Technology penetrates every aspect of personal life with the use of Internet of Things devices that can be used by operators and decision makers in a central location (operations room) or while being on the mobile (agents in action). While desktop based applications can be used to monitor but also process and analyse surveillance data coming from a variety of sources, mobile-based platforms can also be used, including smart phones, smart watches and in general Internet of Things devices, petabytes of data are continually collected not only by governments but also by companies with different pretext. Governments especially after the 9/11 have started running intensive surveillance programs intending to identify potential terrorist threats, while companies are using data collected either through devices or sensors attached to their products in order to understand their customers and their behaviours.
The contemporary refugee crisis, due to conflicts in various areas all over the world, has boosted the need of governments for increased surveillance in borders, in social media as well inside the camps, especially for radicalization and extremism. At the same time, new types of “lone-wolf” terrorist acts have appeared in various countries all over the world making the governmental services unable to predict which will be the next target. In addition, the recent data acquisition scandal involving a major social networking platform for political purposes, reveals the extend of surveillance applicability in all the aspects of human life. As a result, there is an increased need for novel methods of surveillance that can be adapted to the new military and civilian conditions, while also respecting the privacy of individuals.
The workshop is expected to address the aforementioned issues and will aim at presenting novel research in the area of military, civilian and especially in cyber surveillance by experts around the world. The areas of focus will cover a broad range of surveillance techniques in the service of defense organizations applied in social media via social networking platforms, the internet, and in general in cyber space (cyber surveillance). The topics will also cover other novel methods utilized in the everyday life of citizens, such as, but not limited to, video and image analysis based human recognition that can be used in social network analysis. Finally, the workshop will cover another very important aspect of surveillance in social media, namely, the ethical and privacy issues as these are evolving in the light of globalization and terrorism and how these affect citizens and governments.
After the success of the first workshop at San Francisco in 2016, the second workshop at Sidney in 2017 and the third at Barcelona in 2018, the fourth workshop comes to further elaborate on new surveillance methods that enable authorities to protect the public without at the same time intruding upon privacy.
Hellenic Air Force Academy (Greece)
University of Georgia (USA)
University of Piraeus (Greece)
University of Calgary (Canada)
Hellenic Army Academy (Greece)
West Virginia University (USA)
Western Virginia University (USA)
Hellenic Air Force Academy (Greece)
European Security & Defence College (EU)
Full paper manuscripts must be in English with a maximum length of 8 pages or short paper 4 pages (using the IEEE two-column template). Submissions should be in PDF and include the title, author(s), affiliation(s), e-mail address(es) and abstract on the first page. Workshop papers will be submitted through EasyChair Conference System by clicking the Submit button below. If you don't already have an EasyChair account it will be required to create one before submitting a paper.Submit
Accepted and presented papers will be published in the ASONAM 2020 Conference Proceedings and forwarded for inclusion in IEEE Computer Society Digital Library (CSDL), IEEE Xplore and the ACM Digital Library. The conference proceedings will be submitted for EI indexing through INSPEC by IEEE.
Registration for the Workshop will be done through the registration page of the main conference.
More details will be posted
directly to authors by the
main conference organizers