{"id":1746,"date":"2021-07-19T18:05:04","date_gmt":"2021-07-19T18:05:04","guid":{"rendered":"https:\/\/ieeecstforum.wpengine.com\/societal-harms-2023\/?page_id=1746"},"modified":"2024-05-06T12:12:38","modified_gmt":"2024-05-06T12:12:38","slug":"callforpaper","status":"publish","type":"page","link":"https:\/\/tech-forum.computer.org\/societal-harms-2024\/callforpaper\/","title":{"rendered":"Call for Papers"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"1746\" class=\"elementor elementor-1746\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-84d6202 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"84d6202\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2d73f90\" data-id=\"2d73f90\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;background_motion_fx_motion_fx_scrolling&quot;:&quot;yes&quot;,&quot;background_motion_fx_translateY_effect&quot;:&quot;yes&quot;,&quot;background_motion_fx_translateY_speed&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:4,&quot;sizes&quot;:[]},&quot;background_motion_fx_translateY_affectedRange&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:{&quot;start&quot;:0,&quot;end&quot;:100}},&quot;background_motion_fx_devices&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile&quot;]}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-inner-section elementor-element elementor-element-71e0d0e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"71e0d0e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-77a0565\" data-id=\"77a0565\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-02fc7e0 elementor-widget__width-inherit animated-fast elementor-widget elementor-widget-text-editor\" data-id=\"02fc7e0\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h1>Call for Papers<\/h1>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-32c29af elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"32c29af\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7cc2f63\" data-id=\"7cc2f63\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fbe4cad elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"fbe4cad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p dir=\"ltr\" style=\"line-height: 1.3800027272727273;text-align: justify;margin-top: 0pt;margin-bottom: 0pt\"><span style=\"font-size: 11pt;font-family: Arial,sans-serif;color: #333333;background-color: transparent;font-weight: 400;font-style: normal;font-variant: normal;text-decoration: none;vertical-align: baseline\">The pervasiveness of digital platforms and social media makes them a battleground for bad actors to fabricate and propagate massive amounts of harmful information, such as hate speech, discrimination, violent extremism, child sexual abuse<\/span><span style=\"font-size: 11pt;font-family: Arial,sans-serif;color: #000000;background-color: transparent;font-weight: 400;font-style: normal;font-variant: normal;text-decoration: none;vertical-align: baseline\">, <\/span><span style=\"font-size: 11pt;font-family: Arial,sans-serif;color: #333333;background-color: transparent;font-weight: 400;font-style: normal;font-variant: normal;text-decoration: none;vertical-align: baseline\">disinformation and misinformation, with massive online engagement. There is an urgent need for broad collaborations among various stakeholders, including academia researchers from\u00a0 multi-disciplines, technologists, law and policy makers, non-profit organizations, private sectors, and end users.\u00a0<\/span><\/p><p dir=\"ltr\" style=\"line-height: 1.3800027272727273;text-align: justify;margin-top: 12pt;margin-bottom: 12pt\"><span style=\"font-size: 11pt;font-family: Arial,sans-serif;color: #333333;background-color: transparent;font-weight: 400;font-style: normal;font-variant: normal;text-decoration: none;vertical-align: baseline\">The 4th IEEE Digital Platforms and Societal Harms (2024 DPSH) will take place from <\/span><span style=\"font-size: 11pt;font-family: Arial,sans-serif;color: #333333;background-color: transparent;font-weight: bold;font-style: normal;font-variant: normal;text-decoration: none;vertical-align: baseline\">Oct.14 \u2013 15, 2024<\/span><span style=\"font-size: 11pt;font-family: Arial,sans-serif;color: #333333;background-color: transparent;font-weight: 400;font-style: normal;font-variant: normal;text-decoration: none;vertical-align: baseline\"> at American University, Washington DC, USA. <\/span><span style=\"font-size: 11pt;font-family: Arial, sans-serif;color: #333333;background-color: transparent;font-style: normal;font-variant: normal;text-decoration: none;vertical-align: baseline\"><b>Accepted full papers may be presented in person or online.<\/b><\/span><span style=\"font-size: 11pt;font-family: Arial,sans-serif;color: #333333;background-color: transparent;font-weight: 400;font-style: normal;font-variant: normal;text-decoration: none;vertical-align: baseline\"> This conference aims to provide a venue to facilitate discussions among various stakeholders from relevant but diverse disciplines. Interdisciplinary studies are especially welcomed. Interesting topics include but are not limited to:<\/span><\/p><ul style=\"margin-top: 0;margin-bottom: 0;padding-inline-start: 48px\"><li dir=\"ltr\" style=\"list-style-type: disc;font-size: 11pt;font-family: Arial, sans-serif;color: #222222;background-color: transparent;font-style: normal;font-variant: normal;text-decoration: none;vertical-align: baseline\"><p dir=\"ltr\" style=\"line-height: 1.38;text-align: justify;background-color: #ffffff;margin-top: 10pt;margin-bottom: 0pt\" role=\"presentation\"><span style=\"font-size: 11pt;font-family: Arial, sans-serif;color: #222222;background-color: transparent;font-style: normal;font-variant: normal;text-decoration: none;vertical-align: baseline\"><b>Law and public policy<\/b><\/span><span style=\"font-weight: 400;font-size: 11pt;font-family: Arial, sans-serif;color: #222222;background-color: transparent;font-style: normal;font-variant: normal;text-decoration: none;vertical-align: baseline\">, such as Approaches to harm minimisation; Trade offs between competing <\/span><span style=\"font-weight: 400;font-size: 11pt;font-family: Arial, sans-serif;color: #212121;background-color: transparent;font-style: normal;font-variant: normal;text-decoration: none;vertical-align: baseline\">legal and <\/span><span style=\"font-weight: 400;font-size: 11pt;font-family: Arial, sans-serif;color: #222222;background-color: transparent;font-style: normal;font-variant: normal;text-decoration: none;vertical-align: baseline\">policy incentives; Global trends in government responses<\/span><span style=\"font-weight: 400;font-size: 11pt;font-family: Arial, sans-serif;color: #212121;background-color: transparent;font-style: normal;font-variant: normal;text-decoration: none;vertical-align: baseline\"> &amp; intervention<\/span><span style=\"font-weight: 400;font-size: 11pt;font-family: Arial, sans-serif;color: #222222;background-color: transparent;font-style: normal;font-variant: normal;text-decoration: none;vertical-align: baseline\"> to social harms;\u00a0 Human behavior and emotional regulation; Public-private cooperation to address social harms.<\/span><\/p><\/li><li dir=\"ltr\" style=\"list-style-type: disc;font-size: 11pt;font-family: Arial, sans-serif;color: #222222;background-color: transparent;font-style: normal;font-variant: normal;text-decoration: none;vertical-align: baseline\"><p dir=\"ltr\" style=\"line-height: 1.38;text-align: justify;background-color: #ffffff;margin-top: 0pt;margin-bottom: 0pt\" role=\"presentation\"><span style=\"font-size: 11pt;font-family: Arial, sans-serif;color: #222222;background-color: transparent;font-style: normal;font-variant: normal;text-decoration: none;vertical-align: baseline\"><b>Tech\/private sector policy and governance<\/b><\/span><span style=\"font-weight: 400;font-size: 11pt;font-family: Arial, sans-serif;color: #222222;background-color: transparent;font-style: normal;font-variant: normal;text-decoration: none;vertical-align: baseline\">, such as <\/span><span style=\"font-weight: 400;font-size: 11pt;font-family: Arial, sans-serif;color: #000000;background-color: transparent;font-style: normal;font-variant: normal;text-decoration: none;vertical-align: baseline\">Development of corporate policies and <\/span><span style=\"font-weight: 400;font-size: 11pt;font-family: Arial, sans-serif;color: #222222;background-color: transparent;font-style: normal;font-variant: normal;text-decoration: none;vertical-align: baseline\">safety by design; <\/span><span style=\"font-weight: 400;font-size: 11pt;font-family: Arial, sans-serif;color: #000000;background-color: transparent;font-style: normal;font-variant: normal;text-decoration: none;vertical-align: baseline\">Responsible tech governance, management and oversight; Corporate g<\/span><span style=\"font-weight: 400;font-size: 11pt;font-family: Arial, sans-serif;color: #222222;background-color: #ffffff;font-style: normal;font-variant: normal;text-decoration: none;vertical-align: baseline\">overnance structure design; <\/span><span style=\"font-weight: 400;font-size: 11pt;font-family: Arial, sans-serif;color: #000000;background-color: transparent;font-style: normal;font-variant: normal;text-decoration: none;vertical-align: baseline\">Protection, ranging from whistleblower protection to protection of designs as project progress; <\/span><span style=\"font-weight: 400;font-size: 11pt;font-family: Arial, sans-serif;color: #222222;background-color: transparent;font-style: normal;font-variant: normal;text-decoration: none;vertical-align: baseline\">Balance competing policy incentives (free speech and harm minimisation); Transparency.\u00a0<\/span><\/p><\/li><li dir=\"ltr\" style=\"list-style-type: disc;font-size: 11pt;font-family: Arial, sans-serif;color: #222222;background-color: transparent;font-style: normal;font-variant: normal;text-decoration: none;vertical-align: baseline\"><p dir=\"ltr\" style=\"line-height: 1.38;text-align: justify;background-color: #ffffff;margin-top: 0pt;margin-bottom: 0pt\" role=\"presentation\"><span style=\"font-size: 11pt;font-family: Arial, sans-serif;color: #222222;background-color: transparent;font-style: normal;font-variant: normal;text-decoration: none;vertical-align: baseline\"><b>Information aspects<\/b><\/span><span style=\"font-weight: 400;font-size: 11pt;font-family: Arial, sans-serif;color: #222222;background-color: transparent;font-style: normal;font-variant: normal;text-decoration: none;vertical-align: baseline\">, such as Definitions of information trustworthiness, authenticity, integrity and credibility; Information quality and content moderation; Boundaries of journalistic behavior online; Suitability of news content from journalistic entities to surface ground truth.\u00a0<\/span><\/p><\/li><li dir=\"ltr\" style=\"list-style-type: disc;font-size: 11pt;font-family: Arial, sans-serif;color: #222222;background-color: transparent;font-style: normal;font-variant: normal;text-decoration: none;vertical-align: baseline\"><p dir=\"ltr\" style=\"line-height: 1.38;text-align: justify;background-color: #ffffff;margin-top: 0pt;margin-bottom: 0pt\" role=\"presentation\"><span style=\"font-size: 11pt;font-family: Arial, sans-serif;color: #222222;background-color: transparent;font-style: normal;font-variant: normal;text-decoration: none;vertical-align: baseline\"><b>User aspects and psychological features<\/b><\/span><span style=\"font-weight: 400;font-size: 11pt;font-family: Arial, sans-serif;color: #222222;background-color: transparent;font-style: normal;font-variant: normal;text-decoration: none;vertical-align: baseline\">, such as Definitions and analysis of online authentic behavior; Human behavior analysis;<\/span><span style=\"font-weight: 400;font-size: 11pt;font-family: Arial, sans-serif;color: #000000;background-color: transparent;font-style: normal;font-variant: normal;text-decoration: none;vertical-align: baseline\"> Cognitive tagging; <\/span><span style=\"font-weight: 400;font-size: 11pt;font-family: Arial, sans-serif;color: #222222;background-color: transparent;font-style: normal;font-variant: normal;text-decoration: none;vertical-align: baseline\">Trust m<\/span><span style=\"font-weight: 400;font-size: 11pt;font-family: Arial, sans-serif;color: #000000;background-color: transparent;font-style: normal;font-variant: normal;text-decoration: none;vertical-align: baseline\">echanisms; Moral foundations &amp; ethical frameworks; <\/span><span style=\"font-weight: 400;font-size: 11pt;font-family: Arial, sans-serif;color: #222222;background-color: transparent;font-style: normal;font-variant: normal;text-decoration: none;vertical-align: baseline\">Evolutionary features of online hate speech and disinformation; <\/span><span style=\"font-weight: 400;font-size: 11pt;font-family: Arial, sans-serif;color: #000000;background-color: transparent;font-style: normal;font-variant: normal;text-decoration: none;vertical-align: baseline\">Hatred basis against various religious and ethnic groups; Human performance against DeepFake media; User views on government or corporate approaches to mitigating harms; User reporting mechanisms design; User safety.<\/span><\/p><\/li><\/ul><ul style=\"margin-top: 0;margin-bottom: 0;padding-inline-start: 48px\"><li dir=\"ltr\" style=\"list-style-type: disc;font-size: 11pt;font-family: Arial, sans-serif;color: #000000;background-color: transparent;font-style: normal;font-variant: normal;text-decoration: none;vertical-align: baseline\"><p dir=\"ltr\" style=\"line-height: 1.38;text-align: justify;background-color: #ffffff;margin-top: 0pt;margin-bottom: 0pt\" role=\"presentation\"><span style=\"font-size: 11pt;font-family: Arial, sans-serif;color: #000000;background-color: transparent;font-style: normal;font-variant: normal;text-decoration: none;vertical-align: baseline\"><b>AI and digital harms<\/b><\/span><span style=\"font-weight: 400;font-size: 11pt;font-family: Arial, sans-serif;color: #000000;background-color: transparent;font-style: normal;font-variant: normal;text-decoration: none;vertical-align: baseline\">, such as Ethical, Explainable and Sustainable AI; Algorithmic bias and discrimination; New datasets and evaluation methodologies; New approaches for ground truth labeling; DeepFake media generation or detection; AI chatbots as information assistant or opinion influencer; Open-source toolkits, Serverless AI Applications.<\/span><\/p><\/li><\/ul><ul style=\"margin-top: 0;margin-bottom: 0;padding-inline-start: 48px\"><li dir=\"ltr\" style=\"list-style-type: disc;font-size: 11pt;font-family: Arial, sans-serif;color: #222222;background-color: transparent;font-style: normal;font-variant: normal;text-decoration: none;vertical-align: baseline\"><p dir=\"ltr\" style=\"line-height: 1.38;text-align: justify;background-color: #ffffff;margin-top: 0pt;margin-bottom: 0pt\" role=\"presentation\"><span style=\"font-size: 11pt;font-family: Arial, sans-serif;color: #222222;background-color: transparent;font-style: normal;font-variant: normal;text-decoration: none;vertical-align: baseline\"><b>Media propagation aspects<\/b><\/span><span style=\"font-weight: 400;font-size: 11pt;font-family: Arial, sans-serif;color: #222222;background-color: transparent;font-style: normal;font-variant: normal;text-decoration: none;vertical-align: baseline\">, such as Propagation mechanism; Propagation and authenticity; <\/span><span style=\"font-weight: 400;font-size: 11pt;font-family: Arial, sans-serif;color: #000000;background-color: transparent;font-style: normal;font-variant: normal;text-decoration: none;vertical-align: baseline\">Conspiracies, disinformation and propaganda; Regional and local media; Media fragmentation and changing patterns of media consumption and usage; Risks and opportunities of new media usage; Media representation, inequalities, and minorities; Media and information warfare.<\/span><b style=\"color: #333333;font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif;font-size: 16px\">\u00a0 \u00a0 \u00a0 \u00a0 \u00a0\u00a0<\/b><\/p><\/li><\/ul><p>In addition to those engaged in research, we welcome the participation of practitioners from industry, civil society, and government. To facilitate this participation we also invite presentations on tools, services, projects, initatives, and department \/ organisational reports related to hate speech, discrimination, violent extremism, child sexual abuse, disinformation and misinformation. To present <b>(in-person or online)<\/b>, an abstract must be provided and will be checked by the program committee for relevance. These presentations will not include a publication. Abstracts may also be used by researchers to present work in progress, or to present previously published work that remains relevant and timely.\u00a0<\/p><p><span style=\"text-decoration: underline\"><strong><span style=\"font-size: 11pt;font-family: Arial, sans-serif;color: #000000;background-color: transparent;vertical-align: baseline;text-decoration: underline\">Timeline for paper submission have been extended to:<\/span><\/strong><\/span><\/p><ul><li><span style=\"font-size: 11pt;font-family: Arial, sans-serif;color: #000000;background-color: transparent;vertical-align: baseline\">Full paper submission: June 26, 2024 <\/span><\/li><li><span style=\"font-size: 11pt;font-family: Arial, sans-serif;color: #000000;background-color: transparent;vertical-align: baseline\">Abstract submission (for presentations without a full paper): July 31, 2024<\/span><\/li><li><span style=\"font-size: 11pt;font-family: Arial, sans-serif;color: #000000;background-color: transparent;vertical-align: baseline\">Acceptance notification: August 19, 2024<\/span><\/li><li><span style=\"font-size: 11pt;font-family: Arial, sans-serif;color: #000000;background-color: transparent;vertical-align: baseline\">Camera Ready Manuscript: September 15, 2024<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-5fe620d e-flex e-con-boxed e-con e-parent\" data-id=\"5fe620d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fd6d13e elementor-align-center elementor-widget elementor-widget-button\" data-id=\"fd6d13e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/tech-forum.computer.org\/societal-harms-2024\/wp-content\/uploads\/sites\/8\/2024\/04\/IEEE-CS-Tech-Forum-CFP-_V5.pdf\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download the Call for Papers<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5b52e7a elementor-widget elementor-widget-heading\" data-id=\"5b52e7a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Instructions for authors<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-2c4a3a2 e-flex e-con-boxed e-con e-parent\" data-id=\"2c4a3a2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9c431a0 elementor-widget elementor-widget-text-editor\" data-id=\"9c431a0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b><u>For full papers<\/u><\/b><\/p>\n<p>Accepted full papers presented by an original author or co-author during the conference will be published in the <i>2024 IEEE Digital Platforms and Societal Harms<\/i> Conference Proceedings, and submitted for publication in IEEE Xplore\u00ae.&nbsp;&nbsp;<b><br><\/b><\/p>\n<p>We encourage you to use the &#8220;submit your paper&#8221; button below to enter your authors, paper title, and abstract as a first step. You can then attach the paper&nbsp; at a later point (before the deadline) when you are ready.&nbsp;&nbsp;<\/p>\n<p><b>Paper Templates:<\/b> Please use the IEEE Conference Templates to format your paper: <a href=\"https:\/\/www.ieee.org\/conferences\/publishing\/templates.html\">https:\/\/www.ieee.org\/conferences\/publishing\/templates.html<\/a>&nbsp;<\/p>\n<p><b>Length:<\/b>&nbsp;Minimum of 5 pages and a maximum of 8 pages, using the template above.<\/p>\n<p><b>PDF Generations:<\/b> Please use <a href=\"https:\/\/ieee-pdf-express.org\">PDF eXpress<\/a> to generate \/ check your PDF before submission.&nbsp;<\/p>\n<ol>\n<li>&nbsp;Select the &#8220;New Users &#8211; Click Here&#8221; link.<\/li>\n<li>Enter the following:\n<ul>\n<li>60098X for the Conference ID<\/li>\n<li>Your email address<\/li>\n<li>A password<\/li>\n<\/ul>\n<\/li>\n<li>Continue to enter information as prompted.<\/li>\n<\/ol>\n<p style=\"padding-left: 40px\">An Online confirmation will be&nbsp; displayed and an email confirmation will be sent verifying your account setup.<\/p>\n<p><b><u>For abstract only talks<\/u><\/b>&nbsp;<\/p>\n<p>Use the &#8220;submit your paper&#8221; link below and select a track that is most relevant and includes the word &#8220;abstract&#8221; in its title. Your abstract shoudl give a good idea of what the talk will be about. We encourage abstracts of around 500 words, but short abstracts can be used if they are clear, and abstracts of up to 1,000 words are possible. There are no formatting requirements or templates for these abstracts, the text can be entered directly in the form.&nbsp;&nbsp;<\/p>\n<p><b><u>Prepresentations<\/u><\/b><\/p>\n<ul>\n<li>Each presentation should be 10 minutes, plus 5 minutes for questions.&nbsp;<\/li><li>Each accepted full paper or abstract must be presented (in person or online) by a person who has registered as an author \/ presenter.&nbsp;<\/li>\n<li>A registered author \/ presenter may present a second talk for the indicated additional charge (see the registrations page).<\/li>\n<li>A person may present a maximum of two talks.&nbsp;<\/li>\n<li>Talks may be presented in person at the conference or remotely.&nbsp;<\/li><li>For authors not attending in person, a video of the talk should be provided as a backup in case of any technical difficulties.&nbsp;<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f144381 elementor-widget elementor-widget-button\" data-id=\"f144381\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/edas.info\/N32113\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Submit your paper<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3c7db4d elementor-widget elementor-widget-text-editor\" data-id=\"3c7db4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b>Copyright Transfer:<\/b><\/p><ul><li>Copyright transfer to IEEE will be completed as part of the final submission of accepted papers to the EDAS system. We are using the EDAS IEEE eCopyright function (ECF). With ECF, authors are redirected to an IEEE web site and fill in the IEEE copyright form there. The ECF then reports completion of the web form to EDAS, allowing the author to upload the form. Thus, authors do not have to print, fill out and upload copyright forms manually.\u00a0<\/li><li>If you are an author that requires using a third-party agreement based on your employment or funding, please email copyrights@ieee.org supplying the paper title, conference name (<i>2024 IEEE Digital Platforms and Societal Harms<\/i>), the EDAS paper ID, and a copy of the signed agreement.<\/li><li><span style=\"background-color: transparent;text-align: var(--text-align)\">Authors are free to post the accepted version of their articles on their personal Web sites or those of their employers, as per the IEEE\u2019s author posting policy found in Section 8.1.9 of\u00a0<\/span><a style=\"text-align: var(--text-align)\" href=\"https:\/\/pspb.ieee.org\/images\/files\/PSPB\/opsmanual.pdf\" target=\"_blank\" rel=\"noopener\">the IEEE PSPB Operations Manual<\/a><span style=\"background-color: transparent;text-align: var(--text-align)\">.\u00a0<\/span><\/li><li style=\"font-size: 16px\">Details regarding IEEE copyright can be found\u00a0<a href=\"http:\/\/www.ieee.org\/publications_standards\/publications\/rights\/copyrightmain.html\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>. See\u00a0<a href=\"http:\/\/ieee.org\/copyright\" target=\"_blank\" rel=\"noopener noreferrer\">ieee.org\/copyright<\/a>\u00a0for full references.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-55651bc elementor-widget elementor-widget-heading\" data-id=\"55651bc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">See the highlights video from last year<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7df94eb elementor-widget elementor-widget-text-editor\" data-id=\"7df94eb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>(Opens in a new window at IEEE.TV)<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4cd25c1 elementor-widget elementor-widget-image\" data-id=\"4cd25c1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/ieeetv.ieee.org\/video\/highlights-ieee-computer-society-tech-forum-on-digital-platforms-and-societal-harms\" target=\"_blank\">\n\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"767\" height=\"558\" src=\"https:\/\/tech-forum.computer.org\/societal-harms-2024\/wp-content\/uploads\/sites\/8\/2024\/04\/Screenshot-2024-04-02-094420.png\" class=\"attachment-large size-large wp-image-3545\" alt=\"\" srcset=\"https:\/\/tech-forum.computer.org\/societal-harms-2024\/wp-content\/uploads\/sites\/8\/2024\/04\/Screenshot-2024-04-02-094420.png 767w, https:\/\/tech-forum.computer.org\/societal-harms-2024\/wp-content\/uploads\/sites\/8\/2024\/04\/Screenshot-2024-04-02-094420-300x218.png 300w\" sizes=\"(max-width: 767px) 100vw, 767px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Call for Papers The pervasiveness of digital platforms and social media makes them a battleground for bad actors to fabricate and propagate massive amounts of harmful information, such as hate speech, discrimination, violent extremism, child sexual abuse, disinformation and misinformation, with massive online engagement. There is an urgent need for broad collaborations among various stakeholders, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":3533,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1746","page","type-page","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/tech-forum.computer.org\/societal-harms-2024\/wp-json\/wp\/v2\/pages\/1746","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/tech-forum.computer.org\/societal-harms-2024\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/tech-forum.computer.org\/societal-harms-2024\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/tech-forum.computer.org\/societal-harms-2024\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/tech-forum.computer.org\/societal-harms-2024\/wp-json\/wp\/v2\/comments?post=1746"}],"version-history":[{"count":0,"href":"https:\/\/tech-forum.computer.org\/societal-harms-2024\/wp-json\/wp\/v2\/pages\/1746\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tech-forum.computer.org\/societal-harms-2024\/wp-json\/wp\/v2\/media\/3533"}],"wp:attachment":[{"href":"https:\/\/tech-forum.computer.org\/societal-harms-2024\/wp-json\/wp\/v2\/media?parent=1746"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}