• IEEE.org
  • IEEE CS Standards
  • Career Center
  • About Us
  • Subscribe to Newsletter

0

IEEE
CS Logo
  • MEMBERSHIP
  • CONFERENCES
  • PUBLICATIONS
  • EDUCATION & CAREER
  • VOLUNTEER
  • ABOUT
  • Join Us
CS Logo

0

IEEE Computer Society Logo
Sign up for our newsletter
IEEE COMPUTER SOCIETY
About UsBoard of GovernorsNewslettersPress RoomIEEE Support CenterContact Us
COMPUTING RESOURCES
Career CenterCourses & CertificationsWebinarsPodcastsTech NewsMembership
BUSINESS SOLUTIONS
Corporate PartnershipsConference Sponsorships & ExhibitsAdvertisingRecruitingDigital Library Institutional Subscriptions
DIGITAL LIBRARY
MagazinesJournalsConference ProceedingsVideo LibraryLibrarian Resources
COMMUNITY RESOURCES
GovernanceConference OrganizersAuthorsChaptersCommunities
POLICIES
PrivacyAccessibility StatementIEEE Nondiscrimination PolicyIEEE Ethics ReportingXML Sitemap

Copyright 2025 IEEE - All rights reserved. A public charity, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.

  • Home
  • /Digital Library
  • /Magazines
  • /Sp
  • Home
  • / ...
  • /Magazines
  • /Sp

CLOSED: Call for Papers: Special Issue on Inclusive Privacy and Security

Important Dates

  • Submission Deadline: 14 February 2024

Publication: September/October 2024 


Computer security and privacy issues are prevalent in contemporary society, affecting everyone. However, certain groups may encounter distinct and heightened challenges related to their privacy and security. These groups might face specific barriers when trying to address these concerns, and their unique needs and worries may not be widely recognized outside of their communities. The security and privacy community has only recently begun to systematically study the security and privacy issues of systems in the context of diverse populations. This special issue aims to cover the state-of-art knowledge and to outline future directions of inclusive privacy and security, a vision where privacy and security policies, mechanisms, or tools can support a wide range of users including those who are vulnerable, marginalized, or at-risk. We encourage a broad and unbiased exploration and discussion of various groups and situations.

Topics of Interest 

  • Privacy and security challenges faced by diverse populations, for instance, in the context of existing (e.g., mobile devices) or emerging technologies (e.g., generative AI)
  • Open research questions and/or challenges for inclusive privacy and security
  • Public policy questions regarding inclusive privacy and security
  • Usability evaluations of existing tools and systems with diverse populations
  • Systems or tools designed to support diverse populations about their privacy and security needs
  • Theories to interpret or guide the research and design for inclusive privacy and security
  • Methodologies, frameworks or best practices of studying and designing for diverse populations about their privacy and security needs
  • Approaches or models of supporting diverse populations about their privacy and security needs (e.g., community peer support)
  • Lessons learned in conducting research for inclusive privacy and security
  • Ethical considerations for research on inclusive privacy and security
  • Design principles and/or guidelines for informing the design of tools to support inclusive privacy and security
  • Systemization of research on inclusive privacy and security


Submission Guidelines

For author information and submission criteria for full-papers, please visit the Author Information page. As stated there, full papers should be 4900 – 7200 words in length. Please submit full papers through the ScholarOne system, and be sure to select the special-issue name. Manuscripts should not be published or currently submitted for publication elsewhere. There should be no more than 15 references. Related work should appear in a special separated box. Please submit only full papers intended for peer review, not opinion pieces, to the ScholarOne portal.


Questions?

Contact the guest editors at sp4-24@computer.org.

  • Apu Kapadia, Indiana University Bloomington, USA
  • Yang Wang, University of Illinois at Urbana-Champaign, USA

LATEST NEWS
From Isolation to Innovation: Establishing a Computer Training Center to Empower Hinterland Communities
From Isolation to Innovation: Establishing a Computer Training Center to Empower Hinterland Communities
IEEE Uganda Section: Tackling Climate Change and Food Security Through AI and IoT
IEEE Uganda Section: Tackling Climate Change and Food Security Through AI and IoT
Blockchain Service Capability Evaluation (IEEE Std 3230.03-2025)
Blockchain Service Capability Evaluation (IEEE Std 3230.03-2025)
Autonomous Observability: AI Agents That Debug AI
Autonomous Observability: AI Agents That Debug AI
Disaggregating LLM Infrastructure: Solving the Hidden Bottleneck in AI Inference
Disaggregating LLM Infrastructure: Solving the Hidden Bottleneck in AI Inference
Read Next

From Isolation to Innovation: Establishing a Computer Training Center to Empower Hinterland Communities

IEEE Uganda Section: Tackling Climate Change and Food Security Through AI and IoT

Blockchain Service Capability Evaluation (IEEE Std 3230.03-2025)

Autonomous Observability: AI Agents That Debug AI

Disaggregating LLM Infrastructure: Solving the Hidden Bottleneck in AI Inference

Copilot Ergonomics: UI Patterns that Reduce Cognitive Load

The Myth of AI Neutrality in Search Algorithms

Gen AI and LLMs: Rebuilding Trust in a Synthetic Information Age

FacebookTwitterLinkedInInstagramYoutube
Get the latest news and technology trends for computing professionals with ComputingEdge
Sign up for our newsletter