[AISWorld] Call for Papers

Patricia Rafferty patricia.rafferty at sju.edu
Thu Mar 29 11:55:39 EDT 2012


INTERNATIONAL JOURNAL OF BUSINESS INTELLIGENCE RESEARCH [IJBIR] 

Call for Papers: 
The Editor-in-Chief of the International Journal of Business Intelligence Research (IJBIR) would like to invite you to consider submitting a manuscript for inclusion in this scholarly journal. The following describes the mission, the coverage, and directions for submission to IJBIR. 

Mission: The mission of the journal is to advance research in the field of business intelligence and analytics and to identify ways that BI creates value for organizations. The journal publishes original academic research/case studies, as well as selective thought provoking papers on issues, strategies, practices, techniques, and technologies from both academics and practitioners that advance the understanding and practice of Business Intelligence. The focus of this journal is to identify innovative Business Intelligence strategies and to assess the application of theoretical concepts to real-world situations. IJBIR takes a multidisciplinary approach to the examination of business intelligence. 

Submitting to IJBIR: 
Prospective authors should note that only original and previously unpublished articles will be considered. INTERESTED AUTHORS MUST CONSULT THE JOURNAL'S GUIDELINES FOR MANUSCRIPT SUBMISSIONS at http://www.igi-global.com/development/author_info/guidelines submission.pdf prior to submission. All article submissions will be forwarded to at least 2 members of the Editorial Review Board of the journal for double-blind, peer review. Final decision regarding acceptance/revision/rejection will be based on the reviews received from the reviewers. All submissions must be forwarded electronically to patrica.rafferty at sju.edu. 

Publisher: 
The International Journal of Business Intelligence Research (IJBIR) is published by IGI For additional information regarding the publisher, please visit www.igi-global.com. 

All inquiries and submissions should be sent to: 
patricia.rafferty at sju.edu 












Patricia D. Rafferty, Ed.D. 
Erivan K. Haub School of Business 
Saint Joseph's University 

Director 
Master of Science in Business Intelligence Program 
Master of Science in Managing Human Capital Program 
Managing Editor 
International Journal of Business Intelligence Research 
http://www.igi-global.com/bookstore/titledetails.aspx?titleid=1168&detailstype=description 

Be part of the evolution in human resource management and learn about our program name change at www.sju.edu/hsb/hr 



----- Original Message ----- 
From: aisworld-request at lists.aisnet.org 
To: aisworld at lists.aisnet.org 
Sent: Thursday, March 29, 2012 11:21:32 AM GMT -05:00 US/Canada Eastern 
Subject: AISWorld Digest, Vol 29, Issue 38 

Send AISWorld mailing list submissions to 
aisworld at lists.aisnet.org 

To subscribe or unsubscribe via the World Wide Web, visit 
http://lists.aisnet.org/mailman/listinfo/aisworld_lists.aisnet.org 
or, via email, send a message with subject or body 'help' to 
aisworld-request at lists.aisnet.org 

You can reach the person managing the list at 
aisworld-owner at lists.aisnet.org 

When replying, please edit your Subject line so it is more specific 
than "Re: Contents of AISWorld digest..." 


Today's Topics: 

1. Call for Book Chapters: ?Intellectual Capital Strategy 
Management for Knowledge-Based Organizations? 
(PATRICIA ORDO?EZ DE PABLOS) 
2. Journal of Information Systems Education (JISE) Vol 22 Issue 
4 (Kruck, S - kruckse) 
3. JGITM, Vol 15, No 1, January 2012 (Prashant Palvia) 
4. CFP WOSIS 2012. Deadline extended: 10 April (DAVID GARCIA ROSADO) 
5. JGITM, Vol 15, No 2, April 2012 (Prashant Palvia) 
6. Contents of JAIS, Volume 13, Issue 3 (March) (Gregor, Shirley) 
7. JAIS Theory & Writing Workshop ECIS, 2-5pm 10 June 
(Gregor, Shirley) 
8. PhD Studentship in Responsible Research and Innovation in ICT 
(Bernd Carsten STAHL) 
9. DESRIST 2012 early registration ends March 31 
(Marcus Rothenberger) 
10. invitation to KIN summer workshop Amsterdam (Marleen Huysman) 
11. ITSM Implementation Survey (Rob Benyon) 
12. VORTE 2012 - Last CFP (Amal Zouaq) 
13. Deadline Extension: International Workshop on Information 
Value Management (Mouzhi Ge) 
14. 1st CFP: 10th IEEE/IFIP International Conference on Embedded 
and Ubiquitous Computing (George Angelos Papadopoulos) 


---------------------------------------------------------------------- 

Message: 1 
Date: Wed, 28 Mar 2012 18:35:59 +0200 
From: "PATRICIA ORDO?EZ DE PABLOS" <patriop at uniovi.es> 
To: aisworld at lists.aisnet.org 
Subject: [AISWorld] Call for Book Chapters: ?Intellectual Capital 
Strategy Management for Knowledge-Based Organizations? 
Message-ID: <959078411020304f.4f735a0f at uniovi.es> 
Content-Type: text/plain; charset="us-ascii" 

An HTML attachment was scrubbed... 
URL: <http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20120328/b48c1395/attachment-0001.html> 

------------------------------ 

Message: 2 
Date: Wed, 28 Mar 2012 17:24:45 +0000 
From: "Kruck, S - kruckse" <kruckse at jmu.edu> 
To: "'aisworld at lists.aisnet.org'" <aisworld at lists.aisnet.org> 
Subject: [AISWorld] Journal of Information Systems Education (JISE) 
Vol 22 Issue 4 
Message-ID: 
<1FCCDBC71F38D749BAA9BD1317A9629E1B23DAD9 at IT-EXMB3.ad.jmu.edu> 
Content-Type: text/plain; charset="us-ascii" 

IS Professors and IS Education Professionals around the world: 



The Journal of Information Systems Education (JISE) is pleased to announce that Volume 22, Number 4 has been published. JISE is the leading academic journal dedicated to IS education and is the official publication of the Education Special Interest Group (EDSIG) of AITP (the Association of Information Technology Professionals). The index and abstracts for each paper for this issue and abstracts for all papers in Vol. 22(4) can be found at http://jise.org/Volume22/22-4/Contents-22-4.html. 



Contents of Vol. 22(4) include: 



Teaching Case- The Challenge of Implementing an ERP System<http://jise.org/Volume22/22-4/Pdf/Vol22-4pg291.pdf> 

in a Small and Medium Enterprise- A Teaching Case of ERP Project Management<http://jise.org/Volume22/22-4/Pdf/Vol22-4pg291.pdf> 

Hongjiang Xu, Patrick J. Rondeau, and Sakthi Mahenthiran 

(pp 291-296) 



Teaching Case-Procyon LLC: From Music Recommendations to Preference Mapping<http://jise.org/Volume22/22-4/Pdf/Vol22-4pg297.pdf> 

Susan J. Chinn 

(pp 297-306) 



Communication Challenges in Requirements Definition: A Classroom Simulation<http://jise.org/Volume22/22-4/Pdf/Vol22-4pg307.pdf> 

Neil C. Ramiller and Erica L. Wagner 

(pp 307-318) 



The Determinants of the Post-Adoption Satisfaction of <http://jise.org/Volume22/22-4/Pdf/Vol22-4pg319pdf.pdf> 

Educatorswith an E-Learning System<http://jise.org/Volume22/22-4/Pdf/Vol22-4pg319pdf.pdf> 

A.K.M. Najmul Islam 

(pp 319-332) 



The Systems Analysis and Design Course: An Educators'<http://jise.org/Volume22/22-4/Pdf/Vol22-4pg333.pdf> 

Assessment of the Importance and Coverage of Topics<http://jise.org/Volume22/22-4/Pdf/Vol22-4pg333.pdf> 

Brandi N. Guidry, David P. Stevens, and Michael W. Totaro 

(pp 333-348) 



IS 2010 and ABET Accreditation: An Analysis of ABET-<http://jise.org/Volume22/22-4/Pdf/Vol22-4pg349.pdf> 

Accredited Information Systems Programs<http://jise.org/Volume22/22-4/Pdf/Vol22-4pg349.pdf> 

Bruce Saulnier and Bruce White 

(pp 349-356) 



An Approach to Meeting AACSB Assurance of Learning<http://jise.org/Volume22/22-4/Pdf/Vol22-4pg357.pdf> 

Standards in an IS Core Course<http://jise.org/Volume22/22-4/Pdf/Vol22-4pg357.pdf> 

Alan N. Attaway, Satish Chandra, Brian L. Dos Santos, Matt E. Thatcher, and Andrew L. Wright 

(pp 357-368) 



Experiencing the Elicitation of User Requirements and Recording<http://jise.org/Volume22/22-4/Pdf/Vol22-4pg369.pdf> 

them in Use Case Diagrams through Role-Play<http://jise.org/Volume22/22-4/Pdf/Vol22-4pg369.pdf> 
<http://jise.org/Volume22/22-3/Pdf/1199124%20-%2010%20pgs.pdf>Gay Costain and Brad McKenna 

(pp 369-382) 



Call for Papers<http://jise.org/CFP-GlobalSecInfoAssurance.pdf> - Global Information Security and Assurance in IS Education 

*********************************************************************** 

About the Journal of Information Systems Education (JISE): 



SAMPLE COPIES: If you have not received a free sample and would like to receive one, please send an e-mail message with your name and full mailing address to editor at jise.org<mailto:editor at jise.org>. 



CALL FOR MANUSCRIPTS: JISE invites contributions from IS educators and scholars involving IS education. We accept manuscripts in the following areas: IS education research, teaching tips, innovative classroom practices, curriculum issues, teaching cases, classroom minicases, current topics in IS education, IS education trends and new ideas and other IS education-related topics. Submissions should be sent electronically to editor at jise.org<mailto:editor at jise.org>. 



REVIEW PROCESS: Each article submitted to JISE is blind reviewed by members of the Editorial Board and/or other reviewers. Authors are informed of the results of the review by the Editor. The final decision for the publishing of any manuscript is made by the Editor. 



JISE is indexed by ABI/Inform, EBSCO Business Source Complete & Education Research Complete, Gale Group, Inc., ProQuest, H.W. Wilson, Educational Research Abstracts (ERA), Education Resources Information Center (ERIC), WilsonWeb/Wilson OmniFile, Cabell's Directory of Publishing Opportunities, and Ulrich's Periodicals Directory. 



The JISE web site is located at http://jise.org 


S.E. Kruck, Ph.D., CPA, CCP 
KruckSE at JMU.edu<mailto:KruckSE at JMU.edu> 
Professor, Computer Information Systems Department - http://cob.jmu.edu/kruckse 
Editor-in-Chief, Journal of Information Systems Education - http://jise.org<http://jise.org/> (editor at jise.org<mailto:editor at jise.org> or jise at jmu.edu) 
LinkedIn: Journal of Information Systems Education 
Twitter: J_Info_Sys_Educ 
Facebook: JISE 

Board of Directors, EdSIG (AITP) - http://www.aitp-edsig.org<http://www.aitp-edsig.org/> 

President, Friends of Valley Charities - http://tinyurl.com/FriendsofValleyCharities 

James Madison University 
800 Main Street 
College of Business - MSC0202 
Harrisonburg, VA 22807 


-------------- next part -------------- 
An HTML attachment was scrubbed... 
URL: <http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20120328/cb829cdf/attachment-0001.html> 

------------------------------ 

Message: 3 
Date: Wed, 28 Mar 2012 14:06:02 -0400 
From: Prashant Palvia <pcpalvia at uncg.edu> 
To: AISWorld <aisworld at lists.aisnet.org> 
Cc: Vinay Deep Khanapuram <v_khanap at uncg.edu> 
Subject: [AISWorld] JGITM, Vol 15, No 1, January 2012 
Message-ID: 
<CABvY-Xsn_gRrWJ=7edCbujUiktmLSZhb3nXq6OwBZKLxMqxN0A at mail.gmail.com> 
Content-Type: text/plain; charset="windows-1252" 

This issue was published in January 2012. Sorry for the delay in posting. 

Please distribute to colleagues and relevant lists. 
************************* 
CONTENTS OF VOLUME 15, NUMBER 1, (January 2012) OF THE JOURNAL OF GLOBAL 
INFORMATION TECHNOLOGY MANAGEMENT (JGITM) 

Note that JGITM is now among the elite group of MIS journals included in 
the prestigious Social Sciences Citation Index (SSCI). It is included in 
both SSCI and CC/S&BS, both produced by Thomson Reuters. 

http://jgitm.uncg.edu/ 

Publisher: Ivy League Publishing, http://www.ivylp.com, email: 
admin at ivylp.com 

****************************************************************************** 
IF YOU HAVE NOT RECEIVED A FREE SAMPLE IN THE PAST AND WOULD LIKE TO 
RECEIVE ONE, PLEASE WRITE OR SEND AN EMAIL MESSAGE TO THE EDITOR-IN-CHIEF: 
Prashant Palvia, Ph.D., 

The University of North Carolina at Greensboro (pcpalvia at uncg.edu and 
rmouzts at uncg.edu). 
****************************************************************************** 
CALL FOR MANUSCRIPTS: The journal invites contributions from all parts of 
the world from academic and industry scholars involved in research, 
management, and the utilization of global information resources. Besides 
quality work, at a minimum each submitted article should have the following 
three components: an IS topic, an international orientation (e.g., cross 
cultural studies or strong international implications), and strong evidence 
(e.g., survey data, case studies, experiments, secondary data, etc.). 
Please submit your manuscript electronically to the Editor-in-Chief at 
pcpalvia at uncg.edu. 

REVIEW PROCESS: Each suitable article is blind-reviewed by three members of 
the editorial review board. A recommendation is then made by the 
Editor-in-Chief or an Associate Editor. The final decision is made by the 
Editor-in-Chief. If a revision is recommended, the revised paper is sent 
for final approval to one of the Editors. 



CONTENTS OF THIS ISSUE OF JGITM (VOL. 15, NO.1, January 2012) 



SOCIAL MEDIA AND THE GLOBAL CIO 

Anil Kumar, Central Michigan University, anil.kumar at cmich.edu 

The global CIOs job has become both more challenging and interesting as she 
attempts to understand how to exploit social media technologies in her 
organization. The return on investment can be significant if the strategy 
to implement social media technologies is well executed. When planning for 
the social media platform that an organization will use, a global CIO must 
always look to the future as these technologies are evolving very fast. Global 
CIOs that ignore social media technologies do so at their own peril. The 
author discusses a number of issues realted to the use of social media in 
this timely and thought provoking editorial. 

A CROSS CULTURAL COMPARISON OF THE EXTENDED TPB: THE CASE OF DIGITAL PIRACY 

Sulaiman Al-Rafee, Kuwait University, sulaiman at cba.edu.kw 

Ali E. Dashti, Kuwait University, ali.dahti at ku.edu.kw 

This study examined a behavioral model in two different cultures (in the 
U.S., and in the Middle East), within the context of digital piracy. The 
model was extended by adding moral obligation as a factor influencing 
intention to pirate digital media. The results show, that while the 
overall model was significant in predicting the piracy behavior across the 
two cultures, there were differences in the influence of the individual 
variables. Subjective norm was only significant in the Middle East, and 
moral obligation was highly significant in the U.S. sample. Attitude and 
perceived behavioral control were found to be at least moderately 
significant in both cultures. 

A PROCESS MODEL OF GOVERNMENT INTERVENTION AND CAPABILITY DEVELOPMENT: 
LESSONS FROM THE TECHNOLOGY CLUSTER FORMATION IN HYDERABAD, INDIA 

Ramiro Montealegre, University of Colorado, Boulder, 
Ramiro.Montealegre at Colorado.edu 

This study examines the path taken by the government of the Indian state of 
Andhra Pradesh that recently established an information technology (IT) 
cluster in Hyderabad, the capital city. The city went from virtually no 
presence in IT to developing one of the world?s most vibrant IT clusters in 
the world. A retrospective case study research was conducted guided by two 
research questions: (1) how institutional actions influenced the capability 
development that shaped the IT cluster formation in Hyderabad and (2) why 
did it succeed despite the poor fit with its initial context? A process 
model serves as the central contribution of this research. 



ICT ADOPTION IN FACILITIES MANAGEMENT SUPPLY CHAIN: THE CASE OF DENMARK 

Ada Scupola, Roskilde University, Denmark, Ada at ruc.dk 

This is a qualitative study of factors impacting the adoption of ICT 
solutions in the Danish facility management supply chain. There are a 
number of drivers and barriers that influence the adoption of ICT solutions 
in this service sector. These are grouped under three major categories: 
organizational factors including strategic and operational factors; 
external environmental factors including supplier interdependence and 
industry characteristics; and technological factors including compatibility 
and complexity. The study is relevant to researchers concerned with ICT 
adoption, operations and service management (especially facilities 
management) as well as operation managers and ICT managers. 



THE EXPERT OPINION: AN INTERVIEW WITH SCOTT BENDLE, CIO, RIGAKU AMERICAS 
CORPORATION 

Conducted by Paul S. Licker, Oakland University, licker at oakland.edu 

Scott Bendle has more than 25 years in the industry, after starting his 
career teaching Laser-Electro-Optics. Rigaku is a Japanese firm, founded 
in 1951 and headquartered in Tokyo, Japan. Rigaku makes and services X-ray 
generators, XFR and XRD technologies. The interview tackles a number of 
important questions including: the role of information technology (IT) in 
their industry and organization, the role of the CIO, the role of IT in 
internationalization, cultural issues, challenges in application 
development and the global IT architecture. 



BOOK REVIEW: WEB INFORMATION SYSTEMS AND TECHNOLOGIES, EDITED BY JOS? 
CORDEIRO AND JOAQUIM FILIPE 

Reviewed by Roberto Vinaja, Texas A&M University - San Antonio, 
bvinaja at tamusa.tamus.edu 

This book provides a balanced view of web-enabled systems by studying both 
the social and technology components of their implementation. It has a 
special emphasis on the relationship between online social networks and 
e-commerce and business intelligence and incorporates a global perspective. 
Several chapters portray a wide range of IT strategic issues faced by 
organizations, such as collaboration, controlled access to enterprise 
resources and information security. Many chapters describe actual 
prototypes that clearly illustrate the principles and lessons described in 
the chapters. 



******************************************** 
For copies of the above articles, please check for the Journal of Global 
Information Technology Management (JGITM) in your institution's library. 
******************************************** MISSION: The mission of the 
Journal of Global Information Technology Management (JGITM) is to continue 
to be the premier journal on Global Information Technology Management. It 
is a refereed international journal supported by global IT scholars from 
all over the world. JGITM publishes articles and reports related to all 
aspects of the application of information technology for international 
business. For example, it will report on information resource management, 
managerial and organizational concerns, educational issues, and innovative 
applications related to global IT. Very important to the journal is its 
emphasis on quality and relevance. The journal disseminates this knowledge 
to researchers, practitioners, academicians, and educators all over the 
world on a timely basis. Finally, the journal is international in all 
respects: content, article authorship, readership, and the editorial board. 



SCOPE AND COVERAGE: The journal's scope is multidisciplinary. It publishes 
research, applied, and educational articles from all areas of MIS as well 
as functional IT applications that have international focus. The journal 
also entertains a variety of methodological approaches. It encourages 
manuscript submissions from authors all over the world, both from academia 
and industry. In addition, the journal will also include educational cases 
and reviews of MIS books that have bearing on global aspects. Practitioner 
input will be specifically solicited from time-to-time in the form of 
industry columns and CIO interviews. 



Articles in the journal include, but are not limited to the following 
areas: Frameworks and models for global information systems (GIS), 
Development, evaluation and management of GIS, Electronic Commerce, 
Internet related issues, Societal impacts of IT in developing countries, IT 
and Economic development, IT Diffusion in developing countries, IT human 
resource issues, DSS/EIS/ES in international settings, Organizational and 
management structures for GIS, Transborder data flow issues, Electronic 
data interchange, Telecommunications, Distributed global databases and 
networks, Cultural and societal impacts, Comparative studies of nations, 
and Applications and case studies (both educational and research). 

******************************** 

Please join us at the next GITMA World conference in Bangalore, India on 
June 17-19, 2012. http://www.gitma.org. IT IS THE FIRST MAJOR 
INTERNATIONAL IS/IT ACADEMIC CONFERENCE TO BE HELD IN INDIA. 
-------------- next part -------------- 
An HTML attachment was scrubbed... 
URL: <http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20120328/23f5f84f/attachment-0001.html> 

------------------------------ 

Message: 4 
Date: Wed, 28 Mar 2012 20:07:19 +0200 
From: "DAVID GARCIA ROSADO" <David.GRosado at uclm.es> 
To: <aisworld at lists.aisnet.org> 
Subject: [AISWorld] CFP WOSIS 2012. Deadline extended: 10 April 
Message-ID: <B767D97BBA9DF44FBAAA7570ABCC5F48CEA6F1 at EVSCR01.uclm.es> 
Content-Type: text/plain; charset="iso-8859-1" 

[Apologies if you receive multiple copies of this announcement. Please pass it on to your colleagues and students who might be interested in contributing] 





The best papers will have the chance to publish extended and revised versions in a special issue of Computer Standards and Interfaces in the ISI Journal Citation Reports with Impact factor of 0.825. 





**** CALL FOR PAPERS **** 

The Ninth International Workshop on Security In Information Systems WOSIS-2012 

28 June - 1 July, 2012 - Wroclaw, Poland 

http://www.iceis.org/wosis.aspx <http://www.iceis.org/wosis.aspx> 



To be held in conjunction with the 14th International Conference on Enterprise Information Systems (ICEIS 2012) http://www.iceis.org/ <http://www.iceis.org/> 



********Important Dates******** 

Regular Paper Submission: 10 April, 2012 (extended) 

Authors Notification: 27 April, 2012 

Camera Ready Submission Deadline: 10 May, 2012 

***************************** 



Co-chairs: 

Dr. David G. Rosado 

University of Castilla-La Mancha, Spain 

David.GRosado at uclm.es 



Dr. Luis Enrique S?nchez 

Sicaman-NT, Departament of R+D, Spain 

lesanchez at sicaman-nt.com 



Dr. Carlos Blanco 

University of Cantabria, Spain 

blancobc at unican.es 



Dr. Jan J?rjens 

Technical University of Dortmund, Germany 

jan.jurjens at cs.tu-dortmund.de 





Workshop Background and Goals 

Information Systems Security is one of the most pressing challenges facing all kinds of organizations today. Although many companies have discovered how critical information is to the success of their business or operations, very few have managed to be effective in maintaining their information secure, avoiding unauthorized access, preventing intrusions, stopping secret information disclosure, etc. 



There are various definitions of security, but all of them basically agree on the same components. Security in information systems considers the protection of information and of the systems that manage it, against a wide range of threats in order to ensure business continuity, minimize risks and maximize the return on investment and business opportunities. 



Security is, therefore, currently a widespread and growing concern that covers all areas of society: business, domestic, financial, government, and so on. In fact, the so-called information society is increasingly dependent on a wide range of software systems whose mission is critical, such as air traffic control systems, financial systems, or public health systems. The potential losses that are faced by businesses and organizations that rely on all these systems, both hardware and software, therefore signify that it is crucial for information systems to be properly secured from the outset. 



With the increasing dependence that the information society has on Information and Communication Technology (ICT), the need to protect information is increasingly important for companies. The demand for products, systems and services with which to manage and maintain information is therefore increasing, and the realization of superficial security controls is not sufficient. It is necessary to apply a rigorous approach to the assessing and improvement of the security of products and processes that take place in the context of ICT. This has led to the emergence of Information Security Management Systems (ISMS), which are of great importance to the stability of companies' information systems. 



In this new edition of WOSIS, the traditional information systems security topics will remain but we want explicitly focus the workshop on one of the most important issues and currently considered as it is security in Cloud computing. Although there are many benefits to adopting cloud computing, there are also some significant barriers to adoption as is security followed by issues regarding compliance, privacy and legal matters. Security is the main obstacle for many organizations in their move to the cloud, related to risk areas such as external data storage, dependency on the "public" internet, multi-tenancy and integration with internal security. The objective of this new edition is to contribute to the study and analysis of solutions and approaches which help to achieve and facilitate the level of security needed for such distributed environments and that its adoption is not any problem for the society, administration and enterprise. 



Topics of interest include, but are not limited to: 

Topic for Cloud Computing 

* Security Engineering for Cloud-Based Systems 
* Security Requirements Engineering for Cloud-Based Systems 
* Risks and threats in Cloud 
* Privacy and Data protection in Cloud 
* Cloud Legal Issues 
* Trust and policy management in Clouds 
* Issues and recent approaches in portability, interoperability and migration 
* Secure migration processes to cloud computing 
* Security in migration models 
* Systems adapted to the cloud 
* Storage security 
* Cloud Infrastructure Security 
* Security Governance in the Cloud 
* Risk management and assessment and third-party risk management 
* Identity & Access Management in the Cloud 
* Security and Virtualization 
* Security in SaaS, PaaS and IaaS 
* Security in Cloud applications 
* Cloud security models 
* MDA and MDS applied to cloud computing 
* Case studies 

Rest of topics 

* Security in Software development Life Cycle 
* Information Security Management System 
* Security Management and Assessment 
* Analysis and management of risks 
* Security Implementation, Secure programming and Security Deployment 
* Case studies and experiences of secure software 
* Security culture 
* IT Governance 
* IT Service Continuity 
* Language-based Security 
* Open Security Standards and Security Certification 
* Common practice, legal and regulatory issues 
* Security for SOA, Web Services, Grid computing 
* Security for Databases and Data Warehouses 
* Metadata and Security 
* Secure Data Management 
* Workflow and Business Process Security 
* Security Metrics and Measurement 
* Security Ontologies 
* Security in Software Product Lines 
* Distributed and Network Security 
* Security & Trust Models 
* Authentication, Authorization and Access Control 
* Anonymity and Privacy 
* Security for Mobile Computing, sensors networks, multimedia systems 
* Security for Electronic Commerce, Electronic Business and e-Services (e-voting, e-banking, e-governement, e-health) 
* Security in Social Networks 
* Security for embedded systems, smart cards and RFID 
* Security Issues in Ubiquitous/Pervasive Computing 
* Intellectual Property Protection 
* Digital Rights Management (DRM). Mobile DRM 
* Personal Data Protection for Information Systems and Digital Identity management 
* Access Control and Rights Expression Languages 
* Semantic Web Technologies applied to Security 
* Security Engineering 
* Disaster Recovery and Failure Prevention 
* Incident Response and Prevention 
* Intrusion Detection and Fraud Detection 
* Biometric Security 
* Cryptology: Cryptography and Cryptanalysis 
* Information hiding: Steganography & Steganalysis 
* Digital Forensics 
* Cyber terrorism 



Paper Submission 

Prospective authors are invited to submit papers for oral presentation in any of the topics listed above. Submitted papers must present original, non-published work of high quality. Only papers in English will be accepted, and the length of the paper should not exceed 10 pages for full papers and 8 pages for short papers (figures and appendices included). 

Instructions for preparing the manuscript (in Word and Latex formats) are available at the conference Paper Templates web page. Please also check the web page with the Submission Guidelines. Papers should be submitted electronically via the web-based submission system at: http://www.insticc.org/Primoris <http://www.insticc.org/Primoris> 



Publications 

All accepted papers will be published in the workshop proceedings book, under an ISBN reference, and in CD-ROM support. Additionally, the best papers will have the chance to publish extended and revised versions in Journal of Computer Standards and Interfaces in the ISI Journal Citation Reports. 



Workshop Program Committee 

Alfonso Rodriguez. University of Bio-Bio. Chile 

Ambrosio Toval. University of Murcia. Spain 

Andreas Bauer, National ICT Australia. Australia 

Antonio Ma?a. University of Malaga. Spain 

Brajendra Panda. University of Arkansas. USA 

Csilla Farkas. University of South Carolina. USA 

Daniel Mellado. University of Castilla-La Mancha. Spain 

Debasis Giri. Haldia Institute of Technology. India 

Duminda Wijesekera. University George Mason. USA 

Eduardo Fern?ndez-Medina. University of Castilla-La Mancha. Spain 

Eduardo B. Fern?ndez. Florida Atlantic University. USA 

Ernesto Damiani. Universit? degli Studi di Milano. Italy 

G?nther Pernul. University of Regensburg. Germany 

Hugo Jonker. University of Luxembourg. Luxembourg 

Indrakshi Ray. Colorado State University. USA 

Jaejoon Lee. Lancaster University. UK 

Jaime Delgado. Universitat Polit?cnica de Catalunya. Spain 

Kevin Butler. University of Oregon. USA 

Luigi Lo Iacono, European University of Applied Sciences. Germany 

Mar?a Carmen Fern?ndez. Universidad de M?laga. Spain 

Mario Piattini. University of Castilla-La Mancha. Spain 

Mihai Christodorescu. University of Wisconsin. USA <http://www.wisc.edu/> 

Raimundas Matulevicius, University of Tartu. Estonia 

Rajkumar Buyya, Univ. of Melbourne. Australia 

Sabrina De Capitani di Vimercati. Universit? degli Studi di Milano. Italy 

Shareful Islam. University of East London. UK 

Shinsaku Kiyomoto. KDDI R & D Laboratories Inc. Japan 

Siani Pearson. Hewlett-Packard Laboratories. Bristol, UK. 

Spyros Kokolakis. Athens University of Economics and Business. Greece 

Stamatis Karnouskos. SAP AG. Germany 

Steven Furnell. University of Plymouth. UK 

Toshihiro Yamauchi. Okayama University <http://www.okayama-u.ac.jp/index_e.html> . Japan 





-------------- next part -------------- 
An HTML attachment was scrubbed... 
URL: <http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20120328/ffd8a343/attachment-0001.html> 

------------------------------ 

Message: 5 
Date: Wed, 28 Mar 2012 15:03:14 -0400 
From: Prashant Palvia <pcpalvia at uncg.edu> 
To: AISWorld <aisworld at lists.aisnet.org> 
Cc: Vinay Deep Khanapuram <v_khanap at uncg.edu> 
Subject: [AISWorld] JGITM, Vol 15, No 2, April 2012 
Message-ID: 
<CABvY-XssbPhCXSNLPhAsiq8wHFqCCnxwgtvBSENmzdnRkz2BxA at mail.gmail.com> 
Content-Type: text/plain; charset="windows-1252" 

Please distribute to colleagues and relevant lists. 
************************* 
CONTENTS OF VOLUME 15, NUMBER 2, (April, 2012) OF THE JOURNAL OF GLOBAL 
INFORMATION TECHNOLOGY MANAGEMENT (JGITM) 

Note that JGITM is now among the elite group of MIS journals included in 
the prestigious Social Sciences Citation Index (SSCI). It is included in 
both SSCI and CC/S&BS, both produced by Thomson Reuters. 

http://jgitm.uncg.edu/ 

Publisher: Ivy League Publishing, http://www.ivylp.com, email: 
admin at ivylp.com 

SPECIAL ISSUE ON ?ONLINE COMMUNITIES AND SOCIAL NETWORKS ? GLOBAL AND 
CULTURAL PERSPECTIVES? GUEST EDITORS: DAN YANG, SOUTHWESTERN UNIVERSITY OF 
FINANCE AND ECONOMICS; FUJUN LAI, THE UNIVERSITY OF SOUTHERN MISSISSIPPI; 
AND YONG LU, THE PENNSYLVANIA STATE UNIVERSITY 

****************************************************************************** 
IF YOU HAVE NOT RECEIVED A FREE SAMPLE IN THE PAST AND WOULD LIKE TO 
RECEIVE ONE, PLEASE WRITE OR SEND AN EMAIL MESSAGE TO THE EDITOR-IN-CHIEF: 
Prashant Palvia, Ph.D., 

The University of North Carolina at Greensboro (pcpalvia at uncg.edu and 
rmouzts at uncg.edu). 
****************************************************************************** 
CALL FOR MANUSCRIPTS: The journal invites contributions from all parts of 
the world from academic and industry scholars involved in research, 
management, and the utilization of global information resources. Besides 
quality work, at a minimum each submitted article should have the following 
three components: an IS topic, an international orientation (e.g., cross 
cultural studies or strong international implications), and strong evidence 
(e.g., survey data, case studies, experiments, secondary data, etc.). 
Please submit your manuscript electronically to the Editor-in-Chief at 
pcpalvia at uncg.edu. 

REVIEW PROCESS: Each suitable article is blind-reviewed by three members of 
the editorial review board. A recommendation is then made by the 
Editor-in-Chief or an Associate Editor. The final decision is made by the 
Editor-in-Chief. If a revision is recommended, the revised paper is sent 
for final approval to one of the Editors. 



CONTENTS OF THIS ISSUE OF JGITM (VOL. 15, NO.2, April 2012) 

SPECIAL ISSUE ON ?ONLINE COMMUNITIES AND SOCIAL NETWORKS ? GLOBAL AND 
CULTURAL PERSPECTIVES? GUEST EDITORS: DAN YANG, SOUTHWESTERN UNIVERSITY OF 
FINANCE AND ECONOMICS; FUJUN LAI, THE UNIVERSITY OF SOUTHERN MISSISSIPPI; 
AND YONG LU, THE PENNSYLVANIA STATE UNIVERSITY 



EDITORIAL PREFACE: ONLINE COMMUNITIES AND SOCIAL NETWORKS ? GLOBAL AND 
CULTURAL PERSPECTIVES 

Dan Yang, Southwestern University of Finance and Economics, China, 
yangd at swufe.edu.cn 

Fujun Lai, The University of Southern Mississippi, USA, fujun.lai at usm.edu 

Yong Lu, The Pennsylvania State University, USA, ericlu at psu.edu 

Recent advances in the Internet and communication technologies have led to 
the rapid growth of many social networking communities. . Studies in this 
area have focused on social network analysis and more recently on social 
media intelligence and networking data mining. However, current research is 
not closely related to culture and organization issues, and do not fully 
capture and understand the social and managerial impact of Web 2.0. The 
guest editors bring attention to important concerns in this area and 
introduce the contents of this special issue. 



THE ONLINE SOCIAL NETWORKS ON KNOWLEDGE EXCHANGE: ONLINE SOCIAL IDENTITY, 
SOCIAL TIE AND CULTURE ORIENTATION 

Huilin Xiao, Southwestern University of Finance and Economics, China, 
xiaohl at swufe.edu.cn 

Weifeng Li, Southwestern University of Finance and Economics, China, 
weifenglee at gmail.com 

Xubin Cao, Southwestern University of Finance and Economics, China, 
cxb at swufe.edu.cn 

Zongming Tang, Shanghai Jiaotong University, China, zmtang at sjtu.edu.cn 

Uisng social exchange theory and social capital theory, this study develops 
a theoretical model that predicts individual knowledge exchange behavior in 
the virtual environment, where trust and outcome expectation mediate the 
relationship between online social identity, online social tie, personal 
culture orientation and the effect of knowledge exchange. The study 
emphasizes the cross-culture effect which influences knowledge exchange in 
the community. The model was tested empirically with users having 
experience within the online community. Findings indicate that online 
social attributes are key facilitators in knowledge exchange in virtual 
communities. 



UNDERSTANDING USER BEHAVIOR AT SOCIAL NETWORKING SITES: A RELATIONAL 
CAPITAL PERSPECTIVE 

Rui Chen, Ball State University, rchen3 at bsu.edu 

Sushil Sharma, Ball State University, ssharma at bsu.edu 

The authors examine member engagements on social networking sites. 
Engagements such as site use and self-disclosure lead to the growth of 
social relationships, increased site traffic, customized services, and an 
accumulation of user generated contents; hence they are imperative to the 
long-term success of networking sites. Drawing on Social Capital Theory 
(SCT), a model is developed that examines the role of relational capitals 
in predicting member behavior. It also investigates the relationship 
between site use and self-disclosure behavior. The model was validated 
through survey data collected from social networking site users in the U.S. 
and the analysis results provided mixed support to the hypothesized 
relationships. The study adds to the literature on social networking sites 
and SCT; it also provides new perspectives on site management for 
networking service providers. 



CUSTOMER INTERACTIONS IN VIRTUAL BRAND COMMUNITIES: EVIDENCE FROM CHINA 

Yonggui Wang, University of International Business and Economics, China, 
ygwang at uibe.edu.cn 

Jianjun Shi, University of International Business and Economics, China, 
shijj at uibe.edu.cn 

Shuang Ma, University of International Business and Economics, China, 
mashuang3a at 163.com 

Guicheng Shi, Macau University of Science and Technology, China, 
gcshi at must.edu.mo 

Lili Yan, University of International Business and Economics, China, 
yanlili at fltrp.com 

Customer interactions in virtual brand communities (VBCs) have become a 
significant approach in value co-creation. Although VBCs have been examined 
in different contexts and perspectives, customer interactions in VBCs have 
been understudied. This study develops an integrated framework for customer 
interactions and its key antecedents. Drawing from social identity theory, 
brand identity is incorporated to examine its contingent impacts on the 
influences of the needs on customer interactions. The framework is tested 
in the context of the brand community (i.e, Apple, China). Global 
implications, managerial implications and research implications are 
discussed. 



THE EXPERT OPINION: AN INTERVIEW WITH BIN HU, GENERAL EDITOR OF TIANYA 
COMMUNITY 

Conducted by Weiming Li, Hainan University, China, lwming at 126.com 

Dong Lu, Southwestern University of Finance and Economics, China, 
ludong at swufe.edu.cn 

Mingfeng Tang, Southwestern University of Finance and Economics, China, 
tang at swufe.edu.cn* 

Bin Hu is the general editor of Tianya Community in China, responsible for 
content quality, information security and public opinion research. The 
interview describes the Tianya communities and its various dimensions such 
as: its functions and features, user group characteristics, changes that 
have occurred in netizens, power of Web 2.0, problems in Web 2.0 
applications, management issues, and comparisons with the U.S. 



BOOK REVIEW: STEVE JOBS, BY WALTER ISAACSON 

Reviewed by Huilin Zhu, Temple University, USA and Zhexiang Sheng, Fudan 
University, China. 

The biography ?Steve Jobs? written by Walter 
Isaacson<http://topics.nytimes.com/topics/reference/timestopics/people/i/walter_isaacson/index.html?scp=1-spot&sq=walter%20isaacson&st=cse>provides 
us a 
riveting story of the roller-coaster life and searingly intense personality 
of Steve Jobs. This biography is based on more than forty interviews with 
Jobs conducted over two years?as well as interviews with more than a 
hundred family members, friends, adversaries, competitors, and colleagues. This 
book is comprised of 42 chapters, which can be divided into four parts. 
These parts are exactly four stages of his life. The reviewers comment on 
all four parts. Ultimately, Isaacson?s description provides us a chance to 
access Jobs? inner world. 

******************************************** 
For copies of the above articles, please check for the Journal of Global 
Information Technology Management (JGITM) in your institution's library. 
******************************************** MISSION: The mission of the 
Journal of Global Information Technology Management (JGITM) is to continue 
to be the premier journal on Global Information Technology Management. It 
is a refereed international journal supported by global IT scholars from 
all over the world. JGITM publishes articles and reports related to all 
aspects of the application of information technology for international 
business. For example, it will report on information resource management, 
managerial and organizational concerns, educational issues, and innovative 
applications related to global IT. Very important to the journal is its 
emphasis on quality and relevance. The journal disseminates this knowledge 
to researchers, practitioners, academicians, and educators all over the 
world on a timely basis. Finally, the journal is international in all 
respects: content, article authorship, readership, and the editorial board. 



SCOPE AND COVERAGE: The journal's scope is multidisciplinary. It publishes 
research, applied, and educational articles from all areas of MIS as well 
as functional IT applications that have international focus. The journal 
also entertains a variety of methodological approaches. It encourages 
manuscript submissions from authors all over the world, both from academia 
and industry. In addition, the journal will also include educational cases 
and reviews of MIS books that have bearing on global aspects. Practitioner 
input will be specifically solicited from time-to-time in the form of 
industry columns and CIO interviews. 



Articles in the journal include, but are not limited to the following 
areas: Frameworks and models for global information systems (GIS), 
Development, evaluation and management of GIS, Electronic Commerce, 
Internet related issues, Societal impacts of IT in developing countries, IT 
and Economic development, IT Diffusion in developing countries, IT human 
resource issues, DSS/EIS/ES in international settings, Organizational and 
management structures for GIS, Transborder data flow issues, Electronic 
data interchange, Telecommunications, Distributed global databases and 
networks, Cultural and societal impacts, Comparative studies of nations, 
and Applications and case studies (both educational and research). 

******************************** 

Please join us at the next GITMA World conference in Bangalore, India on 
June 17-19, 2012. http://www.gitma.org. IT IS THE FIRST MAJOR 
INTERNATIONAL IS/IT ACADEMIC CONFERENCE TO BE HELD IN INDIA. 
-------------- next part -------------- 
An HTML attachment was scrubbed... 
URL: <http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20120328/a1a8511d/attachment-0001.html> 

------------------------------ 

Message: 6 
Date: Thu, 29 Mar 2012 08:17:55 +1100 
From: "Gregor, Shirley" <Shirley.Gregor at anu.edu.au> 
To: <aisworld at lists.aisnet.org> 
Subject: [AISWorld] Contents of JAIS, Volume 13, Issue 3 (March) 
Message-ID: 
<23177F380EF969428D912A1D602776E901126F2C at markka7.fec.anu.edu.au> 
Content-Type: text/plain; charset="windows-1252" 

Contents of Volume 13, Issue 3 (March) 
Journal of the Association for Information Systems (JAIS) 
Official Publication of the Association for Information Systems 

Published: Monthly Electronically 
ISSN: 1536-9323 
Published by the Association for Information Systems, Atlanta, USA 
http://aisel.aisnet.org/jais/ 

Editor-in-Chief: Professor Shirley Gregor, the Australian National University, Australia 

PAPER ONE 
An Empirical Examination of the Impact of ICT Investments on Future Levels of Institutionalized Democracy and Foreign Direct Investment in Emerging Societies 
By Daniel S. Soper, Haluk Demirkan, Michael Goul, and Robert St. Louis 

Abstract 
The macro-level impacts of information and communication technology (ICT) investments on institutionalized democracy and foreign direct investment (FDI) levels in emerging societies are examined within a multi-theoretic framework that considers societal structure, power, and globalization-driven societal change. Using multilevel change modeling and longitudinal data from 48 emerging societies across seven years, ICT investments are observed to produce positive direct impacts on future levels of institutionalized democracy and FDI. After controlling for several covariates, the direct impact of ICT investments on future levels of institutionalized democracy in emerging societies is shown to partially explain the observed relationship between ICT investments and future FDI in those societies. The implications of these results are discussed in light of an emerging and exemplary World Bank debate over the historical search for a simple recipe for emerging society development and !
  
the need for a new way of thinking represented by what has been referred to as "new structural economics". 

To obtain a copy of the entire article, click on the link below: 
http://aisel.aisnet.org/jais/vol13/iss3/3/ 

PAPER TWO 
IT and Firm Agility: An Electronic Integration Perspective 
By Salman Nazir and Alain Pinsonneault 

Abstract 
Firms evolving in increasingly turbulent environments need to respond to market threats and opportunities with speed. At the same time, firms implement numerous information technologies (IT) in the hope of streamlining processes and providing managers with unfettered access to information from both within and outside the firm. While research shows how agility and IT contribute to firm performance, the relationship between these two constructs remains relatively unexplored. Using an electronic integration perspective, we develop a framework that addresses this issue. The framework suggests that IT applications affect the two components of agility (sensing and responding) through two types of integration (internal and external). The framework also explains the mediating roles of knowledge exploration, knowledge exploitation, and process coupling. Four propositions are developed and illustrated with different examples. Avenues for future research are developed. 

To obtain a copy of the entire article, click on the link below: 
http://aisel.aisnet.org/jais/vol13/iss3/2/ 

PAPER THREE 
A Mixed Methods Approach to Technology Acceptance Research 
By Philip Fei Wu 

Abstract 
The aim of this paper is to discuss the significance and potential of a mixed methods approach in technology acceptance research. After critically reviewing the dominance of the quantitative survey method in TAM-based research, this paper reports a mixed methods study of user acceptance of emergency alert technology in order to illustrate the benefits of combining qualitative and quantitative techniques in a single study. The main conclusion is that a mixed methods approach provides opportunities to move beyond the vague conceptualizations of "usefulness" and "ease of use" and to advance our understanding of user acceptance of technology in context. 

To obtain a copy of the entire article, click on the link below: 
http://aisel.aisnet.org/jais/vol13/iss3/1/ 



-------------- next part -------------- 
An HTML attachment was scrubbed... 
URL: <http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20120329/9820a8f9/attachment-0001.html> 

------------------------------ 

Message: 7 
Date: Thu, 29 Mar 2012 15:19:06 +1100 
From: "Gregor, Shirley" <Shirley.Gregor at anu.edu.au> 
To: <aisworld at lists.aisnet.org> 
Subject: [AISWorld] JAIS Theory & Writing Workshop ECIS, 2-5pm 10 
June 
Message-ID: 
<23177F380EF969428D912A1D602776E9011CFAB3 at markka7.fec.anu.edu.au> 
Content-Type: text/plain; charset="us-ascii" 

Journal of the Association for Information Systems 

Theory and Writing Workshop 

Associated with the 20th European Conference on Information Systems 
(ECIS 2012) 

Date and Venue 
Sunday, 10 June, 2012, 2-5pm 
ESADE Building 1, Barcelona, Spain. 

About JAIS 
The Journal of the Association for Information Systems (JAIS) is the 
flagship journal of the Association for Information Systems (AIS) and 
publishes scholarly contributions that represent the highest quality in 
the field in the field of information systems. JAIS particularly 
welcomes contributions that provide theoretical insights that advance 
our understanding of information systems and information technology in 
organizations and society. JAIS is inclusive in its coverage of topics, 
level, and unit of analysis, theory, method, and philosophical and 
research approaches, which reflects all aspects of information systems 
research globally. A signature feature of JAIS is its strong emphasis on 
theory. 

Workshop Aims 
The aim of this workshop is to assist researchers who are seeking to 
publish work in the Journal of the Association for Information Systems 
(JAIS) or journals of a similar nature. The workshop will discuss how to 
present work in terms of style and structure and also how to better 
demonstrate a contribution to knowledge and theory. 

Workshop Agenda 
The workshop will begin with an overview of JAIS, the categories of 
papers that are published, and the editorial process. There will then be 
a session concerning writing strategies and structuring and positioning 
of papers, so as to improve the chance of publication of submitted work. 

The major part of the workshop will be devoted to small group work, 
where participants 
discuss ideas and problems. Participants are encouraged to bring along 
an outline of current work that they are prepared to discuss. 

Workshop Organizers 
The workshop will be facilitated by members of the Editorial Boards of 
JAIS, including the Editor-in-Chief, Professor Shirley Gregor. 

Registration 
Registration is free but places may be limited. To reserve a place 
please contact: 
Adam.LeBrocq at anu.edu.au 


-------------- next part -------------- 
An HTML attachment was scrubbed... 
URL: <http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20120329/924529f1/attachment-0001.html> 

------------------------------ 

Message: 8 
Date: Thu, 29 Mar 2012 10:06:20 +0100 
From: "Bernd Carsten STAHL" <bstahl at dmu.ac.uk> 
To: <aisworld at lists.aisnet.org> 
Subject: [AISWorld] PhD Studentship in Responsible Research and 
Innovation in ICT 
Message-ID: <016101cd0d8b$34fb92d0$9ef2b870$@dmu.ac.uk> 
Content-Type: text/plain; charset="iso-8859-1" 

De Montfort University ? Centre for Computing and Social Responsibility 

Faculty of Technology 

STARTING OCTOBER 2012 

A PhD research studentship covering stipend and tuition fee costs within the 
Centre for Computing and Social Responsibility, (Faculty of Technology) 
working with an internationally recognised research team is available to 
suitably qualified UK or EU students. 

The project will determine ways of evaluating Responsible Research and 
Innovation (RRI) theory and practice in ICT. Previous EU (ETICA, 
www.etica-project.eu) and current UK (FRRIICT, 
www.responsible-innovation.org.uk) funded projects conducted within the 
Centre have identified emerging technologies, their ethical issues, and 
methods for fostering good, ethical governance and practice in ICT research 
and innovation, but it remains unclear under what conditions are such 
interventions successful and effective? 

Objectives of the PhD project are likely to include: 
? Review of current theory and practice in RRI in different areas (e.g. 
nanotechnology, synthetic biology, nuclear technology, geo-engineering, 
health-related research) 
? Definition of specific differences in RRI between ICT and other fields or 
disciplines 
? Development of criteria to allow for the evaluation of RRI activities and 
initiatives 
? Testing of these evaluation criteria 

The thesis developed during this project will contribute to areas of 
informatics and computer ethics that are concerned with methodological 
innovation and evaluation. The outputs of the project will further academic 
knowledge of how to evaluate particular ICT interventions in terms of RRI, 
and how the results of such evaluations may potentially be communicated more 
rapidly to policy makers. 

The project will build on the findings of the ETICA and FRRIICT projects, 
with an initial supervisory team from both the CCSR (Professor B. Stahl, Dr. 
C. Flick) and the University of Oxford (Dr. M. Jirotka) that are currently 
involved with the FRRIICT project. 

Since 2008 the CCSR has led successful research application worth more than 
?3 million in research funding, the majority of which was won in 2011. All 
of the funded projects feed directly into research and policy discussions on 
RRI in ICT. The Centre boasts an active research agenda and a significant 
number of postgraduate students, with opportunities for the successful 
student to become involved in a supportive, enthusiastic, and collegial 
atmosphere aimed at fostering the highest quality of research and 
significant impact of research output. 
For a more detailed description of the studentship project please visit our 
web site (http://ethics.ccsr.cse.dmu.ac.uk/ccsr) or contact Prof. Bernd 
Stahl on +44 116 207 8252 or email bstahl at dmu.ac.uk 

This research opportunity builds on our excellent past achievements and 
looking forward to REF2014 and beyond. It will develop the university?s 
research capacity into new and evolving areas of study, enhancing DMU?s 
national and international research partnerships. 

Applications are invited from UK or EU students with a good first degree 
(First, 2:1 or equivalent) in a relevant subject. ?Doctoral scholarships are 
available for up to three years full-time study starting October 2012 and 
provide a bursary of ?13,770pa in addition to university tuition fees. 

To receive an application pack, please contact the Graduate School Office 
via email? to researchstudents at dmu.ac.uk .? Completed applications should be 
returned together with a full CV and two supporting references. 

Please quote ref:? DMU Research Scholarships 2012 

CLOSING DATE: ?April 27th 2012 

The full wording of the studentship and information for applicants is 
available here: 
http://www.jobs.ac.uk/job/AEE530/phd-studentship/ 



Bernd Carsten STAHL 
Professor of Critical Research in Technology 
Director, Centre for Computing and Social Responsibility 
De Montfort University 
Faculty of Technology, Department of Informatics 
The Gateway 
Leicester, LE1 9BH, UK 
+44 116 207 8252 
http://www.tech.dmu.ac.uk/~bstahl/ 







------------------------------ 

Message: 9 
Date: Thu, 29 Mar 2012 02:13:48 -0700 
From: Marcus Rothenberger <rothenb2 at unlv.nevada.edu> 
To: aisworld at lists.aisnet.org 
Subject: [AISWorld] DESRIST 2012 early registration ends March 31 
Message-ID: 
<CANK+dMiAXR2EvNM9zMRMQUp7Ur04r_433zVMZoJnKJMvs8DG4Q at mail.gmail.com> 
Content-Type: text/plain; charset="iso-8859-1" 

Early registration for DESRIST 2012 (May 14-15 in Las Vegas, NV) will end 
on March 31 (midnight, pacific time). If you have not registered yet and 
would like to attend, please go to http://desrist2012.unlv.edu and follow 
the instructions for registration before the end of the month. 

Please also make your hotel reservation on the conference web site as soon 
as possible. The hotel block has been met and additional rooms are 
available at the conference rate until they run out, but no later than 
April 20. 

We are looking forward to seeing you in Las Vegas. 

Best regards, 

Ken Peffers 
Marcus Rothenberger 
DESRIST 2012 program chairs 
-------------- next part -------------- 
An HTML attachment was scrubbed... 
URL: <http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20120329/e002a9a7/attachment-0001.html> 

------------------------------ 

Message: 10 
Date: Thu, 29 Mar 2012 13:05:29 +0200 
From: Marleen Huysman <m.h.huysman at vu.nl> 
To: <aisworld at lists.aisnet.org> 
Subject: [AISWorld] invitation to KIN summer workshop Amsterdam 
Message-ID: <A37E89F6-5B7D-414D-BE94-C98DF44FBE64 at vu.nl> 
Content-Type: text/plain; charset="windows-1252" 

Dear colleagues, 
We kindly invite early career researchers (PhD candidates, post doctoral research and junior faculty) to the second KIN summer workshop to be held in Amsterdam, June 18 ? 21, 2012. This year?s theme will be: Online Interactions and New Ways of Working. This 3,5 day workshop, organized by the (KIN) research group of the VU University Amsterdam (kinresearch.nl) together with Amsterdam Business Research Institute (ABRI) offers seminars on new research topics related to new ways of working and knowledge collaboration in online environments; interactive sessions to discuss your ongoing research with an international faculty and ample opportunities to network and socialize with an international group of scholars. The teaching faculty consists of an international group of scholars, known for their research in the field: Samer Faraj, Niki Panteli, Emmanuelle Vaast and Marleen Huysman. For further information, including registration, please visit the ABRI website http://www.abri.vu.n!
  
l/en/events/courses-and-workshops/kin/index.asp or contact ABRI?s Programme Manager, Margriet Buseman (m.buseman at vu.nl). 
Best regards, 
Marleen Huysman 

Professor of Knowledge & Organization 
Head of Department of Information, Logistics and Innovation 
VU University Amsterdam 
http://kinresearch.nl 
http://www.feweb.vu.nl/nl/afdelingen-en-instituten/information-logistics-and-innovation 


















-------------- next part -------------- 
An HTML attachment was scrubbed... 
URL: <http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20120329/6bb9f631/attachment-0001.html> 

------------------------------ 

Message: 11 
Date: Thu, 29 Mar 2012 13:43:12 +0000 
From: Rob Benyon <R.V.Benyon at ru.ac.za> 
To: "aisworld at lists.aisnet.org" <aisworld at lists.aisnet.org> 
Subject: [AISWorld] ITSM Implementation Survey 
Message-ID: 
<943CF9CF9AB98C4FB44F88C502D4586C561C07D2 at mail.ict.ru.ac.za> 
Content-Type: text/plain; charset="us-ascii" 

Hi Folks, 

I have had an unpleasant setback this side. My survey instrument has concurrent guest user conflicts. As a consequence, the data I have gathered is invalid. This is very disappointing. 

I have redone the survey on a different platform (Survey Monkey) and ask you please to participate in the repaired one. 

Thanks, 
Rob 



Dear ITSM practitioner, 



The intention of this research is to develop a framework of recommended best practice for IT Service Management implementation. 



Part of this research includes an online survey of ITSM practitioners. In this regard, it would be greatly appreciated if you would please complete this anonymous questionnaire. Your help in this regard is greatly appreciated. 


https://www.surveymonkey.com/s/ITSMImpSurvey 



Researcher: Rob Benyon, Rhodes University, Department of Information Systems, supervised by Professor David Sewry. 



We need your help to understand that which contributes to the successful implementation of IT Service Management. 



There are 16 Questions. 


-------------- next part -------------- 
An HTML attachment was scrubbed... 
URL: <http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20120329/3bee7936/attachment-0001.html> 

------------------------------ 

Message: 12 
Date: Wed, 28 Mar 2012 19:51:11 -0400 
From: Amal Zouaq <amal.zouaq at gmail.com> 
To: mda at www.mda-at-work.com, iaoa-member at ontolog.cim3.net, 
bull-i3 at irit.fr, ontolog-invitation at ontology.cim3.net, 
iaoa-general at ontolog.cim3.net, SEWORLD at cs.colorado.edu, 
seworld at sigsoft.org, mda-discussion at yahoogroups.com, 
isworld at lyris.isworld.org, office at easst.org, aiia at dis.uniroma1.it, 
aisworld at lists.aisnet.org, wsrp-comment at lists.oasis-open.org, 
ruleml-all at ruleml.org, soa-rm-comment at lists.oasis-open.org, 
ssdl at newcastle.ac.uk, SIGecom-Talk at acm.org, 
ontolog-forum at ontolog.cim3.net, semantic-web at w3.org, 
web.semantique at lists-sop.inria.fr, 
protege-discussion at lists.stanford.edu, dl at dl.kr.org, 
dbitaly at list.dia.uniroma3.it, easst-members at cs.uni-potsdam.de, 
tccc at lists.cs.columbia.edu, ln-request at cines.fr 
Subject: [AISWorld] VORTE 2012 - Last CFP 
Message-ID: 
<CALq95+0746fSs-iFXyqvWkrN2-8CM07vzW0VdBwdXa4n+6_STQ at mail.gmail.com> 
Content-Type: text/plain; charset="windows-1252" 

Apologies for cross-posting and multiple posts. 

FINAL CALL FOR PAPERS ( Deadline April 15th 2012) 

The 7th International Workshop on Vocabularies, Ontologies and Rules for 
the Enterprise (VORTE 2012) 

Co-located with the 16th IEEE International EDOC Conference, Beijing, 
China, 10th-11th September, 2012 

WORKSHOP DESCRIPTION 

The VORTE series of workshops is devoted to the topics of vocabularies, 
ontologies and rules in the context of enterprise systems. The complexity 
of enterprise systems, the increasing needs for advanced collaboration 
between various systems within one institution or among many collaborating 
parties and the velocity of organizational, policy, structural and market 
changes strongly call for immediate mobilization of the research community 
to develop more flexible and reliable technologies for the advancement of 
enterprise systems. 

Trying to respond to this urgent research need, the VORTE series of 
workshops has been established in order to bring together researchers and 
practitioners that are looking into the topics of ontologies and rules in 
enterprise system development from different yet complementary 
perspectives. The major objective is to provide a research forum for 
exchanging ideas and results covering the use of ontologies and rules in 
various stages of the lifecycle of enterprise systems. 

Examples of topics covered by VORTE research contributions include the 
development and adaptation of foundational, business and domain ontologies 
for the enterprise, the use of ontologies and rules in all aspects of 
enterprise modelling such as business process management and services, the 
enhancement of rules and services with formal semantics, and the evaluation 
of such systems and approaches. The workshop is also a forum for the 
discussion of ontology-based knowledge management issues, interoperability 
issues and ontology engineering issues, and covers various application 
domains relevant for organizations (such as e-government and e-commerce). 
The workshop also welcomes contributions on open linked data initiatives 
for the enterprise and empirical studies on the use of ontologies and rules 
in the enterprise system development lifecycle. 

TOPICS 

Vocabularies and Ontologies for the enterprise: 

- Ontology-driven representation of products, services, functionalities, 
design, processes; 

- Ontologies for the know-how; 

- Ontologies for corporate knowledge; 

- Upper-level ontologies in the enterprise; 

Knowledge management: 

- Ontology and ontological methodologies in knowledge management and 
integration; 

- Adaptation of ontologies for companies and organizations; 

- Ontology engineering, learning and maintenance within organizations; 

- Ontology integration and alignment within organizations; 

- Ontology effectiveness and evaluation in organizations; 

Conceptual and Enterprise Modeling: 

- Ontological Foundations for Conceptual Modeling and Meta-modeling 

- Ontology Design and maintenance for Conceptual Model Integration; 

- Ontology-Based Conceptual Modeling Tools and Environments 

- Ontologies and Enterprise Architecture Modeling 

- Ontologies and Business Process Modeling 

- Ontologies and Goal-Based Modeling 

- Ontologies and Business Rules 

Enterprise Semantic Interoperability: 

- Web services, Semantic services 

- Composition and Modularity 

- Merging, Mapping and Alignment 

- Ontology Language Interoperability 

- Open linked data publishing and exploitation 

Problems and case studies in ontology application: 

- Practical issues in using ontologies in enterprises 

- Real cases of successful/unsuccessful use of ontology in business 

- From legacy systems to the new ontology-driven systems 

SUBMISSION AND PUBLICATION 

We solicit two types of papers: 

- Short papers (4 pages) discussing controversial issues in the field or 
describing interesting or thought-provoking ideas that are not yet fully 
developed; and 

- Full papers (8-10 pages) describing more mature results 

All submissions MUST conform to the two-column format of IEEE Computer 
Society conference proceedings ( 
http://www2.computer.org/portal/web/cscps/formatting) and include the 
author's name, affiliation, and contact details. 

Papers must be submitted as PDF files using EasyChair at 
http://www.easychair.org/conferences/?conf=vorte2012 

All papers must not have been previously published or submitted elsewhere. 

The papers accepted for the EDOC 2012 Workshops will be published after the 
workshop with an ISBN in the IEEE Xplore Digital Library. At least one of 
the authors for each accepted paper must register for the main conference 
(there will be no workshop-only registration at EDOC 2012) and present 
their papers at the workshop. 

*Post-conference Journal Publication * 

For previous editions of the workshop, special issues have been published 
in journals such as Applied Ontology (2007), IJBPIM (2007), Elsevier's 
Information Systems (2008, 2010), and Journal of Research Practice in 
Information Technology (2009). 

This year, authors of selected papers will be invited to submit extended 
versions for consideration for a special issue of the Applied Ontology 
Journal http://www.iospress.nl/journal/applied-ontology/. 

KEYNOTE 

TBA 

IMPORTANT DATES 

*Workshop paper submissions: April 15, 2012* 

Workshops paper acceptance notifications: May 28, 2012 

Camera-ready papers due: June 15, 2012 

Workshop: September 10 or 11, 2012 



COMMITTEES 



Workshop Chairs: 

Jo?o Paulo A. Almeida, Federal University of Esp?rito Santo, Brazil, 
jpalmeida at ieee.org 

Roberta Ferrario, Institute of Cognitive Sciences and Technology, 
Laboratory for Applied Ontology, CNR, Trento, Italy, roberta.ferrario at cnr.it 

Amal Zouaq, Royal Military College of Canada, Athabasca University, Queen?s 
University, Canada, amal.zouaq at rmc.ca 


Steering Committee: 

Dragan Gasevic, Athabasca University, Canada 

Giancarlo Guizzardi, Federal University of Esp?rito Santo (UFES), Vit?ria, 
Brazil 

Gerd Wagner, Institute of Informatics, Brandenburg University of Technology 
at Cottbus, Germany 



Program Committee: 

Uwe Assmann, TU Dresden, Germany 

Colin Atkinson, University of Mannheim, Germany 

Ebrahim Bagheri, Athabasca University, Canada 

Emanuele Bottazzi, Institute of Cognitive Sciences and Technologies, CNR, 
Trento, Italy 

Marco Brambilla, Politecnico di Milano, Italy 

Christoph Bussler, Merced Systems, Inc., USA 

Robert Colomb, The University of Queensland, Australia 

Oscar Corcho, Universidad Polit?cnica de Madrid, Spain 

Luiz Olavo Bonino da Silva, BiZZDesign, The Netherlands 

Jens Dietrich, Massey University, New Zealand 

Sergio Espana, Polytechnic University of Valencia 

Joerg Evermann, Memorial University of Newfoundland, Canada 

Ricardo Falbo, Federal University of Espirito Santo, Brazil 

Lu?s Ferreira Pires, University of Twente, The Netherlands 

Adrian Giurca, Brandenburg University of Technology at Cottbus, Germany 

Guido Governatori, NICTA, Australia 

Pierre Grenon, European Bioinformatics Institute, Cambridge, UK 

Giancarlo Guizzardi, Federal University of Espirito Santo, Brazil 

Brian Henderson Sellers, University of Technology Sydney, Australia 

Heinrich Herre, University of Leipzig, Germany 

Florian Matthes, University of Munich, Germany 

Alex Norta, University of Helsinki, Finland 

Andreas Opdahl, University of Bergen, Norway 

Jeffrey Parsons, Memorial University of Newfoundland, Canada 

Adrian Paschke, Free University Berlin, Germany 

Florian Probst, SAP Research Darmstadt, Germany 

Christophe Roche, University of Savoie, France 

Michael Rosemann, Queensland University of Technology, Australia 

Csaba Veres, University of Bergen, Norway 

Gerd Wagner, Brandenburg University of Technology at Cottbus, Germany 

Kewen Wang, Griffith University, Australia 

Ron Weber, Monash University, Australia 

Hans Weigand, Faculty of Economics of Tilburg University, Netherlands 

LINKS 

VORTE2012 web site: http://nemo.inf.ufes.br/vorte2012 

EDOC2012 web site: http://edocconference.org 

EasyChair submissions: 

http://www.easychair.org/conferences/?conf=vorte2012 

Formatting guidelines: http://www2.computer.org/portal/web/cscps/formatting 

-- 
Amal Zouaq 
Professeure adjointe | Assistant Professor 
D?partement de math?matiques et d'informatique| 
Department of Mathematics and Computer Science 
Coll?ge militaire royal du Canada | Royal Military College of Canada 
CP 17000, Succursale Forces, Kingston ON CANADA K7K 7B4 
amal.zouaq at rmc.ca 
Office | Bureau Girouard 320 
Telephone | T?l?phone 613-541-6000 # 6478 
Fax | T?l?copieur 613-541-6584 
http://azouaq.athabascau.ca/ 
-------------- next part -------------- 
An HTML attachment was scrubbed... 
URL: <http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20120328/6e89472d/attachment.html> 

------------------------------ 

Message: 13 
Date: Thu, 29 Mar 2012 10:32:30 +0200 
From: "Mouzhi Ge" <mouzhi.ge at unibw.de> 
To: aisworld at lists.aisnet.org 
Subject: [AISWorld] Deadline Extension: International Workshop on 
Information Value Management 
Message-ID: <ea7ac88208f3231e35b5cf5591e87553.squirrel at mail.unibw.de> 
Content-Type: text/plain;charset=iso-8859-1 


********************************************************** 
International Workshop on Information Value Management 

conjoined with 14th International Conference on Enterprise Information 
Systems (ICEIS) 

28th June, 2012 - Wroclaw, Poland 
http://www.iceis.org/IVM.aspx 
********************************************************** 


Deadline for paper submissions: 10th April, 2012 


Background and Rational 
======================= 
The information systems literature has consistently emphasized the need 
for alignment of information systems with organizational goals and 
strategies and its impact on organizational performance. One of the key 
challenges and subject of continuous debate focuses on how to achieve, 
measure, increase and manage information and the value it creates to 
organisations. It has been concern to researchers and management for many 
years and the difficulty in measuring less tangible benefits has been 
emphasized. 

Information creates not only value in financial terms but also in terms of 
operational and strategic advantages. Thus exploring the value of 
information and its management is crucial to the success of world-leading 
organizations. The value of information can be determined by its 
importance to and the impact information has on the business operations 
such as decision making, strategy development or optimizing supply chains. 
However, the issue of how to manage the value of information is still 
challenging and research so far could only address limited aspects. It has 
been argued that if information result in enhanced business value, the 
focus needs to shift from project based cost/benefit analysis to managing 
the overall value creation of information. Furthermore, over the last 
decade a move from solely technical aspects to a combination of multiple 
contextual factors such as technology, sector, organizational culture, and 
management style can be observed. 

With this workshop we aim to go beyond traditional IT productivity and 
cost evaluations; we view information as a crucial asset that creates 
value to an organizations, and thus needs to be managed accordingly for 
optimal business value. In this workshop, we aim to provide a platform for 
discussing approaches, models, results and case studies or experience 
reports addressing a broad range of issues related to Information Value 
Management. Research challenges include how to determine the Value of 
Information and its impact on business performance, managing Data and 
Information Quality, capturing and maintaining Information Assets, and 
designing and improving Information Manufacture System. 

Papers can include and discuss various research methods and can be based 
on case studies, quantitative and quantitative methods, design science as 
well as experimental and simulation. In addition practical oriented 
research and experience reports are encouraged. 


Topics of interest include but are not limited to the following list: 
================== 
Determining Information Value 
Data and Information Quality 
Specifying and Measuring the Benefits from Information 
Information Value Chains 
Information Manufacture and Information Product 
Optimising Information Value 
Information Lifecycle Concepts 
Modelling and Visualising Information Manufacturing Systems 
Information Risk Management 
Data Integration and Value Creation 
Analytical IS and Value Creation 
IVM Maturity Models 
IVM Capabilities 
IT Governance and IVM 
Management Approaches for IVM 
Change Management and IVM 


Paper submissions 
================= 
Prospective authors are invited to submit papers in any of the topics 
listed above. Instructions for preparing the manuscript (in Word and Latex 
formats) are available at: http://www.iceis.org/papertemplates.aspx 

Please also check the http://www.iceis.org/submissionguidelines.aspx. 
Papers should be submitted electronically via the web-based submission 
system at: http://www.insticc.org/Primoris 


Publication 
=================== 
All accepted papers (full, short and posters) will be published in a 
special section of the conference proceedings book - under an ISBN 
reference and on CD-ROM support - and submitted for indexation by Thomson 
Reuters Conference Proceedings Citation Index (ISI), INSPEC, DBLP and EI 
(Elsevier Index). 

All papers presented at the conference venue will be available at the 
SciTePress Digital Library (http://www.scitepress.org/DigitalLibrary/). 
SciTePress is member of CrossRef (http://www.crossref.org/). 


Important Dates 
=============== 
Paper Submission: 10th April, 2012 
Authors Notification: 27th April, 2012 
Final Paper Submission and Registration: 4th May, 2012 
ICEIS Conference: 28th June, 2012 


Workshop Program Committee 
================ 
Andy Koronios, University of South Australia, Australia 
Carlo Batini, University of Milano-Bicocca, Italy 
Marcin Sikorski, Gdansk University of Technology, Poland 
Raymond Slot, Utrecht University of Applied Sciences, Netherlands 
Joaquim Filipe, Polytechnic Institute of Set?bal/INSTICC, Portugal 
David Olson, University of Nebraska, United States 
Dietmar Jannach, Technical University of Dortmund, Germany 
Maria Vargas-Vera, Open University, United Kingdom 
Andrea Maurino, University of Milano Bicocca, Italy 
Jos? Cordeiro, Polytechnic Institute of Set?bal/INSTICC,Portugal 
Laure Berti-?quille, Universit? de Rennes 1, France 
Cinzia Cappiello, Politecnico di Milano, Italy 
Benjamin Shao, Arizona State University, United States 
Bene Rodriguez, Bundeswehr University of Munich, Germany 
Ying Su, Institute of Scientific and Technical Information of China,China 
Thoa Pham, Dublin City University, Ireland 
Ke Xu, Microsoft, USA 


Workshop Chairs 
================ 
Markus Helfert 
Dublin City University, Ireland 
Markus.Helfert at computing.dcu.ie 

Mouzhi Ge 
Bundeswehr University Munich, Germany 
Mouzhi.Ge at unibw.de 


---- 
Dr. Mouzhi Ge 
E-Business & Web Science Research Group 
Bundeswehr University Munich, Germany 
Email: mouzhi.ge at unibw.de 
Phone: +49-(0) 89-6004-4242 
Fax: +49-(0) 89-6004-4620 
www: https://www.unibw.de/wow5_3/team/mouzhi-ge 





------------------------------ 

Message: 14 
Date: Thu, 29 Mar 2012 17:51:02 +0300 
From: George Angelos Papadopoulos <george at cs.ucy.ac.cy> 
To: undisclosed-recipients:; 
Subject: [AISWorld] 1st CFP: 10th IEEE/IFIP International Conference 
on Embedded and Ubiquitous Computing 
Message-ID: <41525F27-57BE-4AC4-B8AE-D54DBDF75321 at cs.ucy.ac.cy> 
Content-Type: text/plain; charset="us-ascii"; Format="flowed"; 
DelSp="yes" 

*** Call for Papers *** 

The 10th IEEE/IFIP International Conference on Embedded and Ubiquitous 
Computing (IEEE/IFIP EUC 2012) 

http://www.euc2012.cs.ucy.ac.cy/ 

3-5 October 2012, Paphos, Cyprus 


Embedded and ubiquitous computing is an exciting paradigm that promises 
to provide computing and communication services to the end users all the 
time and everywhere. Its systems are now invading in every aspect of our 
daily life and promise to revolutionize our life much more profoundly 
than elevators, electric motors or even personal computer evolution ever 
did. The emergence of this technology is a natural outcome of research 
and technological advances in a variety of areas including embedded 
systems, pervasive computing and communications, wireless networks, 
mobile computing, distributed computing and agent technologies. 

EUC 2012 is the next event, in a series of highly successful IEEE 
International Conferences on Embedded and Ubiquitous Computing (EUC), 
previously held as ICDCS-ECS04 (Tokyo, Japan, March 2004), EUC-04 
(Aizu, Japan, August 2004), EUC-05 (Nagasaki, Japan, December 2005), 
EUC-06 (Seoul, Korea, August 2006), EUC-07 (Taipei, Taiwan, December 
2007), EUC-08 (Shanghai, China, December 2008), EUC-09 (Vancouver, 
Canada, August 2009), EUC-10 (Hong Kong, December 2010) and EUC 2011 
(Melbourne, Australia, October 2011). 

EUC 2012 will take place in Coral Beach resort near the city of 
Paphos, Cyprus. 

Topics of particular interest include, but are not limited to: 

Embedded Computing 
* Embedded System Software and Optimization 
* Embedded System Architectures 
* Hardware/Software Co-design and Design Automation 
* Real-Time Systems and Operating Systems 
* Application-Specific Processors and Devices 
* Power-Aware Computing 
* Sensor Networks 
* System/Network-on-Chip 
* Reconfigurable Computing Systems and Applications 
* Cyber-Physical Systems 

Ubiquitous Computing 
* Pervasive Computing and Communications 
* Middleware and Peer-to-Peer Computing 
* Internet Computing and Applications 
* Multimedia and Data Management 
* Human-Computer Interaction 
* Network Protocols 
* Wireless Communication & Networks 
* Mobile Computing 
* Agents and Distributed Computing 
* Security and Fault Tolerance Applications 

Submission Guidelines 

Submitted papers must not substantially overlap papers that have been 
published or that are simultaneously submitted to a journal or a 
conference with proceedings. Papers should be at most 8 pages 
including the bibliography and well-marked appendices, and should 
follow the IEEE 8.5" x 11" Two-Column Format. Committee members are 
not required to read the appendices, and so the paper should be 
intelligible without them. Submissions are to be made to the 
submission web site. Only pdf files will be accepted. Submissions 
not meeting these guidelines risk rejection without consideration 
of their merits. Papers must be received by the submission deadline. 
Authors of accepted papers must guarantee that their papers will be 
presented at the conference. Accepted papers will be published in 
the IEEE conference proceedings (EI indexed). Selected best papers 
will be published in special issues of high quality journals 
(currently under negotation). 

Important Dates 

* Submission Deadline: 20 May 
* Notification of Acceptance: 15 July 
* Camera-ready Versions Submitted: 31 July 
* Author Registration: 31 July 

Organizing Committee 

General Chairs 
Erol Gelenbe, Imperial College, UK 
Rajesh Gupta, University of California at San Diego, USA 
George A. Papadopoulos, University of Cyprus, Cyprus 

Steering Chairs 
Minyi Guo, Shanghai Jiaotong University, China 
Laurence T. Yang, St. Francis Xavier University, Canada 

Program Chairs 
Habib M. Ammari, University of Michigan-Dearborn, USA 
Marco D. Santambrogio, MIT, USA/Politecnico di Milano, Italy 
Yan Zhang, Simula Research Lab/University of Oslo, Norway 

Workshop Chairs 
Xu Li, INRIA Lille - Nord Europe, France 
Linwei Niu (to be confirmed), California State University Bakersfield, 
USA 

Program Vice-chairs 

Embedded Software and Optimization 
Simone Campanoni, Harvard University, USA 

Embedded Systems and Hardware/Software Co-Design 
Vincenzo Rana, EPFL, Switzerland 

Real-Time Systems and Operating Systems 
Lamia Youseff, Google 

Power-Aware Computing 
Seda Ogrenci Memik, Northwestern University, USA 

Wireless Communications 
Abbas Mohammed, Blekinge Institute of Technology, Sweden 

Agent and Distributed Computing 
Jinhua Guo, University of Michigan-Dearborn, USA 

Middleware for Embedded and Ubiquitous Computing 
Xiuzhen Cheng, George Washington University, USA 

Sensor Networks 
Andreas Constantinides, Frederick University, Cyprus 

Mobile and Context-aware Computing 
Carlo Curino, Yahoo 

Multimedia and Data Management 
Honggang Wang, University of Massachusetts at Dartmouth, USA 

Autonomic, Organic and Trusted Computing 
Jie Shen, University of Michigan-Dearborn, USA 

-------------- next part -------------- 
An HTML attachment was scrubbed... 
URL: <http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20120329/6b9a3d94/attachment.html> 

------------------------------ 

_______________________________________________ 
AISWorld mailing list 
AISWorld at lists.aisnet.org 

End of AISWorld Digest, Vol 29, Issue 38 
**************************************** 
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20120329/e556b63f/attachment.html>


More information about the AISWorld mailing list