posted by organizer: homahosseinmardi || 7197 views || tracked by 7 users: [display]

CyberSafety 2016 : 1st International Workshop on Computational Methods for CyberSafety

FacebookTwitterLinkedInGoogle

Link: http://cybersafety2016.github.io/
 
When Oct 24, 2016 - Oct 28, 2016
Where Indianapolis, IN
Submission Deadline Aug 25, 2016
Notification Due Sep 10, 2016
Final Version Due Sep 30, 2016
Categories    computer science   data mining   cybesafety   social computing
 

Call For Papers

Please distribute this widely to appropriate members of the academic and industrial research community, including students.


Call for Contributions for the First International Workshop on

Computational Methods for CyberSafety (CyberSafety 2016)
http://cybersafety2016.github.io/
===========================================================

Co-located with CIKM 2016, Indianapolis, IN, USA, October 28, 2016
http://cikm2016.cs.iupui.edu/

The goal of this inaugural workshop on cybersafety is to bring together the researchers and practitioners from academia, industry, government and research labs working in the area of cybersafety to discuss the unique challenges in addressing various cybersafety issues and to share experiences, solutions, tools and techniques. The focus of this workshop is on computational methods in cybersafety, including new algorithms, tools, data mining techniques and analysis, systems and applications for the detection, prevention and mitigation of various cybersafety issues, as well as education and promoting safe practices. The workshop will be comprised of keynote speeches, panel discussions, paper presentations and breakout sessions.
Topics of interests include (but are not limited to) the following:
‒ Cyberbullying in social media

‒ Cyberthreats, coercion, and undue social pressure

‒ Misbehaving users in online video chat services

‒ Trolls in chat rooms, discussion boards and other media

‒ The role of anonymity in cybersafety

‒ Irresponsible use of live-streaming video

‒ Deceptive techniques targeted at vulnerable populations such as the elderly and K-12 minors

‒ Bad actors in social media

‒ Online exposure of inappropriate material to minors

‒ Education and promoting safe practices

‒ Remedies for preventing or thwarting cybersafety issues

Paper Submissions:
Authors are invited to submit regular papers of 4-6 pages in length, or 2-page position papers. All submissions will be peer reviewed. Manuscripts should be submitted electronically, in PDF format and formatted using the ACM proceedings templates (http://www.acm.org/sigs/publications/proceedings-templates). The formatted manuscript should be submitted to the following email address: cikm.cybersafety.2016@gmail.com

Important Dates:
Manuscript submission: July 25, 2016
Acceptance notification: August 22, 2016
Camera-ready submission: September 1, 2016
Workshop: October 28, 2016

Workshop Organizers:
Jeremy Blackburn, Telefonica Research, Spain
Richard Han, University of Colorado Boulder, USA
Qin Lv, University of Colorado Boulder, USA
Shivakant Mishra, University of Colorado Boulder, USA

Related Resources

EMNLP 2020   Conference on Empirical Methods in Natural Language Processing
AVC 2020   Advances in Vision Computing: An International Journal
BIOINFORMATICS 2021   12th International Conference on Bioinformatics Models, Methods and Algorithms
IEEE-CVIV 2020-Ei/Scopus 2020   2020 2nd International Conference on Advances in Computer Vision, Image and Virtualization (CVIV 2020)
ICFEM 2020   The 22nd International Conference on Formal Engineering Methods (2020)
WSDM 2021   14th ACM Conference on Web Search and Data Mining
EACL 2021   The 16th Conference of the European Chapter of the Association for Computational Linguistics
IEEE-CTISC 2020-Ei/Scopus 2020   2020 2nd International Conference on Advances in Computer Technology, Information Science and Communications (CTISC 2020)
Fintech 2020   Sustainaility (Q2): Fintech: Recent Advancements in Modern Techniques, Methods and Real-World Solutions
SOFSEM 2021   47th International Conference on Current Trends in Theory and Practice of Computer Science