Message posted on 08/01/2019

CfP: New Security Paradigms Workshop 2019 / Social manipulation through technology

                NSPW 2019: Call for Papers
<br>
<br>San Carlos, Costa Rica
<br>
<br>September 23-26, 2019
<br>
<br>www.nspw.org
<br>
<br>
<br>Submission deadline:             April 12, 2019  23:59 (UTC -11) firm
<br>
<br>Format:                                   PDF file (ACM SIG formatting) via
<br>Easychair
<br>
<br>Author responses:                  May 24 - June 3, 2019
<br>Notification of acceptance:     June 12, 2019
<br>Pre-proceedings deadline:     July 8, 2019
<br>Invitations sent:                      July 15, 2019
<br>Early registration:                   July 29, 2019
<br>Late registration:                     August 5, 2019
<br>Workshop:                              September 23-26, 2019
<br>Final version:                         November 15, 2019
<br>
<br>
<br>The New Security Paradigms Workshop (NSPW) seeks embryonic, disruptive, and
<br>unconventional ideas on information and cyber security that benefit from early
<br>feedback. Submissions typically address current limitations of information
<br>security, directly challenge long-held beliefs or the very foundations of
<br>security, or discuss problems from an entirely novel angle, leading to new
<br>solutions. We welcome papers both from computer science and other disciplines
<br>that study adversarial relationships, as well as from practice. The workshop
<br>is invitation-only; all accepted papers receive a 1 hour plenary time slot for
<br>presentation and discussion. In order to maximize diversity of perspectives,
<br>we particularly encourage submissions from new NSPW authors, from Ph.D.
<br>students, and from non-obvious disciplines and institutions.
<br>
<br>
<br>In 2019, NSPW invites theme submissions around "Social manipulation through
<br>technology" next to regular submissions. Recently, a new type of concern is
<br>emerging in the cybersecurity community: how should the field deal with the
<br>possibility of manipulating societies or subgroups within a society via
<br>information and communication technology (e.g. trolling, fake news, election
<br>manipulation)? What are new paradigms that could help in this context?
<br>Possible topics include, but are not limited to:
<br>
<br>*        What are the motives, origins and characteristics of such
<br>manipulations?
<br>
<br>*        What are the effects on social systems in terms of culture, politics,
<br>communication, media, trust, power?
<br>
<br>*        What can and should our field do, if anything, to safeguard the
<br>values embedded in our societies against such manipulations?
<br>
<br>*        How do current technical and social arrangements enable or facilitate
<br>manipulation?
<br>
<br>*        What new technical or social protections might we put in place? What
<br>new social media could help, or hurt?
<br>
<br>For the theme, we particularly invite cross-disciplinary submissions that may
<br>be having trouble finding the right venue, and submissions (co-)authored by
<br>social and political scientists.
<br>
<br>
<br>NSPW 2019 will be held at Hotel Tilajari in San Carlos, Costa Rica. As in the
<br>past, this choice of venue is designed to facilitate interactions between the
<br>invited attendees throughout the workshop.
<br>
<br>Submission Instructions
<br>
<br>NSPW accepts three categories of submissions:
<br>
<br>*        Regular Submissions present a new approach (paradigm) to a security
<br>problem or critique existing approaches. While regular submissions may present
<br>research results (mathematical or experimental), unlike papers submitted to
<br>most computer security venues, these results should not be the focus of the
<br>submission; instead, the change in approach should be the focus.
<br>
<br>*        Theme Submissions are focused on "Social manipulation through
<br>technology", and should explain the connection with the theme in the
<br>justification statement (see below). They follow the format of a regular
<br>submission.
<br>
<br>*        Panel Proposals describe a debatable topic of interest to the
<br>security community that merits significant discussion. Proposals should
<br>describe the major perspectives on the chosen topic. They should also present
<br>the background of the panelists, explaining how they are the right people to
<br>discuss the chosen topic at NSPW.
<br>
<br>
<br>Submissions must be made in PDF format, 6-15 pages, ACM SIG
<br>formatting, through
<br>EasyChair, as linked on the NSPW site. Submissions must include a cover page
<br>with authors' names, affiliation, justification statement and attendance
<br>statement. Papers not including these risk rejection without review. The
<br>justification statement briefly explains why the submission is appropriate for
<br>NSPW and the chosen submission category. The attendance statement must specify
<br>which author(s) will attend upon acceptance/invitation. Submissions should not
<br>be blinded. Organizers and PC members are allowed to submit, but will not be
<br>involved in the evaluation of their own papers. All submissions are treated as
<br>confidential as a matter of policy. NSPW does not accept previously published
<br>or concurrently submitted papers.
<br>
<br>
<br>Authors may submit review responses during the review process indicating the
<br>changes they wish to commit to. Papers are accepted conditionally and are
<br>shepherded, with final proceedings being published after the workshop.
<br>
<br>Attendance
<br>
<br>The workshop itself is invitation-only, with typically 30-35 participants
<br>consisting of authors of about 12 accepted papers, panelists, program
<br>committee members, and organizers. One author of each accepted paper must
<br>attend; additional authors may be invited if space permits. All participants
<br>must commit to a "social contract": no one arrives late, no one leaves early,
<br>no electronic distractions (including laptops, tablets, and mobile devices),
<br>and all attend all sessions of the 2.5 day program, sharing meals in a group
<br>setting and complying with the code of conduct. The workshop is preceded by an
<br>evening reception allowing attendees to meet each other beforehand.
<br>
<br>
<br>Financial Aid: Financial aid may be available, especially for U.S.-based
<br>students and junior faculty. We encourage submissions from students and junior
<br>faculty, even if support is required to attend.
<br>
<br>
<br>Program Committee Co-chairs:
<br>
<br>            Wolter Pieters, Delft University of Technology,
<br>w.pieters@tudelft.nl
<br>Elizabeth Stobert, National Research Council Canada,
<br>elizabeth@stobert.ca
<br>
<br>
<br>Dr.ir. Wolter Pieters
<br>Associate professor cyber risk - TU Delft
<br>Organisation & Governance | Technology, Policy & Management
<br>
<br>Recent papers:
<br>Beyond individual-centric privacy:
<br>http://dx.doi.org/10.1080/01972243.2017.1354108
<br>Effectiveness of surveillance technology:
<br>https://doi.org/10.1080/01972243.2017.1414721
<br>Preferences for security measures: https://doi.org/10.1016/j.cose.2018.03.003
<br>
<br>TU Delft
<br>Faculty of Technology, Policy and Management; Section OG
<br>Building 31, Jaffalaan 5, 2628 BX  Delft; P.O. Box 5015, 2600 GA  Delft
<br>T +31 (0)15 27 88989    E w.pieters@tudelft.nl
<br>W http://homepage.tudelft.nl/e7x9k
<br>_______________________________________________
<br>EASST's Eurograd mailing list
<br>Eurograd (at) lists.easst.net
<br>Unsubscribe or edit subscription options: http://lists.easst.net/listinfo.cgi/eurograd-easst.net
<br>
<br>Meet us via https://twitter.com/STSeasst
<br>
<br>Report abuses of this list to Eurograd-owner@lists.easst.net
            
view formatted text

EASST-Eurograd RSS

mailing list
30 recent messages