[fc-announce] CFP: 3rd Workshop on Ethics in Computer Security Research - Submission deadline: Oct 31, 2011

Sven Dietrich spock at cs.stevens.edu
Fri Sep 23 23:10:34 CEST 2011


Call for Papers

3rd Workshop on Ethics in Computer Security Research
March 2, 2012
Divi Flamingo Beach Resort, Bonaire
http://www.cs.stevens.edu/~spock/wecsr2012/cfp.html

Computer security often leads to discovering interesting new problems and 
challenges. The challenge still remains to follow a path acceptable for 
Institutional Review Boards at academic institutions, as well as compatible 
with ethical guidelines for professional societies or government institutions. 
However, no exact guidelines exist for computer security research yet. This 
workshop will bring together computer security researchers, practitioners, 
policy makers, and legal experts.

This workshop solicits submissions describing or suggesting ethical and 
responsible conduct in computer security research. While we focus on setting 
standards and sharing prior experiences and experiments in computer security 
research, successful or not, we tap into research behavior in network security, 
computer security, applied cryptography, privacy, anonymity, and security 
economics.

This workshop will favor discussions among participants, in order to shape the 
future of ethical standards in the field. It will be co-located with the 
Sixteenth International Conference on Financial Cryptography and Data Security 
2012.

Submissions

We solicit submissions in three categories.

1. Position papers. Submitted papers must not substantially overlap with papers 
that have been published or that are simultaneously submitted to a journal or 
conference with proceedings. Position paper submission should not exceed 6 
pages in length, excluding bibliography and well-marked appendices.

2. Case studies. Submitted case studies must not substantially overlap with 
papers that have been published or that are simultaneously submitted to a 
journal or conference with proceedings. Submitted case studies should not 
exceed 12 pages in length, excluding bibliography and well-marked appendices.

3. Panel proposals. Submitted panel proposals should list the panel topic, a 
moderator, and a list of confirmed panelists, along with a short biography of 
the participants. The composition should be adequately selected as to generate 
copious discussion. Panelists will be given an opportunity to submit a position 
statement for the final proceedings.

The proceedings will be published in the Springer LNCS series (both the 2010 
and 2011 proceedings were published in Springer LNCS). More information on how 
to submit your work via the EasyChair system can be found at

http://www.cs.stevens.edu/~spock/wecsr2012/cfp.html

Organization:

Program Chair: Sven Dietrich, Stevens Institute of Technology

Program Committee:

John Aycock, University of Calgary
Michael Bailey, University of Michigan
Elizabeth Buchanan, University of Wisconsin-Stout
Aaron Burstein
Jon Callas, Indiana University
Michael Collins, RedJack
Nicolas Christin, Carnegie Mellon University
Marc Dacier, Symantec Research
Rachna Dhamija, Harvard University
David Dittrich, University of Washington APL
Roger Dingledine, The Tor Project
Ken Fleischmann, University of Maryland
Maritza Johnson, Columbia University
Erin Kenneally, UC San Diego/CAIDA/Elchemy
Engin Kirda, Northeastern University
Christian Kreibich, ICSI
John McHugh, UNC/RedJack
Howard Lipson, CERT
Perry E. Metzger, University of Pennsylvania
M. Angela Sasse, University College London
Angelos Stavrou, George Mason University
Michael Steinmann, Stevens Institute of Technology
Lenore Zuck, University of Illinois at Chicago


--
Sven Dietrich               Stevens Institute of Technology
Assistant Professor         Castle Point on Hudson
Computer Science Dept       Hoboken, NJ 07030, USA
spock at cs.stevens.edu        T: +1-201-216-8078 F: +1-201-216-8249


More information about the fc-announce mailing list