Call for submissions
The Summer School takes a holistic approach to society and technology and supports interdisciplinary exchange through keynote and plenary lectures, tutorials, workshops, and research paper presentations. In particular, participants’ contributions that combine technical, legal, regulatory, socio-economic, social or societal, political, ethical, anthropological, philosophical, historical, or psychological perspectives are welcome. The interdisciplinary character of the work is fundamental to the School.
The research paper presentations and the workshops focus on involving students, and on encouraging the publication of high-quality, thorough, research papers by students/young researchers. To this end, the School has a three-phase review process for submitted papers. In the first phase, submissions are short abstracts . Submissions within the scope of the call are selected for presentation at the School. For accepted submissions, the full papers of up to 16 pages in length in Springer LNCS format are to be submitted before the Summer School takes place and they appear in the (unreviewed) pre-proceedings. In a second review phase, the full papers are reviewed soon after the Summer School. The students are invited to resubmit their full papers, after they have revised them based on two sets of feedback: the discussions that took place at the Summer School, as well as a formal written review by programme committee members. In the third review phase, after the full papers are resubmitted, they are reviewed again for inclusion in the School’s proceedings, which will be published by Springer.
Submissions by senior researchers and participants in European, national, or regional/community research projects are also very welcome, and are generally published in a separate section of the book volume.
Call for Tutorials and Workshops
The School also welcomes contributions in the form of tutorials and workshop proposals from all disciplines (e.g. computer science, economics, ethics, law, psychology, sociology, history, political and other social sciences, surveillance studies, business and public management). The timelines for submission of these tutorials and workshops are the same as those of the student papers. Topics of interest include, but are not limited to: concepts, technologies and applications, design, enforcement mechanisms, effects, attitudes, and user practices.
Tutorials are expected to last one or two hours. Proposals should contain a short summary and state the level and background required for attendees to follow the tutorial.
Workshops are expected to last one or two hours and must generate short papers that recapitulate the outcome and the kinds of discussions raised in the School, for inclusion in the post-proceedings. Proposals should contain a short statement summarising the topic(s) to be discussed and the expected contributions from the audience members e.g. responding to a questionnaire or conducting a small experiment. Proposers should indicate whether any special equipment is needed for the workshop, such as audiovisual systems or computational equipment and support.
Topics of interest include, but are not limited to:
Anonymity, pseudonymity, identity, (informed) consent, digital rights, net neutrality, trust, reputation
Technologies and applications
- Privacy aspects of big data analytics, machine learning, biometrics, cloud computing, social networks, blockchain based applications, social computing, crowdsourcing and social movements
- Health informatics (mHealth, eHealth), social care, community care, integrated care, social robotics, opportunities as well as threats to individual and community privacy, personal autonomy and dignity
- Profiling and tracking technologies, online anonymity, surveillance, video surveillance
- Sensor networks, Internet of Things, mobile devices
- Privacy and identity management (services, technologies, infrastructures, usability aspects, legal and socio-economic aspects), eIDs
- Privacy and security in digital citizen communications, e-mail and instant messaging
- Privacy protection and in particular confidentiality of communications by both traditional players/incumbents and OTTs
- Privacy-enhancing technologies (PETs) and transparency-enhancing technologies (TETs)
- Digital participation, participatory design, ethically-informed design, co-creation and co-collaboration, ecosystems, social actors’ engagement in design, stakeholder involvement
- Privacy-by-design, privacy-by-default, value-sensitive design, privacy impact assessment
- Usable privacy
Enforcement and regulation
- Social accountability
- Data protection principles and rights (incl. the right to an explanation)
- Privacy standards and seals
- Security of network and information systems
- Cybercrime and cybersecurity
- Data breaches, data retention and law enforcement
- Regulatory regimes and instruments
- Effects of legislative or regulatory initiatives on privacy or identity
- Effects of technology on discrimination, social profiling, social exclusion, digital divides, communities, societies and cultures
Attitudes and capabilities
- Public attitudes to international, national, local or organisational security, privacy, and identity
- Corporate and organisational views on privacy and data protection measures
- Challenges facing large corporations, small- and medium-sized enterprises, micro-enterprises and entrepreneurs, and a wide range of categories of professions and occupations
- How people or organisations use new technologies and help to shape them.
- Digital literacy and data literacy
How to submit
Extended abstracts (2-4 pages) must be made in PDF format, in the Springer LNCS template (https://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0), and using the Easychair System: https://easychair.org/conferences/?conf=ifipsc2018.