FSFEWT2017: Facing and shaping the Future of emerging and Web Technologies: Most Recent Trends ,Perspectives, Outcomes, and Challenges Warsovia, Poland, April 3-5, 2017 |
| Conference website | http://www.iccmit.net/SPECIAL%20SESSION%20ALGERIA_%20ICCMIT%20%202017.pdf |
| Abstract registration deadline | March 1, 2017 |
| Submission deadline | March 1, 2017 |
Objectives and Motivation Overview: The Net Generation, Y Generation, C Generation, digital natives... there are many terms – several controversial - used to name youth who were born into a world where the Internet is of great importance. These terms issue from a huge body of studies that focus on youth and digital culture on the emerging knowledge society and that illustrate a wide consensus on how new media are altering the way youth learn and socialize. No generation is more at ease with online, collaborative technologies than today’s young people—“digital natives”, who have grown up in an immersive computing environment. Where a notebook and pen may have formed the tool kit of prior generations, today’s students come to class armed with smart phones, laptops and iPods. They demonstrate that teachers face a new audience engaged in tagging, searching, gaming, multitasking, social networking and collaborating through Web 2.0-related activities. Indeed, youth appear more engaged in digital networks where they can create content, share knowledge and expertise, access cultural artefacts or remix existing material. On the other hand the advent of mobile cloud computing , Internet of things , Big data , smart grid and emotional intelligence are new concepts related to smart cities. An advanced persistent threat (APT) is a set of stealthy and continuous computer hacking processes, often orchestrated by human(s) targeting a specific entity. APT usually targets organizations and/or nations for business or political motives. APT processes require a high degree of covertness over a long period of time. The "advanced" process signifies sophisticated techniques using malware to exploit vulnerabilities in systems. The "persistent" process suggests that an external command and control system is continuously monitoring and extracting data from a specific target. The "threat" process indicates human involvement in orchestrating the attack. Aim and scope of the special session This workshop aims at understanding the real impact of emerging Web technologies in transforming education. It will offer researchers and practitioners the opportunity to share their knowledge and expertise in putting forward new models of teaching and learning in the Internet Age. The aim is to bridge the gap between youth digital culture and school culture in order to face the new and complex challenges being addressed by educators in the knowledge society. The second aim of this special session consists in studying international cyber-security using a sociotechnical approach that combines data science techniques, computational models, and network science techniques. Reducing attack exposure and hosting in the most affected countries requires addressing both social and technical issues such as corruption and computer piracy. In a field where the literature is abundant, this session which does not claim to completeness in such a vast area, is intended to complement the literature published on this topic, very scattered and sparse. It aims to fill the gap by being both a working tool updated on a changing area and a window towards research. The workshop aims Engineering students of the telecommunications and computer science fields (broadcasting, TV, multimedia).
Submission Guidelines
All papers must be original and not simultaneously submitted to another journal or conference. The following paper categories are welcome:
- Full papers describing the most recent trends ,perspectives, outcomes, and challenges of emerging network and Web Technologies.
- Posters describing the most recent trends ,perspectives, outcomes, and challenges of emerging network and Web Technologies.
List of Topics
- Topic 1:Web applications
- Topic 2: Cloud computing
- Topic 3: E-services
- Topic 4: IT's
- Topic 5:Computer Networks and Security
- Topic 6:Signal , image and video processing
Publication
FSFEWT2017 proceedings will be published in ...
by Not decided yet
Contact
All questions about submissions should be emailed to aboukelif@yahoo.fr
