The 2025 European Symposium on Usable Security

Dates and Location: September 10 & 11, 2025, Manchester, United Kingdom.

Experience EuroUSEC 2025 in Manchester – the vibrant north England city that lives and breathes football! Join leading minds in usable privacy and security as we unite to explore, learn, and drive innovation in cybersecurity and privacy. Be part of the future—where research meets real-world impact!.

The European Symposium on Usable Security (EuroUSEC) is a forum for research and discussion on human factors in security and privacy. EuroUSEC solicits previously unpublished work offering novel research contributions in any aspect of human-centered security and privacy. EuroUSEC aims to bring together researchers, practitioners, and students from diverse backgrounds, including computer science, engineering, psychology, the social sciences, and economics, to discuss issues related to human-computer interaction, security, and privacy

EuroUSEC is part of the USEC family of events: https://www.usablesecurity.net/USEC/index.php

We want EuroUSEC to be a community-driven event and would love to hear any questions, comments, or concerns you might have regarding changes from last year—please just email the programme chairs.

Call for Papers

We invite you to submit a paper and join us in Manchester, UK at EuroUSEC 2025.

We welcome submissions containing unpublished original work describing research, visions, or experiences in all areas of usable security and privacy. We also welcome systematization of knowledge (SOK) papers with a clear connection to usable security and privacy. Well executed replication studies are also welcomed. We appreciate a variety and mixture of research methods, including both qualitative and quantitative approaches

Topics include, but are not limited to:

  • usable security and privacy implications or solutions for specific domains (such as IoT, ehealth, and vulnerable populations)
  • methodologies for usable security and privacy research
  • role of AI/Generative AI technologies in improving usable security and privacy
  • field studies of security or privacy technology
  • longitudinal studies of deployed security or privacy features
  • new applications of existing privacy/security models or technology
  • innovative security or privacy functionality and design
  • usability evaluations of new or existing security or privacy features
  • security testing of new or existing usability features
  • lessons learned from the deployment and use of usable privacy and security features
  • reports of failed usable privacy/security studies or experiments, with the focus on the lessons learned from such experience
  • papers with negative results
  • reports of replicating previously published important studies and experiments
  • psychological, sociological, cultural, or economic aspects of security and privacy
  • studies of administrators or developers and support for security and privacy
  • studies on the adoption or acceptance of security or privacy technologies
  • systematization of knowledge papers
  • impact of organizational policy or procurement decisions on security and privacy

We aim to provide a venue for researchers at all stages of their careers and at all stages of their projects.

All submissions will undergo a double-blind review by at least two reviewers. The submissions will receive three decisions: Accept, Shepherding, or Reject. Papers receiving shepherding decisions will engage with an appointed Shepherd, and a revised version will be prepared and must be approved by the shepherd before being accepted. During the shepherding phase, the identities of the authors and one shepherding reviewer will be disclosed for communication purposes. Shepherding will take place outside the conference management system. The authors will be responsible for reaching out to Shepherd



Important Dates (Anywhere on Earth (AoE))

Paper registration deadline (mandatory):       Monday, 5th May, 2025
Paper submission deadline: Friday, 9th May, 2025(Hard Deadline)
Author's notification: Monday, 16th June, 2025
   
Revision period (For shepherded papers)): Monday, 17th June to Monday 7th July, 2025
Author's notification (For shepherded papers): Monday, 14th July, 2025
   
Camera-ready submission for all papers: Monday, 4th August, 2025


Submission Instructions

Upload your submission via this link:

Disclaimer: The Microsoft CMT service was used for managing the peer-reviewing process for this conference. This service was provided for free by Microsoft and they bore all expenses, including costs for Azure cloud services as well as for software development and support.

  1. All submissions must report original work written in English.
    • Using Text generated from large language models such as ChatGPT for purposes other than editing the author’s own text is not allowed. While we do not plan to use any tools to check all submissions, we will investigate submissions brought to our attention and will reject them.
    • Authors must clearly document any overlap with previously or simultaneously submitted papers from any of the authors (email the chairs a PDF document outlining this)
  2. Submissions should be anonymized for review. No author names or affiliations should be included in the title page or the body of the paper. Acknowledgments should also be removed, and papers should not reveal authors' identities.
  3. Refer to your own related work in the third person, as though someone else had written it. This also includes, e.g., data sets: "We received data from Smith et al. [31] in our experiment." Do not blind citations except in extraordinary circumstances. If in doubt, contact the chairs.
  4. All submissions should be at most 8 pages, double-column including bibliography) reporting on mature work. Appendices are not counted towards the page count, but note that reviewers will not necessarily read the appendices: the text should be sufficient without appendices. If accepted, authors can include a link to appendices in their paper (hosted on a service such as OSF).
  5. Papers must be typeset in A4 format (not "US Letter") using the IEEE conference proceeding template with the appropriate options [Templates here]. Failure to adhere to the page limit and/or formatting requirements will be grounds for desk rejection.
  6. Systematization of Knowledge paper titles must begin with SOK:
  7. Replication studies must mention “Replication” in the title

Simultaneous submission of the same paper to another venue with proceedings or a journal is prohibited. Authors may post pre-prints, however—please consult the guidelines for further information. Serious infringements of these policies may result in the paper's rejection, and the authors may be put on a warning list, even after if we only become aware of the violation after the paper has been accepted. If you have questions about this policy, contact the EuroUSEC chairs..

At least one author of each accepted paper must register and attend to present the paper IN PERSON. We will only permit virtual presentations in exceptional circumstances.

Contact EuroUSEC chairs if there are any questions.

Program Committee Chairs

The chairs can be contacted at pc.chairs.eurousec

Program Committee

  • Adam Jenkins, King's College London (UK)
  • Agnieszka Kitkowska, Jönköping University (Sweden)
  • Alaa Nehme, Mississippi State University (USA)
  • Alvi Jawad, Carlton University (Canada)
  • Anna Leschanowsky, Fraunhofer Institute for Integrated Circuits IIS (Germany)
  • Anna-Marie Ortloff, University of Bonn (Germany)
  • Anne Hennig, Karlsruhe Institute of Technology (Germany)
  • Anuj Gautam, University of Illinois at Urbana-Champaign (USA)
  • Arianna Rossi, Sant'Anna University of Advanced Studies (Italy)
  • Bernardo Breve, University of Salerno (Italy)
  • Bilal Naqvi, Lappeenranta University of Technology (Finland)
  • Christian Eichenmüller, Friedrich-Alexander-Universität Erlangen-Nürnberg (Germany)
  • Christian Tiefenau, University of Bonn (Germany)
  • Christine Utz, Radboud University (Netherlands)
  • Cigdem Sengul, Brunel University (UK)
  • Claudia Negri-Ribalta, University of Luxembourg (Luxembourg)
  • Collins Munyendo, The George Washington University (USA)
  • Daniel Thomas, University of Strathclyde (UK)
  • Diana Freed, Brown University (USA)
  • Divyanshau Bhardwaj, CISPA Helmholtz Center for Information Security (Germany)
  • Elham Al Qahtani, University of Jeddah (Saudi Arabia)
  • Eman Alashwali, King Abdulaziz University (Saudi Arabia)
  • Emiram Kablo, University of Paderborn (Germany)
  • Emma Nicol, University of Strathclyde (UK)
  • Gaston Pugliese, Friedrich-Alexander-Universität Erlangen-Nürnberg (Germany)
  • Habiba Farzand, University of Bristol (UK)
  • Hana Habib, Carnegie Mellon University (USA)
  • Hazel Murray, Munster Technological University (Ireland)
  • Ingolf Becker, University College London (UK)
  • James Nicholson, Northumbria University (UK)
  • Jan Nold, Ruhr University Bochum (Germany)
  • Jan Tolsdorf, The George Washington University (USA)
  • Jan-Willem Bullee, University of Twente (Netherlands)
  • Jason Jaskolla, Carlton University (Canada)
  • Jide Edu, University of Strathclyde (UK)
  • Jingjie Li, University of Edinburgh (UK)
  • Joakim Kävrestad, Jönköping University (Sweden)
  • Julie Wunder, Friedrich-Alexander-Universität Erlangen-Nürnberg (Germany)
  • Jurlind Budurushi, Baden-Wuerttemberg Cooperative State University (Germany)
  • Kavous Salehzadeh Niksirat, EPFL (Switzerland)
  • Kévin Huguenin, University of Lausanne (Switzerland)
  • Kieron Ivy Turk, Surrey University (UK)
  • Lorin Schoni, ETH Zurich (Switzerland)
  • Mainack Mondal, IIT Kharagpur (India)
  • Maksim Kalameyets, Newcastle University (UK)
  • Marvin Ramokapane, University of Bristol (UK)
  • Mohamed Shehab, University of North Carolina at Charlotte (USA)
  • Muriel-Larissa Frank, University of Luxembourg (Luxembourg)
  • Nicola Zannone, Eindhoven University of Technology (Netherlands)
  • Nicolas E. Díaz Ferreyra, Hamburg University of Technology (Germany)
  • Noé Zufferey, ETH Zurich (Switzerland)
  • Ola Michalec, Bristol University (UK)
  • Pavlo Burda, ICT Institute (Netherlands)
  • Raphael Serafini, University of Cologne (Germany)
  • Robert Biddle, Carleton University (Canada)
  • Ruba Abu-Salma, King's College London (UK)
  • Ryan Gibson, University of Strathclyde (UK)
  • Sabid Bin Habib Pias, Indiana University (USA)
  • Sara Haghighi, University of Maine (USA)
  • Scott Harper, Surrey University (UK)
  • Shan Xiao, Gonzaga University (USA)
  • Shijing He, King's College London (UK)
  • Simon Parkin, Delft University of Technology (Netherlands)
  • Sotirios Terzis, University of Strathclyde (UK)
  • Stefanos Evripidou, University of Glasgow (UK)
  • Stephan Wiefling, swiefling.de & Vodafone (Germany)
  • Thomas Gross, Newcastle University (UK)
  • Verena Distler, Aalto University (Finland)
  • Weijia Henning, University of Southampton (UK)
  • Xiaowei Chen, University of Luxembourg (Luxembourg)
  • Yasmeen Abdrabou, Technical University of Munich (Germany)

Organising Chair

Publicity Chairs

  • Scott Harper, Newcastle University (UK)
  • Huiyun Tang, Luxembourg University (Luxembourg)

Technical Support

  • Frazer Sandison, Strathclyde University (UK)

Steering Committee

  • Oksana Kulyk, IT University of Copenhagen (Denmark)
  • Karen Renaud, University of Strathclyde (UK)
  • Peter Mayer, University of Southern Denmark (Denmark)
  • Angela Sasse, Ruhr University Bochum / Ruhr-Universität Bochum (Germany)
  • Melanie Volkamer, Karlsruhe Institute of Technology (Germany)
  • Charles Weir, Lancaster University (UK)
  • Farzaneh Karegar, Karstad University (Sweden)

Event Logistics

EuroUSEC 2025 will be held on September 10 and 11 in Manchester, UK.

Event location: Digital Security Hub (DiSH) 47 Lloyd Street, Manchester M2 5LE, Floor G, Heron House.

Travelling to Manchester : Manchester has many transport links including Rail, Coach, and Car. Situated at the heart of the M60 Ring Road, it is connected to motorways North, South, East, and West.

Traveling within Manchester : Manchester has bus, tram, train as its main methods of public transport, with a large number of dedicated cycle lanes throughout the city centre. This includes a specific free bus route around the city. The transport links are detailed here.

Accommodation: We will not arrange any hotel reservations for the attendees. However, for their ease will provide details of nearby hotels.

The conference takes place in the heart of Manchester's City Centre. Information for where to stay can be found here. Reservations for nearby stays can also be made through AirBnB or Booking.com

Social Contract

To make EuroUSEC as effective as possible for everyone, we ask that all participants commit to our social contract:

  1. Engage and actively participate (to the degree you feel comfortable) with each talk.
  2. Be sure your feedback is constructive, forward-looking, and meaningful.
  3. The usable security & privacy community has earned a reputation for being inclusive and welcoming to newcomers; please keep it that way.
  4. We encourage attendees to aim to meet at least three new people from this year's EuroUSEC. The meal breaks and the participatory activity are the perfect opportunities for this.
  5. We strongly encourage tweeting under the hashtag "#EuroUSEC2024" and otherwise spreading the word about work you find exciting at EuroUSEC.
  6. EuroUSEC 2025 follows the USABLE events Code of Conduct.