SPECIAL ISSUE ON USABLE SECURITY AND PRIVACY

Novel computing technologies enter the market at a rapidly accelerating pace. Personal smart devices, the Internet of Things, and virtual and augmented reality aren't but a few examples. Many such devices are both networked and augmented with sensing technologies, hence (a) enabling sensitive user data to be collected and (b) allowing data to be accessed on the devices itself as well as in the cloud. This poses considerable challenges with regard to security and privacy approaches. In this special issue, we solicit work that addresses the need to design for security and privacy with the user in mind.

Accepted articles will be published in the Journal of Interactive Media (i-com), edited by the German Association for Informatics. The journal is indexed by the ACM Digital Library, among others.

Topics

Relevant topics include but are not limited to:

  • Field studies of security or privacy technology
  • Longitudinal studies of deployed security or privacy features
  • Work replicating or extending important previously published studies and experiments (in particular, different cultures, genders, etc.)
  • Systematization of knowledge papers that integrate and systematize existing knowledge to provide new insight into a previously studied area
  • Real World Case Studies of usable security systems
  • Studies of administrators or developers and support for security and privacy
  • Novel research approaches / methods in usable security and privacy
  • Lessons learned from the deployment and use of usable privacy and security features
  • Innovative security or privacy functionality and design
  • Usability evaluations of new or existing security or privacy features
  • Security testing of new or existing usability features
  • The impact of organizational policy or procurement decisions
  • Foundational principles of usable security or privacy
  • Ethical, psychological, sociological aspects of usable security and privacy
  • Usable security and privacy implications/solutions for specific domains (e.g., IoT, medical, vulnerable populations)
  • Work on novel application areas in usable security in privacy (e.g., IoT, virtual and augmented reality, behavioural biometrics, smart homes, machine learning, etc.)

Timeline

 

15.05.2019 Submission Deadline
30.06.2019 First round of reviews
31.07.2019 Revisions due
31.08.2019 Final Decision
30.09.2019 Camera-ready Deadline
   

Submission and Review Process

All submissions will undergo a rigorous review process. Hereby each manuscript will be reviewed by three independent expert reviewers. Possible outcomes of the first round of reviews are accept, revision, or reject. Authors of submissions that require revision will have one month to implement the required changes.

 

All non-anonymized manuscripts need to be submitted via ScholarOne. The anticipated length of papers for this special issue is about 7.000 - 10.000  words. The length of the manuscript should be commensurate to its contribution. Authors are asked to use this template for preparing their submissions.

 

No costs will occur for authors of accepted articles.  

Guest Editors

  • Florian Alt, Bundeswehr University Munich
  • Emanuel von Zezschwitz, University Bonn

 

Please direct any questions to Florian Alt or Emanuel von Zezschwitz.

Reviewing Committee (tentative)

  • Matthew Smith, University of Bonn
  • Blase Ur, University of Chicago
  • Heinrich Hussmann, LMU Munich
  • Melanie Volkamer, Karlsruhe Institute for Technology
  • Sascha Fahl, Leibniz University Hannover
  • Luigi Lo Iacono, TH Köln
  • Markus Dürmuth, Ruhr-Universität Bochum
  • Marian Harbach, Google
  • Daniel Buschek, LMU München
  • Mohamed Khamis, University of Glasgow