[AISWorld] PAISI 2010 Reminder: Submission Deadline February 20 2010

G. Alan Wang alanwang at vt.edu
Fri Feb 12 08:00:54 EST 2010


(Apologies for cross-posting. Please share this with your colleagues and
students.)

CALL FOR PAPERS
------------------------------------------------------------------
Pacific Asia Workshop on Intelligence and Security Informatics 
***** PAISI 2010 *****

(to be held in conjunction with PAKDD 2010)

Workshop Website: http://www.business.hku.hk/paisi/

June 21, 2010, Hyderabad, India
------------------------------------------------------------------

Important Dates
===============
Submission due: February 20, 2010
Notification of acceptance: March 20, 2010
Camera-ready copy due: March 30, 2010

Workshop Scope
==============
Intelligence and Security Informatics (ISI) is concerned with the 
study of the development and use of advanced information 
technologies and systems for national, international, and societal 
security-related applications. The annual IEEE International 
Conference series on ISI was started in 2003. In 2006, the Workshop 
on ISI was started in Singapore in conjunction with PAKDD, with most 
contributors and participants from the Pacific Asian region. The 2nd 
PAISI was then held in Chengdu in 2007, the 3rd PAISI was held in 
conjunction with IEEE ISI in Taipei in 2008, and the 4th PAISI was 
held in conjunction with PAKDD in Bangkok in 2009. This year, PAISI 
2010 will once again be held with PAKDD 2010 and will provide a 
stimulating forum for ISI researchers in Pacific Asia and other 
regions of the world to exchange ideas and report research progress. 
The workshop also welcomes contributions dealing with ISI challenges 
specific to the Pacific Asian region.

Paper Submission/Areas of Interest
==================================
Submissions may include systems, methodology, testbed, modeling, 
evaluation, and policy papers. Topics include but are not limited to:

I. Information Sharing and Data/Text Mining	
- Intelligence-related knowledge discovery
- Criminal data mining and network analysis
- Criminal/intelligence information sharing and visualization 
- Web-based intelligence monitoring and analysis
- Spatio-temporal data analysis/GIS for crime analysis and security 
informatics 
- Deception and intent detection 
- Cyber-crime detection and analysis 
- Authorship analysis and identification
- Applications of digital library technologies in intelligence data 
processing, preservation, sharing, and analysis 
- Agents and collaborative systems for intelligence sharing 
- HCI and user interfaces of relevance to intelligence and security 
- Information sharing policy and governance
- Privacy and civil liberties issues	

II. Infrastructure Protection and Emergency Responses	
- Public/animal health and bioterrorism information infrastructure 
- Transportation and communication infrastructure protection
- Cyber-infrastructure design and protection
- Intrusion detection
- Border/transportation safety 
- Emergency response and management
- Disaster prevention, detection, and management 
- Communication and decision support for search and rescue 
- Assisting citizens' responses to terrorism and catastrophic events	

III. Terrorism Informatics	
- Terrorism related analytical methodologies and software tools 
- Terrorism knowledge portals and databases
- Terrorist incident chronology databases
- Terrorism root cause analysis 
- Social network analysis (radicalization, recruitment, conducting 
operations), visualization, and simulation 
- Forecasting terrorism 
- Countering terrorism 
- Measuring the impact of terrorism on society 
- Measuring the effectiveness of counter-terrorism campaigns	

IV. Enterprise Risk Management and Information Systems Security
- Information security management standards
- Information systems security policies
- Behavior issues in information systems security
- Fraud detection
- Cyber crime and social impacts
- Corporate going concerns and risks
- Accounting and IT auditing 
- Corporate governance and monitoring
- Board activism and influence
- Corporate sentiment surveillance
- Market influence analytics and media intelligence
- Consumer-generated media and social media analytics

Long (12-page) and short (6-page) papers following the Springer 
LNCS paper templates in English may be submitted electronically via 
the online submission site 
(http://www.easychair.org/conferences/?conf=paisi2010). Submission 
file formats are PDF, Microsoft Word, or LaTeX. We are in the process 
of making arrangements with Springer to publish accepted PAISI 2009 
papers in its Lecture Notes in Computer Science (LNCS) series, as for 
PAISI 2009, PAISI 2008, PAISI2007, and WISI2006. Required LNCS 
Microsoft Word/LaTeX templates can be found on the workshop Website. 
Authors who wish to only present a poster may submit a 2-page extended 
abstract, which will be reviewed and will appear in the Proceedings 
if accepted.

Hosts and Major Sponsors
========================
The University of Arizona, USA
The University of Hong Kong
The University of Mysore, India

Workshop Organizing Co-chairs 
=============================
Hsinchun Chen, The University of Arizona, USA
Michael Chau, The University of Hong Kong
Shu-hsing Li, National Taiwan University
Shalini Urs, The University of Mysore

Program Co-chairs 
=================
Srinath Srinivasa, IIIT-Bangalore, India
G. Alan Wang, Virginia Tech, USA







More information about the AISWorld mailing list