| |||||||||||||||
IFIP SC 2019 : 14th IFIP Summer School on Privacy and Identity Management | |||||||||||||||
Link: https://www.ifip-summerschool.org/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
Call for submissions
The Summer School takes a holistic approach to society and technology and supports interdisciplinary exchange through keynote and plenary lectures, tutorials, workshops, and research paper presentations. In particular, participants’ contributions that combine any of the following approaches are welcome: technical, legal, regulatory, socioeconomic, social or societal, political, ethical, anthropological, philosophical, historical, psychological, or media & communication studies perspectives. The interdisciplinary character of the work has long been fundamental to the School. The research paper presentations and the workshops focus on involving students, and on encouraging the publication of high-quality, thorough, research papers by students/young researchers. To this end, the School has a three-phase review process for submitted papers. In the first phase, submissions are short abstracts. Submissions within the scope of the call are selected for presentation at the School. For accepted submissions, the full papers of up to 16 pages in length in Springer LNCS format are to be submitted before the Summer School takes place and they appear in the (unreviewed) pre-proceedings. In a second review phase, the full papers are reviewed soon after the Summer School. The students are invited to resubmit their full papers after they have revised them based on two sets of feedback: the discussions that took place at the Summer School, as well as a formal written review by programme committee members. In the third review phase, after the full papers are resubmitted, they are reviewed again for inclusion in the School’s proceedings, which will be published by Springer. Submissions by senior researchers and participants in European, national, or regional/community research projects are also very welcome and are generally published in a separate section of the book volume. Call for Tutorials and Workshops The School also welcomes contributions in the form of tutorials and workshop proposals from a wide range of disciplines (e.g. computer science, economics, ethics, law, psychology, sociology, political and other social sciences, surveillance studies, media and communication studies, and others). The timelines for submission of these tutorials and workshops are the same as those of the student papers. Topics of interest include but are not limited to: concepts, technologies and applications, design, enforcement mechanisms, effects, attitudes, and user practices. Tutorialsare expected to last one or two hours. Proposals should contain a short summary and state the level and background required for attendees to follow the tutorial. Workshopsare expected to last one or two hours and must generate short papers that recapitulate the outcome and the kinds of discussions raised in the School, for inclusion in the post-proceedings. Proposals should contain a short statement summarising the topic(s) to be discussed and the expected contributions from the audience members, e.g. responding to a questionnaire or conducting a small experiment. Proposers should indicate whether any special equipment is needed for the workshop, such as audiovisual systems or computational equipment and support. Topics of interest include, but are not limited to: General Topics * Privacy-enhancing technologies (PETs) & transparency-enhancing technologies (TETs) * Privacy and identity management (services, technologies, infrastructures, usability aspects, legal and socio-economic aspects) * Privacy and security in citizens’ digital communications, online platforms, e-mail and instant messaging * Privacy protection and in particular confidentiality of communications by both traditional players/incumbents and OTTs * Privacy-by-design, privacy-by-default, value-sensitive design, ethical-by-design, human-rights-by-design, data protection/privacy impact assessments, data protection on the ground * Social accountability * Privacy standards and seals * Digital literacy and data (infrastructure) literacy * Regulatory regimes and instruments More specific topics * Privacy attacks and data breaches: the challenges * Privacy threats, privacy attacks against or using AI, AI and data breaches * Adversarial learning and identity management * AI for profiling and tracking technologies, online anonymity, surveillance, video surveillance * AI’s impact on fundamental rights and legal principles ** protection of personal data, ** right to non-discrimination, ** rule of law, ** presumption of innocence, ** children’s rights. * AI and the fight against cybercrime ** AI, data retention and law enforcement * Corporate and organisational views on AI and privacy and data protection measures ** Challenges facing large corporations, small- and medium-sized enterprises, micro-enterprises and entrepreneurs, and a wide range of categories of professions and occupations in relation to AI applications ** Challenges facing AI in healthcare, finance, heavy industry, or crime prevention and detection ** Public service AI, Public service algorithms, public interest technologies * Designing societally compatible AI ** Effects of AI on discrimination, bias, social profiling, social exclusion, digital divides, communities, societies and cultures ** Public attitudes to and trust regarding the deployment of AI and the impact on security, privacy, and identity ** How people or organisations participate in shaping AI applications * Codes of conduct; Ethical guidelines and charters for AI |
|