Call for Papers

Important Dates

EventDate
Submission system opens March 20, 2026
Obligatory abstract registration May 20, 2026
Paper submission deadline May 25, 2026
Notification for authors June 25, 2026
Shepherding starts June 25, 2026
Camera-ready submission July 27, 2026
Conference September 2–3, 2026

These are firm deadlines; no extensions will be granted. All deadlines are at 23:59 AoE (Anywhere on Earth).

Scope & Topics

We welcome submissions containing unpublished original work describing research in all areas of usable security and privacy. We also welcome the systematization of knowledge (SoK) papers with a clear connection to usable security and privacy. Well-executed replication studies are welcomed, as are papers presenting and discussing negative or insignificant results. We appreciate a variety and mixture of research methods, including both qualitative and quantitative approaches.

Topics include, but are not limited to:

  • Usable security and privacy implications or solutions for specific domains
  • Methodologies for usable security and privacy research
  • Role of AI / Generative AI technologies in improving usable security and privacy
  • Field studies of security or privacy technology
  • Longitudinal studies of deployed security or privacy features
  • New applications of existing privacy / security models or technology
  • Innovative security or privacy functionality and design
  • Usability evaluations of new or existing security or privacy features
  • Security testing of new or existing usability features
  • Lessons learned from the deployment and use of usable privacy and security features
  • Reports of failed usable privacy / security studies or experiments, with a focus on lessons learned
  • Reports of replicating previously published important studies and experiments
  • Psychological, sociological, cultural, or economic aspects of security and privacy
  • Studies of administrators or developers and support for security and privacy
  • Studies on the adoption or acceptance of security or privacy technologies
  • Systematization of knowledge papers
  • Impact of organizational policy or procurement decisions on security and privacy
  • Models of user behaviour and user interactions with technology
  • Perceptions of related risk, as well as their influence on humans
  • Social engineering, persuasion, and other deception techniques
  • Requirements for socio-technical systems
  • Decision making in/for socio-technical systems
  • Feasibility of policies, standards, and regulations from the socio-technical perspective
  • Social factors in organizations' policies and processes
  • Interplay of law, ethics and politics with security and privacy measures
  • Balance between technical measures and social strategies
  • Threat models that combine technical and human-centered strategies
  • Socio-technical analysis of incidents and vulnerabilities
  • Studies of real-world vulnerabilities/incidents from a socio-technical perspective
  • Lessons from design, deployment, and enforcement of mechanisms, policies, standards, and regulations
  • Strategies and guidelines for analysis of intelligence and data from a socio-technical perspective

Types of Contributions

Full papers (8–12 pages) discuss complete original research, answer well-defined research questions, and present full and stable results.

Format & Submission

All papers must be typeset in LaTeX in A4 format using the IEEE conference proceeding template (eurosp-template.zip). Submissions must be in PDF. Documents should render correctly in Adobe Reader XI and when printed in black and white. Failure to adhere to page limits and formatting requirements can be grounds for desk rejection.

SPS2026 adopts a double-anonymised review policy. Papers will be reviewed by at least two PC members. Accepted papers will be published through IEEE.

Use of AI tools is permitted, but authors are responsible for the content produced. Any use of AI must be disclosed. Reviewers are not permitted to use AI tools to evaluate submitted papers.

Submissions must be made via EasyChair (link to be published).