Workshop on Privacy in Collaborative & Social Computing

PiCSoC 2016

Co-located with 2nd IEEE International Conference on Collaboration and Internet Computing (CIC 2016)

Nov. 2, 2016. Pittsburgh, PA, USA

Call For Papers

Collaboration technologies enable teams of humans or machines (or a combination of both) to cooperate and provide new services or improve their performance. Furthermore, social computing facilitates collective action and social interaction. While such collaboration and interaction enables many diverse opportunities, it also raises concerns about user privacy.

We are interested in papers that address various privacy challenges in collaborative and social computing including (but not limited to):

The collaborative and social computing application areas of interest include, but are not limited to:

Important Dates

Program Co-Chairs

Technical Program Committee

Paper Submission

We invite original research papers that have not been previously published and are not currently under review for publication elsewhere. Both short and full-length papers will be considered. Submitted papers should be no longer than 8 pages for full papers and 4 pages for short papers including references, and should be formatted according to the two-column IEEE proceedings format.

Submission Site:


Location: Jimmy Stewart - Session Chair: TBA

10:00 - Opening Remarks
Workshop Co-Chairs (Elena Ferrari, Barbara Carminati, Amir Masoumzadeh)

10:15 - Privacy by Socio-Technical Design - A Collaborative Approach for Privacy Friendly System Design
Martin Degeling, Christopher Lentzsch, Alexander Nolte, Thomas Herrmann, Kai-Uwe Loser

10:30 - Using Transfer Learning to Identify Privacy Leaks in Tweets
Saul Castillo, Zhiyuan Chen

11:00 - Privacy Settings Recommender for Online Social Network
Davide Alberto Albertini, Barbara Carminati, Elena Ferrari

11:30 - Towards Measuring Knowledge Exposure in Online Social Networks
Amirreza Masoumzadeh, Andrew Cortese

Location: Jimmy Stewart - Session Chair: TBA

2:45 - Access Control Models for Cloud-Enabled Internet of Things: A Proposed Framework and Research Agenda
Asma Alsheri, Ravi Sandhu

3:15 - If You Can't Measure It, You Can't Manage It: Towards Quantification of Privacy Policies
Manar Alohaly, Hassan Takabi

3:45 - The Listening Patterns to System Events by Benign and Malicious Android Apps
Fadi Mohsen and Mohamed Shehab

4:15 - A Dynamic Privacy Aware Access Control Model for Location Based Services
Leila Karimi, Balaji Palanisamy

4:30 - Closing Remarks
Workshop Co-Chairs (Elena Ferrari, Barbara Carminati, Amir Masoumzadeh)


Amir Masoumzadeh (amasoumzadeh AT