June 25, 2020
10th International Workshop on Socio-Technical Aspects in SecuriTy affiliated with the 25th European Symposium on Research in Computer Security (ESORICS) 2020
The workshop will take place on 17 or 18 September 2020 as one day workshop.
After evaluating the ongoing COVID-19 situation, the decision has been made to run ESORICS 2020 and the associated workshops as an online event.
Therefore, STAST 2020 will take place as entirely virtual.
Successful attacks on information systems often combine social engineering practices with technical skills, exploiting technical vulnerabilities, insecure user behavior, poorly designed user interfaces, and unclear or unrealistic security policies. To improve security, technology must adapt to the users, because research in social sciences and usable security has demonstrated that insecure behavior can be justified from cognitive, emotional, and social perspectives. However, also adherence to reasonable security policies and corresponding behavioral changes should augment and support technical security.
Finding the right balance between the technical and the social security measures remains largely unexplored, which motivates the need for this workshop. Currently, different security communities (theoretical security, systems security, usable security, and security management) rarely work together. There is no established holistic research in security, and the respective communities tend to offload on each other parts of problems that they consider to be out of scope, an attitude that results in deficient or unsuitable security solutions.
The workshop intends to stimulate an exchange of ideas and experiences on how to design systems that are secure in the real world where they interact with non-expert users. It aims at bringing together experts in various areas of computer security and in social and behavioral sciences.
TYPE OF CONTRIBUTIONS
We welcome qualitative and quantitative research approaches from academia and industry.
We welcome meta-analytic as well as replication studies and consider them as original research eligible for full papers. We welcome negative or null results with sound methodology.
Accepted papers will be published as post-proceedings with Springer in their Lecture Notes in Computer Science series.
To celebrate the 10th edition of the workshop, the authors of the best papers will be invited to submit extended versions of their work for a special issue of the Journal of Computer Security.