All dates are at 23:59 AoE (Anywhere on Earth) time.
- Workshops submission deadline:
Friday, May 24, 2019Friday, May 31, 2019 (deadline extended)
- WIPS 2019 submission deadline: Friday, May 31, 2019
- WSIW 2019 submission deadline: Saturday, June 1, 2019 (deadline extended)
- Notification of acceptance: Saturday, June 8, 2019
Tutorials and Workshops Co-Chairs
Elissa Redmiles, University of Maryland
Daniel Zappala, Brigham Young University
Tutorial and Workshop Schedule
|Sunday, August 11||Room 1||Room 2||Room 3|
|9:00 am–12:00 pm||Contextual Integrity: From Theory to Practice (Tutorial)||Designing for the Extremes of Risk||Who Are You!? Adventures in Authentication (WAY 2019)|
|12:00 pm–1:30 pm||Lunch|
|1:30 pm–5:30 pm||5th Workshop on Security Information Workers (WSIW 2019)||4th Workshop on Inclusive Privacy and Security (WIPS 2019)||Who Are You!? Adventures in Authentication (WAY 2019) (continued)|
Contextual Integrity: From Theory to Practice (Tutorial)
Recognizing the endemic failures of the current privacy framework of “notice and consent,” regulators and policymakers are increasingly looking to the Theory of Contextual Integrity (CI) to reason about privacy. Concurrently, there has been a stream of research to better understand and model individuals’ privacy attitudes and expectations through the CI lens, as well as to inform the design of technological solutions that operationalize the theory. Yet, this shift remains relatively nascent; there are many unanswered research questions about how to best apply varying research methodologies and how to best transition research findings into practice. This tutorial will provide a unifying view of contextual integrity, from basic concepts to emerging methodologies to current application areas. The format will be a series of short presentations with opportunities for participants to add to the discussions.
View the tutorial proposal
Designing for the Extremes of Risk
This workshop will cover how to adapt UX design and user feedback collection techniques when working with high-risk communities, through an overview of the different marginalized groups and their needs that the USABLE.tools project have worked with from around the world over the past 2 years. The USABLE.tools project builds feedback loops around the globe by connecting at-risk communities with digital security trainers, usability experts, and security tool developers. USABLE has worked with over 50 trainers and engaged end users in high-risk areas, and supported open source security and privacy tools with funding as well as direct design and implementation support to take this feedback and incorporate it into their tools through human-centered design processes. We welcome community input to present on similar topics and then via breakout groups discuss open questions around building lasting structures to help designers and tool developers responsibly solicit and implement feedback from at-risk populations.
View the Call for Presentations
5th Workshop on Security Information Workers (WSIW 2019)
The human element is often considered the weakest element in security. Although many kinds of humans interact with systems that are designed to be secure, one particular type of human is especially important, the security information workers who develop, use, and manipulate security-related information and data as a significant part of their jobs. This workshop aims to develop and stimulate discussion about security information workers. Successful submissions to this workshop will be informed by an understanding of how security information workers do their jobs, and the results will explicitly address how we understand security information workers.
View the Call for Papers
4th Workshop on Inclusive Privacy and Security (WIPS 2019)
Many privacy and security solutions are designed for and evaluated with a narrow range of users and the solutions make assumptions about the environment and the user interaction capabilities and methods. However, these solutions are used by a much wider variety of people, and in more varied situations than ever evaluated with. To make these solutions more inclusive, we need to take into consideration a wider range of potential users, including vulnerable and marginalised groups and more contexts of use. These would include people with disabilities, older adults, children, those with mental health conditions, people living with stigmatized conditions, survivors of domestic abuse, gig workers, or those living or traveling in countries where freedom of speech is not exercised. We also need to consider not only the individual but also the cultural, social and physical environment in which they exist. Broadly, this workshop is devoted to exploring diverse privacy and security experiences and needs across the wide range of user groups and circumstances.
View the Call for Papers
Who Are You!? Adventures in Authentication (WAY 2019)
The purpose of this workshop is to bring together researchers and practitioners to share experiences, concerns, and ideas about known and new authentication techniques. We are interested in discussing methods of evaluating the impact and usability of various authentication techniques, and ideas about novel authentication techniques that are secure, robust and usable. This year, WAY will also feature a panel of industry experts who will present a discussion of authentication as it applies to industry practices.
View the Call for Papers