banner logo

Privacy and Security for Everyone, Anytime, Anywhere

5th Workshop on Inclusive Privacy and Security (WIPS)

Important Dates

Workshop early submission deadline: Thursday, June 25, 2020
Workshop dates: August 7th (Friday) and 9th (Sunday)
Anonymization: Submissions are NOT to be anonymized
Page limit: 4 pages (excluding references and/or appendix)
Formatting: Minimum 1” margins, minimum 11pt text

Submission Site

Submission form
Alternatively, you can also email us your submission at


Please fill out the registration form

Scope and Focus

Security and privacy challenges confront all participants in modern society, but particular groups may experience unique or uneven privacy and security concerns. These groups may face distinctive obstacles to addressing issues, and their particular needs and concerns may not be well understood beyond those groups. Traditionally, inclusive design has addressed physical accessibility as well as needs arising from age, disability, or environment. While this work remains critical, our community also increasingly recognizes the importance of accounting for the needs of vulnerable users or marginalized groups. The workshop deliberately avoids any concrete definitions of what "vulnerable" means in this context. We encourage a diverse discussion of any group or situation that could be deemed as vulnerable, without prejudice.

In this workshop, we explore the privacy and security experiences and needs of vulnerable user groups. We are also interested in populations or roles in our society (e.g., lawyers, journalists, politicians, activists, medical providers) that support and/or affect the lives of vulnerable individuals. We will endeavor to uncover new ways of taking a more inclusive approach to appreciating and addressing privacy and security challenges. We also seek to identify the unintended harms that can result from privacy and security technology.

The objectives of our workshop are as follows:

i) To broaden participants' awareness of diverse privacy and security concerns.

ii) To compile design guidelines and best practices that are relevant to inclusive design.

iii) To explore the application, adaption, and extension of inclusive design guidelines to privacy and security challenges.

We expect participation from those who want technology respectful of society's diverse security and privacy needs, who seek to ensure that technology is accessible and appropriate for a wider user base, or who endeavour to improve the experience of vulnerable groups. We encourage participation from those who are not yet actively working in inclusive privacy and security!

We enthusiastically encourage participation from those who require accessibility accommodations. If you require accommodations, you can tell us about those by emailing the organizers at


We are soliciting short papers (<= 4 pages, excluding references and/or appendix) for brief presentation:

i) Previously published results

ii) Works-in-progress that evaluate current privacy or security solutions with respect to their inclusivity or exclusivity towards marginalized groups or populations with specific needs

iii) Proposals of design principles, processes, methodologies and/or solutions for specific situations, or generalizable to support a wide range of groups or operational environments

iv) Studies on the needs and experiences of marginalized groups, or for certain situations

Submissions should be made via the submission form. Questions about the workshop, including submissions, should be sent to the organizers (see below).

Tentative Agenda

Friday, August 7th: (US Eastern Time)

10:00am - 10:15am: Introduction, discussion of goals, establishment of group norms

10:15am - 10:20am: 5 min break, sorting into breakout rooms

10:20am - 10:50am: What does it mean to do “inclusive” research?

10:50am - 11:00am: Large Group Share

11:00am - 11:05am: 5 min break, sorting into breakout rooms

11:05am - 11:35am: Who are our participant populations?

11:35am - 11:45am: Large Group Share

11:45am - 12:00pm: 15 min break, resuming breakout rooms

12:00pm - 12:30pm: Where do we go next?

12:30pm - 1:00pm: Large Group Sharing and Reflection

Sunday, August 9th: (US Eastern Time)

10:00am - 10:15am: Introduction, discussion of goals, establishment of group norms

10:15am - 11:00am: Paper presentations (about 3 mins/talk, authors can choose to do a live talk or play a recorded video)

11:00am - 11:05am: 5 min break, sorting into breakout rooms

11:05am - 11:30am: Set-Up Phase for Group Activity

11:30am - 11:45am: End breakout rooms, group address, break and reading time, new breakout rooms formed

11:45am - 12:30pm: Brainstorming and Summary for Group Activity

12:30pm - 1:00pm: Group Sharing and Reflection

Accepted Papers

The camera-ready version of these papers can be found here.

Libraries’ Approaches to the Security of Public Computers
Samuel Dooley, Michael Rosenberg, Elliott Sloate, Sungbok Shin, Michelle Mazurek (University of Maryland, College Park)

Inclusive Privacy Consenting for GDPR Compliance in Public Video Surveillance
Jordan Sommer and Robert Ruska Jr. (University of Wisconsin, Green Bay), Ankur Chattopadhyay (Northern Kentucky University)

Privacy Policy Analysis of Banks and Mobile Money Services in the Middle East
Yousra Javed (National University of Sciences and Technology), Elham Al Qahtani and Mohamed Shehab (University of North Carolina, Charlotte)

The Motivated Can Encrypt (Even With PGP)
Glencora Borradaile, Kelsy Kretschmer, Michele Gretes, Alexandria LeClerc (Oregon State University)

Surveying Vulnerable Populations: A Case Study of Civil Society Organizations
Nikita Samarin, Alisa Frik, Sean Brooks, Coye Cheshire, Serge Egelman (UC Berkeley)

Power Dynamics and Privacy Protection in the Gig Economy
Shruti Sannon (Cornell University)

Brazilian Favela Women: How Your Standard Solutions for Technology Abuse Might Actually Harm Them
Mirela Silva, Daniela Oliveira (University of Florida)

Usable Security and Privacy in Muslim Communities
Elham AlQahtani (University of North Charlotte), Yousra Javed (National University of Sciences and Technology), Heather Lipford and Mohamed Shehab (University of North Charlotte)

Activists Want Better, Safer Technology
Leah Rosenbloom (The Workshop School)

rance: Memorable Keys and Passwords
Leah Rosenbloom (Brown University)

Managing Old Device: User Behavior, Information Exposure, and Privacy Risks
Mahdi Nasrullah Al-Ameen and Huzeyfe Kocabas (Utah State University), Swapnil Nandy (Jadavpur University), Tanjina Tamanna (University of Dhaka), Raihan Islam (Utah State University)

Security for People with Mental Illness in Telehealth Systems: A Proposal
Helen Jiang (Independent, affiliated with Georgia Institute of Technology)

Using Portable Virtualization for Exclusively-Public Computer Users
Jon Volden, Jacob Marshall, Walter Goettlich, Matt Comi, Sarah Smith, William Staples, Perry Alexander, Drew Davidson (University of Kansas)

Organizer Bios (alphabetical order)

Tousif Ahmed is a researcher at Samsung Research America. His research span various topics in usable security and privacy including accessible privacy and security, mobile and digital health, security and privacy of wearable devices, and privacy preserving health monitoring. He investigated the ways to improve the privacy and security issues of people with visual impairments using wearable cameras.

Taslima Akter is a fourth-year PhD student in the School of Informatics, Computing, and Engineering at Indiana University Bloomington. Her research focuses on understanding the privacy risks and concerns of people with visual impairments and bystanders with camera-based assistive technology designed for people with visual impairments. In her dissertation, she is working towards designing privacy-aware assistive systems for people with visual impairments.

Joe Calandrino is the research director of the Federal Trade Commission’s Office of Technology Research and Investigation. His office conducts technical research related to the FTC’s consumer protection mission, examining topics such as consumer fraud, online advertising, financial technologies, and connected devices. His agency seeks to ensure that its efforts benefit consumers including older adults, military service members and veterans, non-English-speaking consumers, and a wide variety of other groups.

Lynne Coventry is a research professor in the school of health and life sciences at Northumbria University, UK. She is director of PactLab – a research group exploring the role of technology in our everyday lives and the interdisciplinary Academic Centre of Excellence in Cybersecurity Research. Her research focuses on the interaction between psychology, design and security/privacy behaviours for a wide range of user types and contexts of use including children and cyberbullying, security compliance in the workplace, older adults, stigmatised groups including those living with HIV, and universal design of privacy and security to optimise inclusion and accessibility.

Roberto Hoyle is an Assistant Professor of Computer Science at Oberlin College. His research focuses on extending the benefits of security and privacy to underserved populations that may not benefit from the same privacy protection settings as the general population. He has investigated privacy needs and preferences of children in foster care, transgender activists, and people with a visual impairment, and how current technology, such as egocentric cameras, could be used to protect privacy.

Ada Lerner is an Assistant Professor of Computer Science at Wellesley College, where their research program focuses on inclusive security and privacy. Their work seeks to understand and design technology, using a mix of qualitative, quantitative, design, and measurement methods, in order to enable technology and computation to support the needs of key actors and marginalized groups in our democratic free society. Examples of populations with whom they have worked include lawyers, journalists, resettled refugees, and transgender people.

Abigail Marsh is an Assistant Professor of Computer Science at Macalester College, where their research focuses on the usable privacy concerns of situations where multiple stakeholders have access to one account or device, including familial and romantic relationships, older adults and their caretakers, and many other groups. They additionally research privacy and security concerns introduced by assistive technology.

Yang Wang is an associate professor of information science, and by courtesy, computer science, in the University of Illinois at Urbana-Champaign (UIUC) where he co-directs the Social Computing Systems (SALT) Lab. . His research is centered around usable privacy and security, and social computing. His recent research focuses on designing privacy mechanisms for underserved groups such as people with disabilities.

Yaxing Yao is a post-doctoral fellow in the School of Computer Science at Carnegie Mellon University. His research focuses on understanding privacy risks and people’s privacy concerns in emerging technologies, and designing, implementing, and evaluating privacy mechanisms to protect people’s privacy. In his dissertation work, he looked at the privacy expectations of different stakeholders in smart homes as well as their expected privacy mechanisms.