posted by organizer: homahosseinmardi || 10078 views || tracked by 7 users: [display]

CyberSafety 2016 : 1st International Workshop on Computational Methods for CyberSafety

FacebookTwitterLinkedInGoogle

Link: http://cybersafety2016.github.io/
 
When Oct 24, 2016 - Oct 28, 2016
Where Indianapolis, IN
Submission Deadline Aug 25, 2016
Notification Due Sep 10, 2016
Final Version Due Sep 30, 2016
Categories    computer science   data mining   cybesafety   social computing
 

Call For Papers

Please distribute this widely to appropriate members of the academic and industrial research community, including students.


Call for Contributions for the First International Workshop on

Computational Methods for CyberSafety (CyberSafety 2016)
http://cybersafety2016.github.io/
===========================================================

Co-located with CIKM 2016, Indianapolis, IN, USA, October 28, 2016
http://cikm2016.cs.iupui.edu/

The goal of this inaugural workshop on cybersafety is to bring together the researchers and practitioners from academia, industry, government and research labs working in the area of cybersafety to discuss the unique challenges in addressing various cybersafety issues and to share experiences, solutions, tools and techniques. The focus of this workshop is on computational methods in cybersafety, including new algorithms, tools, data mining techniques and analysis, systems and applications for the detection, prevention and mitigation of various cybersafety issues, as well as education and promoting safe practices. The workshop will be comprised of keynote speeches, panel discussions, paper presentations and breakout sessions.
Topics of interests include (but are not limited to) the following:
‒ Cyberbullying in social media

‒ Cyberthreats, coercion, and undue social pressure

‒ Misbehaving users in online video chat services

‒ Trolls in chat rooms, discussion boards and other media

‒ The role of anonymity in cybersafety

‒ Irresponsible use of live-streaming video

‒ Deceptive techniques targeted at vulnerable populations such as the elderly and K-12 minors

‒ Bad actors in social media

‒ Online exposure of inappropriate material to minors

‒ Education and promoting safe practices

‒ Remedies for preventing or thwarting cybersafety issues

Paper Submissions:
Authors are invited to submit regular papers of 4-6 pages in length, or 2-page position papers. All submissions will be peer reviewed. Manuscripts should be submitted electronically, in PDF format and formatted using the ACM proceedings templates (http://www.acm.org/sigs/publications/proceedings-templates). The formatted manuscript should be submitted to the following email address: cikm.cybersafety.2016@gmail.com

Important Dates:
Manuscript submission: July 25, 2016
Acceptance notification: August 22, 2016
Camera-ready submission: September 1, 2016
Workshop: October 28, 2016

Workshop Organizers:
Jeremy Blackburn, Telefonica Research, Spain
Richard Han, University of Colorado Boulder, USA
Qin Lv, University of Colorado Boulder, USA
Shivakant Mishra, University of Colorado Boulder, USA

Related Resources

Springer; Methods in Molecular Biology 2026   Digital Pathology - Methods and Protocols
Ei/Scopus-AI2A 2026   2026 6th International Conference on Artificial Intelligence, Automation and Algorithms (AI2A 2026)
RV 2026   International Conference on Runtime Verification 2026
Ei/Scopus-ACEPE 2026   2026 3rd IEEE Asia Conference on Advances in Electrical and Power Engineering (ACEPE 2026)
IEEE-ICECCS 2026   2025 IEEE International Conference on Electronics, Communications and Computer Science (ICECCS 2026)
IEEE-Ei/Scopus-ICISC 2026   2025 6th International Conference on Intelligent System and Computing (ICISC 2026)
ICDM 2026   The 26th IEEE International Conference on Data Mining
SOFEA 2026   12th International Conference on Software Engineering and Applications
EDU 2026   11th International Conference on Education
Ei/Scopus-AICSP 2026   2026 International Conference on Algorithms, Intelligent Control and Signal Processing (AICSP 2026)