• IEEE.org
  • IEEE CS Standards
  • Career Center
  • About Us
  • Subscribe to Newsletter

0

IEEE
CS Logo
  • MEMBERSHIP
  • CONFERENCES
  • PUBLICATIONS
  • EDUCATION & CAREER
  • VOLUNTEER
  • ABOUT
  • Join Us
CS Logo

0

IEEE Computer Society Logo
Sign up for our newsletter
FacebookTwitterLinkedInInstagramYoutube
IEEE COMPUTER SOCIETY
About UsBoard of GovernorsNewslettersPress RoomIEEE Support CenterContact Us
COMPUTING RESOURCES
Career CenterCourses & CertificationsWebinarsPodcastsTech NewsMembership
BUSINESS SOLUTIONS
Corporate PartnershipsConference Sponsorships & ExhibitsAdvertisingRecruitingDigital Library Institutional Subscriptions
DIGITAL LIBRARY
MagazinesJournalsConference ProceedingsVideo LibraryLibrarian Resources
COMMUNITY RESOURCES
GovernanceConference OrganizersAuthorsChaptersCommunities
POLICIES
PrivacyAccessibility StatementIEEE Nondiscrimination PolicyIEEE Ethics ReportingXML Sitemap

Copyright 2025 IEEE - All rights reserved. A public charity, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.

  • Home
  • /Digital Library
  • /Magazines
  • /Sp
  • Home
  • / ...
  • /Magazines
  • /Sp

CLOSED: Call for Papers: Special Issue on Inclusive Privacy and Security

Important Dates

  • Submission Deadline: 14 February 2024
Publication: September/October 2024 
Computer security and privacy issues are prevalent in contemporary society, affecting everyone. However, certain groups may encounter distinct and heightened challenges related to their privacy and security. These groups might face specific barriers when trying to address these concerns, and their unique needs and worries may not be widely recognized outside of their communities. The security and privacy community has only recently begun to systematically study the security and privacy issues of systems in the context of diverse populations. This special issue aims to cover the state-of-art knowledge and to outline future directions of inclusive privacy and security, a vision where privacy and security policies, mechanisms, or tools can support a wide range of users including those who are vulnerable, marginalized, or at-risk. We encourage a broad and unbiased exploration and discussion of various groups and situations.

Topics of Interest 

  • Privacy and security challenges faced by diverse populations, for instance, in the context of existing (e.g., mobile devices) or emerging technologies (e.g., generative AI)
  • Open research questions and/or challenges for inclusive privacy and security
  • Public policy questions regarding inclusive privacy and security
  • Usability evaluations of existing tools and systems with diverse populations
  • Systems or tools designed to support diverse populations about their privacy and security needs
  • Theories to interpret or guide the research and design for inclusive privacy and security
  • Methodologies, frameworks or best practices of studying and designing for diverse populations about their privacy and security needs
  • Approaches or models of supporting diverse populations about their privacy and security needs (e.g., community peer support)
  • Lessons learned in conducting research for inclusive privacy and security
  • Ethical considerations for research on inclusive privacy and security
  • Design principles and/or guidelines for informing the design of tools to support inclusive privacy and security
  • Systemization of research on inclusive privacy and security

Submission Guidelines

For author information and submission criteria for full-papers, please visit the Author Information page. As stated there, full papers should be 4900 – 7200 words in length. Please submit full papers through the ScholarOne system, and be sure to select the special-issue name. Manuscripts should not be published or currently submitted for publication elsewhere. There should be no more than 15 references. Related work should appear in a special separated box. Please submit only full papers intended for peer review, not opinion pieces, to the ScholarOne portal.

Questions?

Contact the guest editors at sp4-24@computer.org.
  • Apu Kapadia, Indiana University Bloomington, USA
  • Yang Wang, University of Illinois at Urbana-Champaign, USA
LATEST NEWS
Securing the Software Supply Chain: Challenges, Tools, and Regulatory Forces
Securing the Software Supply Chain: Challenges, Tools, and Regulatory Forces
Computing’s Top 30: Tejas Padliya
Computing’s Top 30: Tejas Padliya
Reimagining Infrastructure and Systems for Scientific Discovery and AI Collaboration
Reimagining Infrastructure and Systems for Scientific Discovery and AI Collaboration
IEEE 2881: Learning Metadata Terms (LMT) Empowers Learning in the AI Age
IEEE 2881: Learning Metadata Terms (LMT) Empowers Learning in the AI Age
Platform Engineering: Bridging the Developer Experience Gap in Enterprise Software Development
Platform Engineering: Bridging the Developer Experience Gap in Enterprise Software Development
Read Next

Securing the Software Supply Chain: Challenges, Tools, and Regulatory Forces

Computing’s Top 30: Tejas Padliya

Reimagining Infrastructure and Systems for Scientific Discovery and AI Collaboration

IEEE 2881: Learning Metadata Terms (LMT) Empowers Learning in the AI Age

Platform Engineering: Bridging the Developer Experience Gap in Enterprise Software Development

IEEE Std 3158.1-2025 — Verifying Trust in Data Sharing: Standard for Testing and Performance of a Trusted Data Matrix System

IEEE Std 3220.01-2025: Standard for Consensus Framework for Blockchain System

Mapping the $85B AI Processor Landscape: Global Startup Surge, Market Consolidation Coming?

Get the latest news and technology trends for computing professionals with ComputingEdge
Sign up for our newsletter