|1:30 – 1:45||Welcome and opening remarks|
|1:45 – 2:00||A Preliminary user experience evaluation of MISP (Work in Progress)|
|2:00 – 2:15||Studying the Costs and Benefits of Rust, Compared to C|
|2:15 – 2:30||Exploring the Use of Interactive Interfaces and Feedback Mechanisms to Enhance Privacy in Data Works through Information Accountability|
|2:30 – 3:30||Keynote: Tim Mather, Fortium Partners|
|3:30 – 4:00||Break|
|4:00 – 4:15||So, Tell Me What You Know, What You Really Really Know: Identifying the Knowledge Gaps of Future Security Information Workers|
|4:15 – 4:30||Security Awareness in Action: A Case Study|
|4:30 – 4:45||Bug Bounty Programs: Hunters’ vs Organizations’ Perspectives|
|4:45 – 5:25||Discussion|
|5:25 – 5:30||Closing remarks|
Successful submissions to this workshop will be informed by an understanding of how security information workers do their jobs, and the results will explicitly address how we understand security information workers.
We solicit one-page abstracts describing new research contributions in this area as well as case studies, work in progress, preliminary results, novel ideas, and position papers. Abstracts should be no more than one page (excluding references) using the SOUPS template format (MS Word or LaTeX). Submissions may be made at https://wsiw2019.usenix.hotcrp.com/.
Workshop abstracts will be made available to attendees prior to the workshop. Abstract presentations will be approximately 10 minutes in length followed by 5 minutes of questions and answers. Presentations must be made in-person; remote presentations cannot be accomodated.
The half-day workshop will feature paper presentations and breakout sessions to provide an opportunity for smaller group interactive discussion about related topics of interest, which may include methods, challenges, and future directions in security information workers research.
The deadline for submissions is May 31 23:59 AoE (Anywhere on Earth).
|Workshop paper submission deadline||Friday May 31, 2019 (extended)
|Workshop paper acceptance notification to authors||Saturday, June 08, 2019|
|Workshop camera-ready papers due||Monday, July 15, 2019|
|Workshop||Sunday, August 11, 2019|
Bug Bounty Programs: Hunters’ vs Organizations’ Perspectives
Noura Alomar, Primal Wijesekera, Serge Egelman, Edward Qiu, and Amit Elazari (University of California, Berkeley)
Security Awareness in Action: A Case Study
Julie Haney (NIST) and Wayne Lutters (University of Maryland)
Studying the Costs and Benefits of Rust, Compared to C
Kelsey Fulton, Yasmin Abdi, Christopher Neidhart, Michelle Mazurek, Michael Hicks (University of Maryland)
So Tell Me What You Know, What You Really Really Know: Identifying the Knowledge Gaps of Future Security Information Workers
Joseph Hallett and Awais Rashid (University of Bristol)
Work in Progress: A preliminary user experience evaluation of MISP
Borce Stojkovski and Gabriele Lenzini (SnT, University of Luxembourg)
Exploring the Use of Interactive Interfaces and Feedback Mechanisms to Enhance Privacy in Data Workers through Information Accountability
Hye-Chung Kum (Texas A&M University) and Eric Ragan (University of Florida, Gainesville)