THE 2ND Workshop on Security-Centric Strategies for
Combating Information Disorder (SCID)

in conjunction with ACM AsiaCCS 2025

25 - 29 August 2025, Ha Noi, Vietnam


call for PAPERS

Over the past few years, challenges stemming from information disorder and its associated issues have presented significant hurdles in various domains including healthcare, election reporting, and political journalism on a global scale. Current discussions regarding potential solutions to information disorder have predominantly centered around modifications to the management and oversight of digital platforms, along with the necessity of enhancing the clarity of their operations. 

With the rise of social media, it has become easier for false information to spread quickly and widely. Some common methods to deal with information disorder include fact-checking websites and tools, promoting media literacy and critical thinking skills, and increasing transparency and accountability in the media. However, this is an ongoing and complex issue that requires a multi-faceted approach from individuals, governments, and tech companies alike. Hence, building upon the tangible achievements of the organizers' prior research endeavors, we aim to convene the second workshop on Security-Centric Strategies for Combating Information Disorder (SCID), co-located with the 20th ACM ASIA Conference on Computer and Communications Security (ACM AsiaCCS 2025). Our intention is to foster the exchange of fresh insights and research within this domain, particularly emphasizing the perspective of computer security.

The workshop aims to explore innovative ways to combat information disorder, including misinformation, disinformation, and malinformation. We welcome contributions in areas such as computational detection methods, cognitive analysis, interdisciplinary strategies, and ethical considerations. This workshop fosters collaboration among researchers, practitioners, and policymakers to address the challenges posed by the proliferation of false and misleading information from the computer security perspective.

Topics of Interest (but are not limited to):

IMPORTANT DATES

CONTACT