ACM SIGCHI General Interest Announcements (Mailing List)


Options: Use Forum View

Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Reply To:
Thu, 17 Jan 2013 08:51:45 +0100
text/plain (118 lines)
Call for Chapters :: Section #1 :: Handbook :: Web Attacks, Security 
Computer Science and Parochialism of the Cyber Destructors: Concepts and 
Analysis from Informatics and Social Sciences :: Cyber Behaviour Collection 

Section 1: New Trends in Software and Hardware: Safety and Security
Section 2: Social Sciences for an Analysis of the Computer Science 
Section 3: Cyber Behaviour and Strategies for Attacks
Section 4: Cyber Destructors and Psychiatric Profile
Section 5: Human Dignity and Reputation Online: International Legislation 

The handbook encourages high quality chapters to eradicate ambiguities and 
increasingly unify all participants in computer science, system engineering, 
computer programming, social sciences, advocacy, doctors in psychiatry, etc. 
from production, circulation, safety, security, etc. of the digital 
information to control and the prevention of the cyber attacks. 

Scopes of Interest (not limited to): 

Access Control and Privacy Protection
Access to Information and Knowledge: Rights and Obligations
Advanced Multimodal Interfaces for Security
Asperger Syndrome and Autism
Attributes and Metrics for Cyber Destructors
Authentication Mechanisms and Systems
Biological Security Technologies
Biometrics Techniques
Bipolar Disorder
Business and Security Risk Models
Cellphone and Multimedia Mobile Data Vulnerable
Cryptographic Protocols
Cyber Destructors for e-Commerce and e-Banking
Cyber Destructors for Knowledge Transfer: University and Industry / Industry 
and University
Data Privacy and Security
Data Management and Security for Outsourcing
Database: Design, Security and Authorization
Destructive Behaviour and Medieval Brotherhood Phenomenon (i.e., Bullying, 
Stalking, Sadism, Racism, etc.)
Digital Cartography for the Localization of the Cyber Destructors
Digital Contents and Copyright Protection Techniques
Distributed Information Flow Control
Dynamic Persuasor Versus Veracity and Free Scientific Information
Ethics and Aesthetics of the Interactive Contents Online and Off-line
Evaluation of the Impact of Security Efficiency on User Satisfaction
Formal Sciences Methodologies: Evaluation of the Cyber Destruction 
Hacking Democracy
Heuristic Assessment for Cyber Attacks
Human and Social Factors in Security and Privacy
Identity Theft Protection and Profession Cloning Detection
Information Society and International Legislation for New Technologies
Intellectual Property and Copyright: Defense
Intelligent Systems and Security Services
Interactive Design for User Security and Privacy Information
Interfaces Models and the Interaction with Security Systems
Intrusion Detection and Fraud Detection
Key Management and Authentication
Methods and Techniques for Stopping Attacks in Social Networking
Mobile Security Systems and Technologies
Natural Interfaces, Communicability and Strong Security for Interactive 
Negative Values in Cyber Destroyers (i.e., Arrogance, Envy, Narcissism, 
Trouble Maker, etc.)
Network Security Issues and Protocols
Networking Security Systems for Cloud Computing
Ontology for Private and Confidential Information Management
Parochialism and Cyber Criminals: Modus Operandi for Intranet, Extranet and 
Privacy and Integrity of the Information for Outsourcing
Privacy and Security in Context-Aware Multimedia Mobile Services Development
Privacy in Social Networking
Psychiatric Disorders into Parochialism
Scientific Reputation and Public Opinion in Virtual Communities: 
Methodologies for Virtual Defense
Security Applications and Services
Security in Human Centred Environments
Security Certification: Standardization and Guidelines
Security Mechanisms for Multimedia Data and Compression Techniques
Security Models
Security Policies and User Behaviour
Security, Trust and Privacy in Commerce and Business Online
Semantic Computing and Security
Social and Human Factors in Private and Confidential Information 
Social Psychology and Human Behaviour in Safety, Security and Privacy
Strategies of the Cyber Destructors and Medieval Brotherhoods for Anonymous 
Theory and Applications of Cryptology
User Psychology and Social Influence in Security for Industrial Sabotage
Veracity, Credibility and Reputation Management
Voice, Face and Signature Recognition Systems for Security
Vulnerability Analysis
Web 2.0 and Web 3.0: Safety, Security and Privacy
Wireless Data Communications: Security and Privacy 


Two-stage submission: First, interested researchers and practitioners are 
invited to submit a chapter proposal clearly stating your focused domain 
problems and contributions related to one of the above topics due on Monday, 
21th October 2013; second, authors of accepted proposals will be notified by 
Monday, 11th November 2013 about the status of their proposals and sent 
chapter organizational guidelines. Full chapters are due by Friday, 13th 
December 2013. All submitted chapters will be reviewed on a triple-blind 
review basis. The handbook is scheduled to be published in December 2013 by 
Blue Herons Editions: 

    For news of CHI books, courses & software, join CHI-RESOURCES
     mailto: [log in to unmask]

    To unsubscribe from CHI-ANNOUNCEMENTS send an email to
     mailto:[log in to unmask]

    For further details of CHI lists see