| |||||||||||||||
ISI-KDD 2010 : ACM SIGKDD Workshop on Intelligence and Security Informatics 2010 | |||||||||||||||
Link: http://www.ischool.drexel.edu/isi-kdd2010 | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
ACM SIGKDD Workshop on Intelligence and Security Informatics 2010 (ISI-KDD 2010)
held in conjunction with the 16th ACM SIGKDD Conference on Knowledge Discovery and Data Mining 2010 (http://www.ischool.drexel.edu/isi-kdd2010/) July 25, 2010 Washington, DC, USA Important Dates: Submission date for papers: May 4, 2010 Author notification: May 21, 201 Submission of camera-ready papers: June 1, 2010 Intelligence and Security Informatics (ISI) is concerned with the study of the development and use of advanced information technologies and systems for national, international, and societal security-related applications. ISI is an interdisciplinary research field involving academic researchers in information technologies, computer science, public policy, bioinformatics, medical informatics, and social and behavior studies as well as local, state, and federal law enforcement and intelligence experts, and information technology industry consultants and practitioners to support counterterrorism and homeland security missions of anticipation, interdiction, prevention, preparedness and response to terrorist acts. Topic of Interest: I. Information Sharing and Data/Text/Web Mining Intelligence-related knowledge discovery Criminal data mining and network analysis Criminal/intelligence information sharing and visualization Web-based intelligence monitoring and analysis Spatial-temporal data analysis/GIS for crime analysis and security informatics Deception and intent detection Cyber-crime detection and analysis Authorship analysis and identification Agents and collaborative systems for intelligence sharing HCI and user interfaces of relevance to intelligence and security Information sharing policy and governance II. Infrastructure Protection and Emergency Responses Public/animal health and bioterrorism information infrastructure Transportation and communication infrastructure protection Cyber-infrastructure design and protection Intrusion detection Border/transportation safety Emergency response and management Disaster prevention, detection, and management Communication and decision support for search and rescue Assisting citizens? responses to terrorism and catastrophic events III. Terrorism Informatics Terrorism related analytical methodologies and software tools Terrorism knowledge portals and databases Terrorist incident chronology databases Terrorism root cause analysis Social network analysis, visualization, and simulation Forecasting terrorism Countering terrorism Measuring the impact of terrorism on society Measuring the ?effectiveness of counter-terrorism campaigns IV. Enterprise Risk Management and Information Systems Security Information security management standards Information systems security policies Behavior issues in information systems security Fraud detection Cyber crime and social impacts Corporate going concerns and risks Accounting and IT auditing Corporate governance and monitoring Board activism and influence Corporate sentiment surveillance Market influence analytics and media intelligence Consumer-generated media and social media analytics ISI-KDD Challenge In addition, we are also organizing the ISI-KDD Challenge, participants are challenged to ?find the more radical and infectious threads, members, postings, ideas and ideologies? in a Dark Web Portal of several complete multi-year extremist forums. Participants of the workshop will be granted access to more than 1,000,000 messages and postings by these radical members. Participants are free to develop novel computational techniques and algorithms, e.g., linguistic analysis, topic extraction, multilingual text parsing, sentiment analysis, social network analysis, time-series analysis, etc. for the challenge. Participants are requested to describe their methods and results in papers. A panel of terrorism study experts will help evaluate the validity and value of the computing results. Workshop Chairs: Hsinchun Chen (The University of Arizona, Tucson, USA) Christopher C. Yang (College of Information Science and Technology, Drexel Univ., USA) Submission Instructions Manuscripts should be in English and must not exceed 10 pages using the standard ACM format found at http://www.acm.org/sigs/publications/proceedings-templates in PDF format. Please make submission through the online submission system at: http://www.easychair.org/conferences/?conf=isikdd2010 Publication All submitted papers will be refereed for quality and originality by the Program Committee. Papers accepted for presentation at the workshop will be published in the workshop proceedings, which will be included in the ACM Digital Library. Contacts For general inquiries about the workshop, please contact: Christopher C. Yang Drexel University College of Information Science and Technology 3141 Chestnut Street Philadelphia, PA 19104 USA Email: chris.yang(-AT-)ischool.drexel.edu |
|