{"id":937,"date":"2024-03-13T21:27:00","date_gmt":"2024-03-13T21:27:00","guid":{"rendered":"https:\/\/pc-keeper.tech\/index.php\/2024\/03\/13\/special-issue-on-the-cybersecurity-and-privacy\/"},"modified":"2024-03-13T21:27:00","modified_gmt":"2024-03-13T21:27:00","slug":"special-issue-on-the-cybersecurity-and-privacy","status":"publish","type":"post","link":"https:\/\/pc-keeper.tech\/index.php\/2024\/03\/13\/special-issue-on-the-cybersecurity-and-privacy\/","title":{"rendered":"Special Issue on the Cybersecurity and Privacy"},"content":{"rendered":"<p> [ad_1]<br \/>\n<\/p>\n<div style=\"font-family: Open Sans, sans-serif; position: relative; overflow: hidden;\">\n<h3>Important Dates<\/h3>\n<p data-pm-slice=\"1 1 []\">Publication: May\/June 2025<\/p>\n<hr\/>\n<p><span style=\"font-weight: 400;\">Electronic surveillance and cyberattacks are used in occupied conflict regions by aggressors to monitor, cut off communications, intimidate, disrupt, or target [3]. Cyberatttacks are also levied across borders against countries, their populations, and institutions [4], as well as against the United Nations [5] and international, non-governmental organizations (NGOs) providing humanitarian aid [6,7,8,9]. And, attackers are known to take advantage of individuals in vulnerable situations following major natural disasters, such as hurricanes, floods, and wildfires [10].\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This Special Issue of <\/span><i><span style=\"font-weight: 400;\">IEEE Security &amp; Privacy<\/span><\/i><span style=\"font-weight: 400;\"> on \u201cCybersecurity and Privacy in Global Conflict and Disaster Regions\u201d solicits articles on topics related to the aforementioned situations, including threats, mitigations, policies, and future directions.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To better convey scope, a few examples of articles published in other venues that demonstrate desired scope of this Special Issue include (but are not limited to):<\/span><\/p>\n<ul>\n<li><span style=\"font-weight: 400;\">Jessica McClearn and Rikke Bjerg Jensen, and Reem Talhouk. Othered, Silenced and Scapegoated: Understanding the Situated Security of Marginalised Populations in Lebanon.\u00a0 <\/span><i><span style=\"font-weight: 400;\">Proceedings of the 32nd USENIX Security Symposium<\/span><\/i><span style=\"font-weight: 400;\">, pp. 4625\u20134642, 2023.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Dimitrios Serpanos and Theodoros Komninos. The Cyberwarfare in Ukraine. <\/span><i><span style=\"font-weight: 400;\">Computer<\/span><\/i><span style=\"font-weight: 400;\">, 55(7):88-91, IEEE, July 2022.\u00a0<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Martin Hus\u00e1k, Martin La\u0161tovi\u010dka, and Tom\u00e1\u0161 Plesn\u00edk. 2022. Handling Internet Activism During the Russian Invasion of Ukraine: A Campus Network Perspective. <\/span><i><span style=\"font-weight: 400;\">Digital Threats: Research and Practice<\/span><\/i><span style=\"font-weight: 400;\">, 3(3):17, ACM, September 2022.\u00a0<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Kasra EdalatNejad, Wouter Lueks, Justinas Sukaitis, Vincent Graf Narbel, Massimo Marelli, Carmela Troncoso. Janus: Safe Biometric Deduplication for Humanitarian Aid Distribution. <\/span><i><span style=\"font-weight: 400;\">Proceedings of the IEEE Symposium on Security and Privacy, <\/span><\/i><span style=\"font-weight: 400;\">2024.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Rakesh Verma, Devin Crane, and Omprakash Gnawali. Phishing during and after disaster: Hurricane Harvey.\u00a0 <\/span><i><span style=\"font-weight: 400;\">Proceedings of Resilience Week<\/span><\/i><span style=\"font-weight: 400;\">, pp. 88-94. 2018.\u00a0<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Submitted articles should focus on facts and emphasize <\/span><b>technical or scientific aspects<\/b><span style=\"font-weight: 400;\"> (including human factors) of cybersecurity and privacy, or threats to cybersecurity and privacy,\u00a0 in global conflict and disaster regions.\u00a0 We encourage a broad and unbiased exploration and discussion of various threats, mitigations, and situations.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Pieces focusing on important topics such as social media, mis\/disinformation and generative AI are only in scope insofar as those pieces tie strongly to cybersecurity and privacy.<\/span><\/p>\n<p><b>Not in scope<\/b><span style=\"font-weight: 400;\"> for this issue include articles that are <\/span><b>opinion<\/b><span style=\"font-weight: 400;\"> pieces or <\/span><b>political<\/b><span style=\"font-weight: 400;\"> in nature.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">When in doubt about scope, prospective authors should please recall traditional themes of cybersecurity and privacy conferences and journal venues.\u00a0<\/span><\/p>\n<hr\/>\n<h3>Submission Guidelines<\/h3>\n<p><span style=\"font-weight: 400;\">For author information, including style guidance and formatting requirements, please visit the <\/span><span style=\"font-weight: 400;\">Author Information<\/span><span style=\"font-weight: 400;\"> page. Full papers (5000-7000 words) and more technical pieces will be peer-reviewed, as is typical for <\/span><i><span style=\"font-weight: 400;\">IEEE Security &amp; Privacy<\/span><\/i><span style=\"font-weight: 400;\">.\u00a0 Shorter or less technical pieces (2000-4000 words) will be reviewed and managed internally by the Editorial Board.\u00a0 Manuscripts should not be published or currently submitted for publication elsewhere.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">All pieces should initially be sent to spX-YY@computer.org for a determination by the Editorial Board on the article category and associated next steps.\u00a0 Manuscripts that are determined best addressed via peer review will be redirected to submission via ManuscriptCentral.<\/span><\/p>\n<hr\/>\n<h3>Questions?<\/h3>\n<p><strong>Contact the guest editors at sp3-25@computer.org<\/strong><\/p>\n<\/p><\/div>\n<p>[ad_2]<br \/>\n<br \/><a href=\"https:\/\/www.computer.org\/digital-library\/magazines\/sp\/cfp-cybersecurity-and-privacy-in-global-conflict-and-disaster-regions\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[ad_1] Important Dates Publication: May\/June 2025 Electronic surveillance and cyberattacks are used in occupied conflict regions by aggressors to monitor,&hellip;<\/p>\n","protected":false},"author":1,"featured_media":938,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[486,703,747],"tags":[],"class_list":["post-937","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-call-for-papers","category-call-for-papers-filter-post","category-cfp-computer"],"_links":{"self":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/posts\/937","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/comments?post=937"}],"version-history":[{"count":0,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/posts\/937\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/media\/938"}],"wp:attachment":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/media?parent=937"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/categories?post=937"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/tags?post=937"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}