banner logo

Privacy and Security for Everyone, Anytime, Anywhere

9th Workshop on Inclusive Privacy and Security (WIPS)

Important Dates

Submission deadline: Thursday, May 23, 2024, 23:59PM, Anywhere on Earth
Acceptance notification to authors: Thursday, June 6, 2024
Camera ready papers due: Thursday, June 20, 2024, 23:59PM, Anywhere on Earth

Workshop date: Friday, August 9th, 2024 ( agenda can be found below)


WIPS2024 is part of the SOUPS2024 conference

Registration is free.

Registration link is here WIPS 2024 Registration

Submission Site

Participants will submit their papers through HotCRP (Link to HotCRP, to be coordinated through SOUPS organizers, to be added)
You can also email the organizers with questions at / /

Submission link

Anonymization: Submissions are NOT to be anonymized
Page limit: 4 pages (excluding references and/or appendix)
Formatting: please follow the USENIX formatting guideline (available here).

Scope and Focus

This workshop is a continuation of eight workshops which have focused on security and privacy in the contexts of disability, access, and the needs of people from vulnerable or marginalized groups or who are in vulnerable situations. Since these groups have traditionally been underrepresented in research efforts, we aim to continue building this community and expanding the body of work that is focused on these groups. While this research area is expanding, studies focused on inclusive privacy and security are often labor intensive, require access to difficult-to-find populations, and generate findings that may be heavily circumstance-dependent, including circumstances that may extend well outside the digital realm. Privacy and security challenges are accelerating at an incredible pace. We must work as a community to likewise accelerate the research in this space. We do this by building off of one another’s work, learning from one another, and bringing together the body of work in academia with insights from other sources to be able to detect larger trends, identify new vulnerable populations, privacy challenges, and design patterns that can help (or hinder) users.

In this year’s workshop, we take two approaches to work towards accelerating our research in this space. First, we bring the community together to cultivate mentorship and identify challenges they are having conducting research in this space (methodological, related to practical implementation, making the right connections with collaborators, field sites, participants, adapting methods for this context, etc.). We will bring junior and senior researchers together organized into small groups based on similar research interests & expertise. Participants will give one another detailed feedback on submitted workshop papers and trouble-shoot specific research challenges they are facing. The first half of the workshop will focus on such community building and mentorship.

Second, we open the discussion on how to accelerate our research as a community. Specifically, we challenge participants to envision and co-design a privacy research infrastructure that could help us better build on one another’s work and leverage additional data sources that could help us more effectively and efficiently identify privacy issues and vulnerable populations, as well as factors leading to such issues. Creating a more sustainable and cohesive approach to researching vulnerable populations can help us better serve the needs of these communities. In particular, participants will explore the research possibilities that would be enabled by having a database of privacy harms. We will explore the metadata, capabilities, data sources, and reporting mechanisms that would need to be in place for this to be a useful researcher resource. Another capability would be identifying both light and dark patterns of design - in particular, what would the database need to look like so that we can identify common design elements, processes, or contextual factors that contribute to or prevent privacy harms. After the workshop, several of the organizers plan to continue leading an effort to design and develop such an infrastructure to be made freely available to the research community, and welcome continued involvement from interested workshop participants.

To achieve these aims, the workshop will focus on i) providing assessment and feedback on existing research while exploring strategies to transition from one-off experiments to continuous, interconnected research efforts, ii) co-design a privacy infrastructure framework

The objectives of our workshop are as follows:

i) Provide feedback and community building for current research efforts.

ii) Elevate research continuity and relevance.

iii) Establish a privacy infrastructure framework for sustained impact.

We invite contributions from all researchers who are motivated to address society’s diverse security and privacy needs, and seek to improve the accessibility and usability for all users. We welcome both new and seasoned researchers in this space!

We enthusiastically encourage participation from those who require accessibility accommodations. If you require accommodations, you can tell us about those by emailing the organizers at / /


Participants can choose to submit either a statement of interest (describing experience in this topic area and interest in attending), or a short paper (<= 4 pages, excluding references and/or appendix) related to inclusive privacy and security. Those submitting papers will be able to get detailed feedback and discussion on their topic as part of the workshop activities. Paper topics can include:

i) Proposals or plans for future or upcoming work

ii) Proposals or plans for future or upcoming work

iii) Proposals of design principles, processes, methodologies and/or solutions for specific situations, or generalizable to support a wide range of groups or operational environments

Proposals of design principles, processes, methodologies and/or solutions for specific situations, or generalizable to support a wide range of groups or operational environments

Paper submissions will be grouped into small groups (3-4 submissions) prior to the workshop. Participants in each group will read one other’s submissions in preparation for the workshop, in order to strengthen the quality of conversation and feedback at the workshop. Those submitting statements of interest will be assigned to groups that are most aligned with their research interests.

Paper Format: Papers must use the SOUPS formatting template (available for MS Word or LaTeX) and be submitted as a PDF via the web submission system. Submissions must be no more than 4 pages (excluding acknowledgments, bibliography, and appendices). Both statements of interest and short papers should use the SOUPS formatting template.

Submissions may include as many additional pages as needed for references and for supplementary material in appendices. The paper should stand alone without the supplementary material. We encourage authors to use the appendices for content that is peripheral to the main contributions of the paper but that may interest some readers or that may facilitate replication. Note that members of the program committee are free to not read this material when reviewing the paper

Submissions should be made via HotCRP. Questions about the workshop, including submissions, should be sent to the organizers at

Agenda (Virtual)

Zoom: Registered attendees will receive zoom link over email

Friday, August 9th: (US Eastern Time)

9:00 AM - 9:15 AM: Introduction, discussion of goals, establishment of group norms

9:15 AM - 10:15 AM: Paper Presentations:

1: A Proposal for Understanding Social Media Experiences of First-Generation Educational Migrants in the USA with a Focus on Double Presence and Absence

2. Understanding Professional Needs to Create Privacy-Preserving and Secure Emergent Digital Artworks

3. Recruiting Teenage Participants for an Online Security Experiment: A Case Study Using Peachjar

4. Understanding the gendered experiences of harassment among Pakistani young adults

5. Targeted Cybersecurity Education and Training Programs for Two Asiatic Minority Groups in the U.S

10:15 AM - 10:20 AM: Break (5m)

10:20 AM - 11:00 AM: Intermix small groups for continued discussion (jigsaw) (40m)

11:00 AM - 11:05 AM: Break (5m)

11:05 AM - 11:55 AM: Full Group Discussion (50m)

12:00 PM to 2:00 PM: Lunch Break

2:00 PM - 2:45 PM: Small group brainstorming sessions on use cases that could be supported by a research infrastructure on virtual brainstorming platforms such as Miro

2:45 PM- 3:00 PM: Break, affinity grouping

3:00 PM - 3:15 PM: Large group discussion of use cases, people choose a use case to tackle

3:15 PM - 4:15 PM: Small group design sessions - what would the infrastructure look like to support your use case? (e.g., metadata needed, data sources/reporting interface, sketch out the researcher query tool)

4:15 PM - 4:45 PM: Report back to larger group, feedback for improving designs

4:45 PM - 5:00 PM: Wrap-up & next steps

Organizing Committee (alphabetical order)

General Chairs:

Roberto Hoyle, Oberlin College
Xinru Page, Brigham Young University

Paper Chairs:

Garrett Smith, Brigham Young University,
Sarah Tabassum, University of North Carolina at Charlotte,


Taslima Akter, University of California Irvine,
Kevin Butler, University of Florida,
Joe Calandrino, Federal Trade Commission,
Lynne Coventry, Northumbria University,
Sanchari Das, University of Denver,
Roberto Hoyle, Oberlin College,
Smirity Kaushik, University of Illinois at Urbana-Champaign,
Ada Lerner, Northeastern University,
Abigail Marsh, Macalester College,
Imani N. S. Munyaka, UC San Diego,
Xinru Page, Brigham Young University,
Lucy Qin, Brown University,
Garrett Smith, Brigham Young University,
Marvin Ramokapane,
Shruti Sannon, University of Michigan,
Madiha Tabassum,
Sarah Tabassum,
Yang Wang, University of Illinois at Urbana-Champaign,
Noel Warford, University of Maryland,
Yaxing Yao, Virginia Tech,
Yaman Yu, University of Illinois at Urbana-Champaign,

Organizer Bios (alphabetical order)

Xinru Page is an Associate Professor of Computer Science at Brigham Young University. She works in the field of Human-Computer Interaction and directs the Social Technology and Privacy Lab. Her research falls into the areas of Privacy, Social Media, Technology Adoption and Non Use, Supporting Neurodiversity Online, Individual, Developmental, and Cultural Differences Shaping Technology Use, Values in Design, Supporting Vulnerable Populations, and Human-Algorithm interaction.

Taslima Akter is a Postdoctoral researcher in the department of Informatics at University of California Irvine. Her research is centered on gaining an understanding of the accessibility and privacy hurdles that individuals with disabilities face. In her work, she has delved into the privacy requirements of a variety of marginalized groups such as those with visual impairments, racial minorities, and ROTC students. Furthermore, she is currently engaged in designing systems that take privacy into account for these groups.

Kevin Butler Kevin Butler (he/him) is a Professor of Computer and Information Science and Engineering and Director of the Florida Institute for Cybersecurity Research at the University of Florida. He is also director of the NSF Center for Privacy and Security for Marginalized Populations. His research focuses on the security and trustworthiness of computer systems and data and the privacy of users accessing their computing resources, particularly with regards to emerging technologies.

Joe Calandrino Joe Calandrino is the research director of the Federal Trade Commission’s Office of Technology Research and Investigation. His office conducts technical research related to the FTC’s consumer protection mission, examining topics such as consumer fraud, online advertising, financial technologies, and connected devices. His agency seeks to ensure that its efforts benefit all consumers including older adults, military service members and veterans, non-English-speaking consumers, and a wide variety of other groups.

Lynne Coventry is a research professor in the School of Design and Informatics at Abertay University, UK. She is director of Abertay cyberQuarter – a interdisciplinary centre focused on bringing public sector, business and academia closer together to work on local, national and global cybersecurity problems. Her personal research focuses on the interaction between psychology, design and security/privacy behaviors for a wide range of user types and contexts of use including children and cyberbullying, security compliance in the workplace, older adults, stigmatized groups, and universal design of privacy and security to optimize inclusion and accessibility.

Sanchari Das (She/Her/Hers) is an Assistant Professor in the Computer Science department at the Ritchie School of Engineering and Computer Science at the University of Denver. Her research lab focuses on computer security, privacy, education, human-computer interaction, social computing, accessibility, inclusivity, and digital technologies sustainability. In addition, her research interest extends to exploring the impact of digital breaches on everyday life, especially for the group, including children, older adults, the disabled community, and others.

Roberto Hoyle is an Associate Professor of Computer Science at Oberlin College. His research focuses on extending the benefits of security and privacy to underserved populations that may not benefit from the same privacy protection settings as the general population. He has investigated privacy needs and preferences of children in foster care, transgender activists, and people with a visual impairment, and how current technology, such as egocentric cameras, could be used to protect privacy.

Smirity Kaushik is a third-year Ph.D. student in the Information Sciences program at the University of Illinois at Urbana-Champaign (UIUC) where she is advised by Dr. Yang Wang. She received a Master of Science in Information Management from Syracuse University and a Bachelor of Law from the University of Delhi. Her research is centered around usable privacy and security and social computing. She is interested in exploring user-centered privacy research ideas to resolve socio-technical challenges at the intersection of privacy, policy, and HCI.

Ada Lerner is an Assistant Professor of Computer Science at Northeastern University, where their research focuses on the security and privacy concerns, expertise, and norms of marginalized populations, the role of systemic factors such as law and policy in outcomes for these groups, and other interdisciplinary approaches to enabling all people to benefit from technology's potential.

Abigail Marsh is an Assistant Professor of Computer Science at Macalester College, where their research focuses on the usable privacy concerns of situations where multiple stakeholders have access to one account or device, including familial and romantic relationships, older adults and their caretakers, and many other groups. They additionally research privacy and security concerns introduced by assistive technology.

Imani N. S. Munyaka is an Assistant Professor at the University of California, San Diego. She received her PhD in Human-Centered Computing from the University of Florida, Master of Science in Computer Science from Kentucky State University, and a Bachelor of Science in Electrical Engineering from the University of Dayton. Her research focuses on improving the security and privacy-related experiences of underrepresented, historically-excluded, and often ignored populations so that all people can begin to have secure, private, and self-directed interactions with various technologies.

Lucy Qin is a Ph.D. candidate at Brown University in the Encrypted Systems Lab. Her work focuses on designing usable cryptographic solutions to address privacy issues encountered by specific user groups. She has previously worked on designing and implementing cryptographic capabilities for supporting a pay equity initiative in Boston, detecting serial perpetrators of sexual assault on college campuses, and a privacy-centered national gun registry.

Shruti Sannon is a Computing Innovation Fellow and postdoctoral researcher at the University of Michigan School of Information. Shruti’s research examines labor and privacy in digitally-mediated settings, particularly in the context of marginalized groups. Her recent work focuses on low-income and disabled workers in the gig economy. The goal of her research is to inform how technologies can be designed to be more inclusive and privacy-protective for users with diverse needs and experiences.

Yang Wang is an associate professor of information science, and by courtesy, computer science, in the University of Illinois at Urbana-Champaign (UIUC) where he co-directs the Social Computing Systems (SALT) Lab. His research is centered around usable privacy and security, and social computing. His recent research focuses on designing privacy mechanisms for underserved groups such as people with disabilities.

Noel Warford is a Ph.D candidate at University of Maryland College Park, advised by Dr. Michelle Mazurek. His research focuses broadly on digital safety (security, privacy, and abuse/harassment prevention) for users who, by context or circumstance, face elevated risk. Recently, he has focused on the security and privacy needs of IT staff in libraries and journalists’ strategies for managing online harassment.

Yaxing Yao is an Assistant Professor in the Department of Information Systems at the University of Maryland, Baltimore County. His research focuses on understanding privacy risks and people’s privacy concerns in emerging technologies and designing, implementing, and evaluating privacy mechanisms to protect people’s privacy. In his dissertation work, he looked at the privacy expectations of different stakeholders in smart homes as well as their expected privacy mechanisms.

Yaman Yu is a fourth-year Ph.D student in the Information Science program at the University of Illinois at Urbana Champaign, advised by Dr. Yang Wang. Her research focuses on usable privacy and security, accessible design to resolve socio-technical challenges. Her recent focus is on designing inclusive security features in Blockchain and AI technology for vulnerable populations.