• Full Paper Submission:
    October 15, 2018
    October 23 (extended), 2018
    (Anywhere on Earth) = UTC-12
  • Notification:
    November 17, 2018
  • Camera Ready:
    (After the Workshop)
  • Workshop Date:
    December 4, 2018

Previous Editions

STAST 2017:

STAST 2016:

STAST 2015:

STAST 2014:

STAST 2013:

STAST 2012:

STAST 2011:

Stay connected


Call for Papers

This call for papers is available in PDF and in TXT.

Type of contributions

We consider the following submission types:

  • Full Papers, discussing original research, answering well-defined research questions, and presenting full and stable results;
  • Position Papers, original contributions discussing existing challenges and introducing and motivating new research problems;
  • Case Studies, describing lessons learned from design and deployment of security mechanisms and policies in research and in industry.
  • Work in Progress, describing original but unfinished research, which is nevertheless based on solid research questions or hypothesis soundly argued be innovative compared with the state of the art.

See the paper submission page for paper format and instruction for authors

Workshop Topics

Contributions should focus on the interplay of technical, organizational and human factors in breaking and in achieving computer security, for example:

  • Usability and user experience in security
  • Requirements for socio-technical systems
  • Feasibility of policies from the socio-technical perspective
  • Threat models that combine technical and human-centered strategies
  • Socio-technical factors in decision making in security and privacy
  • Balance between technical measures and social strategies
  • Studies of real-world security incidents socio-technical perspective
  • Social factors in organizations security policies and processes
  • Lessons from design and deployment of security mechanisms and policies
  • Models of user behaviour and user interactions with technology
  • Perceptions of security, risk, and trust and their influence on humans
  • Interplay of law, ethics and politics with security and privacy measures
  • Social engineering, persuasion, and other deception techniques
  • Socio-technical analysis of security incidents
  • Strategies, methodology and guidelines cyber-security intelligence analysis

We welcome qualitative and quantitative research approaches from academia and industry


The final proceedings will be published with the ACM International Conference Proceedings Series.