Our Sponsors
Website www.isiconference.org |
Edit Freely
Category ISI 2012
Deadline: February 15, 2012 | Date: June 11, 2012-June 14, 2012
Venue/Country: Washington, U.S.A
Updated: 2012-01-19 22:19:38 (GMT+9)
) was started in 2003, and the first nine meetings were held in Tucson, AZ (twice); Atlanta, GA; San Diego, CA; New Brunswick, NJ; Taipei, Taiwan; Dallas, TX; Vancouver, Canada; and Beijing, China. Proceedings of these ISI meetings and workshops have been published by the IEEE Press and in the Springer Lecture Notes in Computer Science (LNCS) series.ISI 2012 will be organized in four main streams focusing onInformation Sharing and Data/Text Mining,Infrastructure Protection and Emergency Responses,Terrorism Informatics, andEnterprise Risk Management and Information Systems SecuritySubmissions may include systems, methodology, testbed, modeling, evaluation, and policy papers. Research should be relevant to informatics, organization, or public policy in applications of counter-terrorism or protection of local/ national/international security in the physical world or cyberspace. Topics include but are not limited to:Information Sharing and Data/Text MiningIntelligence-related knowledge discoveryComputer or cyber crime investigations and digital forensicsCriminal investigative criteria and standard of procedure on Computer crimeCriminal data mining and network analysisForecasting crime and the impact of crimeCriminal/intelligence information sharing and visualizationCrime pattern recognition and modeling toolsWeb-based intelligence monitoring and analysisSpatial-temporal data analysis/GIS for crime analysis and security informaticsDeception and intent detectionCyber-crime detection and analysisAuthorship analysis and identificationApplications of digital library technologies in intelligence data processing, preservation, sharing, and analysisAgents and collaborative systems for intelligence sharingHCI and user interfaces of relevance to intelligence and securityInformation sharing policy and governancePrivacy, security, and civil liberties issuesIntelligence-computerized community security and surveillance systemInfrastructure Protection and Emergency ResponsesCyber-Physical-Social system security and incident managementCyber-infrastructure design and protectionIntrusion detectionBio-terrorism tracking, alerting, and analysisBio-terrorism information infrastructureTransportation and communication infrastructure protectionBorder/transportation safetyLaw Enforcement decision support systemsEmergency response and managementDisaster prevention, detection, and managementCommunication and decision support for search and rescueAssisting citizens' responses to terrorism and catastrophic eventsComputer forensics and crime lead discoveryAnti-fraud information technologyTerrorism InformaticsTerrorism related analytical methodologies and software toolsTerrorism knowledge portals and databasesTerrorist incident chronology databasesTerrorism root cause analysisSocial network analysis (radicalization, recruitment, conducting operations), visualization, and simulationForecasting terrorismCountering terrorismMeasuring the impact of terrorism on societyMeasuring the effectiveness of counter-terrorism campaignsCrime intelligence and cyberspace crime investigationImmigration and securityEnterprise Risk Management and Information Systems SecurityInformation security management standardsInformation systems security policiesBehavior issues in information systems securityFraud detectionCyber crime and social impactsCorporate going concerns and risksAccounting and IT auditingCorporate governance and monitoringBoard activism and influenceCorporate sentiment surveillanceMarket influence analytics and media intelligenceConsumer-generated media and social media analyticsPaper submission instructions and template information can soon be found on the Submissions page at http://isi.borders.arizona.edu/
WORKSHOPSIn conjunction with ISI 2012, several workshops will be held on June 11, 2012. The currently committed ones include (1) the Border Security Workshop, (2) the Immigration Studies Workshop, and (3) the International Workshop on Social Computing (SoCo). Workshop proposals are welcome.IMPORTANT DATESpaper submission due date for ISI 2012: February 15, 2012Notification of acceptance: March 15, 2012The due date for Tutorial/ Workshop proposals: February 27, 2012PAPER SUBMISSIONSubmission file formats are PDF and Microsoft Word. Required Word/LaTeX templates (IEEE two-column format) can be found at the conference Web site. Long (6,000 words, 6 pages max.) and short (3000 words, 3 pages max.) papers in English must be submitted electronically via the conference Web site. The accepted papers from ISI 2012 and its affiliated workshops will be published by the IEEE Press in a formal Proceedings. IEEE ISI Proceedings are EI-indexed. Authors who wish to present a poster and/or demo may submit a 1-page extended abstract, which, if selected, will appear in Proceedings. The selected IEEE ISI 2012 best papers will be invited for contribution to the new Springer Security Informatics journal.Proposals for tutorials and special-topic workshops in any areas of Intelligence and Security Informatics research and practice are welcome. Such events will be an integral part of the ISI-2012 conference program. Proposals in PDF or Microsoft Word not exceeding 3 pages should be emailed to the conference organizing committee at zeng
email.arizona.edu by February 27, 2012 and contain the following information.Title of tutorial/workshopPreferred duration (half day vs. full day)Brief bios of proposed instructor(s)/organizer(s)Objectives to be achievedScope of topics to be coveredTarget audience and evidence of interest (for tutorials)Target audience and the list of potential presenters/contributors (for workshops)Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.