posted by user: 99552211 || 7133 views || tracked by 10 users: [display]

OASIS 2014 : Ontology of Accounting Systems and Information Security

FacebookTwitterLinkedInGoogle

Link: https://www.facebook.com/oasis2014oman
 
When Oct 5, 2014 - Oct 7, 2014
Where Sultanate of Oman
Abstract Registration Due Mar 31, 2014
Submission Deadline Apr 30, 2014
Notification Due Jun 5, 2014
Final Version Due Jul 30, 2014
Categories    information security   accounting systems   management   ontology
 

Call For Papers

The OASIS 2014 conference is designed to provide a meeting point for academia and practitioners with an interest in Ontology of Accounting Systems and Information Security. The conference encourages submission of high quality articles on both theoretical issues and the deployment of applications.

The focus of OASIS 2014 is to discuss emerging issues in Oman affecting Accounting Information Systems and Information Security. The OASIS 2014 conference serves as a good platform for Omani academics and professionals and their international counterparts to meet with each other and exchange ideas.

OASIS 2014 strikes a balance between ontology and deployment. International Conferences like OASIS 2014 are important for understanding the challenges encountered by both academics and professionals in their efforts to provide protection against cyber criminals. Participants of OASIS 2014 will benefit from the experiences of leading Information Security and Accounting Systems experts who advise governments on Cyber Security as it affects various industries and how they can develop and enhance information protection services.

NOTE: We don’t place any restrictions on topics. However, here is a general list of topics that make us exciting;

Information Security

Disclosure of new Hacking Tools
New Vulnerabilities and Zero Day Exploits
Cyber Forensics
Lock picking & physical security exploitation
Web Application & Network Security
Antivirus/IDS/Firewall/filter evasion techniques
Social Engineering
Metasploit Framework
Web Browser Exploitation
Mobile Application Security and Exploitation
Wireless Security
Denial of Service Attacks
Hardware Hacking/ SCADA Hacking
Honey pots
Fuzzing Techniques
Open Source Security
Cyber Laws, Cyber warfare, Cyber Ethics
Anonymity in Internet
Carding and Black Market Analysis
Privacy Issues
Vulnerability research and exploitation
Penetration testing and security assessment
Malware analysis and new trends in malicious codes
Forensics, IT crime & law enforcement
Low-level hacking (console security & mobile devices)
Risk management and ISO 27001
Smartphone/Mobile/Embedded Hacking & Security
Hardware and Software Reverse Engineering
Infrastructures Hacking and Security

Accounting Systems

Accounting information system modelling, design and implementation issues
Accounting information system integration
Risk assessment and enterprise risk management
Evaluation, assessment and business value of accounting information systems
Accounting information systems and governance
Business intelligence and accounting information systems
Global accounting information systems

Paper Submission Deadline: April 2, 2014
Notification: June 5, 2014
Camera-ready papers: July 30, 2014
Conference Dates: October, 5-7, 2014

Registration Charge: Students ($55) and Non-students ($105)

All accepted papers submitted to OASIS 2014 will be published and indexed.

Submission Method is via easychair as (.pdf)

https://www.easychair.org/conferences/?conf=oasis2014

Contact: oasis2014@easychair.org



Related Resources

ICISS 2025   ACM--2025 The 8th International Conference on Information Science and Systems (ICISS 2025)
SIGML 2025   6th International Conference on Signal Processing and Machine Learning
ACM SAC 2025   40th ACM/SIGAPP Symposium On Applied Computing
IJCIS 2024   International Journal on Cryptography and Information Security
Hong Kong-MIST 2025   2025 Asia-Pacific Conference on Marine Intelligent Systems and Technologies (MIST 2025)
ICVIP--EI 2024   2024 The 8th International Conference on Video and Image Processing (ICVIP 2024)
ISNS 2025   The 5th Int'l Conference on Information Security and Network Security
ACM ICIIT 2025   ACM--2025 10th International Conference on Intelligent Information Technology (ICIIT 2025)--ESCI
ICTC 2025   2025 6th Information Communication Technologies Conference (ICTC 2025)--SCI
IEEE BDAI 2025   IEEE--2025 the 8th International Conference on Big Data and Artificial Intelligence (BDAI 2025)