Privacy Theme

Privacy concerns the operational policies, procedures, and regulations implemented within an information system to control the unauthorized use of, access to, or release of personal information held in any format. Topics of interest in this theme include (but are not limited to):

  • privacy preserving/enhancing technologies
  • identity management and biometrics
  • privacy and ubiquitous computing, e.g. RFIDs
  • reputation, privacy, and communities
  • e-health and privacy
  • anonymity and medical research
  • employee privacy and network administration
  • privacy and location-based technologies and services
  • privacy and traceability
  • spyware and stalking
  • anonymity, pseudonymity, and accountability
  • responding to hate speech, flaming and trolls
  • privacy and emergency management policies and technologies
  • vulnerable online users and privacy sensitization
  • evolving nature of lawful surveillance
  • smart cards and privacy
  • identity theft and management
  • privacy audits and risk analysis
  • evolving role of privacy officers

TECHNICAL PROGRAM CHAIRS

  • Liqun Chen (University of Surrey, UK)
  • Ronxing Lu (University of New Brunswick, Canada)

COMMITTEE

  • Esma Aimeur (University of Montreal)
  • Guillermo Navarro-Arribas (UAB)
  • Nora Cuppens-Boulahia (Telecom Bretagne)
  • Anna Monreale (Computer Science Dep., University of Pisa)
  • Hiroaki Kikuchi (Meiji University)
  • Mohammad Hossein Manshaei (EPFL)
  • Frédéric Cuppens (TELECOM Bretagne)
  • Sebastien Gambs (Université du Québec à Montréal)
  • Sonja Buchegger (KTH)
  • Jordi Castellà-Roca (Universitat Rovira i Virgili)
  • Carlisle Adams (University of Ottawa)
  • Klara Stokes (U. of Skövde)
  • Traian Marius Truta (Northern Kentucky University)
  • Ameer Al-Nemrat (University of East London)
  • Milton Baar (Macquarie University)
  • Lynn Batten (Deakin University)
  • Ebrima Ceesay (TASC)
  • Shiping Chen (CSIRO, Australia)
  • Dongseung Kim (Canterbury University, NZ)
  • Dongxi Liu (CSIRO, Australia)
  • Chris Mitchell (Royal Holloway University of London)
  • Surya Nepal (CSIRO, Australia)
  • Josef Pieprzyk (Queensland University of Technology)
  • Man Qi (Canterbury Christchurch University)
  • George Weir (University of Strathclyde)
  • Qiang Tang (Cornell University)
  • Rui Zhang (Chinese Academy of Sciences)
  • Rongmao Chen (National University of Defense Technology)
  • Jinguang Han (University of Surrey)
  • Weizhi Meng (Technical Universtiy of Denmark)
  • Lei Zhang (East China Normal University)
  • Joseph Liu (Monash University)
  • Qiong Huang (South China Agricultural University)
  • Xinyi Huang (Fujian Normal University, China)
  • Guomin Yang (University of Wollongong)
  • Fangguo Zhang (Sun Yat-sen University)
  • Yanjiang Yang (Sheild Lab, Huawei)
  • Fagen Li (University of Electronic Science and Technology of China)
  • Kaitai Liang (University of Surrey)
  • Jiqiang Lu (Institute for Infocomm Research)
  • Xiaofeng Chen (Xidian University)
  • Qianhong Wu (Beihang University)
  • Jun Shao (Zhejiang Gongshang University)
  • Zhe Liu (Nanjing University of Aeronautics, China; and University of Luxembourg, Luxembourg)

About the author: