Social Media 2017

June 11-12, 2017, London, UK






Call for Papers

IEEE is the Technical Co-Sponsor (TCS) of the International Conference on Social Media, Wearable and Web Analytics (Social Media 2017), an international refereed conference dedicated to the advancement of social media, security of social media and consequential impacts and risks due to compromise or security breaches. It covers economic importance of social media, the emergence of wearable, wearable for fitness, e-health and life style improvements, and the use of web analytics for social media enhancements, business intelligence and business empowerment.

The aim of the Social Media 2017 is to encourage participation and promotion of collaborative scientific, industrial and academic inter-workings among individual researchers, practitioners, members of existing associations, academia, standardisation bodies, and including government departments and agencies. The purpose is to build bridges between academia and industry, and to encourage interplay of different cultures




Submission Deadline

 

Due to numerous requests, the deadline for all paper submissions, that is, both full papers and extended abstracts for Poster, WIP, PoC, Research Idea and PhD Seminar presentations has now been extended to 28th February 2017.

All Industry track, Work in Progress track, Research Ideas track and PhD Seminar track will be published in the conference proceedings. Interested participants, please submit your proposal using the online submission system hosted by Easychair Conference Portal.





Topics of Interest


    • Advances in Social Media
    • Social Media theoretical underpinnings
    • Security in Social Media
    • Trust and privacy in Social Media
    • Social Medial Big Data Analysis
    • Organisational Knowledge Management
    • Branding and E-Marketing
    • Realtime Communications and Instant Messaging
    • Social Network Analysis
    • Social Media Technologies
    • Convergence
    • Learning, Communities & Skills development
    • Cultural Impacts
    • Digital Contents
    • Research
    • Digital Economics
    • Measurement and analysis of social and crowdsourcing systems
    • Social and Digital Inclusion
    • Digital Trust and Reputation
    • Bridging Geographical and Location Gaps
    • Policy, Legal, Legislation & Compliance
    • Standardisation
    • Advances in Wearable
    • Wearable in e-Health
    • Wearable in Fitness
    • Wearable and Bring You Own Devices (BYOD) in the Enterprise
    • Security, Trust and Privacy in Wearable
    • Wearable Technologies
    • Economic Importance of Wearable
    • Life Style Impacts
    • Interaction, Interface and Customisation
    • Design Requirements and Requirements Analysis
    • Aesthetics and Design
    • Monitoring
    • Advances in Web Analytics
    • Web Analytics for Law Enforcement and Security Monitoring
    • Legal Issues of Web Analytics
    • Law, Legislation and Compliance
    • Security, Trust, Privacy
    • Web Analytics for Business Intelligence
    • Web Analytics and Web Surveillance
    • Web Analytics and Geolocation
    • Content-Aware analytics
    • Digital Content
    • Customisation, e-Marketing and Tailoring
    • Customer-centric Analysis
    • Social Network Analysis
    • Cyber Intelligence
    • Business Intelligence
    • Business Analytics & Intelligence
    • Situational Awareness
    • Principles, Theory & Research
    • Endpoint Monitoring, User and Entity Analysis
    • Application and Session Monitoring
    • Risk Assessment and Management
    • Data Mining and Machine Learning in Social Systems
    • Web Analytics Technologies & Tools

Speakers

Dr. Andrew LenaghanOwner

Dr. Andrew LenaghanOwner

The Oxford University CERT (OxCERT), Oxford, UK
Dr. Eckhard Pfluegel Science

Dr. Eckhard Pfluegel Science

Science, Engineering & Computing, Kingston University, London, UK
Dr Mahmoud Hashem Eiza

Dr Mahmoud Hashem Eiza

School of Physical Sciences and Computing, University of Central Lancashire, Preston, UK
Professor Kevin Curran

Professor Kevin Curran

Computer Science, Ulster University, Northern Ireland, UK
Dr. Cyril Onwubiko

Dr. Cyril Onwubiko

Cyber Security Intelligence, Research Series Limited, London, UK
Dr. Janne Hagen

Dr. Janne Hagen

Norwegian Water Resources and Energy Directorate (NVE), Norway

Important Dates


    Industry (Proof of Concept / Pilot) Submission –  January 14, 2017 extended to February 28, 2017

    Extended Abstract (Work in Progress) – January 14, 2017 extended to February 28, 2017

    PhD Seminar Submissions – January 14, 2017 extended to February 28, 2017

    Research Ideas – January 14, 2017 extended to February 28, 2017

    Poster/Demo Submissions – January 14, 2017 extended to February 28, 2017

    Special Track Submissions – January 14, 2017 extended to February 28, 2017

    Workshops and Tutorials Submission – January 14, 2017 extended to February 28, 2017

    Full Paper Submissions – January 14, 2017 extended to February 28, 2017

    Notification of Full Paper/Abstract / Special Track Acceptance/Rejection – March 24, 2017 extended to March 31, 2017

    Camera Ready Paper Due – April 8, 2017 extended to April 14, 2017

    Participants Registration – March 20 – May 25, 2017

    Conference Date – 19 & 20 June 2017


Location


London
United Kingdom



Programme Committee


    • Cyril Onwubiko – Centre for Multidisciplinary Research, Innovation and Collaboration, UK
    • Thomas Owens – Brunel University, London, UK
    • Anthony Davies – IEEE
    • Stefanos Gritzalis – University of the Aegean, Greece
    • Nick Savage – University of Portsmouth, UK
    • Jens Myrup Pedersen – University of Aalborg, Denmark
    • Frederick Wamala – Security Architecture & Cyber Security, IBM, UK
    • Subrata Acharya – Towson University, USA
    • Genshe Chen – Fusion, USA
    • Daniel Zeng – University of Arizona, USA
    • Gareth Niblett – BCS Information Security Specialist Group (ISSG), UK
    • Xavier Bellekens – University of Abertay, Scotland, UK
    • Cyril Onwubiko – Centre for Multidisciplinary Research, Innovation and Collaboration, UK
    • Sarah Alhumoud – MIT Computer Science and Artificial Intelligence Lab, MIT, USA
    • Harshavardhan Achrekar – University of Massachusetts Lowell, USA
    • Alexandros Kapravelos  – Computer Security Group, University of California Santa Barbara, USA
    • Uwe Glässer  – School of Computing Science, Simon Fraser University, Canada
    • Gerardo I. Simari – Universidad Nacional del Sur in Bahia Blanca and CONICET, Argentina
    • Yi Luo  – University of Arizona, Tucson, USA
    • Thomas Owens – Brunel University, London, UK
    • Jens Myrup Pedersen – University of Aalborg, Denmark
    • Reza Tadayoni – University of Aalborg, Denmark
    • Andrew Lenaghan – Oxford University, UK
    • Gareth Niblett – BCS Information Security Specialist Group (ISSG), UK
    • Peter J. Hawrylak – The University of Tulsa, USA
    • Subrata Acharya – Towson University, USA
    • Marios Anagnostopoulos – University of the Aegean, Greece
    • Erik Blasch – Fusion Evaluation & Air Force Research Laboratory, USA
    • Genshe Chen – Fusion, USA
    • Wei Yu – Towson University, USA
    • Joshua W. Haines – MIT, USA
    • William (Bill) Streilein – MIT Lincoln Laboratory, MIT, USA
    • Uri Blumenthal – MIT Lincoln Laboratory, MIT, USA
    • Gerald O’Leary – MIT Lincoln Laboratory, MIT, USA
    • Ciza Thomas – College of Engineering, India
    • N. Balakrishnan – Indian Institute of Science, India
    • Michael Ruiz – Deloitte Consulting LLP, USA
    • Mark Ballora – Pennsylvania State University, USA
    • Stefanos Gritzalis – University of the Aegean, Greece
    • Mike Tyworth – The Pennsylvania State University, USA
    • Eric X. McMillan – The Pennsylvania State University, USA
    • Bechara Al Bouna – Science University, Lebenanon
    • Janne Merete Hagen – Norwegian Defence Research Establishment, Norway
    • Varun Dutt – Indian Institute of Technology Mandi, India
    • Cleotilde Gonzalez – Carnegie Mellon University, USA
    • Khidir M. Ali – Jubail University College, Kingdom of Saudi Arabia
    • Katherine Hamilton – Penn State University, USA
    • Xinyu Yang –  Xi’an Jiaotong University, China
    • Jie Lin – Xi’an Jiaotong University, China
    • Georgios Kambourakis – University of the Aegean, Greece
    • Elisavet Konstantinou – University of the Aegean, Greece
    • Sotiris Ioannidis  – the Institute of Computer Science, Foundation for Research and Technology (FORTH), Greece
    • Pierre Parrend –  ECAM Strasbourg-Europe, France
    • Abdullahi Arabo –  University of the West of England (UWE), Bristol, UK
    • Veena Desai – Gogte Institute of Technology, Belgaum, India
    • Azah Norman – Faculty of Computer Science and Information Technology, University of Malaya, Kuala Lumpur, Malaysia
    • Marco Ivan Ramirez Sosa Moran – Faculty of Science and Technology, University of Westminster, London, UK
    • Lai Bun Lok  –  IEEE UK & Ireland, IEEE
    • Matthew Gream – IEEE UK & Ireland, IEEE
    • Frederick Wamala – Security Architecture & Cyber Security, IBM, UK

Conference Programme


    • Antti Evesti, Teemu Kanstrén and Tapio Frantti. “Cybersecurity Situational Awareness Taxonomy”
    • Eliana Stavrou. “A situation-aware user interface to assess users’ ability to construct strong passwords: A conceptual architecture”
    • Natalie Nakhla, Kathryn Perrett and Christopher McKenzie. “Automated Computer Network Defence using ARMOUR: Mission-oriented decision support and vulnerability mitigation”
    • Marianne Junger, Lorena Montoya, Pieter Hartel and Maliheh Heydari. “Towards the normalization of crime victimization: A routine activities analysis of cybercrime in Europe”
    • Aunshul Rege, Zoran Obradovic, Nima Asadi, Brian Singer, Nicholas Masceri and Quinn Heath. “A Temporal Assessment of Cyber Intrusion Chains Using Multidisciplinary Frameworks and Methodologies”
    • Patrik Lif, Magdalena Granåsen and Teodor Sommestad. “Development and validation of technique to measure cyber situation awareness”
    • Arnau Erola, Ioannis Agrafiotis, Jassim Happa, Michael Goldsmith, Sadie Creese and Philip Legg. “Improving semi-automated network defences by correlating heterogeneous data sources”
    • Boniface Kayode Alese, Aderonke Favour-Bethy Thompson and Patricia Yetunde Oni. “A Location Privacy System in Mobile Network Using Game Theory”
    • Palvi Aggarwal, Cleotilde Gonzalez and Varun Dutt. “Modeling the Effects of Amount and Timing of Deception in Simulated Network Scenarios”
    • Lynsay Shepherd, Jacqueline Archibald and Robert Ian Ferguson. “Security Awareness and Affective Feedback: Categorical Behaviour vs. Reported Behaviour”
    • Outi-Marja Latvala, Tommi Keränen, Sami Noponen, Niko Lehto, Mirko Sailio, Mikko Valta and Pia Olli. “Visualising network events in a muggle friendly way”
    • Boniface Kayode Alese, Abimbola Akinledele, Folasade M. Dahunsi, Aderonke Favour-Bethy Thompson and Tosin Adesuyi. “A Graphic-based Cryptographic Model for Authentication”
    • David Brosset, Yvon Kermarrec, Pedro Merino Laso, Benjamin Costé and Camille Cavelier. “Cr@ck3n: a cyber alerts visualization object”
    • Pablo Casais Solano and Antonio José Reinoso Peinado. “Socioeconomic factors in Cybercrime”
    • Anthony Arrott, Ivan Macalintal and Ian McMillan. “For cloud services on a user’s multiple devices, how do we measure the trusted zone defended by anti-malware?”
    • Elochukwu Ukwandu, William Buchanan and Gordon Russell. “Performance Evaluation of a Fragmented Secret Share System”
    • Gavin Hales. “Visualisation of Device Datasets to Assist Digital Forensic Investigation”
    • Scott Donaldson, Natalie Coull and David Mcluskie. “A Methodology for Testing Virtualization Security”
    • Sumaia Sabouni, Andrea Cullen and Lorna Armitage. “A Preliminary Radicalisation Framework Based on Social Engineering Techniques”
    • Martyn Weedon, Dimitris Tsaptsinos and James Denholm-Price. “Random Forest Explorations for URL Classification”
    • Ruth Ikwu. “A Multi-dimensional Structural Approach to Proactive Cyber Defence”
    • Anthony Arrott and William Kam. “Measuring cloud-based anti-malware protection for Office 365 user accounts “
    • Taniya Bhatia and Rishabh Kaushal. “Malware Detection in Android based on Dynamic Analysis”
    • Daniel Fraunholz, Daniel Krohmer, Simon Duque Antón and Hans Dieter Schotten. “Investigation of Cyber Crime Conducted by Abusing Weak or Default Passwords with a Medium Interaction Honeypot”
    • Mohammed Alzaylaee, Suleiman Yerima and Sakir Sezer. “Improving Dynamic Analysis of Android Apps Using Hybrid Test Input Generation”
    • Feng Yao, Suleiman Yerima, Boojoong Kang and Sakir Sezer. “Continuous Implicit Authentication for Mobile Devices based on Adaptive Neuro-Fuzzy Inference System”
    • Stephen Singam. “Securing an US$ 2.8B Digital Asset: The movie – Avatar”
    • Louai Maghrabi, Eckhard Pfluegel, Luluwah Al-Fagih, Roman Graf, Florian Skopik and Giuseppe Settanni. “Improved Software Vulnerability Patching Techniques Using CVSS and Game Theory”
    • Yassine Lemmou and El Mamoun Souidi. “PrincessLocker analysis”
    • Kamalakanta Sethi, Amartya Majumdar and Padmalochan Bera. “A Novel Implementation of Parallel Homomorphic Encryption for Secure Data Storage in Cloud”
    • Yuanyuan Grace Zeng. “Identifying Email Threats Using Predictive Analysis”
    • Michelle Omoogun, Preetila Seeam, Visham Ramsurrun, Xavier Bellekens and Amar Seeam. “When eHealth Meets the Internet of Things: Pervasive Security and Privacy Challenges”
    • Vahid Moula and Salman Niksefat. “ROPK++: An enhanced ROP attack detection framework for Linux operating system”
    • Tianhui Meng, Zhihao Shang and Katinka Wolter. “An Empirical Performance and Security Evaluation of Android Container Solutions”
    • Clement Guitton. “Foiling Cyber Attacks”
    • Amala Rajan, Rejitha Ravikumar and Mariam Mohammed Al-Shaer. “UAE Cybercrime Law and Cybercrimes – An Analysis”
    • Jasmina Maric. “The Valleys of Death in Refugee Crisis”
    • Amit Walinjkar and John Woods. “ECG Classification and Prognostic Approach towards Personalized Healthcare”
    • Rana Maher, David Malone and Marie Wallace. “The Impact of Interaction and Algorithm Choice on Identified Communities”
    • Waleed Alabbas, Haider Al-Khateeb, Ali Mansour, Gregory Epiphaniou and Ingo Frommholz. “Classification of Colloquial Arabic Tweets in real-time to detect high-risk floods”
    • Karim Grissa. “How the ‘Uses and Gratifications’ Theory explains the usage of Professional Networking Sites (e.g LinkedIn, Viadeo, Xing, skilledAfricans): Comparison between individual members and company members”
    • Anja Corduan. “Social Media as instrument for customer communications – a comparison of companies in East Asia, Western Europe and the US”
    • Scott Miserendino, Corey Maynard and Jacob Davis. “ThreatVectors: Contextual workflows and visualizations for rapid cyber event triage”
    • Trung Nguyen Hoang. “Robust Anti-swing Control of 3D Crane System using GA-Fuzzy”
    • Mohamed Amoud and Ounsa Roudies. “Dynamic Adaptation and Reconfiguration of Security in Mobile Devices”
    • Alexandria Farár, Hayretdin Bahsi and Bernhards Blumbergs. “A Case Study About the Use and Evaluation of Cyber Deceptive Methods Against Highly Targeted Attacks”

Previous Conferences


Social Media 2018

Social Media 2019

Social Media 2016