Call for Papers
Important Dates
| Event | Date |
|---|---|
| Submission system opens | March 20, 2026 |
| Obligatory abstract registration | May 20, 2026 |
| Paper submission deadline | May 25, 2026 |
| Notification for authors | June 25, 2026 |
| Shepherding starts | June 25, 2026 |
| Camera-ready submission | July 27, 2026 |
| Conference | September 2–3, 2026 |
These are firm deadlines; no extensions will be granted. All deadlines are at 23:59 AoE (Anywhere on Earth).
Scope & Topics
We welcome submissions containing unpublished original work describing research in all areas of usable security and privacy. We also welcome the systematization of knowledge (SoK) papers with a clear connection to usable security and privacy. Well-executed replication studies are welcomed, as are papers presenting and discussing negative or insignificant results. We appreciate a variety and mixture of research methods, including both qualitative and quantitative approaches.
Topics include, but are not limited to:
- Usable security and privacy implications or solutions for specific domains
- Methodologies for usable security and privacy research
- Role of AI / Generative AI technologies in improving usable security and privacy
- Field studies of security or privacy technology
- Longitudinal studies of deployed security or privacy features
- New applications of existing privacy / security models or technology
- Innovative security or privacy functionality and design
- Usability evaluations of new or existing security or privacy features
- Security testing of new or existing usability features
- Lessons learned from the deployment and use of usable privacy and security features
- Reports of failed usable privacy / security studies or experiments, with a focus on lessons learned
- Reports of replicating previously published important studies and experiments
- Psychological, sociological, cultural, or economic aspects of security and privacy
- Studies of administrators or developers and support for security and privacy
- Studies on the adoption or acceptance of security or privacy technologies
- Systematization of knowledge papers
- Impact of organizational policy or procurement decisions on security and privacy
- Models of user behaviour and user interactions with technology
- Perceptions of related risk, as well as their influence on humans
- Social engineering, persuasion, and other deception techniques
- Requirements for socio-technical systems
- Decision making in/for socio-technical systems
- Feasibility of policies, standards, and regulations from the socio-technical perspective
- Social factors in organizations' policies and processes
- Interplay of law, ethics and politics with security and privacy measures
- Balance between technical measures and social strategies
- Threat models that combine technical and human-centered strategies
- Socio-technical analysis of incidents and vulnerabilities
- Studies of real-world vulnerabilities/incidents from a socio-technical perspective
- Lessons from design, deployment, and enforcement of mechanisms, policies, standards, and regulations
- Strategies and guidelines for analysis of intelligence and data from a socio-technical perspective
Types of Contributions
Full papers (8–12 pages) discuss complete original research, answer well-defined research questions, and present full and stable results.