Submission deadline extended to Nov 8, 2011!

Final Call for Papers

3rd Workshop on Ethics in Computer Security Research
March 2, 2012 Divi Flamingo Beach Resort, Bonaire

Computer security often leads to discovering interesting new problems and 
challenges. The challenge still remains to follow a path acceptable for 
Institutional Review Boards at academic institutions, as well as compatible 
with ethical guidelines for professional societies or government 
institutions. However, no exact guidelines exist for computer security 
research yet. This workshop will bring together computer security 
researchers, practitioners, policy makers, and legal experts.

This workshop solicits submissions describing or suggesting ethical and 
responsible conduct in computer security research. While we focus on setting 
standards and sharing prior experiences and experiments in computer security 
research, successful or not, we tap into research behavior in network 
security, computer security, applied cryptography, privacy, anonymity, and 
security economics.

This workshop will favor discussions among participants, in order to shape 
the future of ethical standards in the field. It will be co-located with the 
Sixteenth International Conference on Financial Cryptography and Data 
Security 2012.


We solicit submissions in three categories.

1. Position papers. Submitted papers must not substantially overlap with 
papers that have been published or that are simultaneously submitted to a 
journal or conference with proceedings. Position paper submission should not 
exceed 6 pages in length, excluding bibliography and well-marked appendices.

2. Case studies. Submitted case studies must not substantially overlap with 
papers that have been published or that are simultaneously submitted to a 
journal or conference with proceedings. Submitted case studies should not 
exceed 12 pages in length, excluding bibliography and well-marked appendices.

3. Panel proposals. Submitted panel proposals should list the panel topic, a 
moderator, and a list of confirmed panelists, along with a short biography of 
the participants. The composition should be adequately selected as to 
generate copious discussion. Panelists will be given an opportunity to submit 
a position statement for the final proceedings.

The proceedings will be published in the Springer LNCS series (both the 2010 
and 2011 proceedings were published in Springer LNCS). More information on 
how to submit your work via the EasyChair system can be found at


Program Chair: Sven Dietrich, Stevens Institute of Technology

Program Committee:

John Aycock, University of Calgary
Michael Bailey, University of Michigan
Elizabeth Buchanan, University of Wisconsin-Stout
Aaron Burstein
Jon Callas, Indiana University
Michael Collins, RedJack
Nicolas Christin, Carnegie Mellon University
Marc Dacier, Symantec Research
Rachna Dhamija, Usable Security Systems
David Dittrich, University of Washington APL
Roger Dingledine, The Tor Project
Ken Fleischmann, University of Maryland
Rachel Greenstadt, Drexel University
Maritza Johnson, Columbia University
Erin Kenneally, UC San Diego/CAIDA/Elchemy
Engin Kirda, Northeastern University
Christian Kreibich, ICSI
John McHugh, UNC/RedJack
Howard Lipson, CERT
Perry E. Metzger, University of Pennsylvania
M. Angela Sasse, University College London
Angelos Stavrou, George Mason University
Michael Steinmann, Stevens Institute of Technology
Lenore Zuck, University of Illinois at Chicago

Important Dates:

Paper Submission: 	  Extended to Nov 8, 2011
Author Notification:      December 15, 2011
Camera-ready for Pre-Proceedings: 	  	January 15, 2012
WECSR 2012 Dates: 	  	March 2, 2012