina at Charlotte 
Bill Chu, University of North Carolina at Charlotte 
Robert Biddle, Carlton University 

Brian Barry, Bedarra Research Labs
Konstantin Beznosov, University of British Columbia 
Robert Biddle, Carlton University 
Bill Chu, University of North Carolina at Charlotte 
Luke Church, Google 
Simson Garfinkel, Naval Postgraduate School 
Eben Haber, IBM 
Kirstie Hawkey, Dalhousie University 
Cormac Herley, Microsoft 
Iulia Ion, Google 
James Keiser, National Security Agency 
Lucas Layman, Fraunhofer Center for Experimental Software Engineering 
Heather Lipford, University of North Carolina at Charlotte 
Emerson Murphy-Hill, North Carolina State University 
Celeste Paul, University of Maryland Baltimore County 
Mary Ellen Zurko, Cisco Systems

    For news of CHI books, courses & software, join CHI-RESOURCES
     mailto: [log in to unmask]

    To unsubscribe from CHI-ANNOUNCEMENTS send an email to
     mailto:[log in to unmask]

    For further details of CHI lists see