posted by organizer: homahosseinmardi || 5768 views || tracked by 7 users: [display]

CyberSafety 2016 : 1st International Workshop on Computational Methods for CyberSafety

FacebookTwitterLinkedInGoogle

Link: http://cybersafety2016.github.io/
 
When Oct 24, 2016 - Oct 28, 2016
Where Indianapolis, IN
Submission Deadline Aug 25, 2016
Notification Due Sep 10, 2016
Final Version Due Sep 30, 2016
Categories    computer science   data mining   cybesafety   social computing
 

Call For Papers

Please distribute this widely to appropriate members of the academic and industrial research community, including students.


Call for Contributions for the First International Workshop on

Computational Methods for CyberSafety (CyberSafety 2016)
http://cybersafety2016.github.io/
===========================================================

Co-located with CIKM 2016, Indianapolis, IN, USA, October 28, 2016
http://cikm2016.cs.iupui.edu/

The goal of this inaugural workshop on cybersafety is to bring together the researchers and practitioners from academia, industry, government and research labs working in the area of cybersafety to discuss the unique challenges in addressing various cybersafety issues and to share experiences, solutions, tools and techniques. The focus of this workshop is on computational methods in cybersafety, including new algorithms, tools, data mining techniques and analysis, systems and applications for the detection, prevention and mitigation of various cybersafety issues, as well as education and promoting safe practices. The workshop will be comprised of keynote speeches, panel discussions, paper presentations and breakout sessions.
Topics of interests include (but are not limited to) the following:
‒ Cyberbullying in social media

‒ Cyberthreats, coercion, and undue social pressure

‒ Misbehaving users in online video chat services

‒ Trolls in chat rooms, discussion boards and other media

‒ The role of anonymity in cybersafety

‒ Irresponsible use of live-streaming video

‒ Deceptive techniques targeted at vulnerable populations such as the elderly and K-12 minors

‒ Bad actors in social media

‒ Online exposure of inappropriate material to minors

‒ Education and promoting safe practices

‒ Remedies for preventing or thwarting cybersafety issues

Paper Submissions:
Authors are invited to submit regular papers of 4-6 pages in length, or 2-page position papers. All submissions will be peer reviewed. Manuscripts should be submitted electronically, in PDF format and formatted using the ACM proceedings templates (http://www.acm.org/sigs/publications/proceedings-templates). The formatted manuscript should be submitted to the following email address: cikm.cybersafety.2016@gmail.com

Important Dates:
Manuscript submission: July 25, 2016
Acceptance notification: August 22, 2016
Camera-ready submission: September 1, 2016
Workshop: October 28, 2016

Workshop Organizers:
Jeremy Blackburn, Telefonica Research, Spain
Richard Han, University of Colorado Boulder, USA
Qin Lv, University of Colorado Boulder, USA
Shivakant Mishra, University of Colorado Boulder, USA

Related Resources

COLING 2018   The 27th International Conference on Computational Linguistics (COLING 2018)
KDD 2018   Knowledge Discovery and Data Mining Conference
ACL 2018   56th Annual Meeting of the Association for Computational Linguistics
MLDM 2018   14th International Conference on Machine Learning and Data Mining MLDM 2018
COMPImage 2018   International Symposium CompIMAGE’18 - Computational Modeling of Objects Presented in Images: Fundamentals, Methods, and Applications
ICDM 2018   18th Industrial Conference on Data Mining ICDM 2018
CyberSafety 2017   Call for contributions: CyberSafety Workshop 2017
IPMU 2018   17th Information Processing and Management of Uncertainty in Knowledge-Based Systems Conference
COLT 2018   Computational Learning Theory
ICISDM--IEEE Xplore, Ei and Scopus 2018   2018 2nd International Conference on Information System and Data Mining (ICISDM 2018)--IEEE Xplore, Ei and Scopus