[AISWorld] Call for Papers
Patricia Rafferty
patricia.rafferty at sju.edu
Thu Mar 29 11:55:39 EDT 2012
INTERNATIONAL JOURNAL OF BUSINESS INTELLIGENCE RESEARCH [IJBIR]
Call for Papers:
The Editor-in-Chief of the International Journal of Business Intelligence Research (IJBIR) would like to invite you to consider submitting a manuscript for inclusion in this scholarly journal. The following describes the mission, the coverage, and directions for submission to IJBIR.
Mission: The mission of the journal is to advance research in the field of business intelligence and analytics and to identify ways that BI creates value for organizations. The journal publishes original academic research/case studies, as well as selective thought provoking papers on issues, strategies, practices, techniques, and technologies from both academics and practitioners that advance the understanding and practice of Business Intelligence. The focus of this journal is to identify innovative Business Intelligence strategies and to assess the application of theoretical concepts to real-world situations. IJBIR takes a multidisciplinary approach to the examination of business intelligence.
Submitting to IJBIR:
Prospective authors should note that only original and previously unpublished articles will be considered. INTERESTED AUTHORS MUST CONSULT THE JOURNAL'S GUIDELINES FOR MANUSCRIPT SUBMISSIONS at http://www.igi-global.com/development/author_info/guidelines submission.pdf prior to submission. All article submissions will be forwarded to at least 2 members of the Editorial Review Board of the journal for double-blind, peer review. Final decision regarding acceptance/revision/rejection will be based on the reviews received from the reviewers. All submissions must be forwarded electronically to patrica.rafferty at sju.edu.
Publisher:
The International Journal of Business Intelligence Research (IJBIR) is published by IGI For additional information regarding the publisher, please visit www.igi-global.com.
All inquiries and submissions should be sent to:
patricia.rafferty at sju.edu
Patricia D. Rafferty, Ed.D.
Erivan K. Haub School of Business
Saint Joseph's University
Director
Master of Science in Business Intelligence Program
Master of Science in Managing Human Capital Program
Managing Editor
International Journal of Business Intelligence Research
http://www.igi-global.com/bookstore/titledetails.aspx?titleid=1168&detailstype=description
Be part of the evolution in human resource management and learn about our program name change at www.sju.edu/hsb/hr
----- Original Message -----
From: aisworld-request at lists.aisnet.org
To: aisworld at lists.aisnet.org
Sent: Thursday, March 29, 2012 11:21:32 AM GMT -05:00 US/Canada Eastern
Subject: AISWorld Digest, Vol 29, Issue 38
Send AISWorld mailing list submissions to
aisworld at lists.aisnet.org
To subscribe or unsubscribe via the World Wide Web, visit
http://lists.aisnet.org/mailman/listinfo/aisworld_lists.aisnet.org
or, via email, send a message with subject or body 'help' to
aisworld-request at lists.aisnet.org
You can reach the person managing the list at
aisworld-owner at lists.aisnet.org
When replying, please edit your Subject line so it is more specific
than "Re: Contents of AISWorld digest..."
Today's Topics:
1. Call for Book Chapters: ?Intellectual Capital Strategy
Management for Knowledge-Based Organizations?
(PATRICIA ORDO?EZ DE PABLOS)
2. Journal of Information Systems Education (JISE) Vol 22 Issue
4 (Kruck, S - kruckse)
3. JGITM, Vol 15, No 1, January 2012 (Prashant Palvia)
4. CFP WOSIS 2012. Deadline extended: 10 April (DAVID GARCIA ROSADO)
5. JGITM, Vol 15, No 2, April 2012 (Prashant Palvia)
6. Contents of JAIS, Volume 13, Issue 3 (March) (Gregor, Shirley)
7. JAIS Theory & Writing Workshop ECIS, 2-5pm 10 June
(Gregor, Shirley)
8. PhD Studentship in Responsible Research and Innovation in ICT
(Bernd Carsten STAHL)
9. DESRIST 2012 early registration ends March 31
(Marcus Rothenberger)
10. invitation to KIN summer workshop Amsterdam (Marleen Huysman)
11. ITSM Implementation Survey (Rob Benyon)
12. VORTE 2012 - Last CFP (Amal Zouaq)
13. Deadline Extension: International Workshop on Information
Value Management (Mouzhi Ge)
14. 1st CFP: 10th IEEE/IFIP International Conference on Embedded
and Ubiquitous Computing (George Angelos Papadopoulos)
----------------------------------------------------------------------
Message: 1
Date: Wed, 28 Mar 2012 18:35:59 +0200
From: "PATRICIA ORDO?EZ DE PABLOS" <patriop at uniovi.es>
To: aisworld at lists.aisnet.org
Subject: [AISWorld] Call for Book Chapters: ?Intellectual Capital
Strategy Management for Knowledge-Based Organizations?
Message-ID: <959078411020304f.4f735a0f at uniovi.es>
Content-Type: text/plain; charset="us-ascii"
An HTML attachment was scrubbed...
URL: <http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20120328/b48c1395/attachment-0001.html>
------------------------------
Message: 2
Date: Wed, 28 Mar 2012 17:24:45 +0000
From: "Kruck, S - kruckse" <kruckse at jmu.edu>
To: "'aisworld at lists.aisnet.org'" <aisworld at lists.aisnet.org>
Subject: [AISWorld] Journal of Information Systems Education (JISE)
Vol 22 Issue 4
Message-ID:
<1FCCDBC71F38D749BAA9BD1317A9629E1B23DAD9 at IT-EXMB3.ad.jmu.edu>
Content-Type: text/plain; charset="us-ascii"
IS Professors and IS Education Professionals around the world:
The Journal of Information Systems Education (JISE) is pleased to announce that Volume 22, Number 4 has been published. JISE is the leading academic journal dedicated to IS education and is the official publication of the Education Special Interest Group (EDSIG) of AITP (the Association of Information Technology Professionals). The index and abstracts for each paper for this issue and abstracts for all papers in Vol. 22(4) can be found at http://jise.org/Volume22/22-4/Contents-22-4.html.
Contents of Vol. 22(4) include:
Teaching Case- The Challenge of Implementing an ERP System<http://jise.org/Volume22/22-4/Pdf/Vol22-4pg291.pdf>
in a Small and Medium Enterprise- A Teaching Case of ERP Project Management<http://jise.org/Volume22/22-4/Pdf/Vol22-4pg291.pdf>
Hongjiang Xu, Patrick J. Rondeau, and Sakthi Mahenthiran
(pp 291-296)
Teaching Case-Procyon LLC: From Music Recommendations to Preference Mapping<http://jise.org/Volume22/22-4/Pdf/Vol22-4pg297.pdf>
Susan J. Chinn
(pp 297-306)
Communication Challenges in Requirements Definition: A Classroom Simulation<http://jise.org/Volume22/22-4/Pdf/Vol22-4pg307.pdf>
Neil C. Ramiller and Erica L. Wagner
(pp 307-318)
The Determinants of the Post-Adoption Satisfaction of <http://jise.org/Volume22/22-4/Pdf/Vol22-4pg319pdf.pdf>
Educatorswith an E-Learning System<http://jise.org/Volume22/22-4/Pdf/Vol22-4pg319pdf.pdf>
A.K.M. Najmul Islam
(pp 319-332)
The Systems Analysis and Design Course: An Educators'<http://jise.org/Volume22/22-4/Pdf/Vol22-4pg333.pdf>
Assessment of the Importance and Coverage of Topics<http://jise.org/Volume22/22-4/Pdf/Vol22-4pg333.pdf>
Brandi N. Guidry, David P. Stevens, and Michael W. Totaro
(pp 333-348)
IS 2010 and ABET Accreditation: An Analysis of ABET-<http://jise.org/Volume22/22-4/Pdf/Vol22-4pg349.pdf>
Accredited Information Systems Programs<http://jise.org/Volume22/22-4/Pdf/Vol22-4pg349.pdf>
Bruce Saulnier and Bruce White
(pp 349-356)
An Approach to Meeting AACSB Assurance of Learning<http://jise.org/Volume22/22-4/Pdf/Vol22-4pg357.pdf>
Standards in an IS Core Course<http://jise.org/Volume22/22-4/Pdf/Vol22-4pg357.pdf>
Alan N. Attaway, Satish Chandra, Brian L. Dos Santos, Matt E. Thatcher, and Andrew L. Wright
(pp 357-368)
Experiencing the Elicitation of User Requirements and Recording<http://jise.org/Volume22/22-4/Pdf/Vol22-4pg369.pdf>
them in Use Case Diagrams through Role-Play<http://jise.org/Volume22/22-4/Pdf/Vol22-4pg369.pdf>
<http://jise.org/Volume22/22-3/Pdf/1199124%20-%2010%20pgs.pdf>Gay Costain and Brad McKenna
(pp 369-382)
Call for Papers<http://jise.org/CFP-GlobalSecInfoAssurance.pdf> - Global Information Security and Assurance in IS Education
***********************************************************************
About the Journal of Information Systems Education (JISE):
SAMPLE COPIES: If you have not received a free sample and would like to receive one, please send an e-mail message with your name and full mailing address to editor at jise.org<mailto:editor at jise.org>.
CALL FOR MANUSCRIPTS: JISE invites contributions from IS educators and scholars involving IS education. We accept manuscripts in the following areas: IS education research, teaching tips, innovative classroom practices, curriculum issues, teaching cases, classroom minicases, current topics in IS education, IS education trends and new ideas and other IS education-related topics. Submissions should be sent electronically to editor at jise.org<mailto:editor at jise.org>.
REVIEW PROCESS: Each article submitted to JISE is blind reviewed by members of the Editorial Board and/or other reviewers. Authors are informed of the results of the review by the Editor. The final decision for the publishing of any manuscript is made by the Editor.
JISE is indexed by ABI/Inform, EBSCO Business Source Complete & Education Research Complete, Gale Group, Inc., ProQuest, H.W. Wilson, Educational Research Abstracts (ERA), Education Resources Information Center (ERIC), WilsonWeb/Wilson OmniFile, Cabell's Directory of Publishing Opportunities, and Ulrich's Periodicals Directory.
The JISE web site is located at http://jise.org
S.E. Kruck, Ph.D., CPA, CCP
KruckSE at JMU.edu<mailto:KruckSE at JMU.edu>
Professor, Computer Information Systems Department - http://cob.jmu.edu/kruckse
Editor-in-Chief, Journal of Information Systems Education - http://jise.org<http://jise.org/> (editor at jise.org<mailto:editor at jise.org> or jise at jmu.edu)
LinkedIn: Journal of Information Systems Education
Twitter: J_Info_Sys_Educ
Facebook: JISE
Board of Directors, EdSIG (AITP) - http://www.aitp-edsig.org<http://www.aitp-edsig.org/>
President, Friends of Valley Charities - http://tinyurl.com/FriendsofValleyCharities
James Madison University
800 Main Street
College of Business - MSC0202
Harrisonburg, VA 22807
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20120328/cb829cdf/attachment-0001.html>
------------------------------
Message: 3
Date: Wed, 28 Mar 2012 14:06:02 -0400
From: Prashant Palvia <pcpalvia at uncg.edu>
To: AISWorld <aisworld at lists.aisnet.org>
Cc: Vinay Deep Khanapuram <v_khanap at uncg.edu>
Subject: [AISWorld] JGITM, Vol 15, No 1, January 2012
Message-ID:
<CABvY-Xsn_gRrWJ=7edCbujUiktmLSZhb3nXq6OwBZKLxMqxN0A at mail.gmail.com>
Content-Type: text/plain; charset="windows-1252"
This issue was published in January 2012. Sorry for the delay in posting.
Please distribute to colleagues and relevant lists.
*************************
CONTENTS OF VOLUME 15, NUMBER 1, (January 2012) OF THE JOURNAL OF GLOBAL
INFORMATION TECHNOLOGY MANAGEMENT (JGITM)
Note that JGITM is now among the elite group of MIS journals included in
the prestigious Social Sciences Citation Index (SSCI). It is included in
both SSCI and CC/S&BS, both produced by Thomson Reuters.
http://jgitm.uncg.edu/
Publisher: Ivy League Publishing, http://www.ivylp.com, email:
admin at ivylp.com
******************************************************************************
IF YOU HAVE NOT RECEIVED A FREE SAMPLE IN THE PAST AND WOULD LIKE TO
RECEIVE ONE, PLEASE WRITE OR SEND AN EMAIL MESSAGE TO THE EDITOR-IN-CHIEF:
Prashant Palvia, Ph.D.,
The University of North Carolina at Greensboro (pcpalvia at uncg.edu and
rmouzts at uncg.edu).
******************************************************************************
CALL FOR MANUSCRIPTS: The journal invites contributions from all parts of
the world from academic and industry scholars involved in research,
management, and the utilization of global information resources. Besides
quality work, at a minimum each submitted article should have the following
three components: an IS topic, an international orientation (e.g., cross
cultural studies or strong international implications), and strong evidence
(e.g., survey data, case studies, experiments, secondary data, etc.).
Please submit your manuscript electronically to the Editor-in-Chief at
pcpalvia at uncg.edu.
REVIEW PROCESS: Each suitable article is blind-reviewed by three members of
the editorial review board. A recommendation is then made by the
Editor-in-Chief or an Associate Editor. The final decision is made by the
Editor-in-Chief. If a revision is recommended, the revised paper is sent
for final approval to one of the Editors.
CONTENTS OF THIS ISSUE OF JGITM (VOL. 15, NO.1, January 2012)
SOCIAL MEDIA AND THE GLOBAL CIO
Anil Kumar, Central Michigan University, anil.kumar at cmich.edu
The global CIOs job has become both more challenging and interesting as she
attempts to understand how to exploit social media technologies in her
organization. The return on investment can be significant if the strategy
to implement social media technologies is well executed. When planning for
the social media platform that an organization will use, a global CIO must
always look to the future as these technologies are evolving very fast. Global
CIOs that ignore social media technologies do so at their own peril. The
author discusses a number of issues realted to the use of social media in
this timely and thought provoking editorial.
A CROSS CULTURAL COMPARISON OF THE EXTENDED TPB: THE CASE OF DIGITAL PIRACY
Sulaiman Al-Rafee, Kuwait University, sulaiman at cba.edu.kw
Ali E. Dashti, Kuwait University, ali.dahti at ku.edu.kw
This study examined a behavioral model in two different cultures (in the
U.S., and in the Middle East), within the context of digital piracy. The
model was extended by adding moral obligation as a factor influencing
intention to pirate digital media. The results show, that while the
overall model was significant in predicting the piracy behavior across the
two cultures, there were differences in the influence of the individual
variables. Subjective norm was only significant in the Middle East, and
moral obligation was highly significant in the U.S. sample. Attitude and
perceived behavioral control were found to be at least moderately
significant in both cultures.
A PROCESS MODEL OF GOVERNMENT INTERVENTION AND CAPABILITY DEVELOPMENT:
LESSONS FROM THE TECHNOLOGY CLUSTER FORMATION IN HYDERABAD, INDIA
Ramiro Montealegre, University of Colorado, Boulder,
Ramiro.Montealegre at Colorado.edu
This study examines the path taken by the government of the Indian state of
Andhra Pradesh that recently established an information technology (IT)
cluster in Hyderabad, the capital city. The city went from virtually no
presence in IT to developing one of the world?s most vibrant IT clusters in
the world. A retrospective case study research was conducted guided by two
research questions: (1) how institutional actions influenced the capability
development that shaped the IT cluster formation in Hyderabad and (2) why
did it succeed despite the poor fit with its initial context? A process
model serves as the central contribution of this research.
ICT ADOPTION IN FACILITIES MANAGEMENT SUPPLY CHAIN: THE CASE OF DENMARK
Ada Scupola, Roskilde University, Denmark, Ada at ruc.dk
This is a qualitative study of factors impacting the adoption of ICT
solutions in the Danish facility management supply chain. There are a
number of drivers and barriers that influence the adoption of ICT solutions
in this service sector. These are grouped under three major categories:
organizational factors including strategic and operational factors;
external environmental factors including supplier interdependence and
industry characteristics; and technological factors including compatibility
and complexity. The study is relevant to researchers concerned with ICT
adoption, operations and service management (especially facilities
management) as well as operation managers and ICT managers.
THE EXPERT OPINION: AN INTERVIEW WITH SCOTT BENDLE, CIO, RIGAKU AMERICAS
CORPORATION
Conducted by Paul S. Licker, Oakland University, licker at oakland.edu
Scott Bendle has more than 25 years in the industry, after starting his
career teaching Laser-Electro-Optics. Rigaku is a Japanese firm, founded
in 1951 and headquartered in Tokyo, Japan. Rigaku makes and services X-ray
generators, XFR and XRD technologies. The interview tackles a number of
important questions including: the role of information technology (IT) in
their industry and organization, the role of the CIO, the role of IT in
internationalization, cultural issues, challenges in application
development and the global IT architecture.
BOOK REVIEW: WEB INFORMATION SYSTEMS AND TECHNOLOGIES, EDITED BY JOS?
CORDEIRO AND JOAQUIM FILIPE
Reviewed by Roberto Vinaja, Texas A&M University - San Antonio,
bvinaja at tamusa.tamus.edu
This book provides a balanced view of web-enabled systems by studying both
the social and technology components of their implementation. It has a
special emphasis on the relationship between online social networks and
e-commerce and business intelligence and incorporates a global perspective.
Several chapters portray a wide range of IT strategic issues faced by
organizations, such as collaboration, controlled access to enterprise
resources and information security. Many chapters describe actual
prototypes that clearly illustrate the principles and lessons described in
the chapters.
********************************************
For copies of the above articles, please check for the Journal of Global
Information Technology Management (JGITM) in your institution's library.
******************************************** MISSION: The mission of the
Journal of Global Information Technology Management (JGITM) is to continue
to be the premier journal on Global Information Technology Management. It
is a refereed international journal supported by global IT scholars from
all over the world. JGITM publishes articles and reports related to all
aspects of the application of information technology for international
business. For example, it will report on information resource management,
managerial and organizational concerns, educational issues, and innovative
applications related to global IT. Very important to the journal is its
emphasis on quality and relevance. The journal disseminates this knowledge
to researchers, practitioners, academicians, and educators all over the
world on a timely basis. Finally, the journal is international in all
respects: content, article authorship, readership, and the editorial board.
SCOPE AND COVERAGE: The journal's scope is multidisciplinary. It publishes
research, applied, and educational articles from all areas of MIS as well
as functional IT applications that have international focus. The journal
also entertains a variety of methodological approaches. It encourages
manuscript submissions from authors all over the world, both from academia
and industry. In addition, the journal will also include educational cases
and reviews of MIS books that have bearing on global aspects. Practitioner
input will be specifically solicited from time-to-time in the form of
industry columns and CIO interviews.
Articles in the journal include, but are not limited to the following
areas: Frameworks and models for global information systems (GIS),
Development, evaluation and management of GIS, Electronic Commerce,
Internet related issues, Societal impacts of IT in developing countries, IT
and Economic development, IT Diffusion in developing countries, IT human
resource issues, DSS/EIS/ES in international settings, Organizational and
management structures for GIS, Transborder data flow issues, Electronic
data interchange, Telecommunications, Distributed global databases and
networks, Cultural and societal impacts, Comparative studies of nations,
and Applications and case studies (both educational and research).
********************************
Please join us at the next GITMA World conference in Bangalore, India on
June 17-19, 2012. http://www.gitma.org. IT IS THE FIRST MAJOR
INTERNATIONAL IS/IT ACADEMIC CONFERENCE TO BE HELD IN INDIA.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20120328/23f5f84f/attachment-0001.html>
------------------------------
Message: 4
Date: Wed, 28 Mar 2012 20:07:19 +0200
From: "DAVID GARCIA ROSADO" <David.GRosado at uclm.es>
To: <aisworld at lists.aisnet.org>
Subject: [AISWorld] CFP WOSIS 2012. Deadline extended: 10 April
Message-ID: <B767D97BBA9DF44FBAAA7570ABCC5F48CEA6F1 at EVSCR01.uclm.es>
Content-Type: text/plain; charset="iso-8859-1"
[Apologies if you receive multiple copies of this announcement. Please pass it on to your colleagues and students who might be interested in contributing]
The best papers will have the chance to publish extended and revised versions in a special issue of Computer Standards and Interfaces in the ISI Journal Citation Reports with Impact factor of 0.825.
**** CALL FOR PAPERS ****
The Ninth International Workshop on Security In Information Systems WOSIS-2012
28 June - 1 July, 2012 - Wroclaw, Poland
http://www.iceis.org/wosis.aspx <http://www.iceis.org/wosis.aspx>
To be held in conjunction with the 14th International Conference on Enterprise Information Systems (ICEIS 2012) http://www.iceis.org/ <http://www.iceis.org/>
********Important Dates********
Regular Paper Submission: 10 April, 2012 (extended)
Authors Notification: 27 April, 2012
Camera Ready Submission Deadline: 10 May, 2012
*****************************
Co-chairs:
Dr. David G. Rosado
University of Castilla-La Mancha, Spain
David.GRosado at uclm.es
Dr. Luis Enrique S?nchez
Sicaman-NT, Departament of R+D, Spain
lesanchez at sicaman-nt.com
Dr. Carlos Blanco
University of Cantabria, Spain
blancobc at unican.es
Dr. Jan J?rjens
Technical University of Dortmund, Germany
jan.jurjens at cs.tu-dortmund.de
Workshop Background and Goals
Information Systems Security is one of the most pressing challenges facing all kinds of organizations today. Although many companies have discovered how critical information is to the success of their business or operations, very few have managed to be effective in maintaining their information secure, avoiding unauthorized access, preventing intrusions, stopping secret information disclosure, etc.
There are various definitions of security, but all of them basically agree on the same components. Security in information systems considers the protection of information and of the systems that manage it, against a wide range of threats in order to ensure business continuity, minimize risks and maximize the return on investment and business opportunities.
Security is, therefore, currently a widespread and growing concern that covers all areas of society: business, domestic, financial, government, and so on. In fact, the so-called information society is increasingly dependent on a wide range of software systems whose mission is critical, such as air traffic control systems, financial systems, or public health systems. The potential losses that are faced by businesses and organizations that rely on all these systems, both hardware and software, therefore signify that it is crucial for information systems to be properly secured from the outset.
With the increasing dependence that the information society has on Information and Communication Technology (ICT), the need to protect information is increasingly important for companies. The demand for products, systems and services with which to manage and maintain information is therefore increasing, and the realization of superficial security controls is not sufficient. It is necessary to apply a rigorous approach to the assessing and improvement of the security of products and processes that take place in the context of ICT. This has led to the emergence of Information Security Management Systems (ISMS), which are of great importance to the stability of companies' information systems.
In this new edition of WOSIS, the traditional information systems security topics will remain but we want explicitly focus the workshop on one of the most important issues and currently considered as it is security in Cloud computing. Although there are many benefits to adopting cloud computing, there are also some significant barriers to adoption as is security followed by issues regarding compliance, privacy and legal matters. Security is the main obstacle for many organizations in their move to the cloud, related to risk areas such as external data storage, dependency on the "public" internet, multi-tenancy and integration with internal security. The objective of this new edition is to contribute to the study and analysis of solutions and approaches which help to achieve and facilitate the level of security needed for such distributed environments and that its adoption is not any problem for the society, administration and enterprise.
Topics of interest include, but are not limited to:
Topic for Cloud Computing
* Security Engineering for Cloud-Based Systems
* Security Requirements Engineering for Cloud-Based Systems
* Risks and threats in Cloud
* Privacy and Data protection in Cloud
* Cloud Legal Issues
* Trust and policy management in Clouds
* Issues and recent approaches in portability, interoperability and migration
* Secure migration processes to cloud computing
* Security in migration models
* Systems adapted to the cloud
* Storage security
* Cloud Infrastructure Security
* Security Governance in the Cloud
* Risk management and assessment and third-party risk management
* Identity & Access Management in the Cloud
* Security and Virtualization
* Security in SaaS, PaaS and IaaS
* Security in Cloud applications
* Cloud security models
* MDA and MDS applied to cloud computing
* Case studies
Rest of topics
* Security in Software development Life Cycle
* Information Security Management System
* Security Management and Assessment
* Analysis and management of risks
* Security Implementation, Secure programming and Security Deployment
* Case studies and experiences of secure software
* Security culture
* IT Governance
* IT Service Continuity
* Language-based Security
* Open Security Standards and Security Certification
* Common practice, legal and regulatory issues
* Security for SOA, Web Services, Grid computing
* Security for Databases and Data Warehouses
* Metadata and Security
* Secure Data Management
* Workflow and Business Process Security
* Security Metrics and Measurement
* Security Ontologies
* Security in Software Product Lines
* Distributed and Network Security
* Security & Trust Models
* Authentication, Authorization and Access Control
* Anonymity and Privacy
* Security for Mobile Computing, sensors networks, multimedia systems
* Security for Electronic Commerce, Electronic Business and e-Services (e-voting, e-banking, e-governement, e-health)
* Security in Social Networks
* Security for embedded systems, smart cards and RFID
* Security Issues in Ubiquitous/Pervasive Computing
* Intellectual Property Protection
* Digital Rights Management (DRM). Mobile DRM
* Personal Data Protection for Information Systems and Digital Identity management
* Access Control and Rights Expression Languages
* Semantic Web Technologies applied to Security
* Security Engineering
* Disaster Recovery and Failure Prevention
* Incident Response and Prevention
* Intrusion Detection and Fraud Detection
* Biometric Security
* Cryptology: Cryptography and Cryptanalysis
* Information hiding: Steganography & Steganalysis
* Digital Forensics
* Cyber terrorism
Paper Submission
Prospective authors are invited to submit papers for oral presentation in any of the topics listed above. Submitted papers must present original, non-published work of high quality. Only papers in English will be accepted, and the length of the paper should not exceed 10 pages for full papers and 8 pages for short papers (figures and appendices included).
Instructions for preparing the manuscript (in Word and Latex formats) are available at the conference Paper Templates web page. Please also check the web page with the Submission Guidelines. Papers should be submitted electronically via the web-based submission system at: http://www.insticc.org/Primoris <http://www.insticc.org/Primoris>
Publications
All accepted papers will be published in the workshop proceedings book, under an ISBN reference, and in CD-ROM support. Additionally, the best papers will have the chance to publish extended and revised versions in Journal of Computer Standards and Interfaces in the ISI Journal Citation Reports.
Workshop Program Committee
Alfonso Rodriguez. University of Bio-Bio. Chile
Ambrosio Toval. University of Murcia. Spain
Andreas Bauer, National ICT Australia. Australia
Antonio Ma?a. University of Malaga. Spain
Brajendra Panda. University of Arkansas. USA
Csilla Farkas. University of South Carolina. USA
Daniel Mellado. University of Castilla-La Mancha. Spain
Debasis Giri. Haldia Institute of Technology. India
Duminda Wijesekera. University George Mason. USA
Eduardo Fern?ndez-Medina. University of Castilla-La Mancha. Spain
Eduardo B. Fern?ndez. Florida Atlantic University. USA
Ernesto Damiani. Universit? degli Studi di Milano. Italy
G?nther Pernul. University of Regensburg. Germany
Hugo Jonker. University of Luxembourg. Luxembourg
Indrakshi Ray. Colorado State University. USA
Jaejoon Lee. Lancaster University. UK
Jaime Delgado. Universitat Polit?cnica de Catalunya. Spain
Kevin Butler. University of Oregon. USA
Luigi Lo Iacono, European University of Applied Sciences. Germany
Mar?a Carmen Fern?ndez. Universidad de M?laga. Spain
Mario Piattini. University of Castilla-La Mancha. Spain
Mihai Christodorescu. University of Wisconsin. USA <http://www.wisc.edu/>
Raimundas Matulevicius, University of Tartu. Estonia
Rajkumar Buyya, Univ. of Melbourne. Australia
Sabrina De Capitani di Vimercati. Universit? degli Studi di Milano. Italy
Shareful Islam. University of East London. UK
Shinsaku Kiyomoto. KDDI R & D Laboratories Inc. Japan
Siani Pearson. Hewlett-Packard Laboratories. Bristol, UK.
Spyros Kokolakis. Athens University of Economics and Business. Greece
Stamatis Karnouskos. SAP AG. Germany
Steven Furnell. University of Plymouth. UK
Toshihiro Yamauchi. Okayama University <http://www.okayama-u.ac.jp/index_e.html> . Japan
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20120328/ffd8a343/attachment-0001.html>
------------------------------
Message: 5
Date: Wed, 28 Mar 2012 15:03:14 -0400
From: Prashant Palvia <pcpalvia at uncg.edu>
To: AISWorld <aisworld at lists.aisnet.org>
Cc: Vinay Deep Khanapuram <v_khanap at uncg.edu>
Subject: [AISWorld] JGITM, Vol 15, No 2, April 2012
Message-ID:
<CABvY-XssbPhCXSNLPhAsiq8wHFqCCnxwgtvBSENmzdnRkz2BxA at mail.gmail.com>
Content-Type: text/plain; charset="windows-1252"
Please distribute to colleagues and relevant lists.
*************************
CONTENTS OF VOLUME 15, NUMBER 2, (April, 2012) OF THE JOURNAL OF GLOBAL
INFORMATION TECHNOLOGY MANAGEMENT (JGITM)
Note that JGITM is now among the elite group of MIS journals included in
the prestigious Social Sciences Citation Index (SSCI). It is included in
both SSCI and CC/S&BS, both produced by Thomson Reuters.
http://jgitm.uncg.edu/
Publisher: Ivy League Publishing, http://www.ivylp.com, email:
admin at ivylp.com
SPECIAL ISSUE ON ?ONLINE COMMUNITIES AND SOCIAL NETWORKS ? GLOBAL AND
CULTURAL PERSPECTIVES? GUEST EDITORS: DAN YANG, SOUTHWESTERN UNIVERSITY OF
FINANCE AND ECONOMICS; FUJUN LAI, THE UNIVERSITY OF SOUTHERN MISSISSIPPI;
AND YONG LU, THE PENNSYLVANIA STATE UNIVERSITY
******************************************************************************
IF YOU HAVE NOT RECEIVED A FREE SAMPLE IN THE PAST AND WOULD LIKE TO
RECEIVE ONE, PLEASE WRITE OR SEND AN EMAIL MESSAGE TO THE EDITOR-IN-CHIEF:
Prashant Palvia, Ph.D.,
The University of North Carolina at Greensboro (pcpalvia at uncg.edu and
rmouzts at uncg.edu).
******************************************************************************
CALL FOR MANUSCRIPTS: The journal invites contributions from all parts of
the world from academic and industry scholars involved in research,
management, and the utilization of global information resources. Besides
quality work, at a minimum each submitted article should have the following
three components: an IS topic, an international orientation (e.g., cross
cultural studies or strong international implications), and strong evidence
(e.g., survey data, case studies, experiments, secondary data, etc.).
Please submit your manuscript electronically to the Editor-in-Chief at
pcpalvia at uncg.edu.
REVIEW PROCESS: Each suitable article is blind-reviewed by three members of
the editorial review board. A recommendation is then made by the
Editor-in-Chief or an Associate Editor. The final decision is made by the
Editor-in-Chief. If a revision is recommended, the revised paper is sent
for final approval to one of the Editors.
CONTENTS OF THIS ISSUE OF JGITM (VOL. 15, NO.2, April 2012)
SPECIAL ISSUE ON ?ONLINE COMMUNITIES AND SOCIAL NETWORKS ? GLOBAL AND
CULTURAL PERSPECTIVES? GUEST EDITORS: DAN YANG, SOUTHWESTERN UNIVERSITY OF
FINANCE AND ECONOMICS; FUJUN LAI, THE UNIVERSITY OF SOUTHERN MISSISSIPPI;
AND YONG LU, THE PENNSYLVANIA STATE UNIVERSITY
EDITORIAL PREFACE: ONLINE COMMUNITIES AND SOCIAL NETWORKS ? GLOBAL AND
CULTURAL PERSPECTIVES
Dan Yang, Southwestern University of Finance and Economics, China,
yangd at swufe.edu.cn
Fujun Lai, The University of Southern Mississippi, USA, fujun.lai at usm.edu
Yong Lu, The Pennsylvania State University, USA, ericlu at psu.edu
Recent advances in the Internet and communication technologies have led to
the rapid growth of many social networking communities. . Studies in this
area have focused on social network analysis and more recently on social
media intelligence and networking data mining. However, current research is
not closely related to culture and organization issues, and do not fully
capture and understand the social and managerial impact of Web 2.0. The
guest editors bring attention to important concerns in this area and
introduce the contents of this special issue.
THE ONLINE SOCIAL NETWORKS ON KNOWLEDGE EXCHANGE: ONLINE SOCIAL IDENTITY,
SOCIAL TIE AND CULTURE ORIENTATION
Huilin Xiao, Southwestern University of Finance and Economics, China,
xiaohl at swufe.edu.cn
Weifeng Li, Southwestern University of Finance and Economics, China,
weifenglee at gmail.com
Xubin Cao, Southwestern University of Finance and Economics, China,
cxb at swufe.edu.cn
Zongming Tang, Shanghai Jiaotong University, China, zmtang at sjtu.edu.cn
Uisng social exchange theory and social capital theory, this study develops
a theoretical model that predicts individual knowledge exchange behavior in
the virtual environment, where trust and outcome expectation mediate the
relationship between online social identity, online social tie, personal
culture orientation and the effect of knowledge exchange. The study
emphasizes the cross-culture effect which influences knowledge exchange in
the community. The model was tested empirically with users having
experience within the online community. Findings indicate that online
social attributes are key facilitators in knowledge exchange in virtual
communities.
UNDERSTANDING USER BEHAVIOR AT SOCIAL NETWORKING SITES: A RELATIONAL
CAPITAL PERSPECTIVE
Rui Chen, Ball State University, rchen3 at bsu.edu
Sushil Sharma, Ball State University, ssharma at bsu.edu
The authors examine member engagements on social networking sites.
Engagements such as site use and self-disclosure lead to the growth of
social relationships, increased site traffic, customized services, and an
accumulation of user generated contents; hence they are imperative to the
long-term success of networking sites. Drawing on Social Capital Theory
(SCT), a model is developed that examines the role of relational capitals
in predicting member behavior. It also investigates the relationship
between site use and self-disclosure behavior. The model was validated
through survey data collected from social networking site users in the U.S.
and the analysis results provided mixed support to the hypothesized
relationships. The study adds to the literature on social networking sites
and SCT; it also provides new perspectives on site management for
networking service providers.
CUSTOMER INTERACTIONS IN VIRTUAL BRAND COMMUNITIES: EVIDENCE FROM CHINA
Yonggui Wang, University of International Business and Economics, China,
ygwang at uibe.edu.cn
Jianjun Shi, University of International Business and Economics, China,
shijj at uibe.edu.cn
Shuang Ma, University of International Business and Economics, China,
mashuang3a at 163.com
Guicheng Shi, Macau University of Science and Technology, China,
gcshi at must.edu.mo
Lili Yan, University of International Business and Economics, China,
yanlili at fltrp.com
Customer interactions in virtual brand communities (VBCs) have become a
significant approach in value co-creation. Although VBCs have been examined
in different contexts and perspectives, customer interactions in VBCs have
been understudied. This study develops an integrated framework for customer
interactions and its key antecedents. Drawing from social identity theory,
brand identity is incorporated to examine its contingent impacts on the
influences of the needs on customer interactions. The framework is tested
in the context of the brand community (i.e, Apple, China). Global
implications, managerial implications and research implications are
discussed.
THE EXPERT OPINION: AN INTERVIEW WITH BIN HU, GENERAL EDITOR OF TIANYA
COMMUNITY
Conducted by Weiming Li, Hainan University, China, lwming at 126.com
Dong Lu, Southwestern University of Finance and Economics, China,
ludong at swufe.edu.cn
Mingfeng Tang, Southwestern University of Finance and Economics, China,
tang at swufe.edu.cn*
Bin Hu is the general editor of Tianya Community in China, responsible for
content quality, information security and public opinion research. The
interview describes the Tianya communities and its various dimensions such
as: its functions and features, user group characteristics, changes that
have occurred in netizens, power of Web 2.0, problems in Web 2.0
applications, management issues, and comparisons with the U.S.
BOOK REVIEW: STEVE JOBS, BY WALTER ISAACSON
Reviewed by Huilin Zhu, Temple University, USA and Zhexiang Sheng, Fudan
University, China.
The biography ?Steve Jobs? written by Walter
Isaacson<http://topics.nytimes.com/topics/reference/timestopics/people/i/walter_isaacson/index.html?scp=1-spot&sq=walter%20isaacson&st=cse>provides
us a
riveting story of the roller-coaster life and searingly intense personality
of Steve Jobs. This biography is based on more than forty interviews with
Jobs conducted over two years?as well as interviews with more than a
hundred family members, friends, adversaries, competitors, and colleagues. This
book is comprised of 42 chapters, which can be divided into four parts.
These parts are exactly four stages of his life. The reviewers comment on
all four parts. Ultimately, Isaacson?s description provides us a chance to
access Jobs? inner world.
********************************************
For copies of the above articles, please check for the Journal of Global
Information Technology Management (JGITM) in your institution's library.
******************************************** MISSION: The mission of the
Journal of Global Information Technology Management (JGITM) is to continue
to be the premier journal on Global Information Technology Management. It
is a refereed international journal supported by global IT scholars from
all over the world. JGITM publishes articles and reports related to all
aspects of the application of information technology for international
business. For example, it will report on information resource management,
managerial and organizational concerns, educational issues, and innovative
applications related to global IT. Very important to the journal is its
emphasis on quality and relevance. The journal disseminates this knowledge
to researchers, practitioners, academicians, and educators all over the
world on a timely basis. Finally, the journal is international in all
respects: content, article authorship, readership, and the editorial board.
SCOPE AND COVERAGE: The journal's scope is multidisciplinary. It publishes
research, applied, and educational articles from all areas of MIS as well
as functional IT applications that have international focus. The journal
also entertains a variety of methodological approaches. It encourages
manuscript submissions from authors all over the world, both from academia
and industry. In addition, the journal will also include educational cases
and reviews of MIS books that have bearing on global aspects. Practitioner
input will be specifically solicited from time-to-time in the form of
industry columns and CIO interviews.
Articles in the journal include, but are not limited to the following
areas: Frameworks and models for global information systems (GIS),
Development, evaluation and management of GIS, Electronic Commerce,
Internet related issues, Societal impacts of IT in developing countries, IT
and Economic development, IT Diffusion in developing countries, IT human
resource issues, DSS/EIS/ES in international settings, Organizational and
management structures for GIS, Transborder data flow issues, Electronic
data interchange, Telecommunications, Distributed global databases and
networks, Cultural and societal impacts, Comparative studies of nations,
and Applications and case studies (both educational and research).
********************************
Please join us at the next GITMA World conference in Bangalore, India on
June 17-19, 2012. http://www.gitma.org. IT IS THE FIRST MAJOR
INTERNATIONAL IS/IT ACADEMIC CONFERENCE TO BE HELD IN INDIA.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20120328/a1a8511d/attachment-0001.html>
------------------------------
Message: 6
Date: Thu, 29 Mar 2012 08:17:55 +1100
From: "Gregor, Shirley" <Shirley.Gregor at anu.edu.au>
To: <aisworld at lists.aisnet.org>
Subject: [AISWorld] Contents of JAIS, Volume 13, Issue 3 (March)
Message-ID:
<23177F380EF969428D912A1D602776E901126F2C at markka7.fec.anu.edu.au>
Content-Type: text/plain; charset="windows-1252"
Contents of Volume 13, Issue 3 (March)
Journal of the Association for Information Systems (JAIS)
Official Publication of the Association for Information Systems
Published: Monthly Electronically
ISSN: 1536-9323
Published by the Association for Information Systems, Atlanta, USA
http://aisel.aisnet.org/jais/
Editor-in-Chief: Professor Shirley Gregor, the Australian National University, Australia
PAPER ONE
An Empirical Examination of the Impact of ICT Investments on Future Levels of Institutionalized Democracy and Foreign Direct Investment in Emerging Societies
By Daniel S. Soper, Haluk Demirkan, Michael Goul, and Robert St. Louis
Abstract
The macro-level impacts of information and communication technology (ICT) investments on institutionalized democracy and foreign direct investment (FDI) levels in emerging societies are examined within a multi-theoretic framework that considers societal structure, power, and globalization-driven societal change. Using multilevel change modeling and longitudinal data from 48 emerging societies across seven years, ICT investments are observed to produce positive direct impacts on future levels of institutionalized democracy and FDI. After controlling for several covariates, the direct impact of ICT investments on future levels of institutionalized democracy in emerging societies is shown to partially explain the observed relationship between ICT investments and future FDI in those societies. The implications of these results are discussed in light of an emerging and exemplary World Bank debate over the historical search for a simple recipe for emerging society development and !
the need for a new way of thinking represented by what has been referred to as "new structural economics".
To obtain a copy of the entire article, click on the link below:
http://aisel.aisnet.org/jais/vol13/iss3/3/
PAPER TWO
IT and Firm Agility: An Electronic Integration Perspective
By Salman Nazir and Alain Pinsonneault
Abstract
Firms evolving in increasingly turbulent environments need to respond to market threats and opportunities with speed. At the same time, firms implement numerous information technologies (IT) in the hope of streamlining processes and providing managers with unfettered access to information from both within and outside the firm. While research shows how agility and IT contribute to firm performance, the relationship between these two constructs remains relatively unexplored. Using an electronic integration perspective, we develop a framework that addresses this issue. The framework suggests that IT applications affect the two components of agility (sensing and responding) through two types of integration (internal and external). The framework also explains the mediating roles of knowledge exploration, knowledge exploitation, and process coupling. Four propositions are developed and illustrated with different examples. Avenues for future research are developed.
To obtain a copy of the entire article, click on the link below:
http://aisel.aisnet.org/jais/vol13/iss3/2/
PAPER THREE
A Mixed Methods Approach to Technology Acceptance Research
By Philip Fei Wu
Abstract
The aim of this paper is to discuss the significance and potential of a mixed methods approach in technology acceptance research. After critically reviewing the dominance of the quantitative survey method in TAM-based research, this paper reports a mixed methods study of user acceptance of emergency alert technology in order to illustrate the benefits of combining qualitative and quantitative techniques in a single study. The main conclusion is that a mixed methods approach provides opportunities to move beyond the vague conceptualizations of "usefulness" and "ease of use" and to advance our understanding of user acceptance of technology in context.
To obtain a copy of the entire article, click on the link below:
http://aisel.aisnet.org/jais/vol13/iss3/1/
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20120329/9820a8f9/attachment-0001.html>
------------------------------
Message: 7
Date: Thu, 29 Mar 2012 15:19:06 +1100
From: "Gregor, Shirley" <Shirley.Gregor at anu.edu.au>
To: <aisworld at lists.aisnet.org>
Subject: [AISWorld] JAIS Theory & Writing Workshop ECIS, 2-5pm 10
June
Message-ID:
<23177F380EF969428D912A1D602776E9011CFAB3 at markka7.fec.anu.edu.au>
Content-Type: text/plain; charset="us-ascii"
Journal of the Association for Information Systems
Theory and Writing Workshop
Associated with the 20th European Conference on Information Systems
(ECIS 2012)
Date and Venue
Sunday, 10 June, 2012, 2-5pm
ESADE Building 1, Barcelona, Spain.
About JAIS
The Journal of the Association for Information Systems (JAIS) is the
flagship journal of the Association for Information Systems (AIS) and
publishes scholarly contributions that represent the highest quality in
the field in the field of information systems. JAIS particularly
welcomes contributions that provide theoretical insights that advance
our understanding of information systems and information technology in
organizations and society. JAIS is inclusive in its coverage of topics,
level, and unit of analysis, theory, method, and philosophical and
research approaches, which reflects all aspects of information systems
research globally. A signature feature of JAIS is its strong emphasis on
theory.
Workshop Aims
The aim of this workshop is to assist researchers who are seeking to
publish work in the Journal of the Association for Information Systems
(JAIS) or journals of a similar nature. The workshop will discuss how to
present work in terms of style and structure and also how to better
demonstrate a contribution to knowledge and theory.
Workshop Agenda
The workshop will begin with an overview of JAIS, the categories of
papers that are published, and the editorial process. There will then be
a session concerning writing strategies and structuring and positioning
of papers, so as to improve the chance of publication of submitted work.
The major part of the workshop will be devoted to small group work,
where participants
discuss ideas and problems. Participants are encouraged to bring along
an outline of current work that they are prepared to discuss.
Workshop Organizers
The workshop will be facilitated by members of the Editorial Boards of
JAIS, including the Editor-in-Chief, Professor Shirley Gregor.
Registration
Registration is free but places may be limited. To reserve a place
please contact:
Adam.LeBrocq at anu.edu.au
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20120329/924529f1/attachment-0001.html>
------------------------------
Message: 8
Date: Thu, 29 Mar 2012 10:06:20 +0100
From: "Bernd Carsten STAHL" <bstahl at dmu.ac.uk>
To: <aisworld at lists.aisnet.org>
Subject: [AISWorld] PhD Studentship in Responsible Research and
Innovation in ICT
Message-ID: <016101cd0d8b$34fb92d0$9ef2b870$@dmu.ac.uk>
Content-Type: text/plain; charset="iso-8859-1"
De Montfort University ? Centre for Computing and Social Responsibility
Faculty of Technology
STARTING OCTOBER 2012
A PhD research studentship covering stipend and tuition fee costs within the
Centre for Computing and Social Responsibility, (Faculty of Technology)
working with an internationally recognised research team is available to
suitably qualified UK or EU students.
The project will determine ways of evaluating Responsible Research and
Innovation (RRI) theory and practice in ICT. Previous EU (ETICA,
www.etica-project.eu) and current UK (FRRIICT,
www.responsible-innovation.org.uk) funded projects conducted within the
Centre have identified emerging technologies, their ethical issues, and
methods for fostering good, ethical governance and practice in ICT research
and innovation, but it remains unclear under what conditions are such
interventions successful and effective?
Objectives of the PhD project are likely to include:
? Review of current theory and practice in RRI in different areas (e.g.
nanotechnology, synthetic biology, nuclear technology, geo-engineering,
health-related research)
? Definition of specific differences in RRI between ICT and other fields or
disciplines
? Development of criteria to allow for the evaluation of RRI activities and
initiatives
? Testing of these evaluation criteria
The thesis developed during this project will contribute to areas of
informatics and computer ethics that are concerned with methodological
innovation and evaluation. The outputs of the project will further academic
knowledge of how to evaluate particular ICT interventions in terms of RRI,
and how the results of such evaluations may potentially be communicated more
rapidly to policy makers.
The project will build on the findings of the ETICA and FRRIICT projects,
with an initial supervisory team from both the CCSR (Professor B. Stahl, Dr.
C. Flick) and the University of Oxford (Dr. M. Jirotka) that are currently
involved with the FRRIICT project.
Since 2008 the CCSR has led successful research application worth more than
?3 million in research funding, the majority of which was won in 2011. All
of the funded projects feed directly into research and policy discussions on
RRI in ICT. The Centre boasts an active research agenda and a significant
number of postgraduate students, with opportunities for the successful
student to become involved in a supportive, enthusiastic, and collegial
atmosphere aimed at fostering the highest quality of research and
significant impact of research output.
For a more detailed description of the studentship project please visit our
web site (http://ethics.ccsr.cse.dmu.ac.uk/ccsr) or contact Prof. Bernd
Stahl on +44 116 207 8252 or email bstahl at dmu.ac.uk
This research opportunity builds on our excellent past achievements and
looking forward to REF2014 and beyond. It will develop the university?s
research capacity into new and evolving areas of study, enhancing DMU?s
national and international research partnerships.
Applications are invited from UK or EU students with a good first degree
(First, 2:1 or equivalent) in a relevant subject. ?Doctoral scholarships are
available for up to three years full-time study starting October 2012 and
provide a bursary of ?13,770pa in addition to university tuition fees.
To receive an application pack, please contact the Graduate School Office
via email? to researchstudents at dmu.ac.uk .? Completed applications should be
returned together with a full CV and two supporting references.
Please quote ref:? DMU Research Scholarships 2012
CLOSING DATE: ?April 27th 2012
The full wording of the studentship and information for applicants is
available here:
http://www.jobs.ac.uk/job/AEE530/phd-studentship/
Bernd Carsten STAHL
Professor of Critical Research in Technology
Director, Centre for Computing and Social Responsibility
De Montfort University
Faculty of Technology, Department of Informatics
The Gateway
Leicester, LE1 9BH, UK
+44 116 207 8252
http://www.tech.dmu.ac.uk/~bstahl/
------------------------------
Message: 9
Date: Thu, 29 Mar 2012 02:13:48 -0700
From: Marcus Rothenberger <rothenb2 at unlv.nevada.edu>
To: aisworld at lists.aisnet.org
Subject: [AISWorld] DESRIST 2012 early registration ends March 31
Message-ID:
<CANK+dMiAXR2EvNM9zMRMQUp7Ur04r_433zVMZoJnKJMvs8DG4Q at mail.gmail.com>
Content-Type: text/plain; charset="iso-8859-1"
Early registration for DESRIST 2012 (May 14-15 in Las Vegas, NV) will end
on March 31 (midnight, pacific time). If you have not registered yet and
would like to attend, please go to http://desrist2012.unlv.edu and follow
the instructions for registration before the end of the month.
Please also make your hotel reservation on the conference web site as soon
as possible. The hotel block has been met and additional rooms are
available at the conference rate until they run out, but no later than
April 20.
We are looking forward to seeing you in Las Vegas.
Best regards,
Ken Peffers
Marcus Rothenberger
DESRIST 2012 program chairs
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20120329/e002a9a7/attachment-0001.html>
------------------------------
Message: 10
Date: Thu, 29 Mar 2012 13:05:29 +0200
From: Marleen Huysman <m.h.huysman at vu.nl>
To: <aisworld at lists.aisnet.org>
Subject: [AISWorld] invitation to KIN summer workshop Amsterdam
Message-ID: <A37E89F6-5B7D-414D-BE94-C98DF44FBE64 at vu.nl>
Content-Type: text/plain; charset="windows-1252"
Dear colleagues,
We kindly invite early career researchers (PhD candidates, post doctoral research and junior faculty) to the second KIN summer workshop to be held in Amsterdam, June 18 ? 21, 2012. This year?s theme will be: Online Interactions and New Ways of Working. This 3,5 day workshop, organized by the (KIN) research group of the VU University Amsterdam (kinresearch.nl) together with Amsterdam Business Research Institute (ABRI) offers seminars on new research topics related to new ways of working and knowledge collaboration in online environments; interactive sessions to discuss your ongoing research with an international faculty and ample opportunities to network and socialize with an international group of scholars. The teaching faculty consists of an international group of scholars, known for their research in the field: Samer Faraj, Niki Panteli, Emmanuelle Vaast and Marleen Huysman. For further information, including registration, please visit the ABRI website http://www.abri.vu.n!
l/en/events/courses-and-workshops/kin/index.asp or contact ABRI?s Programme Manager, Margriet Buseman (m.buseman at vu.nl).
Best regards,
Marleen Huysman
Professor of Knowledge & Organization
Head of Department of Information, Logistics and Innovation
VU University Amsterdam
http://kinresearch.nl
http://www.feweb.vu.nl/nl/afdelingen-en-instituten/information-logistics-and-innovation
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20120329/6bb9f631/attachment-0001.html>
------------------------------
Message: 11
Date: Thu, 29 Mar 2012 13:43:12 +0000
From: Rob Benyon <R.V.Benyon at ru.ac.za>
To: "aisworld at lists.aisnet.org" <aisworld at lists.aisnet.org>
Subject: [AISWorld] ITSM Implementation Survey
Message-ID:
<943CF9CF9AB98C4FB44F88C502D4586C561C07D2 at mail.ict.ru.ac.za>
Content-Type: text/plain; charset="us-ascii"
Hi Folks,
I have had an unpleasant setback this side. My survey instrument has concurrent guest user conflicts. As a consequence, the data I have gathered is invalid. This is very disappointing.
I have redone the survey on a different platform (Survey Monkey) and ask you please to participate in the repaired one.
Thanks,
Rob
Dear ITSM practitioner,
The intention of this research is to develop a framework of recommended best practice for IT Service Management implementation.
Part of this research includes an online survey of ITSM practitioners. In this regard, it would be greatly appreciated if you would please complete this anonymous questionnaire. Your help in this regard is greatly appreciated.
https://www.surveymonkey.com/s/ITSMImpSurvey
Researcher: Rob Benyon, Rhodes University, Department of Information Systems, supervised by Professor David Sewry.
We need your help to understand that which contributes to the successful implementation of IT Service Management.
There are 16 Questions.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20120329/3bee7936/attachment-0001.html>
------------------------------
Message: 12
Date: Wed, 28 Mar 2012 19:51:11 -0400
From: Amal Zouaq <amal.zouaq at gmail.com>
To: mda at www.mda-at-work.com, iaoa-member at ontolog.cim3.net,
bull-i3 at irit.fr, ontolog-invitation at ontology.cim3.net,
iaoa-general at ontolog.cim3.net, SEWORLD at cs.colorado.edu,
seworld at sigsoft.org, mda-discussion at yahoogroups.com,
isworld at lyris.isworld.org, office at easst.org, aiia at dis.uniroma1.it,
aisworld at lists.aisnet.org, wsrp-comment at lists.oasis-open.org,
ruleml-all at ruleml.org, soa-rm-comment at lists.oasis-open.org,
ssdl at newcastle.ac.uk, SIGecom-Talk at acm.org,
ontolog-forum at ontolog.cim3.net, semantic-web at w3.org,
web.semantique at lists-sop.inria.fr,
protege-discussion at lists.stanford.edu, dl at dl.kr.org,
dbitaly at list.dia.uniroma3.it, easst-members at cs.uni-potsdam.de,
tccc at lists.cs.columbia.edu, ln-request at cines.fr
Subject: [AISWorld] VORTE 2012 - Last CFP
Message-ID:
<CALq95+0746fSs-iFXyqvWkrN2-8CM07vzW0VdBwdXa4n+6_STQ at mail.gmail.com>
Content-Type: text/plain; charset="windows-1252"
Apologies for cross-posting and multiple posts.
FINAL CALL FOR PAPERS ( Deadline April 15th 2012)
The 7th International Workshop on Vocabularies, Ontologies and Rules for
the Enterprise (VORTE 2012)
Co-located with the 16th IEEE International EDOC Conference, Beijing,
China, 10th-11th September, 2012
WORKSHOP DESCRIPTION
The VORTE series of workshops is devoted to the topics of vocabularies,
ontologies and rules in the context of enterprise systems. The complexity
of enterprise systems, the increasing needs for advanced collaboration
between various systems within one institution or among many collaborating
parties and the velocity of organizational, policy, structural and market
changes strongly call for immediate mobilization of the research community
to develop more flexible and reliable technologies for the advancement of
enterprise systems.
Trying to respond to this urgent research need, the VORTE series of
workshops has been established in order to bring together researchers and
practitioners that are looking into the topics of ontologies and rules in
enterprise system development from different yet complementary
perspectives. The major objective is to provide a research forum for
exchanging ideas and results covering the use of ontologies and rules in
various stages of the lifecycle of enterprise systems.
Examples of topics covered by VORTE research contributions include the
development and adaptation of foundational, business and domain ontologies
for the enterprise, the use of ontologies and rules in all aspects of
enterprise modelling such as business process management and services, the
enhancement of rules and services with formal semantics, and the evaluation
of such systems and approaches. The workshop is also a forum for the
discussion of ontology-based knowledge management issues, interoperability
issues and ontology engineering issues, and covers various application
domains relevant for organizations (such as e-government and e-commerce).
The workshop also welcomes contributions on open linked data initiatives
for the enterprise and empirical studies on the use of ontologies and rules
in the enterprise system development lifecycle.
TOPICS
Vocabularies and Ontologies for the enterprise:
- Ontology-driven representation of products, services, functionalities,
design, processes;
- Ontologies for the know-how;
- Ontologies for corporate knowledge;
- Upper-level ontologies in the enterprise;
Knowledge management:
- Ontology and ontological methodologies in knowledge management and
integration;
- Adaptation of ontologies for companies and organizations;
- Ontology engineering, learning and maintenance within organizations;
- Ontology integration and alignment within organizations;
- Ontology effectiveness and evaluation in organizations;
Conceptual and Enterprise Modeling:
- Ontological Foundations for Conceptual Modeling and Meta-modeling
- Ontology Design and maintenance for Conceptual Model Integration;
- Ontology-Based Conceptual Modeling Tools and Environments
- Ontologies and Enterprise Architecture Modeling
- Ontologies and Business Process Modeling
- Ontologies and Goal-Based Modeling
- Ontologies and Business Rules
Enterprise Semantic Interoperability:
- Web services, Semantic services
- Composition and Modularity
- Merging, Mapping and Alignment
- Ontology Language Interoperability
- Open linked data publishing and exploitation
Problems and case studies in ontology application:
- Practical issues in using ontologies in enterprises
- Real cases of successful/unsuccessful use of ontology in business
- From legacy systems to the new ontology-driven systems
SUBMISSION AND PUBLICATION
We solicit two types of papers:
- Short papers (4 pages) discussing controversial issues in the field or
describing interesting or thought-provoking ideas that are not yet fully
developed; and
- Full papers (8-10 pages) describing more mature results
All submissions MUST conform to the two-column format of IEEE Computer
Society conference proceedings (
http://www2.computer.org/portal/web/cscps/formatting) and include the
author's name, affiliation, and contact details.
Papers must be submitted as PDF files using EasyChair at
http://www.easychair.org/conferences/?conf=vorte2012
All papers must not have been previously published or submitted elsewhere.
The papers accepted for the EDOC 2012 Workshops will be published after the
workshop with an ISBN in the IEEE Xplore Digital Library. At least one of
the authors for each accepted paper must register for the main conference
(there will be no workshop-only registration at EDOC 2012) and present
their papers at the workshop.
*Post-conference Journal Publication *
For previous editions of the workshop, special issues have been published
in journals such as Applied Ontology (2007), IJBPIM (2007), Elsevier's
Information Systems (2008, 2010), and Journal of Research Practice in
Information Technology (2009).
This year, authors of selected papers will be invited to submit extended
versions for consideration for a special issue of the Applied Ontology
Journal http://www.iospress.nl/journal/applied-ontology/.
KEYNOTE
TBA
IMPORTANT DATES
*Workshop paper submissions: April 15, 2012*
Workshops paper acceptance notifications: May 28, 2012
Camera-ready papers due: June 15, 2012
Workshop: September 10 or 11, 2012
COMMITTEES
Workshop Chairs:
Jo?o Paulo A. Almeida, Federal University of Esp?rito Santo, Brazil,
jpalmeida at ieee.org
Roberta Ferrario, Institute of Cognitive Sciences and Technology,
Laboratory for Applied Ontology, CNR, Trento, Italy, roberta.ferrario at cnr.it
Amal Zouaq, Royal Military College of Canada, Athabasca University, Queen?s
University, Canada, amal.zouaq at rmc.ca
Steering Committee:
Dragan Gasevic, Athabasca University, Canada
Giancarlo Guizzardi, Federal University of Esp?rito Santo (UFES), Vit?ria,
Brazil
Gerd Wagner, Institute of Informatics, Brandenburg University of Technology
at Cottbus, Germany
Program Committee:
Uwe Assmann, TU Dresden, Germany
Colin Atkinson, University of Mannheim, Germany
Ebrahim Bagheri, Athabasca University, Canada
Emanuele Bottazzi, Institute of Cognitive Sciences and Technologies, CNR,
Trento, Italy
Marco Brambilla, Politecnico di Milano, Italy
Christoph Bussler, Merced Systems, Inc., USA
Robert Colomb, The University of Queensland, Australia
Oscar Corcho, Universidad Polit?cnica de Madrid, Spain
Luiz Olavo Bonino da Silva, BiZZDesign, The Netherlands
Jens Dietrich, Massey University, New Zealand
Sergio Espana, Polytechnic University of Valencia
Joerg Evermann, Memorial University of Newfoundland, Canada
Ricardo Falbo, Federal University of Espirito Santo, Brazil
Lu?s Ferreira Pires, University of Twente, The Netherlands
Adrian Giurca, Brandenburg University of Technology at Cottbus, Germany
Guido Governatori, NICTA, Australia
Pierre Grenon, European Bioinformatics Institute, Cambridge, UK
Giancarlo Guizzardi, Federal University of Espirito Santo, Brazil
Brian Henderson Sellers, University of Technology Sydney, Australia
Heinrich Herre, University of Leipzig, Germany
Florian Matthes, University of Munich, Germany
Alex Norta, University of Helsinki, Finland
Andreas Opdahl, University of Bergen, Norway
Jeffrey Parsons, Memorial University of Newfoundland, Canada
Adrian Paschke, Free University Berlin, Germany
Florian Probst, SAP Research Darmstadt, Germany
Christophe Roche, University of Savoie, France
Michael Rosemann, Queensland University of Technology, Australia
Csaba Veres, University of Bergen, Norway
Gerd Wagner, Brandenburg University of Technology at Cottbus, Germany
Kewen Wang, Griffith University, Australia
Ron Weber, Monash University, Australia
Hans Weigand, Faculty of Economics of Tilburg University, Netherlands
LINKS
VORTE2012 web site: http://nemo.inf.ufes.br/vorte2012
EDOC2012 web site: http://edocconference.org
EasyChair submissions:
http://www.easychair.org/conferences/?conf=vorte2012
Formatting guidelines: http://www2.computer.org/portal/web/cscps/formatting
--
Amal Zouaq
Professeure adjointe | Assistant Professor
D?partement de math?matiques et d'informatique|
Department of Mathematics and Computer Science
Coll?ge militaire royal du Canada | Royal Military College of Canada
CP 17000, Succursale Forces, Kingston ON CANADA K7K 7B4
amal.zouaq at rmc.ca
Office | Bureau Girouard 320
Telephone | T?l?phone 613-541-6000 # 6478
Fax | T?l?copieur 613-541-6584
http://azouaq.athabascau.ca/
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20120328/6e89472d/attachment.html>
------------------------------
Message: 13
Date: Thu, 29 Mar 2012 10:32:30 +0200
From: "Mouzhi Ge" <mouzhi.ge at unibw.de>
To: aisworld at lists.aisnet.org
Subject: [AISWorld] Deadline Extension: International Workshop on
Information Value Management
Message-ID: <ea7ac88208f3231e35b5cf5591e87553.squirrel at mail.unibw.de>
Content-Type: text/plain;charset=iso-8859-1
**********************************************************
International Workshop on Information Value Management
conjoined with 14th International Conference on Enterprise Information
Systems (ICEIS)
28th June, 2012 - Wroclaw, Poland
http://www.iceis.org/IVM.aspx
**********************************************************
Deadline for paper submissions: 10th April, 2012
Background and Rational
=======================
The information systems literature has consistently emphasized the need
for alignment of information systems with organizational goals and
strategies and its impact on organizational performance. One of the key
challenges and subject of continuous debate focuses on how to achieve,
measure, increase and manage information and the value it creates to
organisations. It has been concern to researchers and management for many
years and the difficulty in measuring less tangible benefits has been
emphasized.
Information creates not only value in financial terms but also in terms of
operational and strategic advantages. Thus exploring the value of
information and its management is crucial to the success of world-leading
organizations. The value of information can be determined by its
importance to and the impact information has on the business operations
such as decision making, strategy development or optimizing supply chains.
However, the issue of how to manage the value of information is still
challenging and research so far could only address limited aspects. It has
been argued that if information result in enhanced business value, the
focus needs to shift from project based cost/benefit analysis to managing
the overall value creation of information. Furthermore, over the last
decade a move from solely technical aspects to a combination of multiple
contextual factors such as technology, sector, organizational culture, and
management style can be observed.
With this workshop we aim to go beyond traditional IT productivity and
cost evaluations; we view information as a crucial asset that creates
value to an organizations, and thus needs to be managed accordingly for
optimal business value. In this workshop, we aim to provide a platform for
discussing approaches, models, results and case studies or experience
reports addressing a broad range of issues related to Information Value
Management. Research challenges include how to determine the Value of
Information and its impact on business performance, managing Data and
Information Quality, capturing and maintaining Information Assets, and
designing and improving Information Manufacture System.
Papers can include and discuss various research methods and can be based
on case studies, quantitative and quantitative methods, design science as
well as experimental and simulation. In addition practical oriented
research and experience reports are encouraged.
Topics of interest include but are not limited to the following list:
==================
Determining Information Value
Data and Information Quality
Specifying and Measuring the Benefits from Information
Information Value Chains
Information Manufacture and Information Product
Optimising Information Value
Information Lifecycle Concepts
Modelling and Visualising Information Manufacturing Systems
Information Risk Management
Data Integration and Value Creation
Analytical IS and Value Creation
IVM Maturity Models
IVM Capabilities
IT Governance and IVM
Management Approaches for IVM
Change Management and IVM
Paper submissions
=================
Prospective authors are invited to submit papers in any of the topics
listed above. Instructions for preparing the manuscript (in Word and Latex
formats) are available at: http://www.iceis.org/papertemplates.aspx
Please also check the http://www.iceis.org/submissionguidelines.aspx.
Papers should be submitted electronically via the web-based submission
system at: http://www.insticc.org/Primoris
Publication
===================
All accepted papers (full, short and posters) will be published in a
special section of the conference proceedings book - under an ISBN
reference and on CD-ROM support - and submitted for indexation by Thomson
Reuters Conference Proceedings Citation Index (ISI), INSPEC, DBLP and EI
(Elsevier Index).
All papers presented at the conference venue will be available at the
SciTePress Digital Library (http://www.scitepress.org/DigitalLibrary/).
SciTePress is member of CrossRef (http://www.crossref.org/).
Important Dates
===============
Paper Submission: 10th April, 2012
Authors Notification: 27th April, 2012
Final Paper Submission and Registration: 4th May, 2012
ICEIS Conference: 28th June, 2012
Workshop Program Committee
================
Andy Koronios, University of South Australia, Australia
Carlo Batini, University of Milano-Bicocca, Italy
Marcin Sikorski, Gdansk University of Technology, Poland
Raymond Slot, Utrecht University of Applied Sciences, Netherlands
Joaquim Filipe, Polytechnic Institute of Set?bal/INSTICC, Portugal
David Olson, University of Nebraska, United States
Dietmar Jannach, Technical University of Dortmund, Germany
Maria Vargas-Vera, Open University, United Kingdom
Andrea Maurino, University of Milano Bicocca, Italy
Jos? Cordeiro, Polytechnic Institute of Set?bal/INSTICC,Portugal
Laure Berti-?quille, Universit? de Rennes 1, France
Cinzia Cappiello, Politecnico di Milano, Italy
Benjamin Shao, Arizona State University, United States
Bene Rodriguez, Bundeswehr University of Munich, Germany
Ying Su, Institute of Scientific and Technical Information of China,China
Thoa Pham, Dublin City University, Ireland
Ke Xu, Microsoft, USA
Workshop Chairs
================
Markus Helfert
Dublin City University, Ireland
Markus.Helfert at computing.dcu.ie
Mouzhi Ge
Bundeswehr University Munich, Germany
Mouzhi.Ge at unibw.de
----
Dr. Mouzhi Ge
E-Business & Web Science Research Group
Bundeswehr University Munich, Germany
Email: mouzhi.ge at unibw.de
Phone: +49-(0) 89-6004-4242
Fax: +49-(0) 89-6004-4620
www: https://www.unibw.de/wow5_3/team/mouzhi-ge
------------------------------
Message: 14
Date: Thu, 29 Mar 2012 17:51:02 +0300
From: George Angelos Papadopoulos <george at cs.ucy.ac.cy>
To: undisclosed-recipients:;
Subject: [AISWorld] 1st CFP: 10th IEEE/IFIP International Conference
on Embedded and Ubiquitous Computing
Message-ID: <41525F27-57BE-4AC4-B8AE-D54DBDF75321 at cs.ucy.ac.cy>
Content-Type: text/plain; charset="us-ascii"; Format="flowed";
DelSp="yes"
*** Call for Papers ***
The 10th IEEE/IFIP International Conference on Embedded and Ubiquitous
Computing (IEEE/IFIP EUC 2012)
http://www.euc2012.cs.ucy.ac.cy/
3-5 October 2012, Paphos, Cyprus
Embedded and ubiquitous computing is an exciting paradigm that promises
to provide computing and communication services to the end users all the
time and everywhere. Its systems are now invading in every aspect of our
daily life and promise to revolutionize our life much more profoundly
than elevators, electric motors or even personal computer evolution ever
did. The emergence of this technology is a natural outcome of research
and technological advances in a variety of areas including embedded
systems, pervasive computing and communications, wireless networks,
mobile computing, distributed computing and agent technologies.
EUC 2012 is the next event, in a series of highly successful IEEE
International Conferences on Embedded and Ubiquitous Computing (EUC),
previously held as ICDCS-ECS04 (Tokyo, Japan, March 2004), EUC-04
(Aizu, Japan, August 2004), EUC-05 (Nagasaki, Japan, December 2005),
EUC-06 (Seoul, Korea, August 2006), EUC-07 (Taipei, Taiwan, December
2007), EUC-08 (Shanghai, China, December 2008), EUC-09 (Vancouver,
Canada, August 2009), EUC-10 (Hong Kong, December 2010) and EUC 2011
(Melbourne, Australia, October 2011).
EUC 2012 will take place in Coral Beach resort near the city of
Paphos, Cyprus.
Topics of particular interest include, but are not limited to:
Embedded Computing
* Embedded System Software and Optimization
* Embedded System Architectures
* Hardware/Software Co-design and Design Automation
* Real-Time Systems and Operating Systems
* Application-Specific Processors and Devices
* Power-Aware Computing
* Sensor Networks
* System/Network-on-Chip
* Reconfigurable Computing Systems and Applications
* Cyber-Physical Systems
Ubiquitous Computing
* Pervasive Computing and Communications
* Middleware and Peer-to-Peer Computing
* Internet Computing and Applications
* Multimedia and Data Management
* Human-Computer Interaction
* Network Protocols
* Wireless Communication & Networks
* Mobile Computing
* Agents and Distributed Computing
* Security and Fault Tolerance Applications
Submission Guidelines
Submitted papers must not substantially overlap papers that have been
published or that are simultaneously submitted to a journal or a
conference with proceedings. Papers should be at most 8 pages
including the bibliography and well-marked appendices, and should
follow the IEEE 8.5" x 11" Two-Column Format. Committee members are
not required to read the appendices, and so the paper should be
intelligible without them. Submissions are to be made to the
submission web site. Only pdf files will be accepted. Submissions
not meeting these guidelines risk rejection without consideration
of their merits. Papers must be received by the submission deadline.
Authors of accepted papers must guarantee that their papers will be
presented at the conference. Accepted papers will be published in
the IEEE conference proceedings (EI indexed). Selected best papers
will be published in special issues of high quality journals
(currently under negotation).
Important Dates
* Submission Deadline: 20 May
* Notification of Acceptance: 15 July
* Camera-ready Versions Submitted: 31 July
* Author Registration: 31 July
Organizing Committee
General Chairs
Erol Gelenbe, Imperial College, UK
Rajesh Gupta, University of California at San Diego, USA
George A. Papadopoulos, University of Cyprus, Cyprus
Steering Chairs
Minyi Guo, Shanghai Jiaotong University, China
Laurence T. Yang, St. Francis Xavier University, Canada
Program Chairs
Habib M. Ammari, University of Michigan-Dearborn, USA
Marco D. Santambrogio, MIT, USA/Politecnico di Milano, Italy
Yan Zhang, Simula Research Lab/University of Oslo, Norway
Workshop Chairs
Xu Li, INRIA Lille - Nord Europe, France
Linwei Niu (to be confirmed), California State University Bakersfield,
USA
Program Vice-chairs
Embedded Software and Optimization
Simone Campanoni, Harvard University, USA
Embedded Systems and Hardware/Software Co-Design
Vincenzo Rana, EPFL, Switzerland
Real-Time Systems and Operating Systems
Lamia Youseff, Google
Power-Aware Computing
Seda Ogrenci Memik, Northwestern University, USA
Wireless Communications
Abbas Mohammed, Blekinge Institute of Technology, Sweden
Agent and Distributed Computing
Jinhua Guo, University of Michigan-Dearborn, USA
Middleware for Embedded and Ubiquitous Computing
Xiuzhen Cheng, George Washington University, USA
Sensor Networks
Andreas Constantinides, Frederick University, Cyprus
Mobile and Context-aware Computing
Carlo Curino, Yahoo
Multimedia and Data Management
Honggang Wang, University of Massachusetts at Dartmouth, USA
Autonomic, Organic and Trusted Computing
Jie Shen, University of Michigan-Dearborn, USA
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20120329/6b9a3d94/attachment.html>
------------------------------
_______________________________________________
AISWorld mailing list
AISWorld at lists.aisnet.org
End of AISWorld Digest, Vol 29, Issue 38
****************************************
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20120329/e556b63f/attachment.html>
More information about the AISWorld
mailing list