[AISWorld] PAISI 2010 Reminder: Submission Deadline February 20 2010
G. Alan Wang
alanwang at vt.edu
Fri Feb 12 08:00:54 EST 2010
(Apologies for cross-posting. Please share this with your colleagues and
students.)
CALL FOR PAPERS
------------------------------------------------------------------
Pacific Asia Workshop on Intelligence and Security Informatics
***** PAISI 2010 *****
(to be held in conjunction with PAKDD 2010)
Workshop Website: http://www.business.hku.hk/paisi/
June 21, 2010, Hyderabad, India
------------------------------------------------------------------
Important Dates
===============
Submission due: February 20, 2010
Notification of acceptance: March 20, 2010
Camera-ready copy due: March 30, 2010
Workshop Scope
==============
Intelligence and Security Informatics (ISI) is concerned with the
study of the development and use of advanced information
technologies and systems for national, international, and societal
security-related applications. The annual IEEE International
Conference series on ISI was started in 2003. In 2006, the Workshop
on ISI was started in Singapore in conjunction with PAKDD, with most
contributors and participants from the Pacific Asian region. The 2nd
PAISI was then held in Chengdu in 2007, the 3rd PAISI was held in
conjunction with IEEE ISI in Taipei in 2008, and the 4th PAISI was
held in conjunction with PAKDD in Bangkok in 2009. This year, PAISI
2010 will once again be held with PAKDD 2010 and will provide a
stimulating forum for ISI researchers in Pacific Asia and other
regions of the world to exchange ideas and report research progress.
The workshop also welcomes contributions dealing with ISI challenges
specific to the Pacific Asian region.
Paper Submission/Areas of Interest
==================================
Submissions may include systems, methodology, testbed, modeling,
evaluation, and policy papers. Topics include but are not limited to:
I. Information Sharing and Data/Text Mining
- Intelligence-related knowledge discovery
- Criminal data mining and network analysis
- Criminal/intelligence information sharing and visualization
- Web-based intelligence monitoring and analysis
- Spatio-temporal data analysis/GIS for crime analysis and security
informatics
- Deception and intent detection
- Cyber-crime detection and analysis
- Authorship analysis and identification
- Applications of digital library technologies in intelligence data
processing, preservation, sharing, and analysis
- Agents and collaborative systems for intelligence sharing
- HCI and user interfaces of relevance to intelligence and security
- Information sharing policy and governance
- Privacy and civil liberties issues
II. Infrastructure Protection and Emergency Responses
- Public/animal health and bioterrorism information infrastructure
- Transportation and communication infrastructure protection
- Cyber-infrastructure design and protection
- Intrusion detection
- Border/transportation safety
- Emergency response and management
- Disaster prevention, detection, and management
- Communication and decision support for search and rescue
- Assisting citizens' responses to terrorism and catastrophic events
III. Terrorism Informatics
- Terrorism related analytical methodologies and software tools
- Terrorism knowledge portals and databases
- Terrorist incident chronology databases
- Terrorism root cause analysis
- Social network analysis (radicalization, recruitment, conducting
operations), visualization, and simulation
- Forecasting terrorism
- Countering terrorism
- Measuring the impact of terrorism on society
- Measuring the effectiveness of counter-terrorism campaigns
IV. Enterprise Risk Management and Information Systems Security
- Information security management standards
- Information systems security policies
- Behavior issues in information systems security
- Fraud detection
- Cyber crime and social impacts
- Corporate going concerns and risks
- Accounting and IT auditing
- Corporate governance and monitoring
- Board activism and influence
- Corporate sentiment surveillance
- Market influence analytics and media intelligence
- Consumer-generated media and social media analytics
Long (12-page) and short (6-page) papers following the Springer
LNCS paper templates in English may be submitted electronically via
the online submission site
(http://www.easychair.org/conferences/?conf=paisi2010). Submission
file formats are PDF, Microsoft Word, or LaTeX. We are in the process
of making arrangements with Springer to publish accepted PAISI 2009
papers in its Lecture Notes in Computer Science (LNCS) series, as for
PAISI 2009, PAISI 2008, PAISI2007, and WISI2006. Required LNCS
Microsoft Word/LaTeX templates can be found on the workshop Website.
Authors who wish to only present a poster may submit a 2-page extended
abstract, which will be reviewed and will appear in the Proceedings
if accepted.
Hosts and Major Sponsors
========================
The University of Arizona, USA
The University of Hong Kong
The University of Mysore, India
Workshop Organizing Co-chairs
=============================
Hsinchun Chen, The University of Arizona, USA
Michael Chau, The University of Hong Kong
Shu-hsing Li, National Taiwan University
Shalini Urs, The University of Mysore
Program Co-chairs
=================
Srinath Srinivasa, IIIT-Bangalore, India
G. Alan Wang, Virginia Tech, USA
More information about the AISWorld
mailing list