CHI-ANNOUNCEMENTS Archives

ACM SIGCHI General Interest Announcements (Mailing List)

CHI-ANNOUNCEMENTS@LISTSERV.ACM.ORG

Options: Use Forum View

Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Serge Egelman <[log in to unmask]>
Reply To:
Serge Egelman <[log in to unmask]>
Date:
Wed, 19 Feb 2014 08:17:22 -0800
Content-Type:
text/plain
Parts/Attachments:
text/plain (192 lines)
NOTE: Paper registration deadline is next week!

Symposium On Usable Privacy and Security 2014
In-cooperation with USENIX
http://cups.cs.cmu.edu/soups/
July 9-11, 2014
Menlo Park, CA

CALL FOR PAPERS
http://cups.cs.cmu.edu/soups/2014/cfp.html

The 2014 Symposium on Usable Privacy and Security (SOUPS) will bring
together an interdisciplinary group of researchers and practitioners
in human computer interaction, security, and privacy. The program will
feature technical papers, a poster session, panels and invited talks,
lightning talks and demos, and workshops and tutorials. This year
SOUPS will be held at Facebook in Menlo Park, CA.

TECHNICAL PAPERS
(see the SOUPS website for details on other types of submissions)

We invite authors to submit original papers describing research or
experience in all areas of usable privacy and security. Topics
include, but are not limited to:

- innovative security or privacy functionality and design,
- new applications of existing models or technology,
- field studies of security or privacy technology,
- usability evaluations of new or existing security or privacy features,
- security testing of new or existing usability features,
- longitudinal studies of deployed security or privacy features,
- the impact of organizational policy or procurement decisions, and
- lessons learned from the deployment and use of usable privacy and
  security features,
- reports of replicating previously published studies and experiments,
- reports of failed usable security studies or experiments, with the
  focus on the lessons learned from such experience.

All submissions must relate to both usability and either security or
privacy. Papers on security or privacy applications that do not
address usability or human factors will not be considered.

Papers must use the SOUPS formatting template (available for MS Word or
LaTeX)
and be up to 12 pages in length, excluding the bibliography and any
supplemental
appendices. Authors have the option to attach to their paper supplemental
appendices containing study materials (e.g., surveys) that would not
otherwise
fit within the body of the paper. Reviewers are not required to read any
appendices so your paper should be self contained without them. Accepted
papers
will be published online with their supplemental appendices included.
Submissions must be no more than 20 pages including bibliography and
appendices.

Submissions must be in PDF format and should be made electronically at
http://cups.cs.cmu.edu/crp/soups2014/.

New this year, reviewing is double blind:  Author names and affiliations
should
not appear on the title page, and papers should avoid revealing the authors'
identity in the text. Any references to own work should be made in the third
person. Contact the program chairs if you have any questions. Submissions
that
violate these requirements may be rejected without review.

Technical papers must be registered by 5pm, US Pacific time, Friday, Feb 28
and
submitted by 5pm, US Pacific time, Thursday, Mar 6. This is a hard deadline!
Authors will be notified of technical paper acceptance by May 5, and
camera-ready final versions of technical papers will be due May 30.

Accepted papers will be published by the USENIX Association, and will be
freely
available on the USENIX and SOUPS websites. Submitted papers must not
significantly overlap papers that have been published or that are
simultaneously
submitted to a peer-reviewed venue or publication. Any overlap between your
submitted paper and other work either under submission or previously
published
must be documented in a clearly-marked explanatory note at the front of the
paper. State precisely how the two works differ in their goals, any use of
shared experiments or data sources, and the unique contributions. If the
other
work is under submission elsewhere, the program committee may ask to review
that
work to evaluate the overlap. Please note that program committees frequently
share information about papers under review and reviewers usually work on
multiple conferences simultaneously. As technical reports are not peer
reviewed
they are exempt from this rule. You may also release pre-prints of your
accepted
work to the public at your discretion.

Authors are encouraged to review: Common Pitfalls in Writing about Security
and
Privacy Human Subjects Experiments, and How to Avoid Them
https://cups.cs.cmu.edu/soups/2010/howtosoups.pdf

User experiments should follow the basic principles of ethical research,
e.g.,
beneficence (maximizing the benefits to an individual or to society while
minimizing harm to the individual), minimal risk (appropriateness of the
risk
versus benefit ratio), voluntary consent, respect for privacy, and limited
deception. Authors are encouraged to include in their submissions
explanation of
how ethical principles were followed, and may be asked to provide such an
explanation should questions arise during the review process.

Technical Papers Committee

Lujo Bauer, Carnegie Mellon University, USA (co-chair)
Konstantin Beznosov, University of British Columbia, Canada
Robert Biddle, Carleton University, Canada (co-chair)
Sonia Chiasson, Carleton University, Canada
Sunny Consolvo, Google, USA
Alexander De Luca, University of Munich (LMU), Germany
Simson Garfinkel, Naval Postgraduate School, USA
Iulia Ion, Google, USA
Maritza Johnson, Facebook, USA
Apu Kapadia, Indiana University, USA
Wenke Lee, Georgia Tech, USA
Heather Lipford, UNC Charlotte, USA
Michael K. Reiter, UNC Chapel Hill, USA
Stuart Schechter, Microsoft Research, USA
Matthew Smith, University of Bonn, Germany
Melanie Volkamer, Technische Universitšt Darmstadt, Germany
Yang Wang, Syracuse University, USA
Tara Whalen, Carleton University, Canada
Mary Ellen Zurko, Cisco Systems, USA

SOUPS 2014 IMPORTANT DATES
Early registration deadline - June 12
Conference - July 9-11

Technical papers
Paper registration deadline - February 28, 5 pm US Pacific time -- papers
must be registered!
Submission deadline - March 6, 5 pm US Pacific time (hard deadline!)
Notification of paper acceptance - May 5
Camera ready papers due - May 30

Posters
Submission deadline - May 15, 5 pm US Pacific time
Notification of acceptance - May 30

Tutorials and workshops
Proposal submission deadline - January 24
Notification of proposal acceptance - February 14
Workshop paper submission deadline - May 15
Notification of workshop paper acceptance - May 30
Camera ready papers due - June 13

Panels and invited talks
Panel proposal submission deadline - January 24
Speaker suggestion submission deadline - January 24

Lightning talks and demos
Early submission deadline - May 15
Early submission notification - May 30
Submissions received after May 15 will be considered until the program is
full


Thanks to our sponsors: Facebook, Carnegie Mellon CyLab, and
Carnegie Mellon MSIT-Privacy Engineering Masters Program


-- 
/*
Serge Egelman, Ph.D.
Research Scientist

International Computer Science Institute (ICSI)
and
Department of Electrical Engineering and Computer Sciences (EECS)
University of California, Berkeley

*/

    ---------------------------------------------------------------
    For news of CHI books, courses & software, join CHI-RESOURCES
     mailto: [log in to unmask]

    To unsubscribe from CHI-ANNOUNCEMENTS send an email to
     mailto:[log in to unmask]

    For further details of CHI lists see http://listserv.acm.org
    ---------------------------------------------------------------

ATOM RSS1 RSS2