[CITASA] Call for papers: WEB SCIENCE CYBERCRIME/CYBERWARFARE WORKSHOP 2014 - 23 June 2014, Indiana University - ACM WebSci14

UW
UIR Web Science - CEMAM
Wed, Mar 5, 2014 2:06 PM

APOLOGIES FOR CROSS POSTINGS

Web Science Cybercrime / Cyberwar 2014 <webscience-cybercrime-workshop.net>

--------------------------------------
CALL FOR PAPERS
--------------------------------------

/Come and share your research at the/

WEB SCIENCE CYBERCRIME/CYBERWARFARE WORKSHOP 2014

/'Research Methodologies for analyzing Cybercrime and Cyberwarfare/**'

http://webscience-cybercrime-workshop.net

June 23rd, 2014

ACM Web Science Conference 2014
Indiana University, Bloomington, IN. USA -- June 23-26 2014


Research Methodologies for analyzing Cybercrime and Cyberwarfare

Since the early days of Web Science, Cybercrime, Cyberwar and Darknet
activities have proven to be great topics for innovative and relevant
research. Criminal activities on the Web reflect deeply the violent
aspects of modern society. Most of the risks of the offline world (aside
from physical harm) are replicated on the Web. What is illegal offline
is illegal online.

The Web enables us to transact and share globally; such activities are
not confined to national borders, and so are not subject to clear
national jurisdiction. Due to the large scale nature of the Web, illegal
activities can be identified in many online human interactions, from
money laundering to illegal surveillance, from drug dealing to the sale
of weapons, from hacking to Cyberwar.  Today, it is also possible to
detect conjunctions between criminal activities online. For example,
within the recent events in Syria, Cyberwarfare was conducted by an
electronic army which is mainly composed of sub-networks of criminal
hackers, organized crime groups and mercenaries, using crypto-currencies
to obfuscate their funding sources.

A recent paper in the printed edition of The Economist claimed that 'big
numbers and online crime go together, but few cybercrime surveys cite
the methodology they used'. This detracts from the scientific method,
reducing validity, reliability and repeatability of research.  In the
UK, Cybercrime has been recognized as a Tier 1 Threat, making it more
important than ever to ensure that research into this area is thorough
and accurate. However, given the diverse and transformative nature of
cybercrime, quantifying such behavior can be truly challenging. Previous
research into social structures of groups engaged in Cybercrime is
suggesting that qualitative analysis might be more efficient than a data
oriented quantitative approach.

The motivation behind this workshop is to gather together researchers
from different disciplines and ask them to share and evaluate their
methodologies. How do we measure the impact of Cybercrime? How do we
identify Cyberattacks? What data regarding an attack needs to be
collected, and how should that be done? What methods are relevant to
detect influence or efficiency of people and technologies who work hard
to avoid detection?

Here, it is important to mention that the workshop is not intended to
focus on types of Cybercrime or Cybersecurity technologies. The Web
Science researcher is interested in understanding the impact of the Web
on society, and in observing how humans from around the World, in
various contexts, use the Web to produce transformations on a large
scale. This workshop will not be about fighting Cybercrime or fraudulent
activities online, but about how the Web Science researcher should
proceed, with an interdisciplinary approach, to identify, to understand,
to measure and to reflect the reality of Cybercrime. What do we know for
certain about Cybercrime & Cyberwarfare? Are we working towards
designing methodologies that will help us gain a better understanding of
the true situation?


Useful information:

This workshop will allow participants to present research experiences,
good practices and ideas for analyzing Cybercrime and Cyberwarfare on
the Web.

Papers will be peer reviewed by a select program committee.

Research papers are to be kept short, limited in length to 2 pages (in
ACM template
http://www.acm.org/sigs/publications/proceedings-templates) and can be
position papers or primary studies presenting methods used to study
Cybercrime and Cyberwarfare.

At least one author of each paper is expected to register for the
workshop and attend to present the paper.

Accepted proposal and papers will be given a 15-minute slot of which no
more than 10 minutes will be used for presentation, the rest of the time
will be available for questions and discussion.

Presentation material and research papers will be made available online
on the Web Science Cybercrime / Cyberwar Workshop's website
http://webscience-cybercrime-workshop.netafter the workshop.

/We are expecting to receive up to 30 paper submissions, and plan to
accept up to 8 papers./

-The submission deadline is April 20th, 2014

-Notification of acceptance is May 20th, 2014


The Call for Papers

Researchers wishing to present at the workshop should submit short
research papers presenting finalized or ongoing research activities on
the following topics:

-Cybercrime

-Darknet activities

-Cyberwarfare

-Cyberhacktivism

Research papers are to be kept short, limited in length to 2 pages (in
ACM template
http://www.acm.org/sigs/publications/proceedings-templates) and can be
position papers or primary studies presenting methods used to study
cybercrime and cyberwarfare.


How to Submit?

Submission format:

  • English Language
  • Maximum 2 pages -- 1000 words
  • Word or PDF document

Paper submissions should be formatted according to the official ACM SIG
proceedings template
(http://www.acm.org/sigs/publications/proceedings-templates). Please
make use of the ACM 1998 classification scheme
(http://www.acm.org/about/class/1998/), and submit papers using EasyChair at

https://www.easychair.org/conferences/?conf=wscybercrime2014*

*-------------------------------
Important dates

The submission deadline is April 20th
Notification of acceptance is May 20^th


For more information and contact

http://webscience-cybercrime-workshop.net

Organizing Committee

Stéphane B. BAZAN, Université Saint-Joseph de Beyrouth, Lebanon --
stefan.bazan@usj.edu.lb mailto:stefan.bazan@usj.edu.lb
Dominic HOBSON, University of Southampton, UK -- Dom.Hobson@soton.ac.uk
mailto:Dom.Hobson@soton.ac.uk
Neil MacEWAN, University of Southampton, UK -- nfm2g13@soton.ac.uk
mailto:nfm2g13@soton.ac.uk
Lisa SUGIURA, University of Southampton, UK -- ls3e10@ecs.soton.ac.uk
mailto:ls3e10@ecs.soton.ac.uk
Craig WEBBER, University of Southampton, UK -- C.Webber@soton.ac.uk
mailto:C.Webber@soton.ac.uk

***APOLOGIES FOR CROSS POSTINGS*** Web Science Cybercrime / Cyberwar 2014 <webscience-cybercrime-workshop.net> *-------------------------------------- CALL FOR PAPERS --------------------------------------* /Come and share your research at the/ *WEB SCIENCE CYBERCRIME/CYBERWARFARE WORKSHOP 2014* */'Research Methodologies for analyzing Cybercrime and Cyberwarfare/**'* http://webscience-cybercrime-workshop.net June 23rd, 2014 ACM Web Science Conference 2014 Indiana University, Bloomington, IN. USA -- June 23-26 2014 ------------------------------- *Research Methodologies for analyzing Cybercrime and Cyberwarfare* Since the early days of Web Science, Cybercrime, Cyberwar and Darknet activities have proven to be great topics for innovative and relevant research. Criminal activities on the Web reflect deeply the violent aspects of modern society. Most of the risks of the offline world (aside from physical harm) are replicated on the Web. What is illegal offline is illegal online. The Web enables us to transact and share globally; such activities are not confined to national borders, and so are not subject to clear national jurisdiction. Due to the large scale nature of the Web, illegal activities can be identified in many online human interactions, from money laundering to illegal surveillance, from drug dealing to the sale of weapons, from hacking to Cyberwar. Today, it is also possible to detect conjunctions between criminal activities online. For example, within the recent events in Syria, Cyberwarfare was conducted by an electronic army which is mainly composed of sub-networks of criminal hackers, organized crime groups and mercenaries, using crypto-currencies to obfuscate their funding sources. A recent paper in the printed edition of The Economist claimed that 'big numbers and online crime go together, but few cybercrime surveys cite the methodology they used'. This detracts from the scientific method, reducing validity, reliability and repeatability of research. In the UK, Cybercrime has been recognized as a Tier 1 Threat, making it more important than ever to ensure that research into this area is thorough and accurate. However, given the diverse and transformative nature of cybercrime, quantifying such behavior can be truly challenging. Previous research into social structures of groups engaged in Cybercrime is suggesting that qualitative analysis might be more efficient than a data oriented quantitative approach. The motivation behind this workshop is to gather together researchers from different disciplines and ask them to share and evaluate their methodologies. How do we measure the impact of Cybercrime? How do we identify Cyberattacks? What data regarding an attack needs to be collected, and how should that be done? What methods are relevant to detect influence or efficiency of people and technologies who work hard to avoid detection? Here, it is important to mention that the workshop is not intended to focus on types of Cybercrime or Cybersecurity technologies. The Web Science researcher is interested in understanding the impact of the Web on society, and in observing how humans from around the World, in various contexts, use the Web to produce transformations on a large scale. This workshop will not be about fighting Cybercrime or fraudulent activities online, but about how the Web Science researcher should proceed, with an interdisciplinary approach, to identify, to understand, to measure and to reflect the reality of Cybercrime. What do we know for certain about Cybercrime & Cyberwarfare? Are we working towards designing methodologies that will help us gain a better understanding of the true situation? ------------------------------- *Useful information:* This workshop will allow participants to present research experiences, good practices and ideas for analyzing Cybercrime and Cyberwarfare on the Web. Papers will be peer reviewed by a select program committee. Research papers are to be kept short, limited in length to 2 pages (in ACM template <http://www.acm.org/sigs/publications/proceedings-templates>) and can be position papers or primary studies presenting methods used to study Cybercrime and Cyberwarfare. At least one author of each paper is expected to register for the workshop and attend to present the paper. Accepted proposal and papers will be given a 15-minute slot of which no more than 10 minutes will be used for presentation, the rest of the time will be available for questions and discussion. Presentation material and research papers will be made available online on the Web Science Cybercrime / Cyberwar Workshop's website <http://webscience-cybercrime-workshop.net>after the workshop. /We are expecting to receive up to 30 paper submissions, and plan to accept up to 8 papers./ -The submission deadline is April 20th, 2014 -Notification of acceptance is May 20th, 2014 ------------------------------- *The Call for Papers* Researchers wishing to present at the workshop should submit short research papers presenting finalized or ongoing research activities on the following topics: -Cybercrime -Darknet activities -Cyberwarfare -Cyberhacktivism Research papers are to be kept short, limited in length to 2 pages (in ACM template <http://www.acm.org/sigs/publications/proceedings-templates>) and can be position papers or primary studies presenting methods used to study cybercrime and cyberwarfare. ------------------------------- *How to Submit?* Submission format: * English Language * Maximum 2 pages -- 1000 words * Word or PDF document Paper submissions should be formatted according to the official ACM SIG proceedings template (http://www.acm.org/sigs/publications/proceedings-templates). Please make use of the ACM 1998 classification scheme (http://www.acm.org/about/class/1998/), and submit papers using EasyChair at *https://www.easychair.org/conferences/?conf=wscybercrime2014** *------------------------------- *Important dates* The submission deadline is April 20th Notification of acceptance is May 20^th ------------------------------- *For more information and contact* * * *http://webscience-cybercrime-workshop.net* *Organizing Committee* * * Stéphane B. BAZAN, Université Saint-Joseph de Beyrouth, Lebanon -- stefan.bazan@usj.edu.lb <mailto:stefan.bazan@usj.edu.lb> Dominic HOBSON, University of Southampton, UK -- Dom.Hobson@soton.ac.uk <mailto:Dom.Hobson@soton.ac.uk> Neil MacEWAN, University of Southampton, UK -- nfm2g13@soton.ac.uk <mailto:nfm2g13@soton.ac.uk> Lisa SUGIURA, University of Southampton, UK -- ls3e10@ecs.soton.ac.uk <mailto:ls3e10@ecs.soton.ac.uk> Craig WEBBER, University of Southampton, UK -- C.Webber@soton.ac.uk <mailto:C.Webber@soton.ac.uk>