| |||||||||||
ISI 2012 : IEEE International Conference on Intelligence and Security InformaticsConference Series : Intelligence and Security Informatics | |||||||||||
Link: http://isi.borders.arizona.edu | |||||||||||
| |||||||||||
Call For Papers | |||||||||||
Call For Papers
IEEE International Conference on Intelligence and Security Informatics (ISI 2012) June 11-14, 2012 Washington, DC, USA http://isi.borders.arizona.edu/ THEME: Cyberspace, Border, and Immigration Securities Intelligence and Security Informatics (ISI) research is an interdisciplinary research field involving academic researchers in information technologies, computer science, public policy, bioinformatics, and social and behavior studies as well as local, state, and federal law enforcement and intelligence experts, and information technology industry consultants and practitioners, to support counterterrorism and homeland security missions of anticipation, interdiction, prevention, preparedness and response to terrorist acts. The annual IEEE International ISI Conference series (http://www.isiconference.org/) was started in 2003, and the first nine meetings were held in Tucson, AZ (twice); Atlanta, GA; San Diego, CA; New Brunswick, NJ; Taipei, Taiwan; Dallas, TX; Vancouver, Canada; and Beijing, China. Proceedings of these ISI meetings and workshops have been published by the IEEE Press and in the Springer Lecture Notes in Computer Science (LNCS) series. ISI 2012 will be organized in four main streams focusing on - Information Sharing and Data/Text Mining, - Infrastructure Protection and Emergency Responses, - Terrorism Informatics, and - Enterprise Risk Management and Information Systems Security Submissions may include systems, methodology, testbed, modeling, evaluation, and policy papers. Research should be relevant to informatics, organization, or public policy in applications of counter-terrorism or protection of local/national/international/enterprise security in the physical world or cyberspace. Topics include but are not limited to: 1. Information Sharing and Data/Text Mining - Intelligence-related knowledge discovery - Computer or cyber crime investigations and digital forensics - Criminal investigative criteria and standard of procedure on Computer crime - Criminal data mining and network analysis - Forecasting crime and the impact of crime - Criminal/ intelligence information sharing and visualization - Crime pattern recognition and modeling tools - Web-based intelligence monitoring and analysis - Spatial-temporal data analysis/GIS for crime analysis and security informatics - Deception and intent detection - Cyber-crime detection and analysis - Authorship analysis and identification - Applications of digital library technologies in intelligence data processing, preservation, sharing, and analysis - Agents and collaborative systems for intelligence sharing - HCI and user interfaces of relevance to intelligence and security - Information sharing policy and governance - Privacy, security, and civil liberties issues - Intelligence-computerized community security and surveillance system 2. Infrastructure Protection and Emergency Responses - Cyber-Physical-Social system security and incident management - Cyber-infrastructure design and protection - Intrusion detection - Bio-terrorism tracking, alerting, and analysis - Bio-terrorism information infrastructure - Transportation and communication infrastructure protection - Border/transportation safety - Law Enforcement decision support systems - Emergency response and management - Disaster prevention, detection, and management - Communication and decision support for search and rescue - Assisting citizens' responses to terrorism and catastrophic events - Computer forensics and crime lead discovery - Anti-fraud information technology 3. Terrorism Informatics - Terrorism related analytical methodologies and software tools - Terrorism knowledge portals and databases - Terrorist incident chronology databases - Terrorism root cause analysis - Social network analysis (radicalization, recruitment, conducting operations), - visualization, and simulation - Forecasting terrorism - Countering terrorism - Measuring the impact of terrorism on society - Measuring the effectiveness of counter-terrorism campaigns - Crime intelligence and cyberspace crime investigation - Immigration and security 4. Enterprise Risk Management and Information Systems Security - Information security management standards - Information systems security policies - Behavior issues in information systems security - Fraud detection - Cyber crime and social impacts - Corporate going concerns and risks - Accounting and IT auditing - Corporate governance and monitoring - Board activism and influence - Corporate sentiment surveillance - Market influence analytics and media intelligence - Consumer-generated media and social media analytics Paper submission instructions and template information can soon be found on the Submissions page at http://isi.borders.arizona.edu/ WORKSHOPS In conjunction with ISI 2012, several workshops will be held on June 11, 2012. The currently committed ones include (1) the Border Security Workshop, (2) the Immigration Studies Workshop, and (3) the International Workshop on Social Computing (SoCo). Workshop proposals are welcome. IMPORTANT DATES - paper submission due date for ISI 2012: February 15, 2012 - Notification of acceptance: March 15, 2012 - The due date for Tutorial/ Workshop proposals: February 27, 2012 PAPER SUBMISSION Submission file formats are PDF and Microsoft Word. Required Word/LaTeX templates (IEEE two-column format) can be found at the conference Web site. Long (6,000 words, 6 pages max.) and short (3000 words, 3 pages max.) papers in English must be submitted electronically via the conference Web site. The accepted papers from ISI 2012 and its affiliated workshops will be published by the IEEE Press in a formal Proceedings. IEEE ISI Proceedings are EI-indexed. Authors who wish to present a poster and/or demo may submit a 1-page extended abstract, which, if selected, will appear in Proceedings. The selected IEEE ISI 2012 best papers will be invited for contribution to the new Springer Security Informatics journal. Proposals for tutorials and special-topic workshops in any areas of Intelligence and Security Informatics research and practice are welcome. Such events will be an integral part of the ISI-2012 conference program. Proposals in PDF or Microsoft Word not exceeding 3 pages should be emailed to the conference organizing committee at zeng@email.arizona.edu by February 27, 2012 and contain the following information. - Title of tutorial/workshop - Preferred duration (half day vs. full day) - Brief bios of proposed instructor(s)/organizer(s) - Objectives to be achieved - Scope of topics to be covered - Target audience and evidence of interest (for tutorials) - Target audience and the list of potential presenters/contributors (for workshops) |
|