In recent years the world has been experiencing the exponential growth of mobile social media and networks and their related platforms. The proliferation of innovative mobile network applications and services leads to the emergence of new forms of threats for users, organisations (enterprises, communities, developers, etc.) and society.
Social media have become a large platform for illegal activities such as malware propagation, identity theft, child pornography, etc. It is therefore a major objective to detect abnormal behaviours and to have efficient tools to assess these new forms of threats.
This special issue aims to present the state-of-the-art in risk assessment in mobile social media and networks. Authors are encouraged to submit their research papers on latest trends, threats, vulnerabilities and countermeasures.
Suitable topics include but are not limited to:
Trends in new threat and vulnerability identification
- Survey of risk assessment in mobile social media
- Empirical and comparative studies (microblogging, social networks, online professional networks, etc.)
- Security and privacy issues in mobile social media (digital confidence, privacy policy integration in mobile application)
- Digital identity theft
- Trust and reputation
- Mobile social media use among teens and young adults: trends and vulnerabilities
- Best practices and applications in mobile social media
- Competitive intelligence (brand attack, social media crisis, rumours, etc.)
- Societal and political issues (e-citizenship, e-government, etc.)
- Mobile cloud computing
- Data collection and new tools for data analysis (semantic approaches, data mining, etc.)
- Data pre-processing for data from mobile social media
- Methods and tools for identification and assessment of new forms of threats
- Risk assessment in mobile social network services: URL-shortening, geolocation, etc.
- Convergence mobile phone, social media and network
- Anomaly detection
- Mobile network forensics: indicators, metrics, etc.
- User modelling and pattern identification in mobile social media
- Visualisation tools and techniques for cybercrime analysis
- Mathematical models: fuzzy logic, Bayesian approaches, probabilistic and statistical methods, kernel methods, etc.
First submission deadline: 20 June, 2012
First notification: 20 August, 2012
Revision deadline: 30 September, 2012
Final decision and notification: 20 November, 2012
No comments:
Post a Comment