• IEEE.org
  • IEEE CS Standards
  • Career Center
  • About Us
  • Subscribe to Newsletter

0

IEEE-CS_LogoTM-orange
  • MEMBERSHIP
  • CONFERENCES
  • PUBLICATIONS
  • EDUCATION & CAREER
  • VOLUNTEER
  • ABOUT
  • Join Us
IEEE-CS_LogoTM-orange

0

IEEE Computer Society Logo
Sign up for our newsletter
IEEE COMPUTER SOCIETY
About UsBoard of GovernorsNewslettersPress RoomIEEE Support CenterContact Us
COMPUTING RESOURCES
Career CenterCourses & CertificationsWebinarsPodcastsTech NewsMembership
BUSINESS SOLUTIONS
Corporate PartnershipsConference Sponsorships & ExhibitsAdvertisingRecruitingDigital Library Institutional Subscriptions
DIGITAL LIBRARY
MagazinesJournalsConference ProceedingsVideo LibraryLibrarian Resources
COMMUNITY RESOURCES
GovernanceConference OrganizersAuthorsChaptersCommunities
POLICIES
PrivacyAccessibility StatementIEEE Nondiscrimination PolicyIEEE Ethics ReportingXML Sitemap

Copyright 2026 IEEE - All rights reserved. A public charity, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.

  • Home
  • /Digital Library
  • /Magazines
  • /Sp
  • Home
  • / ...
  • /Magazines
  • /Sp

CLOSED: Call for Papers: Special Issue on Inclusive Privacy and Security

Important Dates

  • Submission Deadline: 14 February 2024

Publication: September/October 2024 


Computer security and privacy issues are prevalent in contemporary society, affecting everyone. However, certain groups may encounter distinct and heightened challenges related to their privacy and security. These groups might face specific barriers when trying to address these concerns, and their unique needs and worries may not be widely recognized outside of their communities. The security and privacy community has only recently begun to systematically study the security and privacy issues of systems in the context of diverse populations. This special issue aims to cover the state-of-art knowledge and to outline future directions of inclusive privacy and security, a vision where privacy and security policies, mechanisms, or tools can support a wide range of users including those who are vulnerable, marginalized, or at-risk. We encourage a broad and unbiased exploration and discussion of various groups and situations.

Topics of Interest 

  • Privacy and security challenges faced by diverse populations, for instance, in the context of existing (e.g., mobile devices) or emerging technologies (e.g., generative AI)
  • Open research questions and/or challenges for inclusive privacy and security
  • Public policy questions regarding inclusive privacy and security
  • Usability evaluations of existing tools and systems with diverse populations
  • Systems or tools designed to support diverse populations about their privacy and security needs
  • Theories to interpret or guide the research and design for inclusive privacy and security
  • Methodologies, frameworks or best practices of studying and designing for diverse populations about their privacy and security needs
  • Approaches or models of supporting diverse populations about their privacy and security needs (e.g., community peer support)
  • Lessons learned in conducting research for inclusive privacy and security
  • Ethical considerations for research on inclusive privacy and security
  • Design principles and/or guidelines for informing the design of tools to support inclusive privacy and security
  • Systemization of research on inclusive privacy and security


Submission Guidelines

For author information and submission criteria for full-papers, please visit the Author Information page. As stated there, full papers should be 4900 – 7200 words in length. Please submit full papers through the ScholarOne system, and be sure to select the special-issue name. Manuscripts should not be published or currently submitted for publication elsewhere. There should be no more than 15 references. Related work should appear in a special separated box. Please submit only full papers intended for peer review, not opinion pieces, to the ScholarOne portal.


Questions?

Contact the guest editors at sp4-24@computer.org.

  • Apu Kapadia, Indiana University Bloomington, USA
  • Yang Wang, University of Illinois at Urbana-Champaign, USA

LATEST NEWS
Inspiring Tomorrow’s Innovators: IEEE CS Juniors TechXperience Kenya 2026
Inspiring Tomorrow’s Innovators: IEEE CS Juniors TechXperience Kenya 2026
Parallel Systems, Leadership, and Research Strategy in Computing: an Interview with Jean-Luc Gaudiot
Parallel Systems, Leadership, and Research Strategy in Computing: an Interview with Jean-Luc Gaudiot
Top HCI Trends in 2026: The Rise of AI Agents and Invisible Interfaces
Top HCI Trends in 2026: The Rise of AI Agents and Invisible Interfaces
From CMDB to Dynamic Digital Twins: Lessons Learned in Building Enterprise Digital Brains
From CMDB to Dynamic Digital Twins: Lessons Learned in Building Enterprise Digital Brains
An Evaluation of Autoencoder Architectures for Fraud Detection in Credit Card Transactions
An Evaluation of Autoencoder Architectures for Fraud Detection in Credit Card Transactions
Read Next

Inspiring Tomorrow’s Innovators: IEEE CS Juniors TechXperience Kenya 2026

Parallel Systems, Leadership, and Research Strategy in Computing: an Interview with Jean-Luc Gaudiot

Top HCI Trends in 2026: The Rise of AI Agents and Invisible Interfaces

From CMDB to Dynamic Digital Twins: Lessons Learned in Building Enterprise Digital Brains

An Evaluation of Autoencoder Architectures for Fraud Detection in Credit Card Transactions

Parallel Systems, Leadership, and Research Strategy in Computing: an Interview with Jean-Luc Gaudiot

Why Your Computer Science Degree Is No Longer Enough in 2026

Episode 2 | Grow Your Career in Hardware Engineering

Get the latest news and technology trends for computing professionals with ComputingEdge
Sign up for our newsletter