VISM 2011 - International Workshop on Visualization and Information Security Management
View: 726
Website http://www.security-conference.eu/VISM/index.php/cfp |
Edit Freely
Category VISM 2011
Deadline: March 20, 2011 | Date: August 29, 2011-September 02, 2011
Venue/Country: Vienna, Austria
Updated: 2011-03-02 06:50:30 (GMT+9)
Call For Papers - CFP
In today's global economy, where conditions change often and rapidly, the efficient, effective as well as continuous management of information security has become a central issue. Exercising for instance strong computer security is a company’s crucial task in order to strengthen the resilience of IT systems against arising threats. However, the most sophisticated technical security techniques will fail, if there is no adequate management attention enabling proper planning, design and implementation of these techniques. At this point, visualization plays a fundamental role in mining, aggregating and presenting relevant information.The purpose of this conference is to act as an interdisciplinary platform for decision-makers, academics, and professionals interested in the development and application of concepts as well as technology in ensuring the sustainable use and management of information. Several orientations of research can be imagined, and we welcome submissions coming from various disciplinary or methodological horizons. We are keen to encourage practitioners to contribute as well as academics and we would like to encourage proposals dealing in particular with one of the following aspects.Topics of interestTopics of interest include, but are not limited to:AuditingBusiness ContinuityCost/Benefit AnalysisData Hiding TechniquesData RecoveryDigital EvidenceDigital Evidence Extraction TechniquesDigital Evidence Search TechniquesDigital Forensic Information VisualizationDigital ForensicsDisaster Recovery Identity Management Information AssuranceInformation Security ManagementInformation Security Metrics and Measurement Insider ThreatsIT Governance and ComplianceIT Service ContinuityManagement and Virtualization Tools Risk ManagementSecurity Awareness and EducationSecurity CultureSecurity Requirements EngineeringStandards, Best Practices and CertificationDeadlinesSubmission Deadline: March 20th, 2011Author Notification: April 20th, 2011Author Registration: May 20th, 2011Proceedings Version: May 20th, 2011Conference/Workshop: August 29th ? September 02nd, 2011Workshop OrganizersStefan Jakoubi, Secure Business Austria, AustriaSimon Tjoa, St. Pölten University of Applied Sciences, AustriaPaper SubmissionAuthors are invited to submit original, unpublished research and application papers that are not being considered in another forum. Manuscripts will be limited to 5 two-column pages (IEEE Proceeding style) including figures and references. Please follow the IEEE Computer Society's Conference Publishing Services Author Guidelines to prepare your papers. Authors of accepted papers are requested to sign the IEEE copyright form. The author guidelines can be found at http://www.computer.org/portal/web/cscps/formatting
.Papers have to be electronically (PDF, DOC) submitted via the DEXA submission system (http://confdriver.ifs.tuwien.ac.at/dexa2011/
). At least one author of each accepted paper is required to attend the conference and present the paper. Papers accepted for presentation will be published by IEEE Computer Society Press as proceedings of the DEXA 2011 workshops.
Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.