ACM SIGCHI General Interest Announcements (Mailing List)


Options: Use Forum View

Use Monospaced Font
Show Text Part by Default
Condense Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
text/plain; format=flowed; charset="iso-8859-1"
Tue, 21 Oct 2014 16:07:03 +0200
"ACM SIGCHI General Interest Announcements (Mailing List)" <[log in to unmask]>
text/plain (123 lines)
Call for long chapters 

Web Attacks, Security Computer Science and Parochialism of the Cyber 
Destructors: Concepts and Analysis from Informatics and Social Sciences 

Handbook Cyber Behaviour Collection :: Blue Herons Editions :: Deadline 

 - Section 1: New Trends in Software and Hardware: Safety and Security
 - Section 2: Social Sciences for an Analysis of the Computer Science 
 - Section 3: Cyber Behaviour and Strategies for Attacks
 - Section 4: Cyber Destructors and Psychiatric Profile
 - Section 5: Human Dignity and Reputation Online: International Legislation 

The handbook encourages high quality chapters to eradicate ambiguities and 
increasingly unify all participants in computer science, system engineering, 
computer programming, social sciences, advocacy, doctors in psychiatry, etc. 
from production, circulation, safety, security, etc. of the digital 
information to control and the prevention of the cyber attacks. 

Scopes of Interest (not limited to): 

 - Access Control and Privacy Protection
 - Access to Information and Knowledge: Rights and Obligations
 - Advanced Multimodal Interfaces for Security
 - Asperger Syndrome and Autism
 - Attributes and Metrics for Cyber Destructors
 - Authentication Mechanisms and Systems
 - Biological Security Technologies
 - Biometrics Techniques
 - Bipolar Disorder
 - Business and Security Risk Models
 - Cellphone and Multimedia Mobile Data Vulnerable
 - Cryptographic Protocols
 - Cyber Destructors for e-Commerce and e-Banking
 - Cyber Destructors for Knowledge Transfer: University and Industry / 
Industry and University
 - Data Privacy and Security
 - Data Management and Security for Outsourcing
 - Database: Design, Security and Authorization
 - Destructive Behaviour and Medieval Brotherhood Phenomenon (i.e., Bullying, 
Stalking, Sadism, Racism, etc.)
 - Digital Cartography for the Localization of the Cyber Destructors
 - Digital Contents and Copyright Protection Techniques
 - Distributed Information Flow Control
 - Dynamic Persuasor Versus Veracity and Free Scientific Information
 - Ethics and Aesthetics of the Interactive Contents Online and Off-line
 - Evaluation of the Impact of Security Efficiency on User Satisfaction
 - Formal Sciences Methodologies: Evaluation of the Cyber Destruction 
 - Hacking Democracy
 - Heuristic Assessment for Cyber Attacks
 - Human and Social Factors in Security and Privacy
 - Identity Theft Protection and Profession Cloning Detection
 - Information Society and International Legislation for New Technologies
 - Intellectual Property and Copyright: Defense
 - Intelligent Systems and Security Services
 - Interactive Design for User Security and Privacy Information
 - Interfaces Models and the Interaction with Security Systems
 - Intrusion Detection and Fraud Detection
 - Key Management and Authentication
 - Methods and Techniques for Stopping Attacks in Social Networking
 - Mobile Security Systems and Technologies
 - Natural Interfaces, Communicability and Strong Security for Interactive 
 - Negative Values in Cyber Destroyers (i.e., Arrogance, Envy, Narcissism, 
Trouble Maker, etc.)
 - Network Security Issues and Protocols
 - Networking Security Systems for Cloud Computing
 - Ontology for Private and Confidential Information Management
 - Parochialism and Cyber Criminals: Modus Operandi for Intranet, Extranet 
and Internet
 - Privacy and Integrity of the Information for Outsourcing
 - Privacy and Security in Context-Aware Multimedia Mobile Services 
 - Privacy in Social Networking
 - Psychiatric Disorders into Parochialism
 - Scientific Reputation and Public Opinion in Virtual Communities: 
Methodologies for Virtual Defense
 - Security Applications and Services
 - Security in Human Centred Environments
 - Security Certification: Standardization and Guidelines
 - Security Mechanisms for Multimedia Data and Compression Techniques
 - Security Models
 - Security Policies and User Behaviour
 - Security, Trust and Privacy in Commerce and Business Online
 - Semantic Computing and Security
 - Social and Human Factors in Private and Confidential Information 
 - Social Psychology and Human Behaviour in Safety, Security and Privacy
 - Strategies of the Cyber Destructors and Medieval Brotherhoods for 
Anonymous Attacks
 - Theory and Applications of Cryptology
 - User Psychology and Social Influence in Security for Industrial Sabotage
 - Veracity, Credibility and Reputation Management
 - Voice, Face and Signature Recognition Systems for Security
 - Vulnerability Analysis
 - Web 2.0 and Web 3.0: Safety, Security and Privacy
 - Wireless Data Communications: Security and Privacy 


Two-stage submission: First, interested researchers and practitioners are 
invited to submit a chapter proposal clearly stating your focused domain 
problems and contributions related to one of the above topics due on ** Open 
**; second, authors of accepted proposals will be notified by *** Open *** 
about the status of their proposals and sent chapter organizational 
guidelines. Full chapters are due by *** one/two week/s, after the 
submission ***. All submitted chapters will be reviewed on a triple-blind 
review basis. The handbook is scheduled to be published in 2014 by Blue 
Herons Editions: 

    For news of CHI books, courses & software, join CHI-RESOURCES
     mailto: [log in to unmask]

    To unsubscribe from CHI-ANNOUNCEMENTS send an email to
     mailto:[log in to unmask]

    For further details of CHI lists see