ACM SIGCHI General Interest Announcements (Mailing List)


Options: Use Forum View

Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Jason Hong <[log in to unmask]>
Reply To:
Jason Hong <[log in to unmask]>
Tue, 11 Feb 2014 09:33:52 -0500
text/plain (93 lines)
Submission deadline: 1 March 2014
Publication date: January–March 2015

Society is increasingly relying on pervasive computing
technologies in all domains. However, with the growing
adoption of these technologies, we are also seeing more
and more issues related to privacy and security.

The aim of this special issue is to explore technologies
related to all aspects of privacy and security in pervasive
computing. Relevant topics for this special issue include,
but are not limited to, the following:

- Privacy and security for pervasive computing domains, such
   as smart homes, smart cars, healthcare, urban computing,
   and more
- Privacy and security for pervasive computing technologies,
   such as smartphones, wireless sensors, wearable computers,
   RFIDs, cameras, and more
- New methods, techniques, or architectures for collecting,
   processing, managing, and sharing sensed data in a way that
   balances privacy, security, and utility
- New approaches for managing privacy and security in pervasive
   computing domains, both for end-users and for organizations
   offering services
- User interfaces for conveying to users what data is being
   sensed and gathered
- User studies probing people's attitudes and behaviors towards
   privacy and security in pervasive computing domains and/or
   involving pervasive computing technologies
- Tools, platforms, and user models to help developers improve
   privacy and security in ubicomp systems
- Experiences with privacy & security for deployed ubicomp systems
- More streamlined ways of authenticating to pervasive computing
   environments, or using pervasive computing technologies to
   improve authentication in general
- Security on low-power computing devices
- Establishing trust in pervasive hardware
- Combining privacy with accuracy in location sensing
- Coping with physical threats to pervasive hardware
- Pervasive surveillance and privacy
- Technology and policy issues
- New business processes and models involving ubicomp privacy
   and security
- Incorporating privacy and security into the design and
   development process of pervasive applications (aka "privacy-

The guest editors invite original and high-quality submissions
addressing all aspects of this field, as long as the connection
to the focus topic is clear and emphasized. Review or summary
articles — for example critical evaluations of the state of the
art, or insightful analysis of established and up-coming
technologies—may be accepted if they demonstrate academic rigor
and relevance.

Special Issue Guest Editors
- Sunny Consolvo, Google
- Jason Hong, Carnegie Mellon University
- Marc Langheinrich, University of Lugano (USI)

Submission Information
Submissions should be 4,000 to 6,000 words long and should
follow the magazine's guidelines on style and presentation.
All submissions will be single-blind anonymously reviewed in
accordance with normal practice for scientific publications.
For more information, contact the guest editors at
[log in to unmask]

To present works-in-progress directly to the community, visit
our Reddit community:

For general author guidelines or submission details: or [log in to unmask]
To submit your article directly to our online peer-review system,
go directly to Manuscript Central.

Jason I. Hong                    Associate Professor    Human Computer Interaction Institute             Carnegie Mellon University

    For news of CHI books, courses & software, join CHI-RESOURCES
     mailto: [log in to unmask]

    To unsubscribe from CHI-ANNOUNCEMENTS send an email to
     mailto:[log in to unmask]

    For further details of CHI lists see