Due to the devastation brought by the hurricane Maria, the workshop has been relocated from San Juan, Puerto Rico to Orlando, Florida . Please refer to the ACSAC homepage for more information. To remeber this unfortunate event, we keep as artwork of this page the one we chose originally and which relates to the old location.
- Abstract and Title Submission:
September 20, 2017
September 27, 2017
(Anywhere on Earth) = UTC-12 - Full Paper Submission:
September 25, 2017
October 2, 2017
(Anywhere on Earth) = UTC-12 - Notification:
October 30, 2017
November 6, 2017 - Camera Ready:
November 20, 2017
November 30, 2017
- Workshop Date:
December 5, 2017
Other Editions
STAST 2018:
stast2018.uni.lu
STAST 2016:
stast2016.uni.lu
STAST 2015:
stast2015.uni.lu
STAST 2014:
stast2014.uni.lu
STAST 2013:
stast2013.uni.lu
STAST 2012:
stast2012.uni.lu
STAST 2011:
stast2011.uni.lu
Proceedings
Proceedings of the 7th Workshop on Socio-Technical Aspects in Security and Trust (STAST)
G. Bella and G. Lenzini (eds.),
ACM, New York, NY, USA are available at
ACM Digital Library.
ISBN: 978-1-4503-6357-0
Mailing List
We invite you to subscribe to our socio-technical security mailing listTerminology
The term "socio-technical" means a reciprocal relationship between technology and people.Concept
Successful attacks on information systems often combine social engineering practices with technical skills, exploiting technical vulnerabilities, insecure user behavior, poorly designed user interfaces, and unclear or unrealistic security policies. To improve security, technology must adapt to the users, because research in social sciences and usable security has demonstrated that insecure behavior can be justified from cognitive, emotional, and social perspectives. However, also adherence to reasonable security policies and corresponding behavioral changes should augment and support technical security.
Finding the right balance between the technical and the social security measures remains largely unexplored, which motivates the need for this workshop. Currently, different security communities (theoretical security, systems security, usable security, and security management) rarely work together. There is no established holistic research in security, and the respective communities tend to offload on each other parts of problems that they consider to be out of scope, an attitude that results in deficient or unsuitable security solutions.
Goals
The workshop intends to stimulate an exchange of ideas and experiences on how to design systems that are secure in the real world where they interact with non-expert users. It aims at bringing together experts in various areas of computer security and in social and behavioral sciences.