CyberSafety 2016: the first international workshop on computational methods for CyberSafety

Shivakant Mishra, Qin Lv, Richard Han, Jeremy Blackburn

Research output: Chapter in Book/Report/Conference proceedingConference abstract

Abstract

The goal of this inaugural workshop on cybersafety is to bring together researchers and practitioners from academia, industry, government and research labs working in the area of cybersafety to discuss the unique challenges in addressing various cybersafety issues and to share experiences, solutions, tools and techniques. Examples of cybersafety issues include cyberbullying, cyberthreats, recruiting minors via Internet services for nefarious purposes, using deceptive means to dupe vulnerable populations, exhibiting misbehaving behaviors such as using profanity or flashing in online video chats, and many others. The focus of the CyberSafety workshop is on the detection, prevention and mitigation of various cybersafety issues, as well as education and promoting safe practices. CyberSafety 2016 will be a one-day workshop, held on October 28, 2016 in conjunction with ACM CIKM 2016 in Indianapolis, IN, USA.

Original languageEnglish
Title of host publicationCIKM 2016 - Proceedings of the 2016 ACM Conference on Information and Knowledge Management
Place of PublicationNew York, NY
PublisherAssociation for Computing Machinery
Pages2501-2502
Number of pages2
ISBN (Electronic)9781450340731
DOIs
Publication statusPublished - 24 Oct 2016
Externally publishedYes
Event25th ACM International Conference on Information and Knowledge Management, CIKM 2016 - Indianapolis, United States
Duration: 24 Oct 201628 Oct 2016

Publication series

NameInternational Conference on Information and Knowledge Management, Proceedings
Volume24-28-October-2016

Other

Other25th ACM International Conference on Information and Knowledge Management, CIKM 2016
Country/TerritoryUnited States
CityIndianapolis
Period24/10/1628/10/16

Keywords

  • Computational methods
  • CyberSafety

Fingerprint

Dive into the research topics of 'CyberSafety 2016: the first international workshop on computational methods for CyberSafety'. Together they form a unique fingerprint.

Cite this