| |||||||||||||||
IEE/ACM CSOSN 2012 : 1st Int. IEEE/ACM Workshop on Cybersecurity of Online Social Networks | |||||||||||||||
Link: https://sites.google.com/site/csosn2012/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
CFP: 1st IEEE/ACM Int. Workshop on Cybersecurity of Online Social Networks (CSOSN'12)
https://sites.google.com/site/csosn2012/ The 1st International Workshop on Cybersecurity of Online Social Networks (CSOSN 2012) will be held on August 26, 2012 in conjunction with the 2012 International Conference on Advances in Social Networks Analysis and Mining (IEEE/ACM ASONAM 2012: http://www.asonam2012.etu.edu.tr/), 26-29 August, 2012, Kadir Has University, Istanbul, Turkey. ---------------------------------------------------------------- With the widespread usage of social network applications, in particular the ones that deal with online social services, there always arises a matter of information privacy. With the everyday growth of social networking websites like MySpace, Facebook, LinkedIn and Google Plus, and even other websites providing social networking services (e.g. YouTube, Wikipedia, eBay), a huge amount of information is shared among many users and also in-between hearers. Further, the huge number of visitors makes these websites extremely attractive to hackers, resulting in a huge security risk. Especially in cases that the knowledge base of the network is more applicable to fraudulent activities, organizations and also individuals tend their information to be secure and fraud-free. Security and privacy issue are entirely two different aspects however. Security issues highly regard to occasions when hackers gain unauthorized access to a base of protected information. On the other hand privacy issues do not necessarily involve security matters, while involving with unwarranted access of private information. In social networks, the more a node reveals information, the higher the value of that node becomes. However the other life of social networks is rather than encouraging nodes to reveal their private information, they should safeguard that information and limit its accessibility for other nodes. This concern causes a challenging problem with the ever-growing of information and its fast spread. Obviously the process of securing such data is a responsibility of both the front-end (e.g. users should use SSL for their credit card transactions) and the back-end (e.g. the transaction servers should implement encoding and secure the data transfer). Therefore mechanisms for dealing with user/actor privacy are needed to ensure the information transactions in a secure way. In addition, such mechanisms should be able to capture fraudulent activities, either being the misuse of credit cards, or the suspicious interactions between nodes which may lead to a terrorist attack. For these purposes and in order to create such mechanism, a lot of techniques may be applicable, originated from Machine Learning, Data Mining, Marketing, Social Sciences, Networking and Security, etc. ---------------------------------------------------------------------- TOPICS OF INTEREST ---------------------------------------------------------------------- The main goals of the workshop are: (1) to create a platform to discuss latest issues, trends, solutions, and cutting-edge research strategies in security and privacy in online social networks; (2) to bring researchers who are working on issues related to security and privacy on the Internet, and those studying online social networks, to discuss the problems that overlap and bring these two areas together. Of the very huge list of topics that fall into the category of Cybersecurity of Online Social Networks, the scope of the 1st international workshop on Cybersecurity of Online Social Networks includes but not limited to the following topics: - Cybercrimes in online social networks - Counter-Terror social network analysis - Social networking security risks - Social engineering through social networks - Data privacy in Social Networks - New attack paradigms in social networks - Detection and characterization of malware, spam, phishing, frauds, hate crime, abuse, extremism via online social networks - Secure information sharing in online communities - Social networking safety - Social network analysis for homeland security - Security issues in mobile social networking - Trust-based social networks - Privacy challenges in location-based social networks - Anonymization of social network datasets - The social and economic impact of security and privacy issues on OSN - Legal and ethical issues for researchers studying security and privacy on OSN - Tools for teaching/research in social network security ---------------------------------------------------------------------- PAPER SUBMISSION ---------------------------------------------------------------------- Papers reporting original and unpublished research results pertaining to the workshop topics are solicited. New full paper submission deadline is May 7, 2012. These papers will follow an academic review process. Full paper manuscripts must be in English with a maximum length of 8 pages (using the IEEE two-column template). Submissions should include the title, author(s), affiliation(s), e-mail address(es), tel/fax numbers, abstract, and postal address(es) on the first page. Papers should be submitted to the EasyChair: https://www.easychair.org/conferences/?conf=csosn2012 If Web submission is not possible, manuscripts should be sent as an attachment via email to kkianmeh@uwo.ca by May 7, 2012. The attachment must be in PDF or Word .doc format. Papers will be selected based on their originality, timeliness, significance, relevance, and clarity of presentation. Authors should certify that their papers represent substantially new previously unpublished work. Paper submission implies that the intent is for one of the authors to present the paper if accepted and that at least one of the authors register for a full conference fee. All papers accepted for workshop will be included in the Workshop Proceedings published by the IEEE Computer Society Press. Hence all the rules and regulations of IEEE CPS will be applied as explained in the following link: http://www.computer.org/portal/web/cscps/policies ---------------------------------------------------------------------- IMPORTANT DATES ---------------------------------------------------------------------- Submission deadline: May 7, 2012 Notification to authors: May 31, 2012 Camera ready papers: June 15, 2012 Author registration due: June 15, 2012 ---------------------------------------------------------------------- Keynote Speaker ---------------------------------------------------------------------- Arno H.P. Reuser, Open Source Intelligence, The Netherlands ---------------------------------------------------------------------- SPECIAL ISSUE ---------------------------------------------------------------------- The extended versions of selected papers presented during the CSOSN 2012 workshop will be published in the special issue of the prestigious Social Network Analysis and Mining (SNAM) journal. ---------------------------------------------------------------------- WORKSHOP CO-CHAIRS ---------------------------------------------------------------------- Luiz F. Capretz, Western University, Canada Charles X. Ling, Western University, Canada Keivan Kianmehr, Western University, Canada |
|