CYBERSAFETY 2016 - 1st International Workshop on Computational Methods for CyberSafety
View: 337
Website http://cybersafety2016.github.io/ |
Edit Freely
Category Computer Science;Data Mining;Misbehavior;Social Computing;Cyberbullying
Deadline: July 25, 2016 | Date: October 24, 2016-October 27, 2016
Venue/Country: Indianapolis, U.S.A
Updated: 2016-06-26 16:22:06 (GMT+9)
Call For Papers - CFP
Call for Contributions for the First International Workshop onComputational Methods for CyberSafety (CyberSafety 2016)http://cybersafety2016.github.io/Co-located with CIKM 2016, Indianapolis, IN, USA, October 28, 2016http://cikm2016.cs.iupui.edu/The goal of this inaugural workshop on cybersafety is to bring together the researchers and practitioners from academia, industry, government and research labs working in the area of cybersafety to discuss the unique challenges in addressing various cybersafety issues and to share experiences, solutions, tools and techniques. The focus of this workshop is on computational methods in cybersafety, including new algorithms, tools, data mining techniques and analysis, systems and applications for the detection, prevention and mitigation of various cybersafety issues, as well as education and promoting safe practices. The workshop will be comprised of keynote speeches, panel discussions, paper presentations and breakout sessions.Topics of interests include (but are not limited to) the following:‒ Cyberbullying in social media‒ Cyberthreats, coercion, and undue social pressure‒ Misbehaving users in online video chat services‒ Trolls in chat rooms, discussion boards and other media‒ The role of anonymity in cybersafety‒ Irresponsible use of live-streaming video‒ Deceptive techniques targeted at vulnerable populations such as the elderly and K-12 minors‒ Bad actors in social media‒ Online exposure of inappropriate material to minors‒ Education and promoting safe practices‒ Remedies for preventing or thwarting cybersafety issuesPaper Submissions:Authors are invited to submit regular papers of 4-6 pages in length, or 2-page position papers. All submissions will be peer reviewed. Manuscripts should be submitted electronically, in PDF format and formatted using the ACM proceedings templates (http://www.acm.org/sigs/publications/proceedings-templates). The formatted manuscript should be submitted to the following email address: cikm.cybersafety.2016gmail.comImportant Dates: Manuscript submission: July 25, 2016Acceptance notification: August 22, 2016Camera-ready submission: September 1, 2016Workshop: October 28, 2016Workshop Organizers:Jeremy Blackburn, Telefonica Research, SpainRichard Han, University of Colorado Boulder, USA Qin Lv, University of Colorado Boulder, USA Shivakant Mishra, University of Colorado Boulder, USA Please distribute this widely to appropriate members of the academic and industrial research community, including students.
Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.