| |||||||||||||
ISI 2013 : Intelligence and Security InformaticsConference Series : Intelligence and Security Informatics | |||||||||||||
Link: http://isiconference2013.org/pgs/call.php | |||||||||||||
| |||||||||||||
Call For Papers | |||||||||||||
Intelligence and Security Informatics (ISI) research is an interdisciplinary research field involving academic researchers in information technologies, computer science, public policy, bioinformatics, and social and behavior studies as well as local, state, and federal law enforcement and intelligence experts, and information technology industry consultants and practitioners to support counterterrorism and homeland security missions of anticipation, interdiction, prevention, preparedness and response to terrorist acts. The annual IEEE International ISI Conference series was started in 2003. Meeting have been held in Tucson, AZ (twice); Atlanta, GA; San Diego, CA; New Brunswick, NJ; Taipei, Taiwan; Dallas, TX; Vancouver, Canada; and Beijing, China, and Washington D.C. Proceedings of these ISI meetings and workshops have been published by the IEEE Press and in the Springer Lecture Notes in Computer Science (LNCS) series.
ISI 2013 will be organized in three main streams focusing on Big Data in Security Informatics Emergent Threats Decision-Making in Security Informatics Submissions may include systems, methodology, test-bed, modeling, evaluation, and policy papers. Research should be relevant to informatics, organization, or public policy in applications of counter-terrorism or protection of local/national/international security in the physical world or cyberspace. Topics include but are not limited to: Big Data in Security Informatics Information Sharing and Data/Text Mining Intelligence-related knowledge discovery Computer or cybercrime investigations and digital forensics Criminal investigative criteria and standard of procedure on Computer crime Criminal data mining and network analysis Forecasting crime and the impact of crime Criminal/intelligence information sharing and visualization Crime pattern recognition and modeling tools Web-based intelligence monitoring and analysis Spatial-temporal data analysis/GIS for crime analysis and security informatics Deception and intent detection Cyber-crime detection and analysis Authorship analysis and identification Applications of digital library technologies in intelligence data processing, preservation, sharing, and analysis Agents and collaborative systems for intelligence sharing HCI and user interfaces of relevance to intelligence and security Information sharing policy and governance Privacy, security, and civil liberties issues Intelligence-computerized community security and surveillance system Emergent Threats Infrastructure Protection and Emergency Responses Cyber-Physical-Social system security and incident management Cyber-infrastructure design and protection Intrusion detection Bio-terrorism tracking, alerting, and analysis Bio-terrorism information infrastructure Transportation and communication infrastructure protection Border/transportation safety Law Enforcement decision support systems Emergency response and management Disaster prevention, detection, and management Communication and decision support for search and rescue Assisting citizens' responses to terrorism and catastrophic events Computer forensics and crime lead discovery Anti-fraud information technology Terrorism Informatics Terrorism related analytical methodologies and software tools Terrorism knowledge portals and databases Terrorist incident chronology databases Terrorism root cause analysis Social network analysis (radicalization, recruitment, conducting operations), visualization, and simulation Forecasting terrorism Countering terrorism Measuring the impact of terrorism on society Measuring the effectiveness of counter-terrorism campaigns Crime intelligence and cyberspace crime investigation Immigration and security Decision-Making in Security Informatics Enterprise Risk Management and Information Systems Security Information security management standards Information systems security policies Behavior issues in information systems security Fraud detection Cybercrime and social impacts Corporate going concerns and risks Accounting and IT auditing Corporate governance and monitoring Board activism and influence Corporate sentiment surveillance Market influence analytics and media intelligence Consumer-generated media and social media analytics IMPORTANT DATES Paper submission due date: February 15, 2013 Notification of acceptance: March 18, 2013 Due date for Workshop proposals: February 18, 2013 PAPER SUBMISSION Submission file formats are PDF and Microsoft Word. Required Word/LaTeX templates (IEEE two-column format) can be found at the conference Web site. Long (6,000 words, 6 pages max) and short (3000 words, 3 pages max.) Papers in English must be submitted electronically via the conference Web site. The accepted papers from ISI 2013 and its affiliated workshops will be published by the IEEE Press in formal Proceedings. IEEE ISI Proceedings are EI-indexed. Authors who wish to present a poster and/or demo may submit a 1-page extended abstract, which, if selected, will appear in Proceedings. The selected IEEE ISI 2013 best papers will be invited for contribution to the Springer Security Informatics journal. The deadline for paper submissions is February 15, 2013. Paper submission instructions and template information can be found at on the Submissions page at https://www.easychair.org/conferences/?conf=ieeeisi2013. Best papers awards will be given in three categories: Best paper Runner-up paper Best student paper Runner-up student paper. WORKSHOPS In conjunction with ISI 2013, several workshops will be held on June 4, 2013.Special-topic workshops in any areas of Intelligence and Security Informatics research and practice are welcome. Such events will be an integral part of the ISI-2013 conference program. Proposals in PDF or Microsoft Word not exceeding 3 pages should be emailed to the conference organizing committee at antonio@pnnl.gov by February 18, 2012 and contain the following information. Title of tutorial/workshop Preferred duration (half day vs. full day) Brief bios of proposed instructor(s)/organizer(s) Objectives to be achieved Scope of topics to be covered Target audience and the list of potential presenters/contributors |
|