Important Dates

  • Abstract and Title Submission:
    September 20, 2017
    September 27, 2017
    (Anywhere on Earth) = UTC-12
  • Full Paper Submission:
    September 25, 2017
    October 2, 2017
    (Anywhere on Earth) = UTC-12
  • Notification:
    October 30, 2017
    November 6, 2017
  • Camera Ready:
    November 20, 2017
    November 30, 2017
  • Workshop Date:
    December 5, 2017

Previous Editions

STAST 2016:

STAST 2015:

STAST 2014:

STAST 2013:

STAST 2012:

STAST 2011:

Supported by




Call for Papers

This call for papers is available in PDF and in TXT.

Type of contributions

We consider the following submission types:

  • Full Papers, discussing original research, answering well-defined research questions, and presenting full and stable results;
  • Position Papers, original contributions discussing existing challenges and introducing and motivating new research problems;
  • Case Studies, describing lessons learned from design and deployment of security mechanisms and policies in research and in industry.
  • Work in Progress, describing original but unfinished research, which is nevertheless based on solid research questions or hypothesis soundly argued be innovative compared with the state of the art.

See the paper submission page for paper format and instruction for authors

Workshop Topics

Contributions should focus on the interplay of technical, organizational and human factors in breaking and in achieving computer security, for example:

  • Requirements for socio-technical systems
  • Feasibility of policies from the socio-technical perspective
  • Threat models that combine technical and human-centred strategies
  • Technical and social factors that influence decision making in security and privacy
  • Balance between technical measures and social strategies in ensuring security and privacy
  • Studies of real-world security incidents from the socio-technical perspective
  • Social factors that influence changes in organizations security policies and processes
  • Lessons learned from holistic design and deployment of security mechanisms and policies
  • Models of user behaviour and user interactions with technology
  • Perceptions of security, risk and trust and their influence on human behaviour
  • Interplay of law, ethics and politics with security and privacy measures
  • Social engineering, persuasion, and other deception techniques
  • Socio-Technical analysis of security incidents
  • Methodology and guidelines for socio-technical and cyber-security intelligence analysis

We welcome qualitative and quantitative research approaches from academia and industry


The final proceedings will be published with the ACM International Conference Proceedings Series.