Conference Information
SOUPS 2018 : International Symposium On Usable Privacy and Security
Submission Date:
Notification Date:
Conference Date:
Baltimore, Maryland, USA
CCF: c   CORE: b   QUALIS: b1   Viewed: 6515   Tracked: 21   Attend: 1

Conference Location
Call For Papers
The 2018 Symposium on Usable Privacy and Security (SOUPS) will bring together an interdisciplinary group of researchers and practitioners in human computer interaction, security, and privacy. The program will feature:

    technical papers, including replication papers
    workshops and tutorials
    a poster session
    lightning talks

Technical Papers

We invite authors to submit previously unpublished papers describing research or experience in all areas of usable privacy and security. We welcome a variety of research methods, including both qualitative and quantitative approaches. Papers will be judged on their scientific quality, overall quality, and value to the community. Topics include, but are not limited to:

    Innovative security or privacy functionality and design
    Field studies of security or privacy technology
    Usability evaluations of new or existing security or privacy features
    Security testing of new or existing usability features
    Longitudinal studies of deployed security or privacy features
    Studies of administrators or developers and support for security and privacy
    The impact of organizational policy or procurement decisions
    Lessons learned from the deployment and use of usable privacy and security features
    Foundational principles of usable security or privacy
    Ethical, psychological, sociological aspects of usable security and privacy
    Usable security and privacy implications/solutions for specific domains (e.g., IoT, medical, vulnerable populations)
    Replicating or extending important previously published studies and experiments

Paper Registration: Technical papers must be registered by the deadline listed above. Registration is mandatory for all papers. Registering a paper in the submission system requires filling out all of the fields of the online form that describe the submission, but does not require uploading a PDF of the paper. This information is used to facilitate the assignment of reviewers. Placeholder or incomplete titles and abstracts may be rejected without review.

Paper Submission: Technical papers must be uploaded as PDF by the deadline listed above. All submissions must follow the guidelines described below. Submissions that violate any of the requirements below may be rejected without review.

Contact the program chairs at if you have any questions about these requirements.

Format and Page Limits: Papers must use the SOUPS formatting template (available for MS Word or LaTeX), and be submitted as a PDF via the submission system. Submissions must be no more than 12 pages (excluding acknowledgements, bibliography, and appendices) and up to 20 pages total including acknowledgements, bibliography, and appendices. For the body of your paper, brevity is appreciated, as evidenced by the fact that many papers in prior years have been well under this limit.

Paper Content: Papers need to describe the purpose and goals of the work, cite related work, show how the work effectively integrates usability or human factors with security or privacy, and clearly indicate the innovative aspects of the work or lessons learned as well as the contribution of the work to the field. The paper abstracts should contain a sentence summarizing the contribution to the field and literature.

All submissions must clearly relate to the human aspects of security or privacy. Papers on security or privacy that do not address usability or human factors will not be considered. Likewise, papers on usability or human factors that do not address security or privacy will not be considered. The determination of whether a paper is within scope will be solely at the discretion of the program committee chairs.
Authors are encouraged to review: Common Pitfalls in Writing about Security and Privacy Human Subjects Experiments, and How to Avoid Them. Note that this paper addresses research work taking an experimental and quantitative approach, with hypothesis testing and statistical inference. However, SOUPS welcomes submissions that take other approaches, and recognizes that other methodological considerations will be appropriate.

Replication Papers: Besides original work, we are looking for well-executed replication studies that meaningfully shift the confidence in the result under consideration. Please prefix the title of these papers with the word “Replication:” for the review process.

Replication papers should aim to replicate important/influential findings from the literature. They may not necessarily offer new or unexpected findings; papers confirming previous findings are also considered contributions. Replication of a result that has already been replicated many times is less valuable. Replication of an obscure study that originally had only minimal influence on the community is less valuable. Authors should clearly state why they conducted a replication study, describe the methodological differences precisely, and compare their findings with the results from the original study.

Replication papers will be held to the same scientific standards as other technical papers. They should use currently accepted methodologies and technologies. Authors should not reuse outdated methods/technologies simply because they were used in the original paper. Replications may follow the same protocol as the original study, may vary one key variable to see whether the result is extensible (e.g., re-running a study with a sample from a different population), or may have the same goal but different design (e.g., conducting a field study instead of a self-reporting survey; using a different measurement instrument to measure a variable).

Anonymization: Reviewing is double blind. No names or affiliations should appear on the title page or in the body of the paper, acknowledgements should be blinded, and papers should avoid revealing the authors' identities in the text. Any references to the authors' own work should be made in the third person, as if it was work by someone else. Appendices and figures should also be blinded (e.g., do not leave logos or contact info on study materials, and remove de-anonymizing URLs from screenshots).

Overlap with previous papers: Submitted papers must not significantly overlap papers that have been published or that are simultaneously submitted to a peer-reviewed venue or publication. Any overlap between your submitted paper and other work either under submission or previously published must be documented in an explanatory note and sent to the chairs. State precisely how the two works differ in their goals, share experiments or data sources, and offer unique contributions. If the other work is under submission elsewhere, the program committee may ask to review that work to evaluate the overlap. Please note that program committees frequently share information about papers under review and reviewers usually work on multiple conferences simultaneously. Technical reports are exempt from this rule, e.g., arXiv reports. If in doubt, please contact the program chairs at for advice.

Self-plagiarism includes verbatim or near-verbatim use of one’s own published work without citing the original source, and is generally not acceptable. In some cases, it may be acceptable to include a brief portion of selected content from the introduction, background, related work, or methods of a closely related paper. In these cases, the original paper must be explicitly referenced and the overlap should be clear to the reader. The reused content must not be part of the main contributions of the paper and, where possible, re-writing the text is prefered. Papers with significant text reuse may be rejected because of too much overlap. If in doubt, please contact the program chairs at for advice.

Appendices: Authors may attach to their paper supplementary appendices containing study materials (e.g., survey instruments, interview guides, etc.) that would not otherwise fit within the body of the paper. These appendices may be included to assist reviewers with questions that fall outside the stated contribution of your paper, on which your work is to be evaluated. Reviewers are not required to read any appendices, so your paper should be self contained without them. Accepted papers will be published online with their supplementary appendices included.

Conflicts of Interest: The submission system will request information about conflicts of interest between the paper's authors with program committee (PC) members. It is the full responsibility of all authors of a paper to identify their potential conflict-of-interest PC members, according to the following definition. A paper author has a conflict of interest with a PC member when one or more of the following conditions holds:

    The PC member is a co-author of the paper.
    The PC member has been a co-worker in the same company or university within the past four years.
    The PC member has been a collaborator within the past four years.
    The PC member is or was an author’s thesis advisor, no matter how long ago.
    An author is or was the PC member's thesis advisor, no matter how long ago.
    The PC member is a relative or close personal friend of the author.

Ethical Research: User studies should follow the basic principles of ethical research, including beneficence (maximizing the benefits to an individual or to society while minimizing harm to the individual), minimal risk (appropriateness of the risk versus benefit ratio), voluntary consent, respect for privacy, and limited deception. Authors are encouraged to include in their submissions explanation of how ethical principles were followed, and may be asked to provide such an explanation should questions arise during the review process. If your organization or institution requires formal clearance for research with human subjects, your paper may be rejected if clearance was not obtained. However, such clearance alone does not guarantee acceptance and the program committee may reject a paper on ethical grounds.

Early Rejections: Papers that receive substantially negative initial reviews will be rejected early. The authors of early-rejected papers, and only such papers, will receive a copy of their initial reviews. At this point, papers are no longer considered under submission (except if authors appeal).

Authors who substantively disagree with the reviews can appeal to the program committee chairs. Authors’ appeals must clearly and explicitly identify concrete disagreements with factual statements in the initial reviews. Appealing a submission that was rejected early will keep it under consideration, and it cannot be withdrawn or resubmitted elsewhere until the final notification of acceptance or rejection.

Rebuttals: The rebuttal period will be held after the second round of reviews, so the authors will be given a chance to see and correct factual errors in all reviews. Authors may provide a short rebuttal that will be considered in subsequent discussions. Authors' rebuttals must clearly and explicitly identify concrete issues with factual statements in the initial reviews, or provide clarification to explicit reviewer questions. Due to time constraints, the rebuttal period is fairly short. Please ensure that you reserve enough time between April 14 and April 20 for the rebuttal process. Late rebuttals will not be accepted.

Publication: Accepted papers will be published by the USENIX Association, and will be freely available on the USENIX and SOUPS websites. Authors will retain copyright of their papers. Authors may also release pre-prints of their accepted work to the public at their discretion.

Presentation: For accepted papers, at least one of the paper authors must attend the conference and present the work.
Last updated by Dou Sun in 2017-12-16
Related Publications
Acceptance Ratio
Related Conferences
CCFCOREQUALISShortFull NameSubmissionNotificationConference
SIMBADInternational Workshop on Similarity-Based Pattern Analysis and Recognition 2013-03-302013-07-03
BioMedComInternational Conference on Biomedical Computing2014-07-152014-09-302014-12-15
RSSRailInternational Conference Reliability, Safety and Security of Railway Systems: Modelling, Analysis, Verification and Certification 2017-06-012017-07-082017-11-14
cb3ICIGInternational Conference on Image and Graphics2015-04-202015-05-102015-08-13
IMCOMInternational Conference on Ubiquitous Information Management and Communication2017-08-202017-10-152018-01-05
ICECEInternational Conference on Electrical and Control Engineering2015-03-312015-04-052015-04-18
NTInternational Conference on Networking and Technology2014-10-102014-10-302014-10-24
bb1ARESInternational Conference on Availability, Reliability and Security2017-03-312017-05-222017-08-29
BigData CongressInternational Congress on Big Data2018-03-212018-04-282018-06-25
EDISInternational Conference on Embedded & Distributed Systems2017-10-152017-11-152017-12-17
Related Journals
CCFFull NameImpact FactorPublisherISSN
bJournal of Computer Security IOS Press0926-227X
cJournal of Internet Security DDSecure.Net Inc.1206-4890
cIET Information Security0.862IET1751-8709
Journal of Logical and Algebraic Methods in Programming0.692Elsevier2352-2208
bComputers & Security2.849ELSEVIER0167-4048
cEURASIP Journal on Information Security Springer1687-417X
International Journal of Network Security & Its Applications AIRCC0975-2307
Swarm Intelligence and Numerical MethodsRational Publication0000-0000
bIEEE Security & Privacy1.382IEEE1540-7993
Integration, the VLSI Journal1.000ELSEVIER0167-9260