Sign for Notice Everyday    Sign Up| Sign In| Link| English|

Our Sponsors


    ISI 2012 - IEEE International Conference on Intelligence and Security Informatics (ISI )

    View: 3546

    Website www.isiconference.org | Want to Edit it Edit Freely

    Category ISI 2012

    Deadline: February 15, 2012 | Date: June 11, 2012-June 14, 2012

    Venue/Country: Washington, U.S.A

    Updated: 2012-01-19 22:19:38 (GMT+9)

    Call For Papers - CFP

    Intelligence and Security Informatics (ISI) research is an interdisciplinary research field involving academic researchers in information technologies, computer science, public policy, bioinformatics, and social and behavior studies as well as local, state, and federal law enforcement and intelligence experts, and information technology industry consultants and practitioners to support counterterrorism and homeland security missions of anticipation, interdiction, prevention, preparedness and response to terrorist acts. The annual IEEE International ISI Conference series (http://www.isiconference.org/) was started in 2003, and the first nine meetings were held in Tucson, AZ (twice); Atlanta, GA; San Diego, CA; New Brunswick, NJ; Taipei, Taiwan; Dallas, TX; Vancouver, Canada; and Beijing, China. Proceedings of these ISI meetings and workshops have been published by the IEEE Press and in the Springer Lecture Notes in Computer Science (LNCS) series.

    ISI 2012 will be organized in four main streams focusing on

    Information Sharing and Data/Text Mining,

    Infrastructure Protection and Emergency Responses,

    Terrorism Informatics, and

    Enterprise Risk Management and Information Systems Security

    Submissions may include systems, methodology, testbed, modeling, evaluation, and policy papers. Research should be relevant to informatics, organization, or public policy in applications of counter-terrorism or protection of local/ national/international security in the physical world or cyberspace. Topics include but are not limited to:

    Information Sharing and Data/Text Mining

    Intelligence-related knowledge discovery

    Computer or cyber crime investigations and digital forensics

    Criminal investigative criteria and standard of procedure on Computer crime

    Criminal data mining and network analysis

    Forecasting crime and the impact of crime

    Criminal/intelligence information sharing and visualization

    Crime pattern recognition and modeling tools

    Web-based intelligence monitoring and analysis

    Spatial-temporal data analysis/GIS for crime analysis and security informatics

    Deception and intent detection

    Cyber-crime detection and analysis

    Authorship analysis and identification

    Applications of digital library technologies in intelligence data processing, preservation, sharing, and analysis

    Agents and collaborative systems for intelligence sharing

    HCI and user interfaces of relevance to intelligence and security

    Information sharing policy and governance

    Privacy, security, and civil liberties issues

    Intelligence-computerized community security and surveillance system

    Infrastructure Protection and Emergency Responses

    Cyber-Physical-Social system security and incident management

    Cyber-infrastructure design and protection

    Intrusion detection

    Bio-terrorism tracking, alerting, and analysis

    Bio-terrorism information infrastructure

    Transportation and communication infrastructure protection

    Border/transportation safety

    Law Enforcement decision support systems

    Emergency response and management

    Disaster prevention, detection, and management

    Communication and decision support for search and rescue

    Assisting citizens' responses to terrorism and catastrophic events

    Computer forensics and crime lead discovery

    Anti-fraud information technology

    Terrorism Informatics

    Terrorism related analytical methodologies and software tools

    Terrorism knowledge portals and databases

    Terrorist incident chronology databases

    Terrorism root cause analysis

    Social network analysis (radicalization, recruitment, conducting operations), visualization, and simulation

    Forecasting terrorism

    Countering terrorism

    Measuring the impact of terrorism on society

    Measuring the effectiveness of counter-terrorism campaigns

    Crime intelligence and cyberspace crime investigation

    Immigration and security

    Enterprise Risk Management and Information Systems Security

    Information security management standards

    Information systems security policies

    Behavior issues in information systems security

    Fraud detection

    Cyber crime and social impacts

    Corporate going concerns and risks

    Accounting and IT auditing

    Corporate governance and monitoring

    Board activism and influence

    Corporate sentiment surveillance

    Market influence analytics and media intelligence

    Consumer-generated media and social media analytics

    Paper submission instructions and template information can soon be found on the Submissions page at http://isi.borders.arizona.edu/

    WORKSHOPS

    In conjunction with ISI 2012, several workshops will be held on June 11, 2012. The currently committed ones include (1) the Border Security Workshop, (2) the Immigration Studies Workshop, and (3) the International Workshop on Social Computing (SoCo). Workshop proposals are welcome.

    IMPORTANT DATES

    paper submission due date for ISI 2012: February 15, 2012

    Notification of acceptance: March 15, 2012

    The due date for Tutorial/ Workshop proposals: February 27, 2012

    PAPER SUBMISSION

    Submission file formats are PDF and Microsoft Word. Required Word/LaTeX templates (IEEE two-column format) can be found at the conference Web site. Long (6,000 words, 6 pages max.) and short (3000 words, 3 pages max.) papers in English must be submitted electronically via the conference Web site. The accepted papers from ISI 2012 and its affiliated workshops will be published by the IEEE Press in a formal Proceedings. IEEE ISI Proceedings are EI-indexed. Authors who wish to present a poster and/or demo may submit a 1-page extended abstract, which, if selected, will appear in Proceedings. The selected IEEE ISI 2012 best papers will be invited for contribution to the new Springer Security Informatics journal.

    Proposals for tutorials and special-topic workshops in any areas of Intelligence and Security Informatics research and practice are welcome. Such events will be an integral part of the ISI-2012 conference program. Proposals in PDF or Microsoft Word not exceeding 3 pages should be emailed to the conference organizing committee at zengatemail.arizona.edu by February 27, 2012 and contain the following information.

    Title of tutorial/workshop

    Preferred duration (half day vs. full day)

    Brief bios of proposed instructor(s)/organizer(s)

    Objectives to be achieved

    Scope of topics to be covered

    Target audience and evidence of interest (for tutorials)

    Target audience and the list of potential presenters/contributors (for workshops)


    Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
    Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.