Stay connected


spc

#STAST2024

Proceedings

IEEE

Call for Papers

The details of the call for papers is available here.

Type of contributions

We will accept papers in several formats. All papers must be original contributions and not simultaneously submitted to another workshop, conference, or journal. The following paper formats are welcome:

  • Full Papers discussing original research, answering well-defined research questions, and presenting full and stable results;
  • Work in Progress describing original but unfinished piece of work, based on solid research questions or hypotheses.
  • Position Papers discussing existing challenges and introducing and motivating new research problems;

We welcome qualitative and quantitative research approaches from academia and industry. We welcome meta-analytic as well as replication studies and consider them as original research eligible for full papers. We also welcome negative or null results with sound methodology.

Proceedings

The proceedings will be via publication through IEEE Xplore in a volume accompanying the main IEEE EuroS&P '24 proceedings.

Workshop Topics

Contributions should focus on the interplay of technical, organizational and human factors in achieving or breaking security, privacy, and trust. For example:

  • Usability and user experience
  • Models of user behaviour and user interactions with technology
  • Perceptions of related risk, as well as their influence on humans
  • Social engineering, persuasion, and other deception techniques
  • Requirements for socio-technical systems
  • Decision making in/for socio-technical systems
  • Feasibility of policies, standards, and regulations from the socio-technical perspective
  • Social factors in organizations' policies and processes
  • Interplay of law, ethics and politics with security and privacy measures
  • Balance between technical measures and social strategies
  • Threat models that combine technical and human-centered strategies
  • Socio-technical analysis of incidents and vulnerabilities
  • Studies of real-world vulnerabilities/incidents from a socio-technical perspective
  • Lessons from design, deployment, and enforcement of mechanisms, policies, standards, and regulations
  • Strategies and guidelines for analysis of intelligence and data from a socio-technical perspective
  • Marginalised and disadvantaged user groups in the lifecycle of socio-technical systems
  • Methodologies and methodological reflections in pursuit of these goals