Submission deadline: CLOSED
Publication: March/April 2020
IT Professional plans a March/April 2020 special issue on Digital Deception: Cyber Fraud and Online Misinformation. Cyber fraud and other types of crime (especially financial) have been rapidly converging. Phishing, user account takeovers, and other computing-related threats have made it easy for criminals to deceive people for financial and other gain. At the same time, social media has become a dominant, direct, and highly effective form of news generation and sharing at a global scale, in a manner that influences and enhances, but also challenges and often antagonizes, traditional media corporations. As news passes to users, the news passes through the hands of actors whose credibility and goals are unknown. Even less is known about the credibility and quality of the information cascades they trigger.
The guest editors of this special issue aim to bring together the latest advances, experiences, findings, and reports on the diverse challenges in digital deception, as manifested in cyber fraud and fake news, as well as ways and practices in combating such efforts to digitally deceive users. We invite novel, interesting, and diverse contributions relating to cyber fraud and disinformation online, such as:
- Identity theft
- Malware, fraudulent material, and websites used in social engineering
- Stolen online passwords
- Stolen health information
- Stolen PII
- Cyber fraud rings
- Cyber fraud metrics and models
- Digital forensics and cyber fraud
- AI-assisted digital deception
- Epidemiology of disinformation in social media
- Technology-assisted content verification in social media
All contributions must have specific emphasis on perspectives of interest to the IT Professional readership, and contributors are urged to read the magazine’s aims and scopes prior to submitting a manuscript. Only submissions that describe previously unpublished, original, state-of-the-art research and that are not currently under review by a conference or journal will be considered. Extended versions of conference papers must be at least 30 percent different from the original conference works. Feature articles should be no longer than 4,200 words and have no more than 20 references (with tables and figures counting as 300 words each). For author guidelines, see our peer review page. All manuscripts must be submitted to ScholarOne Manuscripts by the deadline in order to be considered for publication. Submissions are subject to peer review on both technical merit and relevance to IT Pro’s readership. Articles should be understandable by a broad audience of computer science and engineering professionals, avoiding a focus on theory, mathematics, jargon, and abstract concepts. Figures and tables should be placed in the appropriate location within the template, ideally in files that are 300 dpi or higher at the dimensions they are used in the document template.
Please direct any correspondence before submission to the guest editors at firstname.lastname@example.org.
Guest editors: George Loukas (Greenwich University), Charalampos Patrikakis (University of West Attica), and Linda Wilbanks (CISO Federal Government)