• IEEE.org
  • IEEE CS Standards
  • Career Center
  • About Us
  • Subscribe to Newsletter

0

IEEE
CS Logo
  • MEMBERSHIP
  • CONFERENCES
  • PUBLICATIONS
  • EDUCATION & CAREER
  • VOLUNTEER
  • ABOUT
  • Join Us
CS Logo

0

IEEE Computer Society Logo
Sign up for our newsletter
FacebookTwitterLinkedInInstagramYoutube
IEEE COMPUTER SOCIETY
About UsBoard of GovernorsNewslettersPress RoomIEEE Support CenterContact Us
COMPUTING RESOURCES
Career CenterCourses & CertificationsWebinarsPodcastsTech NewsMembership
BUSINESS SOLUTIONS
Corporate PartnershipsConference Sponsorships & ExhibitsAdvertisingRecruitingDigital Library Institutional Subscriptions
DIGITAL LIBRARY
MagazinesJournalsConference ProceedingsVideo LibraryLibrarian Resources
COMMUNITY RESOURCES
GovernanceConference OrganizersAuthorsChaptersCommunities
POLICIES
PrivacyAccessibility StatementIEEE Nondiscrimination PolicyIEEE Ethics ReportingXML Sitemap

Copyright 2025 IEEE - All rights reserved. A public charity, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.

  • Home
  • /Digital Library
  • /Magazines
  • /It
  • Home
  • / ...
  • /Magazines
  • /It

CLOSED Call for Papers - Special Issue on Digital Deception: Cyber Fraud and Online Misinformation

Submission deadline: CLOSED

Publication: March/April 2020

IT Professional plans a March/April 2020 special issue on Digital Deception: Cyber Fraud and Online Misinformation. Cyber fraud and other types of crime (especially financial) have been rapidly converging. Phishing, user account takeovers, and other computing-related threats have made it easy for criminals to deceive people for financial and other gain. At the same time, social media has become a dominant, direct, and highly effective form of news generation and sharing at a global scale, in a manner that influences and enhances, but also challenges and often antagonizes, traditional media corporations. As news passes to users, the news passes through the hands of actors whose credibility and goals are unknown. Even less is known about the credibility and quality of the information cascades they trigger.

The guest editors of this special issue aim to bring together the latest advances, experiences, findings, and reports on the diverse challenges in digital deception, as manifested in cyber fraud and fake news, as well as ways and practices in combating such efforts to digitally deceive users. We invite novel, interesting, and diverse contributions relating to cyber fraud and disinformation online, such as:

  • Identity theft
  • Malware, fraudulent material, and websites used in social engineering
  • Stolen online passwords
  • Stolen health information
  • Stolen PII
  • Cyber fraud rings
  • Cyber fraud metrics and models
  • Digital forensics and cyber fraud
  • AI-assisted digital deception
  • Epidemiology of disinformation in social media
  • Technology-assisted content verification in social media

All contributions must have specific emphasis on perspectives of interest to the IT Professional readership, and contributors are urged to read the magazine’s aims and scopes prior to submitting a manuscript. Only submissions that describe previously unpublished, original, state-of-the-art research and that are not currently under review by a conference or journal will be considered. Extended versions of conference papers must be at least 30 percent different from the original conference works. Feature articles should be no longer than 4,200 words and have no more than 20 references (with tables and figures counting as 300 words each). For author guidelines, see our peer review page. All manuscripts must be submitted to ScholarOne Manuscripts by the deadline in order to be considered for publication. Submissions are subject to peer review on both technical merit and relevance to IT Pro’s readership. Articles should be understandable by a broad audience of computer science and engineering professionals, avoiding a focus on theory, mathematics, jargon, and abstract concepts. Figures and tables should be placed in the appropriate location within the template, ideally in files that are 300 dpi or higher at the dimensions they are used in the document template.

Questions?

Please direct any correspondence before submission to the guest editors at it2-2020@computer.org.

Guest editors: George Loukas (Greenwich University), Charalampos Patrikakis (University of West Attica), and Linda Wilbanks (CISO Federal Government)

LATEST NEWS
From Isolation to Innovation: Establishing a Computer Training Center to Empower Hinterland Communities
From Isolation to Innovation: Establishing a Computer Training Center to Empower Hinterland Communities
IEEE Uganda Section: Tackling Climate Change and Food Security Through AI and IoT
IEEE Uganda Section: Tackling Climate Change and Food Security Through AI and IoT
Blockchain Service Capability Evaluation (IEEE Std 3230.03-2025)
Blockchain Service Capability Evaluation (IEEE Std 3230.03-2025)
Autonomous Observability: AI Agents That Debug AI
Autonomous Observability: AI Agents That Debug AI
Disaggregating LLM Infrastructure: Solving the Hidden Bottleneck in AI Inference
Disaggregating LLM Infrastructure: Solving the Hidden Bottleneck in AI Inference
Read Next

From Isolation to Innovation: Establishing a Computer Training Center to Empower Hinterland Communities

IEEE Uganda Section: Tackling Climate Change and Food Security Through AI and IoT

Blockchain Service Capability Evaluation (IEEE Std 3230.03-2025)

Autonomous Observability: AI Agents That Debug AI

Disaggregating LLM Infrastructure: Solving the Hidden Bottleneck in AI Inference

Copilot Ergonomics: UI Patterns that Reduce Cognitive Load

The Myth of AI Neutrality in Search Algorithms

Gen AI and LLMs: Rebuilding Trust in a Synthetic Information Age

Get the latest news and technology trends for computing professionals with ComputingEdge
Sign up for our newsletter