<font style="font-family:arial,helvetica,sans-serif" size="2">CALL FOR PAPERS<br><br>
18th Americas Conference on Information Systems</font><span style="font-family:arial,helvetica,sans-serif">
</span><font style="font-family:arial,helvetica,sans-serif" size="2"><br>
Seattle, Washington, August 9-12, 2012<br><a href="http://amcis2012.aisnet.org/" target="_blank">http://amcis2012.aisnet.org/</a><br><br>
Track: <span class="il">Social</span> Issues and <span class="il">Social</span> Inclusion</font><span style="font-family:arial,helvetica,sans-serif">
</span><font style="font-family:arial,helvetica,sans-serif" size="2"><br>
Minitrack: The <span class="il">Dark</span> <span class="il">Side</span> <span class="il">of</span> <span class="il">Social</span> <span class="il">Networking</span> -- <span class="il">Social</span> and Ethical Issues<br>

<br><br>
DESCRIPTION</font><span style="font-family:arial,helvetica,sans-serif">

</span><font style="font-family:arial,helvetica,sans-serif" size="2"><br>

</font><p style="text-align:justify;font-family:arial,helvetica,sans-serif"><font>Online <span class="il">social</span> networks
are web-based services, platforms, or sites that <span><i>“</i></span><span><span style="font-weight:normal">allow individuals
to (1) construct a public or semi-public profile within a bounded system, (2)
articulate a list <span class="il">of</span> other users within whom they share a connection, and (3)
view and traverse their list <span class="il">of</span> connections and those made by others within
their system</span></span><span><i>” </i></span>(Boyd and Ellison, 2008). By
facilitating the establishment and maintenance <span class="il">of</span> <span class="il">social</span> relations as well as the
sharing <span class="il">of</span> interests and activities within individual networks, <span class="il">social</span>
<span class="il">networking</span> sites (such as Facebook, Twitter, LinkedIn, MySpace, YouTube, and more
recently Google+) have become increasingly integrated in our modern culture, changing
the way we work, study, play and socialize, and how we spend time and money.</font></p><font style="font-family:arial,helvetica,sans-serif" size="2">

</font><p style="text-align:justify;font-family:arial,helvetica,sans-serif"><font>Notwithstanding the many
personal, educational, and work benefits offered by online <span class="il">social</span> networks,
their use raises a variety <span class="il">of</span> <span class="il">social</span> and ethical concerns (e.g., privacy and
security threats, cyber-bullying, addiction, deception, censorship and
surveillance). The objective <span class="il">of</span> this mini-track is to develop theoretical insight
and understanding on topics and issues that address the <b><i>troubling</i></b> or <b><i><span class="il">dark</span></i></b>
<span class="il">side</span> <span class="il">of</span> online <span class="il">social</span> networks. We welcome conceptual, theoretical, and
empirical papers that enrich our understanding <span class="il">of</span> the <span class="il">social</span> and ethical issues
<span class="il">of</span> online <span class="il">social</span> networks. </font></p><font style="font-family:arial,helvetica,sans-serif" size="2">

</font><p style="font-family:arial,helvetica,sans-serif" class="MsoNormal"><font> </font></p><font style="font-family:arial,helvetica,sans-serif" size="2">

</font><p style="font-family:arial,helvetica,sans-serif" class="MsoNormal"><font>Topics
<span class="il">of</span> interest include, but are not limited to:</font></p><font style="font-family:arial,helvetica,sans-serif" size="2">

</font><p style="margin-left:18pt;font-family:arial,helvetica,sans-serif"><font><span><span style="font-style:normal;font-variant:normal;font-weight:normal;line-height:normal;font-size-adjust:none;font-stretch:normal"></span></span>-- Privacy
risks</font><font><span><span style="font-style:normal;font-variant:normal;font-weight:normal;line-height:normal;font-size-adjust:none;font-stretch:normal"></span></span></font></p>
<p style="margin-left:18pt;font-family:arial,helvetica,sans-serif"><font><span><span style="font-style:normal;font-variant:normal;font-weight:normal;line-height:normal;font-size-adjust:none;font-stretch:normal">-- </span></span>Security
vulnerabilities</font>

</p><p style="margin-left:18pt;font-family:arial,helvetica,sans-serif"><font><span>-- </span>Cyber-bullying
and cyber-stalking</font></p><font style="font-family:arial,helvetica,sans-serif" size="2">

</font><p style="margin-left:18pt;font-family:arial,helvetica,sans-serif"><font><span>-- </span><span class="il">Social</span>
network addiction</font></p><font style="font-family:arial,helvetica,sans-serif" size="2">

</font><p style="margin-left:18pt;font-family:arial,helvetica,sans-serif"><font><span>-- </span>Risk
to child safety</font></p><font style="font-family:arial,helvetica,sans-serif" size="2">

</font><p style="margin-left:18pt;font-family:arial,helvetica,sans-serif"><font><span>-- </span>Risk
to reputation and confidentiality</font></p><font style="font-family:arial,helvetica,sans-serif" size="2">

</font><p style="margin-left:18pt;font-family:arial,helvetica,sans-serif"><font><span>-- </span>Violations
<span class="il">of</span> intellectual property right</font></p><font style="font-family:arial,helvetica,sans-serif" size="2">

</font><p style="margin-left:18pt;font-family:arial,helvetica,sans-serif"><font><span>-- </span>Ethical
issues in <span class="il">social</span> network analysis and mining</font></p><font style="font-family:arial,helvetica,sans-serif" size="2">

</font><p style="margin-left:18pt;font-family:arial,helvetica,sans-serif"><font><span>-- </span>Risk
<span class="il">of</span> identity theft</font></p><font style="font-family:arial,helvetica,sans-serif" size="2">

</font><p style="margin-left:18pt;font-family:arial,helvetica,sans-serif"><font><span>-- </span>Deception
on <span class="il">social</span> networks</font></p><font style="font-family:arial,helvetica,sans-serif" size="2">

</font><p style="margin-left:18pt;font-family:arial,helvetica,sans-serif"><font><span>-- </span>Reduction
in productivity and disruption to working environment</font></p><font style="font-family:arial,helvetica,sans-serif" size="2">

</font><p style="margin-left:18pt;font-family:arial,helvetica,sans-serif"><font><span>-- </span>Negative
impact <span class="il">of</span> <span class="il">social</span> <span class="il">networking</span> on relationships (e.g., <span class="il">social</span> isolation and
distraction from quality relationships)</font></p><font style="font-family:arial,helvetica,sans-serif" size="2">

</font><p style="margin-left:18pt;font-family:arial,helvetica,sans-serif"><font><span>-- </span>Negative
health consequences (e.g., personality and brain disorder) associated with the
use <span class="il">of</span> <span class="il">social</span> <span class="il">networking</span> sites</font></p><font style="font-family:arial,helvetica,sans-serif" size="2">

</font><p style="margin-left:18pt;font-family:arial,helvetica,sans-serif"><font><span>-- </span><span class="il">Social</span>
network surveillance</font></p><font style="font-family:arial,helvetica,sans-serif" size="2">

</font><p style="margin-left:18pt;font-family:arial,helvetica,sans-serif"><font><span>-- <span style="font-style:normal;font-variant:normal;font-weight:normal;line-height:normal;font-size-adjust:none;font-stretch:normal"></span></span><span class="il">Social</span>
network censorship</font></p>

<br><br>
IMPORTANT DATES<br>
<br>


January 2, 2012  Manuscript Central will start accepting paper submissions<br>

March 1, 2012  Deadline for paper submissions<br>

April 2, 2012  Authors will be notified <span class="il">of</span> acceptances on or about this date<br>

April 20, 2012  For accepted papers, camera-ready copy due<br>
<br>
<br>
<br>
SUBMISSION SITE<br>
<br>
<a href="http://mc.manuscriptcentral.com/amcis2012" target="_blank">http://mc.manuscriptcentral.com/amcis2012</a><br><br>
<br>
<br>CHAIRS' CONTACT INFORMATION<br><font style="font-family:arial,helvetica,sans-serif" size="2"><br>

</font><p style="font-family:arial,helvetica,sans-serif" class="MsoNormal"><font>Bo
Sophia Xiao <br>
Computing & Information Systems, Department <span class="il">of</span> Computer Science<br>
Hong Kong Baptist University<br>
Kowloon Tong, Hong Kong<br>
Tel: <a href="tel:%2B852%203411%205818" target="_blank">+852 3411 5818</a><br>
Email: <a href="mailto:boxiao@comp.hkbu.edu.hk" target="_blank">boxiao@comp.hkbu.edu.hk</a><br>
<br>

Christy M.K. Cheung<br>
Department <span class="il">of</span> Finance and Decision Sciences, School <span class="il">of</span> Business<br>
Hong Kong Baptist University<br>
Kowloon Tong, Hong Kong<br>
Tel: <a href="tel:%2B852%203411%202102" target="_blank">+852 3411 2102</a><br>
Fax: <a href="tel:%2B852%203411%205855" target="_blank">+852 3411 5855</a><br>
Email: <a href="mailto:ccheung@hkbu.edu.hk" target="_blank">ccheung@hkbu.edu.hk</a><br>
</font></p><font style="font-family:arial,helvetica,sans-serif" size="2">

</font><p style="font-family:arial,helvetica,sans-serif" class="MsoNormal"><font> </font></p><font style="font-family:arial,helvetica,sans-serif" size="2">

</font><span style="font-size:12.0pt;font-family:"Times New Roman","serif""><font style="font-family:arial,helvetica,sans-serif" size="2">Matthew K.O. Lee<br>
College <span class="il">of</span> Business, City University <span class="il">of</span> Hong Kong<br>
Kowloon Tong, Hong Kong<br>
Tel: <a href="tel:%2B852%202%20788%207348" target="_blank">+852 2 788 7348</a><br>
Fax: <a href="tel:%2B852%202%20788%208192" target="_blank">+852 2 788 8192</a><br>
Email: <a href="mailto:ismatlee@cityu.edu.hk" target="_blank">ismatlee@cityu.edu.hk</a></font></span>