Collaboration technologies enable teams of humans or machines (or a combination of both) to cooperate and provide new services or improve their performance. Furthermore, social computing facilitates collective action and social interaction. While such collaboration and interaction enables many diverse opportunities, it also raises concerns about user privacy.
We are interested in papers that address various privacy challenges in collaborative and social computing including (but not limited to):
The collaborative and social computing application areas of interest include, but are not limited to:
We invite original research papers that have not been previously published and are not currently under review for publication elsewhere. Both short and full-length papers will be considered. Submitted papers should be no longer than 8 pages for full papers and 4 pages for short papers including references, and should be formatted according to the two-column IEEE proceedings format.
Submission Site: https://easychair.org/conferences/?conf=picsoc2016
10:00am-12:00pm
Location: Jimmy Stewart - Session Chair: TBA
10:00 - Opening Remarks
Workshop Co-Chairs (Elena Ferrari, Barbara Carminati, Amir Masoumzadeh)
10:15 - Privacy by Socio-Technical Design - A Collaborative Approach for Privacy Friendly System Design
Martin Degeling, Christopher Lentzsch, Alexander Nolte, Thomas Herrmann, Kai-Uwe Loser
10:30 - Using Transfer Learning to Identify Privacy Leaks in Tweets
Saul Castillo, Zhiyuan Chen
11:00 - Privacy Settings Recommender for Online Social Network
Davide Alberto Albertini, Barbara Carminati, Elena Ferrari
11:30 - Towards Measuring Knowledge Exposure in Online Social Networks
Amirreza Masoumzadeh, Andrew Cortese
02:45pm-04:45pm
Location: Jimmy Stewart - Session Chair: TBA
2:45 - Access Control Models for Cloud-Enabled Internet of Things: A Proposed Framework and Research Agenda
Asma Alsheri, Ravi Sandhu
3:15 - If You Can't Measure It, You Can't Manage It: Towards Quantification of Privacy Policies
Manar Alohaly, Hassan Takabi
3:45 - The Listening Patterns to System Events by Benign and Malicious Android Apps
Fadi Mohsen and Mohamed Shehab
4:15 - A Dynamic Privacy Aware Access Control Model for Location Based Services
Leila Karimi, Balaji Palanisamy
4:30 - Closing Remarks
Workshop Co-Chairs (Elena Ferrari, Barbara Carminati, Amir Masoumzadeh)
Amir Masoumzadeh (amasoumzadeh AT albany.edu).