Submission deadline extended to Nov 8, 2011! Final Call for Papers 3rd Workshop on Ethics in Computer Security Research March 2, 2012 Divi Flamingo Beach Resort, Bonaire http://www.cs.stevens.edu/~spock/wecsr2012/cfp.html Computer security often leads to discovering interesting new problems and challenges. The challenge still remains to follow a path acceptable for Institutional Review Boards at academic institutions, as well as compatible with ethical guidelines for professional societies or government institutions. However, no exact guidelines exist for computer security research yet. This workshop will bring together computer security researchers, practitioners, policy makers, and legal experts. This workshop solicits submissions describing or suggesting ethical and responsible conduct in computer security research. While we focus on setting standards and sharing prior experiences and experiments in computer security research, successful or not, we tap into research behavior in network security, computer security, applied cryptography, privacy, anonymity, and security economics. This workshop will favor discussions among participants, in order to shape the future of ethical standards in the field. It will be co-located with the Sixteenth International Conference on Financial Cryptography and Data Security 2012. Submissions We solicit submissions in three categories. 1. Position papers. Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or conference with proceedings. Position paper submission should not exceed 6 pages in length, excluding bibliography and well-marked appendices. 2. Case studies. Submitted case studies must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or conference with proceedings. Submitted case studies should not exceed 12 pages in length, excluding bibliography and well-marked appendices. 3. Panel proposals. Submitted panel proposals should list the panel topic, a moderator, and a list of confirmed panelists, along with a short biography of the participants. The composition should be adequately selected as to generate copious discussion. Panelists will be given an opportunity to submit a position statement for the final proceedings. The proceedings will be published in the Springer LNCS series (both the 2010 and 2011 proceedings were published in Springer LNCS). More information on how to submit your work via the EasyChair system can be found at http://www.cs.stevens.edu/~spock/wecsr2012/cfp.html Organization: Program Chair: Sven Dietrich, Stevens Institute of Technology Program Committee: John Aycock, University of Calgary Michael Bailey, University of Michigan Elizabeth Buchanan, University of Wisconsin-Stout Aaron Burstein Jon Callas, Indiana University Michael Collins, RedJack Nicolas Christin, Carnegie Mellon University Marc Dacier, Symantec Research Rachna Dhamija, Usable Security Systems David Dittrich, University of Washington APL Roger Dingledine, The Tor Project Ken Fleischmann, University of Maryland Rachel Greenstadt, Drexel University Maritza Johnson, Columbia University Erin Kenneally, UC San Diego/CAIDA/Elchemy Engin Kirda, Northeastern University Christian Kreibich, ICSI John McHugh, UNC/RedJack Howard Lipson, CERT Perry E. Metzger, University of Pennsylvania M. Angela Sasse, University College London Angelos Stavrou, George Mason University Michael Steinmann, Stevens Institute of Technology Lenore Zuck, University of Illinois at Chicago Important Dates: Paper Submission: Extended to Nov 8, 2011 Author Notification: December 15, 2011 Camera-ready for Pre-Proceedings: January 15, 2012 WECSR 2012 Dates: March 2, 2012