Social Media 2016

June 13-14, 2016,London, UK

Call for Papers

IEEE is the Technical Co-Sponsor (TCS) of the International Conference on Social Media, Wearable and Web Analytics (Social Media 2016), an international refereed conference dedicated to the advancement of social media, security of social media and consequential impacts and risks due to compromise or security breaches. It covers economic importance of social media, the emergence of wearable, wearable for fitness, e-health and life style improvements, and the use of web analytics for social media enhancements, business intelligence and business empowerment.

The aim of the Social Media 2016 is to encourage participation and promotion of collaborative scientific, industrial and academic inter-workings among individual researchers, practitioners, members of existing associations, academia, standardisation bodies, and including government departments and agencies. The purpose is to build bridges between academia and industry, and to encourage interplay of different cultures.


Submission Deadline

Deadline for all paper submissions, that is, both full papers and extended abstracts for Poster, WIP, PoC, Research Idea and PhD Seminar presentations is 26th February 2016.

All Industry track, Work in Progress track, Research Ideas track and PhD Seminar track will be published in the conference proceedings. Interested participants, please submit your proposal using the online submission system hosted by Easychair Conference Portal.

Full paper submission should be via Easychair Conference Portal

Topics of Interest

    • Advances in Social Media
    • Social Media theoretical underpinnings
    • Security in Social Media
    • Trust and privacy in Social Media
    • Social Medial Big Data Analysis
    • Organisational Knowledge Management
    • Branding and E-Marketing
    • Realtime Communications and Instant Messaging
    • Social Network Analysis
    • Social Media Technologies
    • Convergence
    • Learning, Communities & Skills development
    • Cultural Impacts
    • Digital Contents
    • Research
    • Digital Economics
    • Measurement and analysis of social and crowdsourcing systems
    • Social and Digital Inclusion
    • Digital Trust and Reputation
    • Bridging Geographical and Location Gaps
    • Policy, Legal, Legislation & Compliance
    • Standardisation
    • Advances in Wearable
    • Wearable in e-Health
    • Wearable in Fitness
    • Wearable and Bring You Own Devices (BYOD) in the Enterprise
    • Security, Trust and Privacy in Wearable
    • Wearable Technologies
    • Economic Importance of Wearable
    • Life Style Impacts
    • Interaction, Interface and Customisation
    • Design Requirements and Requirements Analysis
    • Aesthetics and Design
    • Monitoring
    • Advances in Web Analytics
    • Web Analytics for Law Enforcement and Security Monitoring
    • Legal Issues of Web Analytics
    • Law, Legislation and Compliance
    • Security, Trust, Privacy
    • Web Analytics for Business Intelligence
    • Web Analytics and Web Surveillance
    • Web Analytics and Geolocation
    • Content-Aware analytics
    • Digital Content
    • Customisation, e-Marketing and Tailoring
    • Customer-centric Analysis
    • Social Network Analysis
    • Cyber Intelligence
    • Business Intelligence
    • Business Analytics & Intelligence
    • Situational Awareness
    • Principles, Theory & Research
    • Endpoint Monitoring, User and Entity Analysis
    • Application and Session Monitoring
    • Risk Assessment and Management
    • Data Mining and Machine Learning in Social Systems
    • Web Analytics Technologies & Tools


Dr. Janne Hagen

Dr. Janne Hagen

Norwegian Water Resources and Energy Directorate (NVE), Norway
Professor Frank Wang

Professor Frank Wang

School of Computing, University of Kent, UK
Professor Ali Hassami

Professor Ali Hassami

Chair, IEEE United Kingdom & Republic of Ireland
Dr. Nick Savage

Dr. Nick Savage

School of Computing, University of Portsmouth, Portsmouth, UK
Professor Olav Lysne

Professor Olav Lysne

Centre for Resilient Networks and Applications (CRNA), Simula, Norway
Dr. Thomas Owens

Dr. Thomas Owens

Brunel University, London, UK
Dr. Andrew Lenaghan

Dr. Andrew Lenaghan

The Oxford University CERT (OxCERT), Oxford, UK
Dr.Syed Naqvi

Dr.Syed Naqvi

Cyber Security and Forensics, Birmingham City University, Birmingham, UK

Important Dates

    • Industry (Proof of Concept / Pilot) Submission –  February 26, 2016 March 11, 2016
    • Extended Abstract (Work in Progress) – February 26, 2016 March 11, 2016
    • PhD Seminar Submissions – February 26, 2016 March 11, 2016
    • Research Ideas – February 26, 2016 March 11, 2016
    • Poster/Demo Submissions – February 26, 2016 March 11, 2016
    • Special Track Submissions – February 26, 2016 March 11, 2016
    • Workshops and Tutorials Submission – February 26, 2016 March 11, 2016
    • Full Paper Submissions – February 26, 2016 March 11, 2016
    • Notification of Full Paper/Abstract / Special Track Acceptance/Rejection – March 25, 2016
    • Camera Ready Paper Due – April 8, 2016
    • Participants Registration – March 25 – May 25, 2016
    • Conference Date – 13 & 14 June 2016


United Kingdom

Programme Committee

    • Cyril Onwubiko – Centre for Multidisciplinary Research, Innovation and Collaboration, UK
    • Thomas Owens – Brunel University, London, UK
    • Anthony Davies – IEEE
    • Stefanos Gritzalis – University of the Aegean, Greece
    • Nick Savage – University of Portsmouth, UK
    • Jens Myrup Pedersen – University of Aalborg, Denmark
    • Subrata Acharya – Towson University, USA
    • Genshe Chen – Fusion, USA
    • Daniel Zeng – University of Arizona, USA
    • Gareth Niblett – BCS Information Security Specialist Group (ISSG), UK
    • Xavier Bellekens – University of Abertay, Scotland, UK
    • Cyril Onwubiko – Centre for Multidisciplinary Research, Innovation and Collaboration, UK
    • Alexandros Kapravelos  – Computer Security Group, University of California Santa Barbara, USA
    • Uwe Glässer  – School of Computing Science, Simon Fraser University, Canada
    • Gerardo I. Simari – Universidad Nacional del Sur in Bahia Blanca and CONICET, Argentina
    • Yi Luo  – University of Arizona, Tucson, USA
    • Thomas Owens – Brunel University, London, UK
    • Jens Myrup Pedersen – University of Aalborg, Denmark
    • Reza Tadayoni – University of Aalborg, Denmark
    • Andrew Lenaghan – Oxford University, UK
    • Gareth Niblett – BCS Information Security Specialist Group (ISSG), UK
    • Peter J. Hawrylak – The University of Tulsa, USA
    • Subrata Acharya – Towson University, USA
    • Marios Anagnostopoulos – University of the Aegean, Greece
    • Erik Blasch – Fusion Evaluation & Air Force Research Laboratory, USA
    • Genshe Chen – Fusion, USA
    • Wei Yu – Towson University, USA
    • Joshua W. Haines – MIT, USA
    • William (Bill) Streilein – MIT Lincoln Laboratory, MIT, USA
    • Uri Blumenthal – MIT Lincoln Laboratory, MIT, USA
    • Gerald O’Leary – MIT Lincoln Laboratory, MIT, USA
    • Ciza Thomas – College of Engineering, India
    • N. Balakrishnan – Indian Institute of Science, India
    • Michael Ruiz – Deloitte Consulting LLP, USA
    • Mark Ballora – Pennsylvania State University, USA
    • Stefanos Gritzalis – University of the Aegean, Greece
    • Mike Tyworth – The Pennsylvania State University, USA
    • Eric X. McMillan – The Pennsylvania State University, USA
    • Bechara Al Bouna – Science University, Lebenanon
    • Janne Merete Hagen – Norwegian Defence Research Establishment, Norway
    • Varun Dutt – Indian Institute of Technology Mandi, India
    • Cleotilde Gonzalez – Carnegie Mellon University, USA
    • Khidir M. Ali – Jubail University College, Kingdom of Saudi Arabia
    • Katherine Hamilton – Penn State University, USA
    • Xinyu Yang –  Xi’an Jiaotong University, China
    • Jie Lin – Xi’an Jiaotong University, China
    • Georgios Kambourakis – University of the Aegean, Greece
    • Elisavet Konstantinou – University of the Aegean, Greece
    • Sotiris Ioannidis  – the Institute of Computer Science, Foundation for Research and Technology (FORTH), Greece
    • Pierre Parrend –  ECAM Strasbourg-Europe, France
    • Abdullahi Arabo –  University of the West of England (UWE), Bristol, UK
    • Veena Desai – Gogte Institute of Technology, Belgaum, India
    • Azah Norman – Faculty of Computer Science and Information Technology, University of Malaya, Kuala Lumpur, Malaysia

Conference Programme

    • Ryan Heartfield and George Loukas. “Evaluating the reliability of Users as Human Sensors of Social Media Security Threats
    • Jennifer Cole, Chris Watkins and Dorothea Kleine. “Internet Discussion Forums: Maximizing Choice in Health-seeking Behaviour During Public Health Emergencies
    • Paul Baxter and Trevor Wood. “Generating Insight from Data
    • Philip Legg. “Enhancing Cyber Situation Awareness for Non-Expert Users using Visual Analytics
    • Samir Puuska, Matti J. Kortelainen, Viljami Venekoski and Jouko Vankka. “Instant Message Classification in Finnish Cyber Security -Themed Free-Form Discussion
    • Yoram Golandsky. “Cyber Crisis Management, Survival or Extinction?
    • Joe Burton. “Cyber Attacks and Maritime Situational Awareness: Evidence from Japan and Taiwan
    • Jan Ahrend, Marina Jirotka and Kevin Jones. “On the Collaborative Practices of Cyber Threat Intelligence Analysts to Develop and Utilize Tacit Threat and Defence Knowledge
    • Eliana Stavrou and Andreas Pitsillides. “Situation aware intrusion recovery policy in WSNs
    • Michael Davies and Menisha Patel. “Are we managing the risk of sharing Cyber Situational Awareness – A UK Public Sector Case Study
    • Radu-Stefan Pirscoveanu, Matija Stevanovic and Jens Myrup Pedersen. “Clustering Analysis of Malware Behavior using Self Organizing Map
    • Mahesh Bang and Himanshu Saraswat. “Building an effective and efficient continuous Web Application Security Program
    • Xavier Bellekens, Preetila Seeam, Quentin Franssen, Andrew Hamilton, Kamila Nieradzinska and Amar Seeam. “Pervasive eHealth Services A Security and Privacy Risk Awareness Survey
    • Mohamed Chahine Ghanem and Deepthi N. Ratnayake. “Enhancing WPA2-PSK four-way handshaking after re-authentication to deal with de-authentication followed by brute-force attack A novel re-authentication protocol
    • Filippo Sanfilippo. “A Multi-Sensor System for Enhancing Situational Awareness in Offshore Training
    • Palvi Aggarwal, Cleotilde Gonzalez and Varun Dutt. “Looking from the Hacker’s Perspective: Role of Deceptive Strategies in Cyber Security
    • Zahid Maqbool, V.S. Chandrasekhar Pammi and Varun Dutt. “Cybersecurity: Effect of Information Availability in Dynamic Security Games
    • Roman Graf, Florian Skopik and Kenny Whitebloom. “A Decision Support Model for Situational Awareness in National Cyber Operations Centers
    • Shruti Kohli. “Developing Cyber Security Asset Management framework for UK Rail
    • Gaofeng Zhang, Paolo Falcarin, Elena Gómez-Martínez, Christophe Tartary, Shareeful Islam, Bjorn De Sutter and Jerome D’annoville. “Attack Simulation based Software Protection Assessment Method for Protection Optimisation
    • Mohammed Alzaylaee, Suleiman Yerima and Sakir Sezer. “DynaLog: An Automated Dynamic Analysis Framework for characterizing Android Applications
    • Louai Maghrabi, Eckhard Pfluegel and Senna Fathima Noorji. “Designing Utility Functions for Game-Theoretic Cloud Security Assessment: A Case for Using the Common Vulnerability Scoring System
    • Kamile Nur Sevis and Ensar Seker. “Cyber Warfare: Terms, Issues, Laws and Controversies
    • Thomas Mundt and Peter Wickboldt. “Security in building automation systems – A first analysis
    • Fara Yahya, Robert Walters and Gary Wills. “Goal-Based Security Components for Cloud Storage Security Framework: A Preliminary Study
    • Dylan Smyth, Victor Cionca, Sean McSweeney and Donna O’Shea. “Exploiting Pitfalls in Software-Defined Networking Implementation
    • Boojoong Kang, Suleiman Yerima, Kieran Mclaughlin and Sakir Sezer. “N-opcode Analysis for Android Malware Classification and Categorization
    • Muhammad Aminu Ahmad, Steve Woodhead and Diane Gan. “A Countermeasure Mechanism for Fast Scanning Malware
    • Andrea Cullen and Lorna Armitage. “The Social Engineering Attack Spiral (SEAS)
    • Catrin Burrows and Pooneh Bagheri Zadeh. “A Mobile Forensic Investigation into Steganography
    • Egon Kidmose, Matija Stevanovic and Jens Myrup Pedersen. “Correlating Intrusion Detection Alerts on Bot Malware infections using Neural Network
    • Zbigniew Hulicki. “The IM System with a Cryptographic Feature
    • Reza Montasari, Pekka Peltola and Victoria Carpenter. “Gauging the Effectiveness of Computer Misuse Act in Dealing with Cybercrimes
    • Tomáš Sochor, Matej Zuzčák and Petr Bujok. “Statistical Analysis of Attacking Autonomous Systems
    • Marcelo Fontenele and Lily Sun. “Knowledge management of cyber security expertise: an ontological approach to talent discovery
    • Cyril Onwubiko. “Exploring Web Analytics to enhance Cyber Situational Awareness for the Protection of Online Web Services
    • Abdulrahman Alruban, Nathan Clarke, Fudong Li and Steven Furnell. “Proactive Biometric-Enabled Forensic Imprinting
    • Mary Geddes and Pooneh Bagheri Zadeh. “Forensic Analysis of Private Browsing” (Extended Abstract / WIP)
    • Aisha Abubakar, Pooneh Bagheri Zadeh, Richard Howley and Helge Janicke. “Root Cuase Analysis (RCA) as a Preliminary Tool into the Investigation of Identity Theft” (WIP)
    • Taolue Chen, Tingting Han, Florian Kammueller, Ibrahim Nemli and Christian Probst. “Model Based Analysis of Insider Threats” (Extended Abstract)

Previous Conferences