posted by organizer: homahosseinmardi || 5688 views || tracked by 7 users: [display]

CyberSafety 2016 : 1st International Workshop on Computational Methods for CyberSafety

FacebookTwitterLinkedInGoogle

Link: http://cybersafety2016.github.io/
 
When Oct 24, 2016 - Oct 28, 2016
Where Indianapolis, IN
Submission Deadline Aug 25, 2016
Notification Due Sep 10, 2016
Final Version Due Sep 30, 2016
Categories    computer science   data mining   cybesafety   social computing
 

Call For Papers

Please distribute this widely to appropriate members of the academic and industrial research community, including students.


Call for Contributions for the First International Workshop on

Computational Methods for CyberSafety (CyberSafety 2016)
http://cybersafety2016.github.io/
===========================================================

Co-located with CIKM 2016, Indianapolis, IN, USA, October 28, 2016
http://cikm2016.cs.iupui.edu/

The goal of this inaugural workshop on cybersafety is to bring together the researchers and practitioners from academia, industry, government and research labs working in the area of cybersafety to discuss the unique challenges in addressing various cybersafety issues and to share experiences, solutions, tools and techniques. The focus of this workshop is on computational methods in cybersafety, including new algorithms, tools, data mining techniques and analysis, systems and applications for the detection, prevention and mitigation of various cybersafety issues, as well as education and promoting safe practices. The workshop will be comprised of keynote speeches, panel discussions, paper presentations and breakout sessions.
Topics of interests include (but are not limited to) the following:
‒ Cyberbullying in social media

‒ Cyberthreats, coercion, and undue social pressure

‒ Misbehaving users in online video chat services

‒ Trolls in chat rooms, discussion boards and other media

‒ The role of anonymity in cybersafety

‒ Irresponsible use of live-streaming video

‒ Deceptive techniques targeted at vulnerable populations such as the elderly and K-12 minors

‒ Bad actors in social media

‒ Online exposure of inappropriate material to minors

‒ Education and promoting safe practices

‒ Remedies for preventing or thwarting cybersafety issues

Paper Submissions:
Authors are invited to submit regular papers of 4-6 pages in length, or 2-page position papers. All submissions will be peer reviewed. Manuscripts should be submitted electronically, in PDF format and formatted using the ACM proceedings templates (http://www.acm.org/sigs/publications/proceedings-templates). The formatted manuscript should be submitted to the following email address: cikm.cybersafety.2016@gmail.com

Important Dates:
Manuscript submission: July 25, 2016
Acceptance notification: August 22, 2016
Camera-ready submission: September 1, 2016
Workshop: October 28, 2016

Workshop Organizers:
Jeremy Blackburn, Telefonica Research, Spain
Richard Han, University of Colorado Boulder, USA
Qin Lv, University of Colorado Boulder, USA
Shivakant Mishra, University of Colorado Boulder, USA

Related Resources

COLING 2018   The 27th International Conference on Computational Linguistics (COLING 2018)
TheWebConf 2018   The Web Conference (The International World Wide Web Conference - WWW2018)
IJCMHS 2018   International Journal of Computational Methods in Heritage Science
PAKDD 2018   The 22nd Pacific-Asia Conference on Knowledge Discovery and Data Mining
Emerging trends in ML@ESANN 2018   Special Session - Emerging trends in machine learning: beyond conventional methods and data
SDM 2018   SIAM International Conference on Data Mining
RCMKRL 2018   IEEE Access“Recent Computational Methods in Knowledge Engineering and Intelligence Computation”
ICASSP 2018   IEEE International Conference on Acoustics, Speech and Signal Processing
RCMKEIC 2017   Special Sections“Recent Computational Methods in Knowledge Engineering and Intelligence Computation”
MLDM 2018   14th International Conference on Machine Learning and Data Mining MLDM 2018