• IEEE.org
  • IEEE CS Standards
  • Career Center
  • About Us
  • Subscribe to Newsletter

0

IEEE
CS Logo
  • MEMBERSHIP
  • CONFERENCES
  • PUBLICATIONS
  • EDUCATION & CAREER
  • VOLUNTEER
  • ABOUT
  • Join Us
CS Logo

0

IEEE Computer Society Logo
Sign up for our newsletter
FacebookTwitterLinkedInInstagramYoutube
IEEE COMPUTER SOCIETY
About UsBoard of GovernorsNewslettersPress RoomIEEE Support CenterContact Us
COMPUTING RESOURCES
Career CenterCourses & CertificationsWebinarsPodcastsTech NewsMembership
BUSINESS SOLUTIONS
Corporate PartnershipsConference Sponsorships & ExhibitsAdvertisingRecruitingDigital Library Institutional Subscriptions
DIGITAL LIBRARY
MagazinesJournalsConference ProceedingsVideo LibraryLibrarian Resources
COMMUNITY RESOURCES
GovernanceConference OrganizersAuthorsChaptersCommunities
POLICIES
PrivacyAccessibility StatementIEEE Nondiscrimination PolicyIEEE Ethics ReportingXML Sitemap

Copyright 2025 IEEE - All rights reserved. A public charity, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.

  • Home
  • /Digital Library
  • /Magazines
  • /It
  • Home
  • / ...
  • /Magazines
  • /It

CLOSED Call for Papers - Special Issue on Digital Deception: Cyber Fraud and Online Misinformation

Submission deadline: CLOSED

Publication: March/April 2020

IT Professional plans a March/April 2020 special issue on Digital Deception: Cyber Fraud and Online Misinformation. Cyber fraud and other types of crime (especially financial) have been rapidly converging. Phishing, user account takeovers, and other computing-related threats have made it easy for criminals to deceive people for financial and other gain. At the same time, social media has become a dominant, direct, and highly effective form of news generation and sharing at a global scale, in a manner that influences and enhances, but also challenges and often antagonizes, traditional media corporations. As news passes to users, the news passes through the hands of actors whose credibility and goals are unknown. Even less is known about the credibility and quality of the information cascades they trigger.

The guest editors of this special issue aim to bring together the latest advances, experiences, findings, and reports on the diverse challenges in digital deception, as manifested in cyber fraud and fake news, as well as ways and practices in combating such efforts to digitally deceive users. We invite novel, interesting, and diverse contributions relating to cyber fraud and disinformation online, such as:

  • Identity theft
  • Malware, fraudulent material, and websites used in social engineering
  • Stolen online passwords
  • Stolen health information
  • Stolen PII
  • Cyber fraud rings
  • Cyber fraud metrics and models
  • Digital forensics and cyber fraud
  • AI-assisted digital deception
  • Epidemiology of disinformation in social media
  • Technology-assisted content verification in social media

All contributions must have specific emphasis on perspectives of interest to the IT Professional readership, and contributors are urged to read the magazine’s aims and scopes prior to submitting a manuscript. Only submissions that describe previously unpublished, original, state-of-the-art research and that are not currently under review by a conference or journal will be considered. Extended versions of conference papers must be at least 30 percent different from the original conference works. Feature articles should be no longer than 4,200 words and have no more than 20 references (with tables and figures counting as 300 words each). For author guidelines, see our peer review page. All manuscripts must be submitted to ScholarOne Manuscripts by the deadline in order to be considered for publication. Submissions are subject to peer review on both technical merit and relevance to IT Pro’s readership. Articles should be understandable by a broad audience of computer science and engineering professionals, avoiding a focus on theory, mathematics, jargon, and abstract concepts. Figures and tables should be placed in the appropriate location within the template, ideally in files that are 300 dpi or higher at the dimensions they are used in the document template.

Questions?

Please direct any correspondence before submission to the guest editors at it2-2020@computer.org.

Guest editors: George Loukas (Greenwich University), Charalampos Patrikakis (University of West Attica), and Linda Wilbanks (CISO Federal Government)

LATEST NEWS
Quantum Insider Session Series: Choosing the Right Time and Steps for Start Working with Quantum Tech
Quantum Insider Session Series: Choosing the Right Time and Steps for Start Working with Quantum Tech
Igniting Young Minds: The Impact of IEEE CS Juniors STEMpire on Karnataka, Indian Students
Igniting Young Minds: The Impact of IEEE CS Juniors STEMpire on Karnataka, Indian Students
Monitoring LLM Safety with BERTopic: Clustering Failure Modes for Actionable Insights
Monitoring LLM Safety with BERTopic: Clustering Failure Modes for Actionable Insights
CS Juniors: ChiTech Discovery Days
CS Juniors: ChiTech Discovery Days
CV Template
CV Template
Read Next

Quantum Insider Session Series: Choosing the Right Time and Steps for Start Working with Quantum Tech

Igniting Young Minds: The Impact of IEEE CS Juniors STEMpire on Karnataka, Indian Students

Monitoring LLM Safety with BERTopic: Clustering Failure Modes for Actionable Insights

CS Juniors: ChiTech Discovery Days

CV Template

A History of Rendering the Future with Computer Graphics & Applications

AI Assisted Identity Threat Detection and Zero Trust Access Enforcement

Resume Template

Get the latest news and technology trends for computing professionals with ComputingEdge
Sign up for our newsletter