[AISWorld] AISWorld Digest, Vol 980, Issue 1

Atilla Elçi atilla.elci at gmail.com
Mon Feb 9 15:50:33 EST 2015


   - Please announce the attached CFPs in the next issue of the AISWorld.


On Mon, Feb 9, 2015 at 7:00 PM, <aisworld-request at lists.aisnet.org> wrote:

> Send AISWorld mailing list submissions to
>         aisworld at lists.aisnet.org
>
> To subscribe or unsubscribe via the World Wide Web, visit
>         http://lists.aisnet.org/mailman/listinfo/aisworld_lists.aisnet.org
> or, via email, send a message with subject or body 'help' to
>         aisworld-request at lists.aisnet.org
>
> You can reach the person managing the list at
>         aisworld-owner at lists.aisnet.org
>
> When replying, please edit your Subject line so it is more specific
> than "Re: Contents of AISWorld digest..."
>
>
> Today's Topics:
>
>    1. Re: What is IS strategy and how to prepare strategic IS plans
>       (Ross Malaga)
>    2. CFP : MSPN 2015 (Paris, 15-17 June 2015) (Boumerdassi)
>    3. Handbook on Sustainable ICT Adoption and integration for
>       Socio-Economic Development (Olawande Daramola)
>    4. Call for Papers - Big Data Analytics and Process Innovation
>       Workshop | To be held in CENTERIS 2015 - Vilamoura, Algarve,
>       Portugal, 7-9 October  2015 (Samuel FOSSO WAMBA)
>    5. Call for Papers: 2015 International Workshop on Distance
>       Education Technologies (Maiga Chang)
>    6. IEEE-ICCTIM2015, Malaysia [CALL FOR PAPERS,       SPECIAL SESSIONS]
>       (The Second International Conference on Computing Technology and
> Information Management (ICCTIM2015))
>    7. CFP- AMCIS Mini Track: Design, Evaluation, and Implication of
>       Communication Technologies : (Hyo-Joo Han)
>    8. Re: AISWorld Digest, Vol 979, Issue 1 (Atilla El?i)
>    9. Laboring Online: AIS Journal Club Webinar on Feb. 11
>       (Rachel Daeger)
>   10. UKAIS2015 Conference Registrations now open (Hopkins, Abigail)
>   11. Final CFP: 2015 IEEE International Conference on Security
>       Informatics (zhoul at umbc.edu)
>
>
> ----------------------------------------------------------------------
>
> Message: 1
> Date: Sun, 08 Feb 2015 12:57:07 -0500
> From: Ross Malaga <malagar at mail.montclair.edu>
> To: aisworld at lists.aisnet.org, Jeet Gupta <guptaj at uah.edu>
> Subject: Re: [AISWorld] What is IS strategy and how to prepare
>         strategic IS plans
> Message-ID: <54D7A373.6070301 at mail.montclair.edu>
> Content-Type: text/plain; charset="windows-1252"; Format="flowed"
>
> Hi Jeet -
>
> When I teach this (to MBA students) I take the approach of understanding
> an organizations strategic goals.  The IS/T strategy should detail what
> information systems (I use this very broadly to include not just actual
> systems, but really focus on data, processes, etc.) are needed in order
> for the organization to achieve its strategic goals.  This would be the
> same for a marketing strategy or operations strategy.
>
> As IT usually provides support for all parts of an organization this can
> get quite complicated.  Some of this support takes the form of just
> keeping the organization running (updating software, responding to
> network outages, etc.).  I usually discuss this aspect as more
> operational vs strategic.  In addition, IT may be required to help other
> units achieve their strategic plan.  For example, marketing might
> require new or expanded IS (better Web analytics, new CRM, etc.) in
> order to achieve its goals.
>
> So in answer to your main question - what is an IS/T strategy - to me it
> is a plan for the future of IS/T within an organization that needs to
> co-evolve with the strategic planning of the organization AND the other
> units/departments within the organization.
>
> I hope this helps.
>
> Regards,
>
> Ross
>
> Dr. Ross A. Malaga
> Professor of Information Systems & Entrepreneurship
> School of Business
> Montclair State University
> Montclair, NJ 07043
> malagar at mail.montclair.edu
>
> On 2/7/2015 11:41 PM, Jeet Gupta wrote:
> >
> > Hello Bob
> >
> > I am back to with the same questions I had last year when you said you
> > will provide me with some thoughts.  My questions are:
> >
> > What is an IS/T strategy?  How does one prepare strategic IS plans in
> > an organization?
> >
> > Also, in a 150-minute class session of MS level IS students, what will
> > you teach for the subject of IS/T strategy?  I am having a difficult
> > time planning this session since a student asked me the question: What
> > is IS/T strategy?  After thinking about it more than a year, I still
> > do not have answered even though I have taught this course for a long
> > time.  I could talk about SIS, what is done in IS from a strategic
> > level, how could we use IS/T for competitive advantage or even IT
> > governance.  But what is IS/T strategy? How do we prepare strategic IS
> > plans>
> >
> > I know I can define the Operations or the Marketing Strategy. How
> > about IS/T strategy?  What is the relationship with Digital Business
> > Strategy?
> >
> > Any thoughts?  Any copies of papers and/or slides will be helpful and
> > appreciated.
> >
> > Best regards,
> >
> >
> >
> > _________________________________________________________________
> > Jatinder (Jeet) N. D. Gupta, PhD, CFPIM
> >
> > Associate Dean for Graduate and Sponsored Programs
> >
> > Director of Integrated Enterprise Lab
> > Eminent Scholar and Professor
> > College of Business Administration
> > The University of Alabama in Huntsville
> > 301 Sparkman Drive
> > Huntsville, AL 35899
> > Phone: 256-824-6593 (office)
> >            256-288-0150 (home)
> > FAX:    256-824-4712
> > E-mail: guptaj at uah.edu <mailto:guptaj at uah.edu>
> >
> >
> >
> > _______________________________________________
> > AISWorld mailing list
> > AISWorld at lists.aisnet.org
>
> -------------- next part --------------
> An HTML attachment was scrubbed...
> URL: <
> http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20150208/b7a1bcad/attachment-0001.html
> >
>
> ------------------------------
>
> Message: 2
> Date: Sat, 7 Feb 2015 23:19:44 +0100
> From: Boumerdassi <selma.boumerdassi at inria.fr>
> To: "selma.boumerdassi at inria.fr" <selma.boumerdassi at inria.fr>
> Subject: [AISWorld] CFP : MSPN 2015 (Paris, 15-17 June 2015)
> Message-ID: <725FD74A-730E-4B31-9DCC-C5A563ABE305 at inria.fr>
> Content-Type: text/plain; charset="windows-1252"
>
> International Conference on Mobile, Secure and Programmable Networking
>                              (MSPN'2015)
>
>                            Paris,  France
>                           June 15-17, 2015
>         http://cedric.cnam.fr/workshops/mspn2015/
>
>
>    The rapid deployment of new infrastructures based on network
> virtualization
> and Cloud computing triggers new applications and services that in turn
> generate
> new constraints such as security and/or mobility. The  International
> Conference
> on Mobile, Secure and Programmable Networking aims at providing a top
> forum  for
> researchers and practitioners to present and discuss new  trends  in
> networking
> infrastructures,  security,  services  and  applications   while
>  focusing   on
> virtualization and Cloud computing for networks, network  programming,
> Software
> Defined Networks (SDN) and their security. Position papers are also
> welcome  and
> should be clearly marked as such.
>
>    Authors are invited to submit complete unpublished  papers,  which
> are  not
> under review in any other conference or journal, including, but not
> limited  to,
> the following topic areas:
>    . Software Defined Networks (tools, software, concepts)
>    . Virtualization and Cloud computing
>    . Networks and Cloud computing
>    . Mobile computing and Mobile Cloud computing
>    . Security, Privacy and Trust in Networks, Services and Applications
>    . Green computing and networking
>    . Ubiquitous Computing and Sensor Networks
>    . System design and testbeds
>    . Cross-Layer Design and Optimization
>    . Quality of service
>    . Modeling and performance evaluation
>    . 4G and 5G networks
>    . Social networks
>    . Cooperative networking and Self-Organizing networks
>    . Distributed sensing, actuation, and control in cyber-physical systems
>    . Internet of Things
>    . Vehicular networks and Connected Car
>    . Crowdsourcing
>    . Datacenter networking
>    . Location-based Services
>    . Web-services and SOA
>
>    Program Committee Chairs
>    ------------------------
>
>    Selma Boumerdassi, INRIA, France
>    Eric Renault, Institut Mines-T?l?com -- T?l?com SudParis, France
>    Samia Bouzefrane, CNAM, France
>
>    Steering Committee
>    ------------------
>
>    Abdella Battou, NIST, USA
>    Pierre Paradinas, CNAM, France
>    Omar Charkaoui, UQAM, Canada
>    Damien Sauveron, University of Limoges, France
>
>    Organizing Committee
>    --------------------
>
>    Jean-Marc Farinone, CNAM, France
>
>    Technical Program Committee
>    ---------------------------
>
>    . Claudio A. Ardagna, Universita` degli Studi di Milano, Italy
>    . Ioannis Askoxylakis, FORTH-ICS, Greece
>    . Chakib BEKARA, CDTA, Algeria
>    . Andr?-Luc Beylot, ENSEEIHT, France
>    . Weiwei Chen, Google Inc., USA
>    . Mauro Conti, University of Padua, Italy
>    . Mehammed Daoui, University Mouloud Mammeri of Tizi-Ouzou, Algeria
>    . Yuhui Deng, Jinan University, China
>    . Wassim Drira, Qatar Mobility Innovations Center, Qatar
>    . Jos? Mar?a de Fuentes, Carlos III University of Madrid, Spain
>    . Viet Hai HA, Hue University, Vietnam
>    . M-Tahar Kechadi, University College Dublin, Ireland
>    . Karim Khireddine, Universit? de B?jaia, Algeria
>    . Andrea Lanzi, University of Milan, Italy
>    . Sjouke Mauw, University of Luxembourg, Luxembourg
>    . Alessio Merlo, University of Genova, Italy
>    . Ruben Milocco, Universidad Nacional del Comahue, Argentina
>    . Pascale Minet, Inria, France
>    . Paul Muhlethaler, Inria, France
>    . Henrich C. P?hls, Institute  of  IT  Security  and  Security  Law
> at  the
>      University of Passau, Germany
>    . Christina P?pper, Ruhr-University Bochum, Germany
>    . Laurent Roullet, Alcatel Lucent Bell Labs Villarceaux
>    . Shiju Sathyadevan, Amrita University, Kerala, India
>    . Ahmed Soua, NIST, USA
>    . Xuan-Tu Tran, Vietnam National University, Vietnam
>    . Chao Wang, Arizona State university, USA
>    . Qian Wang, Wuhan University, China
>    . Muhammad Younas, Oxford Brookes University, UK
>    . Stefano Zanero, Politecnico di Milano, Italy
>    . Weishan Zhang, University of Petroleum, China
>    . Rong Zheng, MacMaster university, Canada
>
>    Submission
>    ----------
>
>    Submissions  must  not  be  published  or  submitted  to  a  journal
> and/or
> conference/workshop with proceedings. Each submission should be at most 16
> pages
> with the Springer?s LNCS format. All submissions should be anonymous
> (i.e.,  no
> author names/affiliations and obvious citations). Submissions are to be
> made  to
> the submission web site:
>           https://www.easychair.org/conferences/?conf=mspn2015
>
>    Only pdf files are accepted. Submissions not meeting  the  above
> guidelines
> will be rejected  without  other  consideration.  The  camera-ready
> version  of
> accepted papers will have to follow the Springer guidelines for
> publication  in
> the Lecture Notes in Computer Science series. The proceedings will be
> available
> at the conference.
>
>    If a student is the main author of a paper, this paper is eligible
> for  the
> best student paper award. To participate in this selection process,
> please  add
> the word "STUDENT" in the affiliation field of the submission form.
> Authors  of
> accepted papers must present their papers at the conference. At least one
> author
> of each accepted paper is required  to  register  and  present  the
> paper.  For
> authors presenting more than one paper, note that a normal registration is
> valid
> for up to two papers.
>
>    Important dates
>    ---------------
>
>    Paper submission: Feb 26, 2015
>    Notification of acceptance: March 20, 2015
>    Final manuscripts due: April 7, 2015
>    Conference: June 15-17, 2015
> -------------- next part --------------
> An HTML attachment was scrubbed...
> URL: <
> http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20150207/98d24a7e/attachment-0001.html
> >
>
> ------------------------------
>
> Message: 3
> Date: Sun, 8 Feb 2015 19:17:24 +0100
> From: Olawande Daramola <olawande.daramola at covenantuniversity.edu.ng>
> To: aisworld at lists.aisnet.org
> Cc: Charles Ayo <charles.ayo at covenantuniversity.edu.ng>,        Victor
>         Mbarika <victor at mbarika.com>
> Subject: [AISWorld] Handbook on Sustainable ICT Adoption and
>         integration for Socio-Economic Development
> Message-ID:
>         <
> CACxASFwH3euASqmm847TahGGBoocKWB0pNyzjjj-xNOcbPw3hg at mail.gmail.com>
> Content-Type: text/plain; charset="utf-8"
>
> Dear Esteemed Colleagues
>
> Currently, I am in the process of editing a forthcoming publication
> entitled *Handbook on **Sustainable ICT Adoption and integration for
> Socio-Economic Development*, to be published by IGI Global, an
> international publisher of progressive academic research. I would like to
> take this opportunity to cordially invite you, and others within the
> professional network to submit your work for consideration in this
> publication.
>
> I am certain that members of this research community with interests and
> expertise in *Information Systems and Information and Communication
> Technology Development (ICTD) *will be able to make useful contributions to
> this publication.
>
> Please visit
> http://www.igi-global.com/publish/call-for-papers/call-details/1698  for
> more details regarding this publication and to submit your work. You can
> also find detailed manuscript formatting and submission guidelines at
> http://www.igi-global.com/publish/contributor-resources/before-you-write/.
> If you have any questions or concerns, please do not hesitate to contact
> me. Thank you very much for your consideration of this invitation, and I
> hope to hear from you by *March 15, 2015*!
>
> Best wishes,
>
> *Prof. Charles Ayo*
>
> Editor
> *Handbook on **Sustainable ICT Adoption and*
>
> *Integration for Socio-Economic Development*
>
> --
> Olawande Daramola (PhD)
> Associate Professor (Computer Science),
> Deputy Dean, School of Natural and Applied Sciences (SNAS),
> Covenant University, Ota, Nigeria.
> +2348171883079
> -------------- next part --------------
> An HTML attachment was scrubbed...
> URL: <
> http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20150208/222e4057/attachment-0001.html
> >
>
> ------------------------------
>
> Message: 4
> Date: Sun, 8 Feb 2015 18:41:16 +0000
> From: Samuel FOSSO WAMBA <Samuel.FOSSO.WAMBA at neoma-bs.fr>
> To: "aisworld at lists.aisnet.org" <aisworld at lists.aisnet.org>
> Subject: [AISWorld] Call for Papers - Big Data Analytics and Process
>         Innovation Workshop | To be held in CENTERIS 2015 - Vilamoura,
>         Algarve, Portugal, 7-9 October  2015
> Message-ID:
>         <D2BCA962A3E0F445AC666FCABA11EF874CB7D8F1 at RN2H04-EXCMBX01.itg.local
> >
> Content-Type: text/plain; charset="iso-8859-1"
>
> Call for Papers - Big Data Analytics and Process Innovation Workshop | To
> be held in CENTERIS 2015 - Vilamoura, Algarve, Portugal, 7-9 October  2015
>
> http://centeris.scika.org
>
> AIS Affiliated Conference
>
>
>
>
>
> WORKSHOP OBJECTIVE
>
> Big data analytics (BBA) or the "collection of data and technology that
> accesses, integrates, and reports all available data by filtering,
> correlating, and reporting insights not attainable with past data
> technologies" (APICS 2012), is emerging as the "next big thing" in
> management. Some scholars have gone so far as suggesting that BBA is the
> "next management revolution" (McAfee and Brynjolfsson 2012), and thus
> generating huge attention from both practitioners and academics. Some
> analysts estimate that BBA-enabled process improvement may lead to about
> 26% average performance improvement over a three years period (Capgemini
> 2012). However, very few empirical studies have been conducted to assess
> the real business value of BBA at the firm and supply chain levels.
> The main objective of this workshop to invite scholars and practitioners
> to look at the ways and means to identify and capture business value from
> BDA in terms of innovative business models, improved decisions making,
> improved intra-and inter-organizational performance, and competitive
> advantage.
>
>
>
> WORKSHOP TOPICS AND AREAS OF INTEREST (not limited to)
>
> * Big data analytics enabled-business process innovation at the firm and
> supply chain levels
>
> * Assessment of the effect of big data analytics on the decision-making
> processes in operations
>
> * Assessment of facilitators and inhibitors of big data analytics adoption
> for supply chain management processes
>
> * In-depth & longitudinal case studies and pilot studies on the
> implementation of IT infrastructure to support big data initiatives for
> improved operations management, lean & agile operations, quality management
> in operations and supply chain management
>
> * Facilitation of innovative electronic business models and operations by
> using big data analytics in various sectors (e.g., healthcare, retail
> industry, and manufacturing)
>
> * Enabling smart cities, smart organizations and smart homes using big
> data analytics
>
> * New theory development to explain the adoption and use of big data in
> operations at the organizational and inter-organizational levels
>
> * Challenges related to big data analytics-enabled end-to-end supply chain
> transformation
>
>
> SUBMISSIONS
>
> We welcome full research papers, short papers, posters and practitioner
> papers on the workshop theme.
>
> Submitted manuscripts must be written in English. Each manuscript should
> not exceed the maximum number of pages predefined for each submission type,
> considering the format available for download at the conference webpage.
>
> Manuscript should be submitted electronically at the CENTERIS webpage
> until April 3, 2015.
>
> Submitted papers will be reviewed on a double-blind review basis, and
> authors will be notified of the review process results by May 17, 2015.
> Authors of accepted papers can receive recommendations to revise their
> manuscript according to the reviewers? comments and should submit the
> revised version until June 12, 2015.
>
>
>
> IMPORTANT DATES
>
> Deadline for paper submission: April 3, 2015
>
> Notification of acceptance/rejection: May 17, 2015
>
> Revised version: June 12, 2015
>
> Conference Date: October 7-9, 2015
>
>
>
>
>
> PUBLICATION
>
> Accepted full and short papers will be published in the conference
> proceedings (with ISSN). Poster and practitioner papers will be published
> in the conference book of abstracts, industry and poster papers (with
> ISBN). Authors of a selection of papers will be invited to enhance their
> manuscripts for inclusion in a book of chapters or in a journal.
>
>
>
> Selected authors will be invited to submit an extended version (with at
> least 45% improvement) of their workshop paper to a special issue in the
> Business Process Management Journal on: "Big Data Analytics and Business
> Process Innovation". The improved articles will be placed in a fast-track
> of review. However, the manuscript will need to meet the journal
> publication standard for publication.
>
>
>
> WORKSHOP CHAIR
>
> Samuel Fosso Wamba (samuel.fosso.wamba at neoma-bs.fr), NEOMA Business
> School, France
>
> WORKSHOP SCIENTIFIC COMMITTEE
>
> Samuel Fosso Wamba, NEOMA Business School, France
>
> Ygal Bendavid, The Universit? du Qu?bec ? Montr?al (UQAM), Canada
>
> Shahriar Akter, University of Wollongong, Australia
>
> Thomas Tatietse, University of Yaound? I, Cameroun
>
> Jean Kamdjoug. Universit? Catholique d'Afrique Centrale, Cameroun
>
> Peter Mkhize, University of South Africa, South Africa
>
> Eric Ngai, The Hong Kong Polytechnic University, Hong Kong
>
> Fred Riggins, North Dakota State University, USA
>
> Gary Graham, University Business School, UK
> Wojciech Piotrowicz, University of Oxford, UK
>
> -------------- next part --------------
> An HTML attachment was scrubbed...
> URL: <
> http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20150208/4d40dbd1/attachment-0001.html
> >
>
> ------------------------------
>
> Message: 5
> Date: Sun, 8 Feb 2015 16:23:09 -0700
> From: Maiga Chang <maiga.igibook at gmail.com>
> To: <AISWorld at lists.aisnet.org>
> Subject: [AISWorld] Call for Papers: 2015 International Workshop on
>         Distance        Education Technologies
> Message-ID: <BA7163BC8B804DF5A4916399BF1D6AF0 at CleanXP>
> Content-Type: text/plain; format=flowed; charset="big5";
>         reply-type=original
>
> [Apologies if you receive multiple times, please circulate this to
>  your colleagues who might be interested, thank you so much.]
>
> ------------------------------------------------
>
> Call For Papers (submissions due: May 1, 2015)
>
> 2015 International Workshop on Distance Education Technologies
> Vancouver, Canada
> August 31 to September 2, 2015
> http://www.ksi.edu/seke/det15cfp.html
>
>
> * Important dates:
> Paper submission due: May 1, 2015
> Notification of acceptance: June 1, 2015
> Camera-ready copy: July 1, 2015
> Early conference registration due: July 1, 2015
> Invitation of paper submission to JVLC: August 1, 2015
> Paper for JVLC due: September 1, 2015
> Notification of JVLC paper revision: October 1, 2015
> Final paper for JVLC due: October 20, 2015
> Publication of JVLC special issue: December 15, 2015
>
>
> DET 2015 focuses on creative solutions on distance education. It combines
> several advanced topics on design, implementation, and
> applications of E-learning systems. Submissions may cover novel approaches
> on distance learning tools, communication mechanisms,
> distance learning and culture, new educational technologies, distance
> learning, serious game, simulation, and the arts, and so on.
> Our special attention will be devoted to the following themes:
> - Sentient Multimedia Systems for Distance Learning
> - 3D Printing Innovations in Distance Learning
> - Mobile and Social Learning
>
> Topics:
> Distance Education Technologies cover important aspects of Communication
> Technologies, distance learning and culture improvement and
> arts by using Intelligent Technologies and Educational Technologies. In
> addition to the themes, the technical issues to be addressed
> include, but are not limited to:
> - Technology Enhanced Learning
> - Ubiquitous Learning
> - Intelligent learning
> - Eclipse Open source ecosystem and E-learning
> - Societal, Legal and Ethical Considerations
> - Pedagogical issues
> - Distance Learning for culture and arts
> - Virtual environment and serious game for education
>
>
> Selected Papers will be Published in Special Issue of JVLC:
> The Journal of Visual Languages and Computing (JVLC), which is indexed by
> SCI, EI, DBLP, Scopus and other indexers, will publish the
> selected papers of DMS/VLC/DET2015 in the December 2015 extra large
> special issue of JVLC. The conference will first publish a
> roceedings available to authors and conference attendees. Papers will go
> through three rounds of reviews (see detailed review plan)
> so that selected papers can be further improved to meet the standard of
> JVLC. The formal proceedings/JVLC special issue will be
> available both in print and online.
>
>
> Submission of Papers:
> 1. Papers should be prepared according to
> http://www.ksi.edu/seke/dms15author.html.
> 2. All manuscripts must be in English.
> 3. Manuscript must include a 200-word abstract and no more than 8 pages of
> double column text
>     (include figures and references).
> 4. All submissions must not be published or under consideration for
> publication in a journal or
>     in a conference with proceedings.
> 5. Templates
>     a. MS WORD template (http://www.ksi.edu/seke/Conf_Template.dot)
>     b. Latex Style File (http://www.ksi.edu/seke/sk00latex.html)
> 6. Paper submission should be through
> https://www.easychair.org/conferences/?conf=dms20150.
> 7. When submitting, select the track DET15 Distant Education Technologies
> Workshop.
> 8. Papers will be evaluated based on originality, significance, technical
> soundness and clarify of
>     exposition. Depending upon the results of evaluation, a paper may be
> accepted as
>     a. regular paper (10 pages)
>     b. short paper (7 pages) or
>     c. technical notes (1 page and demo/poster presentation).
>
>
> Workshop Chair
> Paolo Maresca, University Federico II, Napoli, Italy; Workshop Chair
>
> Program Co-Chairs
> Maiga Chang, Athabasca University, Canada; Program Chair
> Rita Francese, University of Salerno, Italy; Program Co-Chair
>
> Publicity Co-Chairs
> Kao-Shing Hwang, National Chung Cheng University, Taiwan; Publicity Chair
> Lidia Stanganelli, University of Napoli Federico II, Italy; Publicity
> Co-Chair
>
>
> Listed by:
> SCOPUS
> DBLP
> INSPEC
> Compendex
> AllConferences.com
> WikiCFP
>
>
> Contact Information:
> DET'15 Secretariat
> Knowledge Systems Institute
> 156 Park Square, Pittsburgh, PA 15238 USA
> E-mail: dms2015-0 at easychair.org
>
>
>
>
>
> ------------------------------
>
> Message: 6
> Date: Mon, 9 Feb 2015 04:03:00 +0300
> From: "The Second International Conference on Computing Technology and
>         Information Management (ICCTIM2015)" <icctim2015 at sdiwc.net>
> To: aisworld at lists.aisnet.org
> Subject: [AISWorld] IEEE-ICCTIM2015, Malaysia [CALL FOR PAPERS,
>         SPECIAL SESSIONS]
> Message-ID: <4b31ffd06df016a47cd345fb956a7d57.squirrel at sdiwc.net>
> Content-Type: text/plain;charset=iso-8859-1
>
> ** Apologies for cross-posting **
> ** Please forward to anybody who might be interested. **
> ====
>
> The Second International Conference on Computing Technology
> and Information Management (ICCTIM2015)
> April 21-23, 2015 - Johor, Malaysia
>
> http://sdiwc.net/conferences/icctim2015/
> icctim2015 at sdiwc.net
> ====
>
> ** KEYNOTE SPEAKERS **
>
> Dr. Rosziati Bte Ibrahim, Universiti Tun Hussein Onn Malaysia, Malaysia
> Dr. Mohd Najib Bin Mohd Salleh, Universiti Tun Hussein Onn Malaysia,
> Malaysia
> Dr. Saadat M. Alhashmi, Abu Dhabi University, UAE
>
> http://sdiwc.net/conferences/dipdmwc2015/keynote-speakers/
> ====
>
> ** TUTORIAL **
> Dr. Dakshina Ranjan Kisku, Asansol Engineering College, India
>
> http://sdiwc.net/conferences/icctim2015/tutorial/
> ====
>
> ** GENERAL INFORMATION **
>
> ICCTIM2015 will be held over three days, with presentations delivered
> by researchers from the international community, including presentations
> from keynote speakers and state-of-the-art lectures.
>
> All registered papers will be submitted to IEEE for potential inclusion to
> IEEE Xplore
> ====
>
> All the registered papers will be submitted to IEEE for POTENTIAL
> inclusion to IEEE Xplore as well as other Abstracting and Indexing (A&I)
> databases.
> In addition, BEST registered papers will be published in one of the
> following
> special issues provided that the author do major improvements and extension
> within the time frame that will be set by the conference and his/her paper
> is approved by the chief editor:
>
> * International Journal of New Computer Architectures and their
> Applications (IJNCAA)
> * International Journal of Digital Information and Wireless Communications
> (IJDIWC)
> * International Journal of Cyber-Security and Digital Forensics (IJCSDF)
> * International Journal of Data Science (IJDS)
>
> = = = = = = = = = = = = = = = = = = = = =
> *** You are invited to submit papers to this exciting event! ***
> = = = = = = = = = = = = = = = = = = = = =
>
> ** IMPORTANT DATES **
>
> - Submission Date: The submission is open from now until March 05,2015
> - Notification of Acceptance: 2-3 weeks from the submission date
> - Camera Ready Submission: Open from now until April 10, 2015
> - Last Day for Registration: Open from now until April 11, 2015
> ====
>
> ** PAPER SUBMISSION **
>
> Researchers are encouraged to submit their work electronically.
> Submitted paper should not exceed 15 pages, including illustrations.
> Papers must be without page numbers.
> The submission must be for the full paper (abstracts only are not
> accepted).
> All papers will be fully refereed by a minimum of two specialized referees.
> Before final acceptance, all referees comments must be considered.
> ====
>
> ** ORGANIZE A SPECIAL SESSION **
>
> Researchers are welcome to organize special session.
> The session should be within a very specific topic.
> Please send your session title, your CV for this purpose to
> icctim2015 at sdiwc.net.
>
> The conference will list the session on the web.
> The session chair will manage the publicity of his session.
> It is expected that each session will attract 5 registered papers.
> The session chair will get a free registration for one of his papers.
>
> The submission and the reviewing process for the papers of the sessions
> will be managed jointly between the chair and the conference.
> The chair can take the responsibility of the reviewing with the help of
> other researchers.
> However, the conference will get all the reviewing reports at the end.
> ====
>
> ** ORGANIZE A WORKSHOP **
>
> ICCTIM2015 will host several workshops addressing different areas related
> to
> digital technologies that complement the main ICCTIM2015 conference.
> Workshops are intended to serve as an intensive collaborative forum for
> exchanging ideas and theories that are still in an evolutionary stage.
> We encourage prospective workshop organizers to submit their proposals
> focusing on either in-depth analysis or broad-ranging approaches to areas
> related to digital technologies.
> ====
>
> ** LOCATION **
>
> The conference will be held in Johor, Malaysia
>
> All information about venue and accommodation may be found at the
> following links:
>
> http://sdiwc.net/conferences/icctim2015/travel-information/
> http://sdiwc.net/conferences/icctim2015/accommodation/
> ====
>
> Looking forward to welcoming you to Johor in April 2015.
> Aya Akiyama
> www.sdiwc.net
> ==========
>
>
>
>
> ------------------------------
>
> Message: 7
> Date: Sun, 8 Feb 2015 22:06:59 -0500
> From: Hyo-Joo Han <hhan at georgiasouthern.edu>
> To: aisworld at lists.aisnet.org
> Subject: [AISWorld] CFP- AMCIS Mini Track: Design, Evaluation, and
>         Implication of Communication Technologies :
> Message-ID:
>         <
> CAKksc4XxeF3gLWNh_L9f9KqRwyzpZPcUbCMtszQcogbkSogP-Q at mail.gmail.com>
> Content-Type: text/plain; charset="utf-8"
>
> *Call for Proposal*
>
> AMCIS 2015, Puerto Rico, August 13-15, 2015
>
> http://amcis2015.aisnet.org
>
> *Submission Due: Feb 25th*
>
> Track: Human Computer Interaction (HCI)
>
> *Minitrack: Design, Evaluation, and Implication of Communication
> Technologies*
>
>
>
> *Co-Chairs: *
>
> Yi ?Jenny? Zhang,  zhang at fullerton.edu
>
> HyoJoo Han, hhan at georgiasouthern.edu
>
>
>
> We invite you to submit your manuscripts to the 21th Americas Conference on
> Information
>
> Systems (AMCIS 2015), HCI Track and Design, Evaluation and Implication of
> Communication Technologies mini-track.
>
>
>
>
>
> *Topics include but are not limited to:*
>
>
>
>    - Impacts of advanced tools and technologies that support personal,
>    interpersonal, group, community, and organizational communications
>    - Influence of communication technologies in virtual communities
>    - Impact of communication on group behavior and outcomes in virtual
> teams
>    - Emerging communication technologies, their adoption, usage,
>    evaluation, and effects
>    - New design genres examining communication technologies used in
>    political, economic, social, and legal contexts
>    - ICT tools and applications through which social relations are
>    developed, maintained, and grown
>    - Theoretical and conceptual frameworks concerning the design, usage,
>    and evaluation of innovative CMC tools and technologies
>    - New concerns regarding information privacy, interpersonal and business
>    related trust issues, self-disclosure concerns, and other
> confidentiality
>    issues for employees, individuals, and minorities (such as women, teens,
>    GLB) in using online communication technology.
>    - Studies of the components, processes, and contexts of emerging and
>    innovative online communication and technologies.
>    - Impact of communication technologies in teaching and learning
>
>
>
> Important Dates for AMCIS 2015:
>
> February 25, 2015: AMCIS manuscript submissions closes for authors
> Tuesday, April 21, 2015: Authors notified about the disposition of their
> papers.
> Tuesday, April 28, 2015:  Authors submit camera-ready revision of their
> papers.
> May 5, 2015: Final decisions on AMCIS 2015 program are made
> -------------- next part --------------
> An HTML attachment was scrubbed...
> URL: <
> http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20150208/dae47c36/attachment-0001.html
> >
>
> ------------------------------
>
> Message: 8
> Date: Mon, 9 Feb 2015 09:30:32 +0200
> From: Atilla El?i <atilla.elci at gmail.com>
> To: aisworld at lists.aisnet.org
> Subject: Re: [AISWorld] AISWorld Digest, Vol 979, Issue 1
> Message-ID:
>         <CAFRM=SQyM3sS9kYQ7kygjo+s40WmJtTKY5PovYWoGRG55=
> 8r1w at mail.gmail.com>
> Content-Type: text/plain; charset="utf-8"
>
> Please announce the CFP of SIN'15 as attached.
>
> On Sun, Feb 8, 2015 at 7:00 PM, <aisworld-request at lists.aisnet.org> wrote:
>
> > Send AISWorld mailing list submissions to
> >         aisworld at lists.aisnet.org
> >
> > To subscribe or unsubscribe via the World Wide Web, visit
> >
> http://lists.aisnet.org/mailman/listinfo/aisworld_lists.aisnet.org
> > or, via email, send a message with subject or body 'help' to
> >         aisworld-request at lists.aisnet.org
> >
> > You can reach the person managing the list at
> >         aisworld-owner at lists.aisnet.org
> >
> > When replying, please edit your Subject line so it is more specific
> > than "Re: Contents of AISWorld digest..."
> >
> >
> > Today's Topics:
> >
> >    1. Call for Papers - ICT Trends for Enterprises workshop | To be
> >       held in CENTERIS 2015 - Vilamoura, Algarve, Portugal, 7-9 October
> >       2015 (Maria Manuela Cruz Cunha)
> >    2. Call for Papers - Mobile Web Portals workshop | to be held in
> >       CENTERIS 2015 - Vilamoura, Algarve, Portugal, 7-9 October 2015
> >       (Maria Manuela Cruz Cunha)
> >    3. Call for Papers - Mobile Web Portals workshop | to be held in
> >       CENTERIS 2015 - Vilamoura, Algarve, Portugal, 7-9 October 2015
> >       (Maria Manuela Cruz Cunha)
> >    4. Call for papers for 2 journals (IJOCI and OJBD) (Chang V.I.)
> >    5. LATA 2015: call for participation (GRLMC)
> >    6. [Mycolleagues] Call for papers for 2 journals (IJOCI and
> >       OJBD) (Chang V.I.)
> >    7. AMCIS 2015 Minitrack: The use of DSR in Post-graduate Studies
> >       and Supervision in IS (Alta vdm)
> >    8. Springer Book Series Proposal (Purnendu Mandal)
> >    9. What is IS strategy and how to prepare strategic IS plans
> >       (Jeet Gupta)
> >   10. CFP - AMCIS 2015 Minitrack: Cloud Computing in    E-Government
> >       (Satish Krishnan)
> >   11. Contents of Vol. 13,      No. 1 of International Journal of
> >       Distance Education Technologies   (IJDET, an EI journal) (Maiga
> > Chang)
> >   12. CF STUDENT POSTERS for Innovations'15 (No registration fees),
> >       Dubai, November 01-03, 2015 (Nabeel Al-Qirim)
> >   13. The 5th International Conference on Current and Future Trends
> >       of ICT in Healthcare September 27-30, Berlin (Nabeel Al-Qirim)
> >   14. CFW: The 5th International Conference on Current and Future
> >       Trends of ICT in Healthcare 27-30 September, Berlin (Nabeel
> Al-Qirim)
> >   15. Re: What is IS strategy and how to prepare strategic IS   plans
> >       (John Artz)
> >
> >
> > ----------------------------------------------------------------------
> >
> > Message: 1
> > Date: Sat, 7 Feb 2015 17:56:21 +0000
> > From: "Maria Manuela Cruz Cunha" <mcunha at ipca.pt>
> > To: aisworld at lists.aisnet.org
> > Subject: [AISWorld] Call for Papers - ICT Trends for Enterprises
> >         workshop | To be held in CENTERIS 2015 - Vilamoura, Algarve,
> > Portugal,
> >         7-9 October 2015
> > Message-ID:
> >         <
> > mailman.2.1423414802.31465.aisworld_lists.aisnet.org at lists.aisnet.org>
> >
> > Content-Type: text/plain
> >
> > Please, accept our apologies in case of multiple copies of this CFP.
> >
> >
> >
> >
> ========================================================================================
> >
> > Workshop ICT Trends for Enterprises
> >
> > To be held in CENTERIS 2015 ? International Conference on ENTERprise
> > Information Systems
> > Vilamoura, Algarve, Portugal, 7-9 October 2015
> > http://centeris.scika.org
> > AIS Affiliated Conference
> >
> >
> >
> ========================================================================================
> >
> >
> > WORKSHOP OBJECTIVE
> >
> > The social business is based on technology trends (powerful mobile
> > devices, broadband Internet, and low-cost data storage), work (culture,
> > globalization) and society (propensity for sharing). This new way of
> doing
> > business will enable a paradigm shift, "comes out of the hierarchy and
> > works on the net", which will surely be the "essence of the fast
> > enterprises and the next generation."
> >
> > Nowadays, according to the McKinsey Global Institute, in its report "The
> > social economy: Unlocking value and productivity through social
> > technologies", there are over 1.5 billion users of social networks, 80%
> is
> > the proportion of total users that interact with social networks
> regularly,
> > 70% is the proportion of companies using social technologies, and it is
> > used about 28 hours a week to write emails, search for information and
> > perform internal collaboration.
> >
> > Strategies of platform and application integration need to be established
> > and social technology tools need to be integrated, while a common culture
> > of collaborative communication has to be maintained. Questions of user
> > adoption, communication facilitation and measurable business value are
> > arising. Benefits of information sharing, interactive knowledge exchange
> > and usability extension seem to be apparent, whereas concerns of
> technical
> > operationalization, security control and practicability of social
> > technology features are still persistent. This workshop encourages
> studies
> > on technical, social and theoretical issues in ICT trends for enterprises
> > that will interest both practitioners and researchers.
> >
> >
> > WORKSHOP TOPICS AND AREAS OF INTEREST (not limited to)
> >
> > -       Social Tools
> > -       Web 2.0 and Social Networking
> > -       Platform Integration and Management
> > -       Global Online Communities
> > -       Interactive Applications
> > -       Operational Criteria and System Integration
> > -       Real-time Video Collaboration, Knowledge Management and Activity
> > Streaming
> > -       Metrics and Methods
> > -       Usability, Content and Security
> > -       Ethical issues
> > -       Success factors for social workplace adoption
> > -       Key drivers for leveraging social value generation and business
> > transformation
> > -       Visions for future work and process organization
> >
> >
> > SUBMISSIONS
> >
> > We welcome full research papers, short papers, posters and practitioner
> > papers on the workshop theme.
> > Submitted manuscripts must be written in English. Each manuscript should
> > not exceed the maximum number of pages predefined for each submission
> type,
> > considering the format available for download at the conference webpage.
> > Manuscript should be submitted electronically at the CENTERIS webpage
> > until April 3, 2015.
> > Submitted papers will be reviewed on a double-blind review basis, and
> > authors will be notified of the review process results by May 17, 2015.
> > Authors of accepted papers can receive recommendations to revise their
> > manuscript according to the reviewers? comments and should submit the
> > revised version until June 12, 2015.
> >
> >
> > IMPORTANT DATES
> >
> > Deadline for paper submission: April 3, 2015 Notification of
> > acceptance/rejection: May 17, 2015
> > Revised version: June 12, 2015 Conference Date: October 7-9, 2015
> >
> >
> > PUBLICATION
> >
> > Accepted full and short papers will be published in the conference
> > proceedings (with ISSN). Poster and practitioner papers will be published
> > in the conference book of abstracts, industry and poster papers (with
> > ISBN). Authors of a selection of papers will be invited to enhance their
> > manuscripts for inclusion in a book of chapters or in a journal.
> >
> >
> > WORKSHOP CHAIR
> >
> > Fernando Moreira (fmoreira at upt.pt), Universidade Portucalense, Portugal
> >
> >
> > WORKSHOP SCIENTIFIC COMMITTEE
> >
> > George Dragoi, University of Bucarest, Romania
> > Olaf Bassus, University of Technology, Business and Design, Germany
> > Arnaldo Martins, Universidade de Aveiro, Portugal
> > Dimitra I. Kaklamani, National Technical University of Athens, Greece
> > Fawzy Soliman, University of Technology Sydney, Australia
> > Giorgio Bruno, Politecnico di Torino, Italy
> > Kathryn Comircan, National University of Ireland, Ireland
> > Manel P?rez Cota, Universidade de Vigo, Espanha
> > Matjaz Mulej, University of Maribor, Slovenia
> > Samo Bobek, University of Maribor, Slovenia
> >
> >
> >
> >
> >
> >
> > ------------------------------
> >
> > Message: 2
> > Date: Sat, 7 Feb 2015 17:58:40 +0000
> > From: "Maria Manuela Cruz Cunha" <mcunha at ipca.pt>
> > To: aisworld at lists.aisnet.org
> > Subject: [AISWorld] Call for Papers - Mobile Web Portals workshop | to
> >         be held in CENTERIS 2015 - Vilamoura, Algarve, Portugal, 7-9
> > October
> >         2015
> > Message-ID:
> >         <
> > mailman.3.1423414802.31465.aisworld_lists.aisnet.org at lists.aisnet.org>
> >
> > Content-Type: text/plain
> >
> > Please, accept our apologies in case of multiple copies of this CFP.
> >
> >
> >
> >
> ========================================================================================
> >
> > Mobile Web Portals
> >
> > To be held in CENTERIS 2015 ? International Conference on ENTERprise
> > Information Systems
> > Vilamoura, Algarve, Portugal, 7-9 October 2015
> > http://centeris.scika.org
> > AIS Affiliated Conference
> >
> >
> >
> ========================================================================================
> >
> >
> > WORKSHOP OBJECTIVE
> >
> > According to the European Commission report "A Roadmap for Advanced Cloud
> > Technologies H2020 under", the environment of IST (market research,
> > industry, education, training, etc.) undergoes constant changes. Thus, it
> > is necessary to identify the major changes that can be expected in the
> next
> > 5-10 years and may, or will, affect the environment of IST. It is
> expected,
> > for example, that in 2015 billions of people connected by nearly a
> trillion
> > devices, the concept BYOD (Bring Your Own Device) is practically general,
> > as well as Cloud Computing.
> >
> > Additionally, mobile malware has been around for a while, but it is only
> > in the last few years that it is been used as a tool in the hands of
> > cybercriminals. The growth of mobile malware is only going to continue as
> > people increasingly conduct business and sensitive transactions via
> mobile
> > devices and it is a result of a number of different factors. First, the
> > huge numbers of smartphones being used; second, the variety of
> > ?interesting? data now stored on these devices, such as: contacts,
> > photographs, SMS messages, banking credentials and social networking
> > logins; and finally, the growing use of mobile devices in business and
> the
> > lack of awareness from organizations around mobile threats.
> >
> > There are a number of major trends in the mobile space which will change
> > the way software providers deliver applications and services. One of
> these
> > trends is the move toward Mobile Websites instead of apps, hence Mobile
> Web
> > Portals have a great impact. This progress it is important because
> > literature in information systems rarely addresses the particulars of
> > Mobile Web Portals from pure ICT view. This workshop encourages studies
> on
> > technical, social and theoretical issues in mobile computing that will
> > interest both practitioners and researchers.
> >
> >
> > WORKSHOP TOPICS AND AREAS OF INTEREST (not limited to)
> >
> > - Web Services and Web Engineering
> > - Authentication and Access Control
> > - Web Security and Privacy
> > - Databases and Datawarehouses
> > - Portal strategies
> > - Accessibility issues and Technology
> > - Usability and Ergonomics
> > - Web Geographical Information Systems
> > - Social and Legal Issues
> > - Mobile Navigation and Assistance
> > - Context Detection
> > - Mobile Social Network Interaction
> > - Mobile learning
> > - Mobile commerce
> > - Mobile cloud
> >
> >
> > SUBMISSIONS
> >
> > We welcome full research papers, short papers, posters and practitioner
> > papers on the workshop theme.
> > Submitted manuscripts must be written in English. Each manuscript should
> > not exceed the maximum number of pages predefined for each submission
> type,
> > considering the format available for download at the conference webpage.
> > Manuscript should be submitted electronically at the CENTERIS webpage
> > until April 3, 2015.
> > Submitted papers will be reviewed on a double-blind review basis, and
> > authors will be notified of the review process results by May 17, 2015.
> > Authors of accepted papers can receive recommendations to revise their
> > manuscript according to the reviewers? comments and should submit the
> > revised version until June 12, 2015.
> >
> >
> > IMPORTANT DATES
> >
> > Deadline for paper submission: April 3, 2015 Notification of
> > acceptance/rejection: May 17, 2015 Revised version: June 12, 2015
> > Conference Date: October 7-9, 2015
> >
> >
> > PUBLICATION
> >
> > Accepted full and short papers will be published in the conference
> > proceedings (with ISSN). Poster and practitioner papers will be published
> > in the conference book of abstracts, industry and poster papers (with
> > ISBN). Authors of a selection of papers will be invited to enhance their
> > manuscripts for inclusion in a book of chapters or in a journal.
> >
> >
> > WORKSHOP CHAIR
> >
> > Fernando Moreira (fmoreira at upt.pt), Universidade Portucalense, Portugal
> >
> >
> > WORKSHOP SCIENTIFIC COMMITTEE
> >
> > Chad Lin, Curtin University of Technology, Australia
> > Christian Bonnet, Mobile Communications Department of Eurocom, France
> > Hassan Karimi, University of Pittsburgh, USA
> > Claudia Winegarden, Georgia Tech, USA
> > Nabeel Ahmad, Columbia University, USA
> > Carl Chang, Iowa State University, USA
> > Vincenzo Pallota, University of Fribourg, Switzerland
> > Hideyuki Takahashi, Tohoku University, Japan
> > Ramiro Gon?alves, UTAD
> > Joaquim Sousa Pinto, Universidade de Aveiro
> >
> >
> >
> >
> > ------------------------------
> >
> > Message: 3
> > Date: Sat, 7 Feb 2015 18:15:08 +0000
> > From: "Maria Manuela Cruz Cunha" <mcunha at ipca.pt>
> > To: aisworld at lists.aisnet.org
> > Subject: [AISWorld] Call for Papers - Mobile Web Portals workshop | to
> >         be held in CENTERIS 2015 - Vilamoura, Algarve, Portugal, 7-9
> > October
> >         2015
> > Message-ID:
> >         <
> > mailman.4.1423414802.31465.aisworld_lists.aisnet.org at lists.aisnet.org>
> >
> > Content-Type: text/plain
> >
> > Please, accept our apologies in case of multiple copies of this CFP.
> >
> >
> >
> >
> ========================================================================================
> >
> > WORKSHOP ON MOBILE WEB PORTALS
> >
> > To be held in CENTERIS 2015 ? International Conference on ENTERprise
> > Information Systems
> > Vilamoura, Algarve, Portugal, 7-9 October 2015
> > http://centeris.scika.org
> > AIS Affiliated Conference
> >
> >
> >
> ========================================================================================
> >
> >
> > WORKSHOP OBJECTIVE
> >
> > According to the European Commission report "A Roadmap for Advanced Cloud
> > Technologies H2020 under", the environment of IST (market research,
> > industry, education, training, etc.) undergoes constant changes. Thus, it
> > is necessary to identify the major changes that can be expected in the
> next
> > 5-10 years and may, or will, affect the environment of IST. It is
> expected,
> > for example, that in 2015 billions of people connected by nearly a
> trillion
> > devices, the concept BYOD (Bring Your Own Device) is practically general,
> > as well as Cloud Computing.
> >
> > Additionally, mobile malware has been around for a while, but it is only
> > in the last few years that it is been used as a tool in the hands of
> > cybercriminals. The growth of mobile malware is only going to continue as
> > people increasingly conduct business and sensitive transactions via
> mobile
> > devices and it is a result of a number of different factors. First, the
> > huge numbers of smartphones being used; second, the variety of
> > ?interesting? data now stored on these devices, such as: contacts,
> > photographs, SMS messages, banking credentials and social networking
> > logins; and finally, the growing use of mobile devices in business and
> the
> > lack of awareness from organizations around mobile threats.
> >
> > There are a number of major trends in the mobile space which will change
> > the way software providers deliver applications and services. One of
> these
> > trends is the move toward Mobile Websites instead of apps, hence Mobile
> Web
> > Portals have a great impact. This progress it is important because
> > literature in information systems rarely addresses the particulars of
> > Mobile Web Portals from pure ICT view. This workshop encourages studies
> on
> > technical, social and theoretical issues in mobile computing that will
> > interest both practitioners and researchers.
> >
> >
> > WORKSHOP TOPICS AND AREAS OF INTEREST (not limited to)
> >
> > - Web Services and Web Engineering
> > - Authentication and Access Control
> > - Web Security and Privacy
> > - Databases and Datawarehouses
> > - Portal strategies
> > - Accessibility issues and Technology
> > - Usability and Ergonomics
> > - Web Geographical Information Systems
> > - Social and Legal Issues
> > - Mobile Navigation and Assistance
> > - Context Detection
> > - Mobile Social Network Interaction
> > - Mobile learning
> > - Mobile commerce
> > - Mobile cloud
> >
> >
> > SUBMISSIONS
> >
> > We welcome full research papers, short papers, posters and practitioner
> > papers on the workshop theme.
> > Submitted manuscripts must be written in English. Each manuscript should
> > not exceed the maximum number of pages predefined for each submission
> type,
> > considering the format available for download at the conference webpage.
> > Manuscript should be submitted electronically at the CENTERIS webpage
> > until April 3, 2015.
> > Submitted papers will be reviewed on a double-blind review basis, and
> > authors will be notified of the review process results by May 17, 2015.
> > Authors of accepted papers can receive recommendations to revise their
> > manuscript according to the reviewers? comments and should submit the
> > revised version until June 12, 2015.
> >
> >
> > IMPORTANT DATES
> >
> > Deadline for paper submission: April 3, 2015 Notification of
> > acceptance/rejection: May 17, 2015 Revised version: June 12, 2015
> > Conference Date: October 7-9, 2015
> >
> >
> > PUBLICATION
> >
> > Accepted full and short papers will be published in the conference
> > proceedings (with ISSN). Poster and practitioner papers will be published
> > in the conference book of abstracts, industry and poster papers (with
> > ISBN). Authors of a selection of papers will be invited to enhance their
> > manuscripts for inclusion in a book of chapters or in a journal.
> >
> >
> > WORKSHOP CHAIR
> >
> > Fernando Moreira (fmoreira at upt.pt), Universidade Portucalense, Portugal
> >
> >
> > WORKSHOP SCIENTIFIC COMMITTEE
> >
> > Chad Lin, Curtin University of Technology, Australia
> > Christian Bonnet, Mobile Communications Department of Eurocom, France
> > Hassan Karimi, University of Pittsburgh, USA
> > Claudia Winegarden, Georgia Tech, USA
> > Nabeel Ahmad, Columbia University, USA
> > Carl Chang, Iowa State University, USA
> > Vincenzo Pallota, University of Fribourg, Switzerland
> > Hideyuki Takahashi, Tohoku University, Japan
> > Ramiro Gon?alves, UTAD
> > Joaquim Sousa Pinto, Universidade de Aveiro
> >
> >
> >
> >
> > ------------------------------
> >
> > Message: 4
> > Date: Fri, 6 Feb 2015 20:19:40 +0000
> > From: "Chang V.I." <vic1e09 at soton.ac.uk>
> > To: "cfp at grid.chu.edu.tw" <cfp at grid.chu.edu.tw>, "cse-cfp at cse.stfx.ca"
> >         <cse-cfp at cse.stfx.ca>, "IRList at lists.shef.ac.uk"
> >         <IRList at lists.shef.ac.uk>,      "performance at merlot.usc.edu"
> >         <performance at merlot.usc.edu>,   "mmkm at jiscmail.ac.uk"
> >         <mmkm at jiscmail.ac.uk>, "aisworld at lists.aisnet.org"
> >         <aisworld at lists.aisnet.org>, "mycolleagues at mailman.ufsc.br"
> >         <mycolleagues at mailman.ufsc.br>, "admmyc at ig.com.br" <
> > admmyc at ig.com.br>,
> >         "dustdar at infosys.tuwien.ac.at" <dustdar at infosys.tuwien.ac.at>,
> >         "ecoop-info at ecoop.org" <ecoop-info at ecoop.org>, "
> > seworld at sigsoft.org"
> >         <seworld at sigsoft.org>
> > Subject: [AISWorld] Call for papers for 2 journals (IJOCI and OJBD)
> > Message-ID:
> >         <C87E186B27EA2C4786B010911E0B1D15468C8F23 at SRV00049.soton.ac.uk>
> > Content-Type: text/plain; charset="Windows-1252"
> >
> > Dear All,
> >
> > Apologies if you've received it from somewhere. Our 2 journals have our
> > calls for papers and special issues.
> >
> > International Journal of Organizational and Collective Intelligence
> > (IJOCI) with 2 special issues:
> >
> >
> http://www.igi-global.com/calls-for-papers-special/international-journal-organizational-collective-intelligence/1140
> >
> > Open Journal of Big Data (OJBD) with 5 special issues:
> > http://www.ronpub.com/index.php/journals/ojbd
> >
> > OJBD has the fee waiver for the accepted papers submitted by the 15th of
> > February 2015. Those who submit to IJOCI, will be based on the
> > first-come-first serve basis.
> > Details about the scope, topics, our motivation and impacts of our
> > research contributions are available at the end of this email. We blend
> our
> > journals with other scholarly activities.
> >
> > I have included the scope and details of these 2 journals at the end of
> > this email. I hope you can consider.
> >
> > Many thanks again for your kind assistance and interests. Thanks and
> > regards.
> >
> > Dr. Victor Chang,
> > Editor-in-Chief, OJBD and IJOCI
> >
> > ----
> > International Journal of Organizational and Collective Intelligence
> > (IJOCI):
> >
> http://www.igi-global.com/journal/international-journal-organizational-collective-intelligence/1140
> >
> > Mission
> > The mission of the International Journal of Organizational and Collective
> > Intelligence (IJOCI) is to provide researchers and practitioners in the
> > communities of computer and information sciences with a forum to advance
> > the practice and understanding of computing theories and empirical
> analyses
> > for realizing ?organizational intelligence and collective intelligence?,
> > i.e., intelligent computing for organizational and collective information
> > from not only technical but also institutional and social aspects.
> >
> > Topics Covered
> > Agents, HCI and business intelligence systems
> > Artificial intelligence for organizational management
> > Big Data (system design, implementations, applications, proof-of-concepts
> > and use cases)
> > Case studies
> > Classification and clustering
> > Cloud Computing (IaaS, PaaS, SaaS, experiments, simulations
> > proof-of-concepts and consulting)
> > Collaboration and communication systems
> > Corporate management systems
> > Data mining and knowledge bases for organizational management
> > Decision making theory and modeling
> > Decision science
> > Decision support systems and crisis management systems
> > Expert systems
> > Game theoretic and information economic analysis
> > Genetic algorithms and evolutionary computing
> > Global enterprise systems
> > Information content security
> > Information systems and sustainability (human, social and management
> > aspects)
> > Intellectual property management
> > Intelligent Agents and Multi-Agent Systems
> > Intelligent Web-based systems
> > Knowledge Discovery
> > Knowledge engineering, e-Learning and computing for education
> > Machine and computer vision
> > Machine Learning
> > Metadata and multimedia information systems
> > Monitoring and planning
> > Neural networks, bayesian networks,and fuzzy techniques and systems
> > Optimization
> > Organizational systems, middleware, applications, and experiences
> > Risk modeling and financial computing
> > Robotics for intelligent organizations
> > Security and access control
> > Self-organizing and complex systems
> > Semantic Web architecture and applications
> > Service computing
> > Signal and time series processing
> > Soft computing in organizations
> > Software engineering and formal methods
> >
> > ---
> >
> > Open Journal of Big Data (OJBD):
> > http://www.ronpub.com/index.php/journals/ojbd
> >
> > Big Data research is expected to be the hottest topic for the next five
> > years. We shall have solid plans and regular meetings to ensure that our
> > journal attracts the best papers from reputable researchers to support
> our
> > mission continuously. Our objectives are as follows:
> >
> > Disseminate the emerging techniques, technologies and services associated
> > with Big Data.
> > Offer empirical evidence and approaches to demonstrate contributions made
> > by Big Data.
> > Offer recommendations to research and enterprise communities that use Big
> > Data as a solution for their work.
> > Offer guidelines and strategic directions in the way that Big Data
> > research should progress.
> > We will seek recommendations and practices that can be successfully
> > delivered to other disciplines such as healthcare, finance, education and
> > science, providing us quality papers centered on Big Data and whose
> lessons
> > learned will be transferable across disciplines to encourage
> > inter-disciplinary research and funding activities essential for
> > progressive research and development. We will cover extensive studies to
> > ensure that the research and enterprise communities can take our
> > recommendations, guidelines and best practices, which will make real
> > positive impacts to their services and projects. We will ensure that key
> > lessons taken from our journal can be very useful to communities. By
> > blending workshops and calls for papers in our journal, we will ensure
> that
> > our articles are of the highest caliber and can demonstrate added values
> > and benefits to the people adopting our recommendations. We will ensure
> all
> > submitters understand and use our recommendations, so that their
> citations
> > and adoptions of our key lessons will keep our quality high.
> >
> > Our journal has an advantage over the competing journals in Big Data as
> > follows. First, steps involved in Big Data development should be
> > reproducible to allow organizations to follow. Some articles in competing
> > journals are very theoretical, making reproduction difficult. Second, all
> > demonstrated deliveries in our journal should be easy to use, and provide
> > real added value to technology-adopting organizations beyond just
> technical
> > implementations. Unlike some articles in competing journals, whose
> > deliveries are hard to understand and don?t consider technical or
> > organizational adoption. We also encourage industrial partners to provide
> > their latest developments, success stories (empirical) and best practices
> > (quantitative and qualitative) to ensure our journal articles have the
> edge
> > over others.
> >
> > The Open Journal of Big Data (OJBD) welcomes high-quality and scholarly
> > papers, which include new methodologies, processes, case studies,
> > proofs-of-concept, scientific demonstrations, industrial applications and
> > adoption. The journal covers a wide range of topics including Big Data
> > science, frameworks, analytics, visualizations, recommendations and
> > data-intensive research. The OJBD presents the current challenges faced
> by
> > Big Data adoption and implementation, and recommends ways, techniques,
> > services and technologies that can resolve existing challenges and
> improve
> > on the current practices. We focus on how Big Data can make huge positive
> > impacts to different disciplines in addition to IT, which include
> > healthcare, finance, education, physical science, biological science,
> earth
> > science, business & management, information systems, social sciences and
> > law. There are eight major topics as follows:
> >
> > - Techniques, algorithms and innovative methods of processing Big Data
> (or
> > Big datasets) that achieve performance, accuracy and low-costs.
> > - Design, implementation, evaluation and services related to Big Data,
> > including the development process, use cases, experiments and associated
> > simulations.
> > - Systems and applications developed by Big Data and descriptions of how
> > Big Data can be used in disciplines such as bioinformatics, finance,
> > education, natural science, weather science, life science, physics,
> > astronomy, law and social science.
> > - Security, privacy, trust, data ownership, legal challenges, business
> > models, information systems, social implications, social network analyses
> > and social science related to Big Data.
> > - Consolidation of existing technologies (databases, web, mobile, HPC)
> and
> > how to integrate them in Big Data such as SOA Big Data, data mining,
> > machine learning, HPC Big Data and cloud storage.
> > - Recommendations, emerging technologies and techniques associated with
> > Big Data such as mobile Big Data, standards, multi-clouds and internet of
> > things.
> > - Data analysis, analytics and visualization, including GPU techniques,
> > new algorithms and methods showing how to achieve significant
> improvements
> > from existing methods.
> > - Surveys, case studies, frameworks and user evaluations involved with
> > qualitative, quantitative and/or computational research methods.
> >
> >
> >
> >
> > ------------------------------
> >
> > Message: 5
> > Date: Fri, 6 Feb 2015 22:00:17 +0100
> > From: "GRLMC" <grlmc at urv.cat>
> > To: "GRLMC" <grlmc at urv.cat>
> > Subject: [AISWorld] LATA 2015: call for participation
> > Message-ID: <3AC8012AE0264276A2D456065698A277 at Carlos1>
> > Content-Type: text/plain;       charset="utf-8"
> >
> > *To be removed from our mailing list, please respond to this message with
> > UNSUBSCRIBE in the subject line*
> >
> >
> >
> *****************************************************************************
> >
> > 9th INTERNATIONAL CONFERENCE ON LANGUAGE AND AUTOMATA THEORY AND
> > APPLICATIONS
> >
> > LATA 2015
> >
> > Nice, France
> >
> > March 2-6, 2015
> >
> > Organized by:
> >
> > CNRS, I3S, UMR 7271
> > Nice Sophia Antipolis University
> >
> > Research Group on Mathematical Linguistics (GRLMC)
> > Rovira i Virgili University
> >
> > http://grammars.grlmc.com/lata2015/
> >
> >
> >
> *****************************************************************************
> >
> > PROGRAM
> >
> > Monday, March 2
> >
> > 09:15 - 10:15   Registration
> >
> > 10:15 - 10:25   Opening
> >
> > 10:25 - 11:15   Azadeh Farzan, Matthias Heizmann, Jochen Hoenicke,
> Zachary
> > Kincaid and Andreas Podelski: Automated Program Verification - Invited
> > Lecture
> >
> > 11:15 - 11:45   Coffee Break
> >
> > 11:45 - 13:00
> >
> > Ala Eddine Ben Salem: Single-pass Testing Automata for LTL Model Checking
> >
> > Conrad Cotton-Barratt, Andrzej S. Murawski and C.-H. Luke Ong: Weak and
> > Nested Class Memory Automata
> >
> > Joey Eremondi, Oscar H. Ibarra and Ian McQuillan: Insertion Operations on
> > Deterministic Reversal-Bounded Counter Machines
> >
> > 13:00 - 14:30   Lunch
> >
> > 14:30 - 16:10
> >
> > Adrien Boiret, Vincent Hugot, Joachim Niehren and Ralf Treinen: Logics
> for
> > Unordered Trees with Data Constraints on Siblings
> >
> > Fran?ois Gonze and Rapha?l M. Jungers: On the Synchronizing Probability
> > Function and the Triple Rendezvous Time: New Approaches to Cerny's
> > Conjecture
> >
> > Vesa Halava, Reino Niskanen and Igor Potapov: On Robot Games of Degree
> Two
> >
> > Shankara Narayanan Krishna, Lakshmi Manasa and Ashutosh Trivedi:
> > Time-Bounded Reachability Problem for Recursive Timed Automata is
> > Undecidable
> >
> > 16:10 - 16:25   Break
> >
> > 16:25 - 18:10
> >
> > Rui Li and Yiguang Hong: On Observability of Automata Networks via
> > Computational Algebra
> >
> > Nicolas Peltier: Reasoning on Schemas of Formulas: An Automata-Based
> > Approach
> >
> > Martin Sulzmann and Peter Thiemann: Derivatives for Regular Shuffle
> > Expressions
> >
> > Eric Allender and Ian Mertz: Complexity of Regular Functions
> >
> > Tuesday, March 3
> >
> > 09:00 - 09:50
> >
> > Marco Autili, Paola Inverardi, Filippo Mignosi, Romina Spalazzese and
> > Massimo Tivoli: Automated Synthesis of Application-layer Connectors from
> > Automata-based Specifications - Invited Lecture
> >
> > 09:50 - 10:05   Break
> >
> > 10:05 - 11:20
> >
> > Peter Thiemann and Martin Sulzmann: From Omega-Regular Expressions to
> > B?chi Automata via Partial Derivatives
> >
> > Guillaume Verdier and Jean-Baptiste Raclet: Quotient of Acceptance
> > Specifications under Reachability Constraints
> >
> > Parvaneh Babari and Manfred Droste: A Nivat Theorem for Weighted Picture
> > Automata and Weighted MSO Logics
> >
> > 11:20 - 11:50   Coffee Break
> >
> > 11:50 - 13:05
> >
> > Luc Boasson and Olivier Carton: Rational Selecting Relations and
> Selectors
> >
> > Peter Leupold and Norbert Hundeshagen: A Hierarchy of Transducing
> Observer
> > Systems
> >
> > Antoine Ndione, Aur?lien Lemay and Joachim Niehren: Sublinear DTD
> Validity
> >
> > 13:05 - 14:35   Lunch
> >
> > 14:35 - 16:15
> >
> > Carl Barton, Costas S. Iliopoulos and Solon P. Pissis: Average-case
> > Optimal Approximate Circular String Matching
> >
> > Johanna Bj?rklund, Frank Drewes and Niklas Zechner: An Efficient
> > Best-Trees Algorithm for Weighted Tree Automata over the Tropical
> Semiring
> >
> > Bastien Cazaux, Thierry Lecroq and Eric Rivals: Construction of a de
> > Bruijn Graph for Assembly from a Truncated Suffix Tree
> >
> > Da-Jung Cho, Yo-Sub Han and Hwee Kim: Frequent Pattern Mining with
> > Non-overlapping Inversions
> >
> > 16:15 - 16:30   Break
> >
> > 16:30 - 17:45
> >
> > H.K. Dai and Z. Wang: A Parallel Algorithm for Finding All Minimal
> Maximum
> > Subsequences via Random Walk
> >
> > Hern?n Ponce-De-Le?n and Andrey Mokhov: Building Bridges Between Sets of
> > Partial Orders
> >
> > Vojt?ch Vorel and Adam Roman: Complexity of Road Coloring with Prescribed
> > Reset Words
> >
> > Wednesday, March 4
> >
> > 9:00 - 9:50
> >
> > Antonio Restivo: The Shuffle Product: New Research Directions - Invited
> > Lecture
> >
> > 9:50 - 10:05    Break
> >
> > 10:05 - 11:20
> >
> > Marcella Anselmo, Dora Giammarresi and Maria Madonia: Structure and
> > Measure of a Decidable Class of Two-dimensional Codes
> >
> > Thibault Godin, Ines Klimann and Matthieu Picantin: On Torsion-Free
> > Semigroups Generated by Invertible Reversible Mealy Automata
> >
> > Luis-Miguel Lopez and Philippe Narbel: Coding Non-orientable Laminations
> >
> > 11:20 - 11:50   Group Photo and Coffee Break
> >
> > 11:50 - 13:05
> >
> > Pavel Panteleev: Preset Distinguishing Sequences and Diameter of
> > Transformation Semigroups
> >
> > Charalampos Zinoviadis: Hierarchy and Expansiveness in 2D Subshifts of
> > Finite Type
> >
> > Stefano Bilotta, Elisa Pergola, Renzo Pinzani and Simone Rinaldi:
> > Recurrence Relations, Succession Rules and the Positivity Problem
> >
> > 13:05 - 14:35   Lunch
> >
> > 14:35 - 16:15
> >
> > Philip Bille, Inge Li G?rtz and S?ren Vind: Compressed Data Structures
> for
> > Range Searching
> >
> > Alberto Policriti, Nicola Gigante and Nicola Prezza: Average Linear Time
> > and Compressed Space Construction of the Burrows-Wheeler Transform
> >
> > Jan Tr?vn??ek, Jan Janou?ek, Bo?ivoj Melichar and Loek Cleophas: Backward
> > Linearised Tree Pattern Matching
> >
> > Vladimir Ulyantsev, Ilya Zakirzyanov and Anatoly Shalyto: BFS-based
> > Symmetry Breaking Predicates for DFA Identification
> >
> > 17:00 - 20:00   Touristic visit
> >
> > Thursday, March 5
> >
> > 09:00 - 09:50
> >
> > Giancarlo Mauri, Alberto Leporati, Luca Manzoni, Antonio E. Porreca and
> > Claudio Zandron: Complexity Classes for Membrane Systems - Invited
> Lecture
> >
> > 09:50 - 10:05   Break
> >
> > 10:05 - 11:20
> >
> > Davide Bresolin, Dario Della Monica, Angelo Montanari, Pietro Sala and
> > Guido Sciavicco: On the Complexity of Fragments of the Modal Logic of
> > Allen's Relations over Dense Structures
> >
> > Nadia Creignou, Ra?da Ktari, Arne Meier, Julian-Steffen M?ller, Fr?d?ric
> > Olive and Heribert Vollmer: Parameterized Enumeration for Modification
> > Problems
> >
> > Martin L?ck, Arne Meier and Irena Schindler: Parameterized Complexity of
> > CTL: A Generalization of Courcelle's Theorem
> >
> > 11:20 - 11:50   Coffee Break
> >
> > 11:50 - 13:05
> >
> > Kazuyuki Amano and Atsushi Saito: A Nonuniform Circuit Class with
> > Multilayer of Threshold Gates Having Super Quasi Polynomial Size Lower
> > Bounds against NEXP
> >
> > Georg Bachmeier, Michael Luttenberger and Maximilian Schlund: Finite
> > Automata for the Sub- and Superword Closure of CFLs: Descriptional and
> > Computational Complexity
> >
> > Olaf Beyersdorff, Leroy Chew and Karteek Sreenivasaiah: A Game
> > Characterisation of Tree-like Q-resolution Size
> >
> > 13:05 - 14:35   Lunch
> >
> > 14:35 - 16:15
> >
> > Alberto Dennunzio, Enrico Formenti, Luca Manzoni and Antonio E. Porreca:
> > Preimage Problems for Reaction Systems
> >
> > Ryo Yoshinaka: Learning Conjunctive Grammars and Contextual Binary
> Feature
> > Grammars
> >
> > Rapha?l Bailly, Fran?ois Denis and Guillaume Rabusseau: Recognizable
> > Series on Hypergraphs
> >
> > Yohan Boichut, Jacques Chabin and Pierre R?ty: Towards More Precise
> > Rewriting Approximations
> >
> > 16:15 - 16:30   Break
> >
> > 16:30 - 17:45
> >
> > Michael Codish, Lu?s Cruz-Filipe and Peter Schneider-Kamp: Sorting
> > Networks: the End Game
> >
> > Konrad Kazimierz Dabrowski, Shenwei Huang and Dani?l Paulusma: Bounding
> > Clique-width via Perfect Graphs
> >
> > Ryszard Janicki, Jetty Kleijn, Maciej Koutny and ?ukasz Mikulski: Order
> > Structures for Subclasses of Generalised Traces
> >
> > Friday, March 6
> >
> > 9:00 - 9:50
> >
> > Johann A. Makowsky and Nadia Labai: Hankel Matrices: From Words to Graphs
> > - Invited Lecture
> >
> > 9:50 - 10:05    Break
> >
> > 10:05 - 11:20
> >
> > Golnaz Badkobeh, Gabriele Fici and Zsuzsanna Lipt?k: On the Number of
> > Closed Factors in a Word
> >
> > Gabriele Fici, Thierry Lecroq, Arnaud Lefebvre and ?lise Prieur-Gaston:
> > Online Computation of Abelian Runs
> >
> > Guilhem Gamard and Gwena?l Richomme: Coverability in Two Dimensions
> >
> > 11:20 - 11:50   Coffee Break
> >
> > 11:50 - 13:05
> >
> > Jana Hadravov? and ?t?p?n Holub: Equation xiyjxk=uivjuk in Words
> >
> > ?ukasz Mikulski, Marcin Pi?tkowski and Wojciech Rytter: Square-free Words
> > over Partially Commutative Alphabets
> >
> > Ananda Chandra Nayak and Kalpesh Kapoor: On the Language of Primitive
> > Partial Words
> >
> > 13:05 - 13:15   Closing
> >
> >
> > ---
> > Este mensaje no contiene virus ni malware porque la protecci?n de avast!
> > Antivirus est? activa.
> > http://www.avast.com
> >
> >
> >
> >
> > ------------------------------
> >
> > Message: 6
> > Date: Fri, 6 Feb 2015 20:19:40 +0000
> > From: "Chang V.I." <vic1e09 at soton.ac.uk>
> > To: "cfp at grid.chu.edu.tw" <cfp at grid.chu.edu.tw>, "cse-cfp at cse.stfx.ca"
> >         <cse-cfp at cse.stfx.ca>,  "IRList at lists.shef.ac.uk"
> >         <IRList at lists.shef.ac.uk>,      "performance at merlot.usc.edu"
> >         <performance at merlot.usc.edu>,   "mmkm at jiscmail.ac.uk"
> >         <mmkm at jiscmail.ac.uk>, "aisworld at lists.aisnet.org"
> >         <aisworld at lists.aisnet.org>, "mycolleagues at mailman.ufsc.br"
> >         <mycolleagues at mailman.ufsc.br>, "admmyc at ig.com.br" <
> > admmyc at ig.com.br>,
> >         "dustdar at infosys.tuwien.ac.at" <dustdar at infosys.tuwien.ac.at>,
> >         "ecoop-info at ecoop.org" <ecoop-info at ecoop.org>, "
> > seworld at sigsoft.org"
> >         <seworld at sigsoft.org>
> > Subject: [AISWorld] [Mycolleagues] Call for papers for 2 journals
> >         (IJOCI and      OJBD)
> > Message-ID:
> >         <C87E186B27EA2C4786B010911E0B1D15468C8F23 at SRV00049.soton.ac.uk>
> > Content-Type: text/plain; charset="windows-1252"
> >
> > Dear All,
> >
> > Apologies if you've received it from somewhere. Our 2 journals have our
> > calls for papers and special issues.
> >
> > International Journal of Organizational and Collective Intelligence
> > (IJOCI) with 2 special issues:
> >
> >
> http://www.igi-global.com/calls-for-papers-special/international-journal-organizational-collective-intelligence/1140
> >
> > Open Journal of Big Data (OJBD) with 5 special issues:
> > http://www.ronpub.com/index.php/journals/ojbd
> >
> > OJBD has the fee waiver for the accepted papers submitted by the 15th of
> > February 2015. Those who submit to IJOCI, will be based on the
> > first-come-first serve basis.
> > Details about the scope, topics, our motivation and impacts of our
> > research contributions are available at the end of this email. We blend
> our
> > journals with other scholarly activities.
> >
> > I have included the scope and details of these 2 journals at the end of
> > this email. I hope you can consider.
> >
> > Many thanks again for your kind assistance and interests. Thanks and
> > regards.
> >
> > Dr. Victor Chang,
> > Editor-in-Chief, OJBD and IJOCI
> >
> > ----
> > International Journal of Organizational and Collective Intelligence
> > (IJOCI):
> >
> http://www.igi-global.com/journal/international-journal-organizational-collective-intelligence/1140
> >
> > Mission
> > The mission of the International Journal of Organizational and Collective
> > Intelligence (IJOCI) is to provide researchers and practitioners in the
> > communities of computer and information sciences with a forum to advance
> > the practice and understanding of computing theories and empirical
> analyses
> > for realizing ?organizational intelligence and collective intelligence?,
> > i.e., intelligent computing for organizational and collective information
> > from not only technical but also institutional and social aspects.
> >
> > Topics Covered
> > Agents, HCI and business intelligence systems
> > Artificial intelligence for organizational management
> > Big Data (system design, implementations, applications, proof-of-concepts
> > and use cases)
> > Case studies
> > Classification and clustering
> > Cloud Computing (IaaS, PaaS, SaaS, experiments, simulations
> > proof-of-concepts and consulting)
> > Collaboration and communication systems
> > Corporate management systems
> > Data mining and knowledge bases for organizational management
> > Decision making theory and modeling
> > Decision science
> > Decision support systems and crisis management systems
> > Expert systems
> > Game theoretic and information economic analysis
> > Genetic algorithms and evolutionary computing
> > Global enterprise systems
> > Information content security
> > Information systems and sustainability (human, social and management
> > aspects)
> > Intellectual property management
> > Intelligent Agents and Multi-Agent Systems
> > Intelligent Web-based systems
> > Knowledge Discovery
> > Knowledge engineering, e-Learning and computing for education
> > Machine and computer vision
> > Machine Learning
> > Metadata and multimedia information systems
> > Monitoring and planning
> > Neural networks, bayesian networks,and fuzzy techniques and systems
> > Optimization
> > Organizational systems, middleware, applications, and experiences
> > Risk modeling and financial computing
> > Robotics for intelligent organizations
> > Security and access control
> > Self-organizing and complex systems
> > Semantic Web architecture and applications
> > Service computing
> > Signal and time series processing
> > Soft computing in organizations
> > Software engineering and formal methods
> >
> > ---
> >
> > Open Journal of Big Data (OJBD):
> > http://www.ronpub.com/index.php/journals/ojbd
> >
> > Big Data research is expected to be the hottest topic for the next five
> > years. We shall have solid plans and regular meetings to ensure that our
> > journal attracts the best papers from reputable researchers to support
> our
> > mission continuously. Our objectives are as follows:
> >
> > Disseminate the emerging techniques, technologies and services associated
> > with Big Data.
> > Offer empirical evidence and approaches to demonstrate contributions made
> > by Big Data.
> > Offer recommendations to research and enterprise communities that use Big
> > Data as a solution for their work.
> > Offer guidelines and strategic directions in the way that Big Data
> > research should progress.
> > We will seek recommendations and practices that can be successfully
> > delivered to other disciplines such as healthcare, finance, education and
> > science, providing us quality papers centered on Big Data and whose
> lessons
> > learned will be transferable across disciplines to encourage
> > inter-disciplinary research and funding activities essential for
> > progressive research and development. We will cover extensive studies to
> > ensure that the research and enterprise communities can take our
> > recommendations, guidelines and best practices, which will make real
> > positive impacts to their services and projects. We will ensure that key
> > lessons taken from our journal can be very useful to communities. By
> > blending workshops and calls for papers in our journal, we will ensure
> that
> > our articles are of the highest caliber and can demonstrate added values
> > and benefits to the people adopting our recommendations. We will ensure
> all
> > submitters understand and use our recommendations, so that their
> citations
> > and adoptions of our key lessons will keep our quality high.
> >
> > Our journal has an advantage over the competing journals in Big Data as
> > follows. First, steps involved in Big Data development should be
> > reproducible to allow organizations to follow. Some articles in competing
> > journals are very theoretical, making reproduction difficult. Second, all
> > demonstrated deliveries in our journal should be easy to use, and provide
> > real added value to technology-adopting organizations beyond just
> technical
> > implementations. Unlike some articles in competing journals, whose
> > deliveries are hard to understand and don?t consider technical or
> > organizational adoption. We also encourage industrial partners to provide
> > their latest developments, success stories (empirical) and best practices
> > (quantitative and qualitative) to ensure our journal articles have the
> edge
> > over others.
> >
> > The Open Journal of Big Data (OJBD) welcomes high-quality and scholarly
> > papers, which include new methodologies, processes, case studies,
> > proofs-of-concept, scientific demonstrations, industrial applications and
> > adoption. The journal covers a wide range of topics including Big Data
> > science, frameworks, analytics, visualizations, recommendations and
> > data-intensive research. The OJBD presents the current challenges faced
> by
> > Big Data adoption and implementation, and recommends ways, techniques,
> > services and technologies that can resolve existing challenges and
> improve
> > on the current practices. We focus on how Big Data can make huge positive
> > impacts to different disciplines in addition to IT, which include
> > healthcare, finance, education, physical science, biological science,
> earth
> > science, business & management, information systems, social sciences and
> > law. There are eight major topics as follows:
> >
> > - Techniques, algorithms and innovative methods of processing Big Data
> (or
> > Big datasets) that achieve performance, accuracy and low-costs.
> > - Design, implementation, evaluation and services related to Big Data,
> > including the development process, use cases, experiments and associated
> > simulations.
> > - Systems and applications developed by Big Data and descriptions of how
> > Big Data can be used in disciplines such as bioinformatics, finance,
> > education, natural science, weather science, life science, physics,
> > astronomy, law and social science.
> > - Security, privacy, trust, data ownership, legal challenges, business
> > models, information systems, social implications, social network analyses
> > and social science related to Big Data.
> > - Consolidation of existing technologies (databases, web, mobile, HPC)
> and
> > how to integrate them in Big Data such as SOA Big Data, data mining,
> > machine learning, HPC Big Data and cloud storage.
> > - Recommendations, emerging technologies and techniques associated with
> > Big Data such as mobile Big Data, standards, multi-clouds and internet of
> > things.
> > - Data analysis, analytics and visualization, including GPU techniques,
> > new algorithms and methods showing how to achieve significant
> improvements
> > from existing methods.
> > - Surveys, case studies, frameworks and user evaluations involved with
> > qualitative, quantitative and/or computational research methods.
> >
> > _______________________________________________
> > Mycolleagues mailing list
> > Mycolleagues at mailman.ufsc.br
> > http://mailman.ufsc.br/mailman/listinfo/mycolleagues
> >
> > - Through this link above you can "subscribe", "unsubscribe", or change
> > your settings in the list, using "username=ufsc" and "password=ufsc".
> > - If you need any help, please send a message to
> > mycolleagues-owner at mailman.ufsc.br.
> > - ENJOY this COURTESY offered by FEDERAL UNIVERSITY OF SANTA CATARINA.
> >
> >
> >
> > ------------------------------
> >
> > Message: 7
> > Date: Sat, 07 Feb 2015 13:59:34 +0200
> > From: "Alta vdm" <Alta.vdm at up.ac.za>
> > To: <aisworld at lists.aisnet.org>
> > Subject: [AISWorld] AMCIS 2015 Minitrack: The use of DSR in
> >         Post-graduate Studies and Supervision in IS
> > Message-ID: <54D61A46020000CB0007FCFC at gwise.up.ac.za>
> > Content-Type: text/plain; charset="utf-8"
> >
> > Americas Conference on Information Systems (AMCIS), Puerto Rico, August
> > 13-15, 2015
> >
> >
> http://amcis2015.aisnet.org/2-uncategorised/35-design-science-research-dsr-track
> >
> > Track: Design Science TrackMinitrack: The use of DSR in Post-graduate
> > studies and supervision in IS
> >
> > The adoption of DSR as a research approach whenever artefacts are
> > developed within IS has seen substantial growth in recent years. This
> > trend was also found in post-graduate studies where students are
> > involved in the development of an artefact and then adopt DSR in their
> > studies.  Several authors such as Vijay Vaishnavi, Bill Keuchler, Al
> > Hevner and Shirley Gregor published on the topic of Design Science
> > research. However, using DSR in postgraduate studies is a relatively new
> > way of conducting research and the presentation of a DSR study within
> > dissertations and theses poses unique challenges and opportunities.
> >
> > This track explores the techniques, opportunities, challenges and best
> > practices adopted for both students and supervisors when adopting and
> > using DSR within post-graduate studies. We invite submissions for the
> > use of DSR in Post-graduate studies and supervision in IS mini-track
> > that discusses relevant topics including, but not limited to, the
> > following:
> > ?           Design Science Research as a research approach in
> > post-graduate studies;
> > ?           Writing up a DSR study in a thesis or dissertation;
> > ?           Mixed-method research and DSR as research approach;
> > ?           Case Studies and best practices for post-graduate DSR
> > studies;
> > ?           Evaluation of Design Science Research;
> > ?           Science of Design and Design Theory;
> > ?           Research philosophies and DSR;
> > ?           The artefact within a DSR post-graduate study.
> >
> > Some Important Dates for AMCIS 2015:
> >
> >
> >
> > Date
> > Activity
> >
> > January 5, 2015:Manuscript submissions for AMCIS 2015 begin
> > February 25, 2015
> > AMCIS manuscript submissions close for authors
> > Tuesday, April 21, 2015
> > Authors notified about the disposition of their papers.
> > Tuesday, April 28, 2015:Authors submit camera-ready revision of their
> > ipapers
> > May 5, 2015Final decisions on AMCIS 2015 program are made
> >
> >
> > Looking forward to meet you in Puerto Rico,
> >
> > Mini?track Chairs:
> > Aurona Gerber, CSIR Meraka aurona.gerber at gmail.com,
> > Alta van der Merwe, University of Pretoria, alta at up.ac.za
> > -------------- next part --------------
> > An HTML attachment was scrubbed...
> > URL: <
> >
> http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20150207/e4d5a3bf/attachment-0001.html
> > >
> >
> > ------------------------------
> >
> > Message: 8
> > Date: Sat, 7 Feb 2015 17:09:23 -0500 (EST)
> > From: Purnendu Mandal <purnendu.mandal at lamar.edu>
> > To: aisworld at lists.aisnet.org
> > Subject: [AISWorld] Springer Book Series Proposal
> > Message-ID: <1499971532.2441340.1423346963426.JavaMail.root at lamar.edu>
> > Content-Type: text/plain; charset="utf-8"
> >
> >
> > Here is an opportunity to publish your book or edited volume with
> Springer.
> > Book Series: Managing the Asian Century -
> > http://www.springer.com/series/13579
> >
> >
> >
> > Managing the Asian Century provides a platform for scholastic discussions
> > and stresses the need for a holistic framework to understand Asia as an
> > emerging economic global powerhouse. Books published in this series cover
> > Asia-centric topics in economics, production, marketing, finance,
> > entrepreneurship, education, culture, technology, as well as other areas
> of
> > importance to Asian economics.
> >
> > The series will publish edited volumes based on papers submitted to
> > international and regional conferences that focus on specific
> Asia-Pacific
> > themes, such as investment in education, women?s rights,
> entrepreneurship,
> > climate change, wage inequality, challenges in governance, and
> corruption.
> > Books in this series are of keen interest to researchers and policy
> > planners around the world and will be used by universities for graduate
> and
> > doctoral level studies.
> >
> > If interested please contact me at purnendu.mandal at lamar.edu
> >
> >
> >
> >
> >
> > Purnendu Mandal
> > Professor,College of Business, Lamar University, Beaumont, Texas(409) 880
> > 8634; Email: purnendu.mandal at lamar.edu
> >
> >
> >
> >
> >
> > CONFIDENTIALITY: Any information contained in this e-mail
> > (including attachments) is the property of The State of Texas and
> > unauthorized disclosure or use is prohibited. Sending, receiving or
> > forwarding of confidential, proprietary and privileged information is
> > prohibited under Lamar Policy. If you received this e-mail in error,
> > please notify the sender and delete this e-mail from your system.
> > -------------- next part --------------
> > An HTML attachment was scrubbed...
> > URL: <
> >
> http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20150207/80077880/attachment-0001.html
> > >
> >
> > ------------------------------
> >
> > Message: 9
> > Date: Sat, 7 Feb 2015 22:41:50 -0600
> > From: "Jeet Gupta" <guptaj at uah.edu>
> > To: "'Galliers, Robert'" <rgalliers at bentley.edu>,
> >         <aisworld at lists.aisnet.org>
> > Subject: [AISWorld] What is IS strategy and how to prepare strategic
> >         IS plans
> > Message-ID: <00b101d04359$8e95d9c0$abc18d40$@uah.edu>
> > Content-Type: text/plain; charset="us-ascii"
> >
> > Hello Bob
> >
> >
> >
> > I am back to with the same questions I had last year when you said you
> will
> > provide me with some thoughts.  My questions are:
> >
> >
> >
> > What is an IS/T strategy?  How does one prepare strategic IS plans in an
> > organization?
> >
> >
> >
> > Also, in a 150-minute class session of MS level IS students, what will
> you
> > teach for the subject of IS/T strategy?  I am having a difficult time
> > planning this session since a student asked me the question: What is IS/T
> > strategy?  After thinking about it more than a year, I still do not have
> > answered even though I have taught this course for a long time.  I could
> > talk about SIS, what is done in IS from a strategic level, how could we
> use
> > IS/T for competitive advantage or even IT governance.  But what is IS/T
> > strategy? How do we prepare strategic IS plans>
> >
> >
> >
> > I know I can define the Operations or the Marketing Strategy.  How about
> > IS/T strategy?  What is the relationship with Digital Business Strategy?
> >
> >
> >
> > Any thoughts?  Any copies of papers and/or slides will be helpful and
> > appreciated.
> >
> >
> >
> >
> >
> >
> >
> > Best regards,
> >
> >
> >
> > _________________________________________________________________
> > Jatinder (Jeet) N. D. Gupta, PhD, CFPIM
> >
> > Associate Dean for Graduate and Sponsored Programs
> >
> > Director of Integrated Enterprise Lab
> > Eminent Scholar and Professor
> > College of Business Administration
> > The University of Alabama in Huntsville
> > 301 Sparkman Drive
> > Huntsville, AL 35899
> > Phone: 256-824-6593 (office)
> >            256-288-0150 (home)
> > FAX:    256-824-4712
> > E-mail: guptaj at uah.edu
> >
> > -------------- next part --------------
> > An HTML attachment was scrubbed...
> > URL: <
> >
> http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20150207/4d0ac3ce/attachment-0001.html
> > >
> >
> > ------------------------------
> >
> > Message: 10
> > Date: Sun, 8 Feb 2015 11:34:40 +0530
> > From: Satish Krishnan <iamsatishk at gmail.com>
> > To: "aisworld at lists.aisnet.org" <aisworld at lists.aisnet.org>
> > Subject: [AISWorld] CFP - AMCIS 2015 Minitrack: Cloud Computing in
> >         E-Government
> > Message-ID:
> >         <CADHGrpaZOM=gkXJXBAvA8=
> > y+doKLaRLNwsCuyGPKKmJiA-4mBQ at mail.gmail.com>
> > Content-Type: text/plain; charset="utf-8"
> >
> > *Call for Papers*
> >
> > *21st Americas Conference on Information Systems (AMCIS?15) *
> > August 13-15, 2015
> > Puerto Rico
> >
> > *Track: *eGovernment
> > *Minitrack:* Cloud Computing in E-Government
> >
> > *Description:*
> >
> > The emergence of the cloud computing paradigm shifts the way information
> > technology (IT) is transforming service in today?s economy. Cloud
> computing
> > provides scalable access, elastic and shared computing capabilities
> anytime
> > and anywhere, and thereby requires minimum management and interaction
> with
> > service providers. It promises efficiency gains and potential cost
> savings,
> > which makes cloud solutions attractive to the public sector. However, due
> > to different, often more restrictive security requirements, the
> > implementation of cloud solutions in the public sector is different from
> > the private sector. To enable public sector organizations to leverage the
> > power of cloud computing, research is needed to address a number of
> issues.
> >
> > Therefore, we explicitly call for full paper and research-in-progress
> > submissions ranging from exploratory to confirmatory work. All methods of
> > research are encouraged, including design science, empirical, and
> > theoretical research.
> >
> > *Potential topics include, but are not limited to the following:*
> >
> > ?    Adoption of cloud-based G2C e-services by citizens
> > ?    Implementation of cloud-based G2G applications
> > ?    Values of cloud-based e-government service platform for government,
> > society and environment
> > ?    Cloud computing in e-governance
> > ?    Privacy and security issues of cloud computing in public sector
> > ?    Collaborative innovation enabled by cloud computing through
> > public-private partnership
> > ?    Cloud computing and e-participation
> > ?    Cloud computing and e-democracy (e.g., enablement of secure
> e-voting)
> > ?    Cloud service models (e.g., IaaS, PaaS, SaaS) in e-government
> > ?    Cloud deployment models (e.g., public cloud, private cloud,
> community
> > cloud, hybrid cloud) in e-government
> > ?    Best practices of cloud computing in e-government
> > ?    Country-level comparison of cloud computing in e-government
> > ?    Role of policymakers and IS professionals in enabling cloud
> computing
> > in public sector
> > ?    Benefits, risks and recommendations for cloud-based information
> > security in e-government
> > ?    Cases of failure of cloud computing in e-government
> >
> > *Submission Process:*
> >
> > Paper submissions must be made electronically through AMCIS 2015
> Manuscript
> > Submission Site http://amcis2015.aisnet.org/submission-guidelines.
> Papers
> > will be peer reviewed using a double-blind system.
> >
> >
> > *Important Dates:*
> > January 5, 2015: Manuscript submissions for AMCIS 2015 begin
> > February 25, 2015: AMCIS manuscript submissions close for authors
> > Tuesday, April 21, 2015: Authors notified about the disposition of their
> > papers
> > Tuesday, April 28, 2015:  Authors submit camera-ready revision of their
> > papers
> > May 5, 2015: Final decisions on AMCIS 2015 program are made
> >
> > More information is available at http://amcis2015.aisnet.org/ or by
> > contacting the minitrack co-chairs.
> >
> > *Minitrack Co-Chairs:*
> >
> > *Prof. Dr. Julia Kroenung*
> > University of Mannheim
> > kroenung at bwl.uni-mannheim.de
> >
> > *Dr. Satish Krishnan*
> > Indian Institute of Management Kozhikode
> > satishk at iimk.ac.in
> > -------------- next part --------------
> > An HTML attachment was scrubbed...
> > URL: <
> >
> http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20150208/3556926f/attachment-0001.html
> > >
> >
> > ------------------------------
> >
> > Message: 11
> > Date: Sun, 8 Feb 2015 04:37:14 -0700
> > From: Maiga Chang <maiga.igibook at gmail.com>
> > To: <AISWorld at lists.aisnet.org>
> > Subject: [AISWorld] Contents of Vol. 13,        No. 1 of International
> >         Journal of Distance Education Technologies      (IJDET, an EI
> > journal)
> > Message-ID: <C5E0B7CEE72A4BF8B921E68CE10B562A at CleanXP>
> > Content-Type: text/plain; format=flowed; charset="big5";
> >         reply-type=original
> >
> > [Apologies if you receive multiple times, please circulate this to
> >   your colleagues who might be interested, thank you so much.]
> >
> > [This email includes the table of contents of Vol. 13, No. 1 of
> >  International Journal of Distance Education Technologies
> >  (IJDET, an EI journal) and the general call for papers of IJDET]
> >
> >
> > ------- Annoucement of the publication of Vol. 13, No. 1 of IJDET (an EI
> > journal)-----------
> >
> >
> http://www.igi-global.com/journal/international-journal-distance-education-technologies/1078
> >
> > We are glad to announce the publication of Vol. 13, No. 1 of
> International
> > Journal of Distance Education Technologies (IJDET, an EI
> > journal). In this issue, SIX papers are included:
> >
> >
> > Architecture for an Adaptive and Intelligent Tutoring System that
> > Considers the Learner's Multiple Intelligences (pages 1-21)
> > Mohamed Hafidi, Taher Bensebaa
> > The majority of adaptive and intelligent tutoring systems (AITS) are
> > dedicated to a specific domain, allowing them to offer accurate
> > models of the domain and the learner. The analysis produced from traces
> > left by the users is didactically very precise and specific
> > to the domain in question. It allows one to guide the learner in case of
> > difficulty and to offer her/him some support. This paper's
> > objective was to develop an (AITS), adapted for letting the learners work
> > in several disciplinary fields of the University of the
> > Annaba. In this context, its constraint is threefold: to represent
> > knowledge relative to several disciplinary domains, to propose
> > interactive activities to the learners based on multiple intelligences,
> > and finally, to be able to support student guidance in
> > her/his course by proposing her/him relevant support activities when
> > she/he meets difficulties. The proposed system covers all
> > important properties such as hypertext component, adaptive sequencing,
> > problem-solving support, intelligent solution analysis and
> > adaptive presentation while available systems have only some of them.
> > DOI: 10.4018/ijdet.2015010101
> >
> >
> > A Review of Personalised E-Learning: Towards Supporting Learner Diversity
> > (pages 22-47)
> > Eileen O'Donnell, Seamus Lawless, Mary Sharp, Vincent P. Wade
> > The realisation of personalised e-learning to suit an individual
> learner's
> > diverse learning needs is a concept which has been
> > explored for decades, at great expense, but is still not achievable by
> > non-technical authors. This research reviews the area of
> > personalised e-learning and notes some of the technological challenges
> > which developers may encounter in creating authoring tools
> > for personalised e-learning and some of the pedagogical challenges which
> > authors may encounter when creating personalised e-learning
> > activities to enhance the learning experience of their students. At
> > present educators who wish to create personalised e-learning
> > activities require the assistance of technical experts who are
> > knowledgeable in the area. Even with the help of an expert the
> > creation of personalised e-learning activities still remains a complex
> > process to authors who are new to the concept of tailoring
> > e-learning to suit learner diversity. Before the successful utilisation
> of
> > adaptive authoring tools can be realised, academic
> > authors need to learn how to effectively use these tools. All learners
> > come to education with a diverse set of characteristics;
> > educators need to decide which learner characteristic(s) they wish to
> > focus on addressing through the use of personalised e-learning
> > activities. Further investigation, evaluation and analyses of authoring
> > tools is required before personalised e-learning to support
> > learner diversity can be achieved by many academics. Research members of
> > the AMAS (2013) project team are currently involved in
> > developing an authoring tool for adaptive activities for e-learning.
> > DOI: 10.4018/ijdet.2015010102
> >
> >
> > Investigating Faculty Members' Beliefs about Distance Education: The Case
> > of Sultan Qaboos University, Oman (pages 48-69)
> > Naifa Eid Saleem, Mohammed Nasser Al-Suqri
> > This research paper aims to investigate the beliefs (perceptions) about
> > distance education(DE) held by the faculty members of Sultan
> > Qaboos Uuniversity (SQU) at the Sultanate of Oman as well as the
> > differences between their beliefs (perceptions) with regards to
> > gender, teaching experience, college academic rank, nationality, etc.
> This
> > study used a questionnaire as a method of data
> > collection. Findings of the study indicated statistically significant
> > difference in terms of gender. Results show that female
> > faculty members hold positive beliefs (perceptions) about the use of DE
> in
> > learning and teaching whereas compared to their male
> > colleagues. With regards to nationality, the study found statistically
> > slight differences, wherein the Omani faculty members yielded
> > higher scores on the positive statements and lower at the negative
> > statements.
> > DOI: 10.4018/ijdet.2015010103
> >
> >
> > Cross-Sectional Evaluation of Distance Education Students' Learning
> Styles
> > and Critical Thinking Dispositions in Turkey (pages
> > 70-86)
> > Ismail Yuksel, Ercument Turkses
> > This study aims to examine distance education students' learning styles
> > and critical thinking dispositions. This cross sectional
> > survey was conducted on 114 Turkish distance education students from
> > various departments in a state university. The data of the
> > study were collected through Grasha-Riechmann Student Learning Style
> Scale
> > (GRSLSS) and California Critical Thinking Disposition
> > Inventory (CCTDI). Cronbach Alpha coefficiencies of the scales were .76
> > for GRSLSS and .79 for CCTDI. To analyze the data,
> > descriptive statistics (frequencies, percentages, means and standard
> > deviations), t-test and one-way analysis of variance tests were
> > used. The results indicated that the dependent learning style was the
> most
> > preferred style and the avoidant learning style was the
> > least preferred style. The further analysis regarding learning style
> > indicated that female students perceived themselves more
> > dependent than male students. The results also indicated that students in
> > teacher training programs scored higher in independent and
> > avoidant sub-scales, while students in arts and sciences programs scored
> > higher in dependent, collaborative, competitive and
> > participant sub-scales. The results manifested that students' critical
> > thinking dispositions were at a low level, and they mostly
> > had analyticity and open-mindedness dispositions. Female students were
> > found to have more critical thinking dispositions than male
> > students.
> > DOI: 10.4018/ijdet.2015010104
> >
> >
> > Effects of the Digital Game-Development Approach on Elementary School
> > Students' Learning Motivation, Problem Solving, and Learning
> > Achievement (pages 87-102)
> > Hui-Chun Chu, Chun-Ming Hung
> > In this study, the game-based development approach is proposed for
> > improving the learning motivation, problem solving skills, and
> > learning achievement of students. An experiment was conducted on a
> > learning activity of an elementary school science course to
> > evaluate the performance of the proposed approach. A total of 59 sixth
> > graders from two classes of the elementary school
> > participated in the experiment. One class of 30 students was selected as
> > the experimental group, and the other class of 29 students
> > was the control group. From the experimental results, it was found that
> > the proposed game development-based learning approach could
> > effectively promote the students' problem-solving skills. However, the
> > students' learning achievement and motivations were quite
> > different from our expectations. A discussion of the experimental group
> > interview data is provided and suggestions made.
> > DOI: 10.4018/ijdet.2015010105
> >
> >
> > The MORPG-based Learning System for Multiple Courses: A Case Study on
> > Computer Science Curriculum (pages 103-123)
> > Kuo-Yu Liu
> > This study aimed at developing a Multiplayer Online Role Playing
> > Game-based (MORPG) Learning system which enabled instructors to
> > construct a game scenario and manage sharable and reusable learning
> > content for multiple courses. It used the curriculum of
> > ?Introduction to Computer Science? as a study case to assess students'
> > learning effectiveness on the subject of ?computer
> >  network?. The sample was 56 freshman students, who were randomly
> assigned
> > to two groups, one of which used the game-based learning
> > and the other one the Web-based video lectures. Furthermore, this study
> > also conducted the System Usability Scale (SUS) to measure
> > satisfaction, usability and learnability of the developed management
> > system for instructors. Five instructors were invited to
> > participate in the practical use and evaluation. The results showed that
> > game-based learning could be exploited as effective
> > learning environments and game design system was usable and learnable for
> > instructors to create learning games.
> > DOI: 10.4018/ijdet.2015010106
> >
> >
> >
> > ------- General Call for Papers for IJDET (an EI journal)-----------
> > The electronic version of this cfp can be seen at
> > http://maiga.athabascau.ca/editors/IJDET-Call_for_Papers-General.pdf
> >
> >
> > International Journal of Distance Education Technologies (IJDET)
> > (
> >
> http://www.igi-global.com/journal/international-journal-distance-education-technologies/1078
> > )
> >
> > The International Journal of Distance Education Technologies (IJDET) is
> > a forum for researchers and practitioners to disseminate practical
> > solutions
> > to the automation of open and distance learning. Targeted to academic
> > researchers and engineers who work with distance learning programs and
> > software systems, as well as general users of distance education
> > technologies
> > and methods, IJDET discusses computational methods, algorithms,
> > implemented prototype systems, and applications of open and distance
> > learning.
> > All manuscripts submitted to the journal are peer-reviewed according to
> > the procedure consisting of initial review, peer review, and
> recommendation
> >
> > Editor in Chief:
> > Dr. Maiga Chang (maiga.chang at gmail.com)
> >
> >
> > Indices:
> > Compendex (Elsevier EI), DBLP, EBSCOhost, ERIC, Google Scholar,
> > INSPEC, PsycINFOR, SCOPUS, and many others
> >
> >
> > Suggested topics:
> > IJDET is an EI journal and the scope of the journal includes, but is not
> > limited to:
> > - Assessment
> > - Distance Learning for Culture and Arts
> > - Intelligent and Adaptive Learning
> > - Intelligent Agents and Multi-Agent Systems
> > - Mobile Learning
> > - Nurse Medical Healthcare
> > - Pedagogical Issues
> > - Social Learning
> > - Serious Games for Distance Education
> > - Science, Technology, Engineering, and Math (STEM) Education
> > - Technology Enhanced Learning
> > - Ubiquitous Learning
> > - Virtual Worlds for Distance Education
> >
> >
> > Interested in serving IJDET as a reviewer?
> > Please note that as a reviewer of IJDET, you are expected to review
> > FOUR manuscripts a year within FOUR weeks and you will be removed
> > from the reviewer list if you couldn't finish assigned reviews in a
> > timely manner or you can not review four manuscripts a year for IJDET).
> >
> > You can quit for being a reviewer at any time you want, just send
> > an email to the editor in chief and he or she will help you remove
> > your name from the reviewer list.
> >
> > You would be invited to become international review editorial board
> members
> > if you could maintain high quality reviews in a timely manner for
> > at least two years.
> >
> > If you are interested in serving IJDET as a reviewer, please send your CV
> > to the editor in chief, Dr. Maiga Chang (maiga.chang at gmail.com).
> >
> >
> > Manuscript guidelines:
> > At this moment we have not moved to the publisher's online
> > submission system yet (we plan to move to the publisher's system later),
> > please go to http://www.ijdet.com to submit your manuscript.
> >
> > Please note that you need to follow the manuscript template and
> > author guidelines to prepare your manuscript before submit it.
> > The links of the manuscript template in DOC format and the author
> > guidelines and the instructional video can be found on the main page
> > of the website (http://www.ijdet.com). Please remember to check
> > "Author" role while registering your account.
> >
> > All submissions have to follow IJDET manuscript guidelines at
> >
> >
> http://www.igi-global.com/publish/resources/journal-organization-and-formatting.pdf
> > http://www.igi-global.com/journals/guidelines-for-submission.aspx
> > should be submitted online at http://www.ijdet.com/ after registering an
> > account.
> >
> >
> > Special Issue proposals:
> > We also encourage potential research in any fields related to the journal
> > to form a high quality guest editorial team to submit special issue
> > proposal
> > online, for any emerging, important, and hot topics. Please submit your
> > special issue proposal online as a manuscript and choose
> > "[Special Issue Proposal]" as its Section
> >
> > The special issue proposal sample can be downloaded at
> >
> http://maiga.athabascau.ca/editors/IJDET-Special_Issue_Proposal_Sample.doc
> >
> >
> > For queries, please contact Dr. Maiga Chang (maiga.chang at gmail.com)
> > ------------------------------------
> >
> >
> >
> > Sincerely,
> >
> > Maiga Chang
> > maiga.chang at gmail.com
> > http://maiga.athabascau.ca
> > 02, 08 '15
> >
> > ---------------------------------
> > Editor-in-Chief, International Journal of Distance Education Technologies
> > (EI)
> > http://www.ijdet.com
> >
> > Associate Editor, IEEE Technology and Engineering Education
> > Associate Editor, International Journal of Online Pedagogy and Course
> > Design
> >
> > Smart Learning Environments, Springer
> >
> >
> http://www.springer.com/education+%26+language/learning+%26+instruction/book/978-3-662-44446-7
> >
> > -----------
> > Program Chair of IASLE International Conference on Smart Learning
> Systems,
> > Sinaia, Romania, September 23-25, 2015
> > http://ask4research.info/icsle/2015/
> >
> > Track Program Chair of Track "Digital Game and Intelligent Toy Enhanced
> > Learning"
> > in 15th IEEE International Conference on Advanced Learning Technologies
> > 2015
> > http://www.ask4research.info/icalt/2015/
> >
> > Co-chair of GCCCE 2015 sub-conference on Joyful Learning and Society
> > http://www.gcsce.org/gccce2015/doc/C3_e.html
> >
> > -----------
> > Guest Editor, The Scientific World Journal
> > Special Issue on "Recent Advances in Mobile Learning Technologies,
> > Applications, and Evaluation.
> > http://www.hindawi.com/journals/tswj/si/178386/cfp/
> >
> > Guest Editor, Mathematical Problems in Engineering (SCI)
> > Special Issue on Information Management and Applications of Intelligent
> > Transportation System
> > http://www.hindawi.com/journals/mpe/si/241739/cfp/
> >
> > Guest Editor, Multimedia Tools and Applications (SCI)
> > Special Issue on Emergence of Web Data Analysis in Pervasive Multimedia
> > Environment
> > http://maiga.athabascau.ca/editors/MTAP_SI.pdf
> >
> > Guest Editor, Research and Practice in Technology Enhanced Learning (free
> > open access)
> > Special Issue on Practical Applications of Mobile and Internet
> Educational
> > Games (Vol. 8, No. 2)
> > http://www.apsce.net/rptel_papers.php?id=1020
> >
> > Guest Editor, International Review of Research in Open and Distance
> > Learning (SSCI)
> > Special Issue on Technology Enhanced Information Retrieval and Processing
> > for Online Learning (Vol. 13, No. 5)
> > http://www.irrodl.org/index.php/irrodl/issue/view/54
> >
> > Guest Editor, International Journal of Distance Education Technologies
> (EI)
> > Special Issue on Emotional Intelligence for Online Learning (Vol. 11, No.
> > 2)
> >
> >
> http://www.igi-global.com/journal/international-journal-distance-education-technologies/1078#contents
> >
> > ---------
> > School of Computing and Information Systems (http://scis.athabascau.ca/)
> > Athabasca University
> >
> > 1200, 10011-109 Street
> > Edmonton, T5J-3S8
> > AB, Canada
> >
> > ---------------
> > Phone: +1-866-916-8646
> > Website: http://maiga.dnsalias.org and http://maiga.athabascau.ca
> > CV: http://scis.athabascau.ca/scis/staff/faculty.jsp?id=maigac
> >
> > Leave me an Audio/Video message with JoinNet (required to install in
> > Microsoft Windows OS first)
> > http://meeting.athabascau.ca/gotomeeting.php?u=5&c=visit
> > JoinNet software: http://www.homemeeting.com/en_US/download_joinnet.html
> >
> >
> >
> >
> > ------------------------------
> >
> > Message: 12
> > Date: Sun, 8 Feb 2015 14:06:13 +0000
> > From: Nabeel Al-Qirim <Nalqirim at uaeu.ac.ae>
> > To: "aisworld at lists.aisnet.org" <aisworld at lists.aisnet.org>
> > Subject: [AISWorld] CF STUDENT POSTERS for Innovations'15 (No
> >         registration fees), Dubai, November 01-03, 2015
> > Message-ID:
> >         <
> 613A9065892D6441AC7E1D2FE4E16EA147BD7AB0 at PEXMBOX20101.uaeu.ac.ae>
> > Content-Type: text/plain; charset="windows-1256"
> >
> > CF STUDENT POSTERS for Innovations'15 (No registration fees), Dubai,
> > November 01-03, 2015
> >
> > IIT?15: The 11th International Conference on Innovations in Information
> > Technology 2015
> >
> > URL: http://www.it-innovations.ae/iit2015/posters.html
> >
> >
> > The IIT?15 Student Poster and Demos Committee invites all undergraduate
> > and graduate students to submit an extended (2 pages max.) abstract and
> to
> > display it as a poster during the IIT?15. The poster topic should fall
> > within the conference?s theme and tracks.
> >
> > SUBMISSION
> >
> > Extended abstracts should be sent to Dr. Nabeel Al-Qirim at
> > nalqirim at uaeu.ac.ae. All students are encouraged to review their
> > abstracts with their faculty advisers prior to submission. All accepted
> > abstracts will be published by the IIT?15 proceedings.
> >
> > IMPORTANT DATES
> >
> > -Student Poster (Extended Paper) Submission May 30, 2015
> > -Notification of Student Poster acceptance July 15, 2015
> > -Camera ready Extended Paper and Poster material September 01, 2015
> > -Conference November 01-03, 2015
> >
> > BEST STUDENT POSTER AWARDS
> >
> > There will be a competition for best student poster award at the IIT?15.
> > This award will be given to recognize student excellence in research and
> > presentation.
> >
> > CONTACT
> > Queries should be directed to: Dr. Nabeel Al-Qirim at
> nalqirim at uaeu.ac.ae
> >
> > Thanks,
> >
> > Dr. Nabeel Al-Qirim
> > IIT?15 Student Poster and Demos Chair
> >
> > College of Information Technology
> > United Arab Emirates University
> > P.O Box 15551 - Al Ain
> > United Arab Emirates
> >
> > Tel: +971-3-7135531        Mobile: +971-507308705
> > Fax: +971-3-7672018       Email: nalqirim at uaeu.ac.ae
> > Website: http://nalqirim.wix.com/nabeel-al-qirim
> > ________________________________
> >
> >
> > Disclaimer: This email and the file(s) attached shall remain confidential
> > and is intended for the receivers use only. If you are not the intended
> > receiver or if you have received this email by mistake, please advise the
> > sender and delete the email along with its attachment(s) from your system
> > immediately. You do not have the right to copy/print/distribute this
> email
> > or attached file(s), or to release its contents to any other party other
> > than the intended receivers whatsoever; except if you take prior written
> > approval from the sender. If you violate the above, you will be legally
> > held accountable.
> >
> >
> >
> > ------------------------------
> >
> > Message: 13
> > Date: Sun, 8 Feb 2015 14:22:08 +0000
> > From: Nabeel Al-Qirim <Nalqirim at uaeu.ac.ae>
> > To: "aisworld at lists.aisnet.org" <aisworld at lists.aisnet.org>
> > Subject: [AISWorld] The 5th International Conference on Current and
> >         Future Trends of ICT in Healthcare September 27-30, Berlin
> > Message-ID:
> >         <
> 613A9065892D6441AC7E1D2FE4E16EA147BD7B97 at PEXMBOX20101.uaeu.ac.ae>
> > Content-Type: text/plain; charset="iso-8859-1"
> >
> > ----The 5th International Conference on Current and Future Trends of ICT
> > in Healthcare September 27-30, Berlin---
> >
> > The 5th International Conference on Current and Future Trends of
> > Information and Communication Technologies in Healthcare
> > September 27-30, 2015
> > Berlin, Germany
> > http://icth-15.dai-labor.de/
> >
> > Important Dates
> > ------------------
> > - Workshop Proposals: February 15, 2015
> > - Paper Submission Due: May 6, 2015
> > - Acceptance Notification: June 26, 2015
> > - Final Manuscript Due: July 26, 2015
> >
> > The 5th International Conference on Current and Future Trends of
> > Information and Communication Technologies in Healthcare (ICTH) is a
> > premier venue for bringing together multi-disciplinary researchers,
> > professionals and practitioners from academia and healthcare who are
> > engaged in different facets of ICT and healthcare. The conference
> > encourages innovative research contributions providing the recent
> > significant developments and promising future trends of ICT based
> > applications, systems, tools, environments and infrastructures in the
> > fields of health/medical care, and related domains, such as public health
> > and pharmaceuticals. Papers on either completed or ongoing research are
> > invited in the following and related topics of interests.
> > ICTH-2015 will be held in conjunction with the 6th International
> > Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN:
> > http://euspn-15.dai-labor.de/).
> > Accepted papers will be published by Elsevier Science in the open-access
> > Procedia Computer Science series (on-line). Procedia Computer Sciences is
> > hosted on www.Elsevier.com and on the Elsevier content platform
> > ScienceDirect (www.sciencedirect.com), and will be freely available
> > worldwide. All papers in Procedia will also be indexed by Thomson
> Reuters'
> > Conference Proceeding Citation Index
> > http://thomsonreuters.com/conference-proceedings-citation-index/. The
> > papers will contain linked references, XML versions and citable DOI
> > numbers. All accepted papers will also be indexed in DBLP (
> > http://dblp.uni-trier.de/). Selected papers will be invited for
> > publication in a special issue of an international journal.
> > We invite submissions on either completed or ongoing work. Submitted
> > papers must be no longer than 8 pages for full papers, 5 pages for short
> > papers and 4 pages for work in progress, including all figures, tables
> and
> > references. We encourage students to submit short papers or works in
> > progress, and welcome proposals on workshops in areas of special interest
> > to participants.
> > Topics of interest include, but are not limited to:
> > ------------------------------------------------------
> > - Ambient Assisted Living for Elderly Care
> > - Ambient Intelligence and Intelligent Service Systems
> > - Analysis and Evaluation of Healthcare Systems
> > - Clinical Data and Knowledge Management
> > - Cloud Computing for Healthcare
> > - Collaboration Technologies for Healthcare
> > - Context-aware Applications for Patient Monitoring and Care
> > - Data mining Techniques and Data Warehouses in Healthcare
> > - Data Visualization
> > - Decision Support Systems in Healthcare
> > - Drug Information Systems
> > - Design and Development Methodologies for Healthcare Systems
> > - Diagnostic and Therapeutic Technologies in Healthcare
> > - Digital Hospitals
> > - E-health & m-health
> > - Electronic Health Records (EHR) & Personal Health Records (PHR)
> > - Evidence Based Medicine (EBM)
> > - Healthgrids
> > - Health Portals
> > - Information and Knowledge Processing in Healthcare Environments
> > - Middleware Support for Smart Homes and Intelligent Applications
> > - Privacy, Confidentiality and Security Issues in Healthcare Systems
> > - Related Real World Experimentations and Case Studies in Healthcare
> > - RFID Solutions for Healthcare
> > - Smart Homes and Home Care Intelligent Environments
> > - Telemedicine and Health Telematics
> > - Ubiquitous and Pervasive Computing in Healthcare
> > - Usability & Socio Technical studies
> > - User Interface Design for Healthcare Applications
> > - Virtual and Augmented Reality in Healthcare
> > - Virtual Environments for Healthcare
> > Committees
> > -------------
> > Steering Committee Chair
> > Elhadi Shakshuki, Acadia University, Canada
> > Honorary Chair
> > Sahin Albayrak, DAI-Lab, TU Berlin, Germany
> >
> > General Chairs
> > Ellen Jaatun, Institute of Cancer Research and Molecular Medicine, NTNU,
> > St. Olvas Hospital, Norway
> > Syed Sibte Raza Abidi, Dalhousie University, Nova Scotia
> >
> > Advisory Committee
> > Sergio Camorlinga, Head eHealth Research, TRLabs, Canda
> > Kevin Daimi, University of Detroit Mercy, USA
> > Finn Kensing, University of Copenhagen, Denmark
> > Francesco Princiroli, Politecnico di Milano, Italy
> > Abdul Roudsari, University of Victoria, Canada
> >
> > Workshop Chair
> > Zahoor Khan, Higher Colleges of Technology, UA
> > Local Arrangements Members
> > Jan Keiser, DAI-Lab, TU Berlin, Germany
> > Fikret Sivrikaya, German-Turkish Advanced ICT Research Centre, Germany
> > Johannes F?hndrich, TU Berlin, Germany
> >
> > Publicity Chairs
> > Christian Kuster, German-Turkish Advanced ICT Research Centre, Germany
> > Samir Ouchani, University of Luxembourg, Luxembourg
> > Nabeel Al-Qirim, College of Information Technology, UAE
> > ________________________________
> >
> >
> > Disclaimer: This email and the file(s) attached shall remain confidential
> > and is intended for the receivers use only. If you are not the intended
> > receiver or if you have received this email by mistake, please advise the
> > sender and delete the email along with its attachment(s) from your system
> > immediately. You do not have the right to copy/print/distribute this
> email
> > or attached file(s), or to release its contents to any other party other
> > than the intended receivers whatsoever; except if you take prior written
> > approval from the sender. If you violate the above, you will be legally
> > held accountable.
> >
> >
> >
> > ------------------------------
> >
> > Message: 14
> > Date: Sun, 8 Feb 2015 14:25:39 +0000
> > From: Nabeel Al-Qirim <Nalqirim at uaeu.ac.ae>
> > To: "aisworld at lists.aisnet.org" <aisworld at lists.aisnet.org>
> > Subject: [AISWorld] CFW: The 5th International Conference on Current
> >         and Future Trends of ICT in Healthcare 27-30 September, Berlin
> > Message-ID:
> >         <
> 613A9065892D6441AC7E1D2FE4E16EA147BD7BA6 at PEXMBOX20101.uaeu.ac.ae>
> > Content-Type: text/plain; charset="us-ascii"
> >
> >        *** Apologies if you receive multiple copies of this message ***
> >
> > -----------------     Call for Workshops Proposals
> >  ------------------------
> >      The 5th International Conference on Current and Future Trends
> >        of Information and Communication Technologies in
> >                      Healthcare (ICTH)
> >        27-30 September, 2015
> >            Berlin, Germany
> >        http://icth-15.dai-labor.de/
> >
> >
> -------------------------------------------------------------------------------
> > Important Dates
> > ===============
> > - Workshop Proposal Due:    February 25, 2015
> > - Acceptance Notification: March 1, 2015
> >
> > The ICTH-2015 organizing committee invites proposals for workshops. The
> > main
> > objective of the workshops is to provide a forum for researchers and
> > professionals to discuss a specific topic from the field of ICTH-2015 and
> > its
> > related areas.
> >
> > All papers accepted for workshops will be included in the ICTH-2015
> > proceedings, which will be published by Elsevier. The authors must follow
> > Elsevier guidelines as given in ICTH-2015 Website. The selective
> > outstanding
> > papers presented at the workshops, after further revision, will be
> > considered
> > for publication in journals special issues.
> > Proposal Format
> > ===============
> > - Title of the workshop
> > - Workshop Website: tentative address, or old address (if applicable)
> > - Draft Call for paper of the workshop
> > - Tentative list of TPC members
> > Workshops Chair
> > ===============
> > Dr. Zahoor Khan, Higher Colleges of Technology, UAE
> > Email: zahoor.khan at hct.ac.ae
> > ________________________________
> >
> >
> > Disclaimer: This email and the file(s) attached shall remain confidential
> > and is intended for the receivers use only. If you are not the intended
> > receiver or if you have received this email by mistake, please advise the
> > sender and delete the email along with its attachment(s) from your system
> > immediately. You do not have the right to copy/print/distribute this
> email
> > or attached file(s), or to release its contents to any other party other
> > than the intended receivers whatsoever; except if you take prior written
> > approval from the sender. If you violate the above, you will be legally
> > held accountable.
> >
> >
> >
> > ------------------------------
> >
> > Message: 15
> > Date: Sun, 8 Feb 2015 09:30:25 -0500
> > From: John Artz <jartz at gwu.edu>
> > To: Jeet Gupta <guptaj at uah.edu>
> > Cc: "aisworld at lists.aisnet.org" <aisworld at lists.aisnet.org>,
> >         "Galliers,      Robert" <rgalliers at bentley.edu>
> > Subject: Re: [AISWorld] What is IS strategy and how to prepare
> >         strategic IS    plans
> > Message-ID:
> >         <CAOWvAbt5LHiZbBruo2-pbk3QYsGppuUL7Ct=
> > e60fe56ZZrAudQ at mail.gmail.com>
> > Content-Type: text/plain; charset="utf-8"
> >
> > Jeet,
> >
> > I begin with the premise that strategy is a plan to solve a problem.
> While
> > this is not universally agreed upon, it mainstream enough. The problems
> in
> > marketing or operations are a little easier to understand as the problems
> > in IS/IT are all over the map. They can range from infrastructural, to
> HR,
> > to cost overruns, to lack of innovation, to failure to adapt to rapidly
> > changing technologies, etc. etc. This list is by no means complete, as
> they
> > are just examples. Nonetheless, a good way to approach IS/IT strategy is
> to
> > look at the range of problems, pick one or two, attempt to come up with
> > strategies to solve them and then just apply vanilla business strategy.
> >
> > I hope this helps,
> >
> > John
> >
> >
> >
> >
> > *John M. Artz, PhDWebpages: http://home.gwu.edu/~jartz
> > <http://home.gwu.edu/%7Ejartz>Email: jartz at gwu.edu <jartz at gwu.edu>*
> > *Character is Destiny - Heraclitus*
> > <http://www.brainyquote.com/quotes/authors/h/heraclitus.html>
> >
> > On Sat, Feb 7, 2015 at 11:41 PM, Jeet Gupta <guptaj at uah.edu> wrote:
> >
> > > Hello Bob
> > >
> > >
> > >
> > > I am back to with the same questions I had last year when you said you
> > > will provide me with some thoughts.  My questions are:
> > >
> > >
> > >
> > > What is an IS/T strategy?  How does one prepare strategic IS plans in
> an
> > > organization?
> > >
> > >
> > >
> > > Also, in a 150-minute class session of MS level IS students, what will
> > you
> > > teach for the subject of IS/T strategy?  I am having a difficult time
> > > planning this session since a student asked me the question: What is
> IS/T
> > > strategy?  After thinking about it more than a year, I still do not
> have
> > > answered even though I have taught this course for a long time.  I
> could
> > > talk about SIS, what is done in IS from a strategic level, how could we
> > use
> > > IS/T for competitive advantage or even IT governance.  But what is IS/T
> > > strategy? How do we prepare strategic IS plans>
> > >
> > >
> > >
> > > I know I can define the Operations or the Marketing Strategy.  How
> about
> > > IS/T strategy?  What is the relationship with Digital Business
> Strategy?
> > >
> > >
> > >
> > > Any thoughts?  Any copies of papers and/or slides will be helpful and
> > > appreciated.
> > >
> > >
> > >
> > >
> > >
> > >
> > >
> > > Best regards,
> > >
> > >
> > >
> > > _________________________________________________________________
> > > Jatinder (Jeet) N. D. Gupta, PhD, CFPIM
> > >
> > > Associate Dean for Graduate and Sponsored Programs
> > >
> > > Director of Integrated Enterprise Lab
> > > Eminent Scholar and Professor
> > > College of Business Administration
> > > The University of Alabama in Huntsville
> > > 301 Sparkman Drive
> > > Huntsville, AL 35899
> > > Phone: 256-824-6593 (office)
> > >            256-288-0150 (home)
> > > FAX:    256-824-4712
> > > E-mail: guptaj at uah.edu
> > >
> > > _______________________________________________
> > > AISWorld mailing list
> > > AISWorld at lists.aisnet.org
> > >
> > -------------- next part --------------
> > An HTML attachment was scrubbed...
> > URL: <
> >
> http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20150208/e04f8c55/attachment-0001.html
> > >
> >
> > ------------------------------
> >
> > Subject: Digest Footer
> >
> > _______________________________________________
> > AISWorld mailing list
> > AISWorld at lists.aisnet.org
> >
> > ------------------------------
> >
> > End of AISWorld Digest, Vol 979, Issue 1
> > ****************************************
> >
>
>
>
> --
>
> Cheers,
>
> Atilla Elci, PhD.
>
> http://www.computer.org/portal/web/COMPSAC/COMPSAC-WEDA
>
> *http://www.sinconf.org/ <http://www.sinconf.org/sin2014/index.php/keynote
> >*
>
> http://member.acm.org/~aelci
>
> http://aksaray.academia.edu/AtillaEl%C3%A7i
>
> http://lnkd.in/i4RAxn
>
> http://eem.aksaray.edu.tr/
>
> PS: nemo judex in sua causa
> -------------- next part --------------
> An HTML attachment was scrubbed...
> URL: <
> http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20150209/39983976/attachment-0001.html
> >
> -------------- next part --------------
> [Apologies for cross postings.  Please circulate to colleagues and
> prospective interested parties.]
>
> CALL FOR CONTRIBUTIONS
> ======================
>
> 8th International Conference on Security of Information and Networks (SIN
> 2015)
> 8-10 September 2015
> Sochi, Russia
>
> www.sinconf.org
>
> In Technical Cooperation with ACM Special Interest Group on Security,
> Audit and Control (SIGSAC)
> -------------------------
> Proceedings by ACM Press; all papers will be inserted into the ACM Digital
> Library.
> -------------------------
>
> In succession to the successful SIN 2007 - SIN 2014, the 8th International
> Conference on Security of Information and Networks (SIN 2015) provides an
> international forum for presentation of research and applications of
> security in information and networks. SIN 2015 conference features
> contributed as well as invited papers, special sessions, workshops, and
> tutorials on theory and practice.
>
> SIN 2015 will feature the following keynote papers and talks:
> TBA
>
> Future SIN Conferences are scheduled to take place in the USA (2016) and
> Australia (2017).
>
> PROPOSALS
> ==================
>
> Papers, special sessions, tutorials, and workshops addressing all aspects
> of security in information and networks are being sought. Researchers and
> industrial practitioners working on the following and related subjects are
> especially encouraged: development and realization of cryptographic
> solutions, security schemes, new algorithms; critical analysis of existing
> approaches; secure information systems, especially distributed control and
> processing applications, and security in networks; interoperability,
> service levels and quality issues in such systems; information assurance,
> security, and public policy; detection and prevention of cybercrimes such
> as fraud and phishing; next generation network architectures, protocols,
> systems and applications; industrial experiences and challenges of the
> above. Doctoral students are encouraged to propose papers on ongoing
> research.
>
> Original papers will be considered; submissions must not substantially
> duplicate work that any of the authors has published elsewhere or has
> submitted in parallel to any other conference or workshop that has
> proceedings. All submitted papers will be reviewed by at least three
> members of the program committee judging its originality, significance,
> correctness, presentation and relevance. Authors are also encouraged to
> propose position papers on practical studies and experiments, critique of
> existing work, emerging issues, and novel ideas under development.
>
> Enterprises and research centers developing, implementing, or using
> security tools and frameworks are encouraged to propose application / tool
> demo.
>
> Proposals of half-day tutorials on fundamental to advanced subjects
> covering practical implementation aspects of security are welcome.
>
> Proposals of special session(s) to be held in the main conference are
> welcome.
>
> Proposals are invited for workshops to be held in conjunction with SIN
> 2015 Conference. The workshop proposal theme should be closely related to
> the conference topics.
>
> Broad areas of interest in security theory, technology and applications
> will include, but are not limited to, the following:
>
> * Access control and intrusion detection
> * Security of cyber-physical systems
> * Autonomous and adaptive security
> * Security tools and development platforms
> * Computational intelligence techniques in security
> * Security ontology, models, protocols & policies
> * Computer network defense
> * Standards, guidelines and certification
> * Cryptographic techniques and key management
> * Security-aware software engineering
> * Industrial applications of security
> * Trust and privacy
> * Information assurance
> * Next generation network architectures
> * Malware analysis
> * Network security and protocols
> * Security challenges in Mobile/Embedded Systems
> * Cloud security
>
> SUBMISSION OF PROPOSALS
> =======================
>
> Papers must be submitted electronically via the SIN 2015 Submission Site
> at https://cmt.research.microsoft.com/SIN2015/. Title, author's name(s),
> affiliation, mailing address, telephone, fax and email of the principal
> author should be included. Maximum length for the proceedings is 8 pages
> for full paper, 4 pages for short paper, 2 pages for fast abstract and
> position statement, and 2 pages for demo and tutorial proposals.?Extra page
> charges apply. All papers should be written according to double-column ACM
> conference format (
> http://www.acm.org/sigs/publications/proceedings-templates).
>
> All proposals for organizing workshops, tutorials, demos, and special
> sessions are expected at the conference e-mail sin2015 at sinconf.org.
>
> All accepted papers will be published by ACM Press in a conference
> proceedings and placed into ACM Digital Library. Extended versions of
> selected papers will be invited for possible publication in a special issue
> of an archival journal (TBA). Each accepted paper must be registered to be
> included in the proceedings. Papers not presented during the conference may
> be removed from the online proceedings.
>
> IMPORTANT DATES
> ===============
>
> Please consult www.sinconf.org site for the most up-to-date info on the
> following:
>
> Workshop / Special Session Proposals: 1 March 2015
> Paper Submission by: 20 April 2015
> Tutorial Proposal by: 10 May 2015
> Tutorial Notification: 20 May 2015
> All Author Notification: 17 May 2015
> All Papers Camera Ready by:  1 June 2015
> Author Registration due date: 1 June 2015
> Tutorial Date: 7 September 2015
> Conference Dates: 8?10 September 2015
> Workshops Date: 10 September 2015
>
> ORGANIZATION & SPONSORS
> =======================
>
> Organized by
> ------------
> - Southern Federal University, Taganrog, Rostov-on-Don, Russia
> - The University of Glasgow, Glasgow, UK
> - Aksaray University, Aksaray, Turkey
> - Malaviya National Institute of Technology, Jaipur, India
> - Macquarie University, Sydney, Australia
>
> Supported by
> ------------
> Southern Federal University, Russia (pending)
> Russian Foundation for Basic Research (pending)
>
> Sponsored by
> ------------
> TBA
>
> Hosted by
> ---------
> Department of Security of Information Technologies and South-Russian
> Regional Scientific-Educational Center for Information Security Problems,
> Southern Federal University, Taganrog, Rostov-on-Don, Russia
>
> ORGANIZATION COMMITTEE
> =====================
>
> Honorary Chair: Marina Borovskaya, Rector of Southern Federal University,
> Russia
>
> Conference Chair: Oleg Makarevich, Southern Federal University, Russia
> Conference Co-Chair: Ron Poet, University of Glasgow, UK
> Conference Co-Chair: Atilla Elci, Aksaray University, Turkey
> Conference Co-Chair: Manoj Singh Gaur, Malaviya National Institute of
> Technology, India
> Conference Co-Chair: Mehmet Orgun, Macquarie University, Australia
>
> Program Chair: Ludmila Babenko, Southern Federal University, Russia
> Program Co-Chair: Sadek Ferdous, University of Glasgow, UK
> Program Co-Chair: Anthony T.S. Ho, University of Surrey, UK
> Program Co-Chair: Vijay Laxmi, Malaviya National Institute of Technology,
> India
> Program Co-Chair: Josef Pieprzyk, Queensland University of Technology,
> Australia
>
> Tutorials Chair: Evgeny Abramov, Southern Federal University, Russia
> Tutorials Co-Chair: Hani Aljahdali, University of Glasgow, UK
> Tutorials Co-Chair: Behnam Rahnama, Okan University, Turkey
> Tutorials Co-Chair: Chhagan Lal, SKIT, India
>
> Workshops Chair: Peter Zegzhda, Saint-Petersburg State Polytechnical
> University, Russia
> Workshops Co-Chair: Maria Evangelopoulou, University of Glasgow, UK
> Workshops Co-Chair: Hossain Shahriar, Kennesaw State University, USA
> Workshops Co-Chair: Chhagan Lal, SKIT, India
>
> Publication Chair: Alexander Chefranov, Eastern Mediterranean University,
> North Cyprus
> Publication Co-Chair: Jaideep Vaidya, Rutgers Business School, USA,
>
> Treasurer: Vladimir Strukov, Southern Federal University, Russia
>
> Registration Chair: Olga Peskova, Southern Federal University, Russia
>
> Local Arrangements Chair: Maxim Anikeev, Southern Federal University,
> Russia
>
> e-Presence Chair: Ivan Polovko, Southern Federal University, Russia
> e-Presence Co-Chair: Muhammet Saygin, Mersin University, Silifke
> Vocational School, Turkey
>
> Promotion Chair: Maxim Anikeev, Southern Federal University, Russia
> Promotion Co-Chair: Alexey Nekrasov, Southern Federal University, Russia
> Promotion Co-Chair: Soum Chowdhury, University of Glasgow, UK
> Promotion Co-Chair: Duygu ?elik, Istanbul Aydin University, Turkey
> Promotion Co-Chair: Parvez Faruki, BPTI, Bhavnagar, India
>
> Liaison for South America: Carlos Becker Westphall, Federal University of
> Santa Catarina, Brazil
>
> Logo, certificates & covers designs: Efe Cem El?i, Turkey
>
> Volunteers Team: Nikita Sushkin, Students of IT-Security Department
> (Southern Federal University, Russia)
>
> Advisory Committee Members:
>         Bart Preneel, Katholieke Universiteit Leuven, Belgium
>         B?lent ?rencik, Beykent University, Turkey
>         Cetin Kaya Koc, University of California Santa Barbara, USA
>         Edward Dawson, Queensland University of Technology, Australia
>         Elisa Bertino, Purdue University, USA
>         Gene Spafford, Purdue University, CERIAS, USA
>         N. Balakrishnan, IISc Bangalore, India
>         Willy Susilo, University of Wollongong, Australia
>
> INTERNATIONAL PROGRAM COMMITTEE
> ===============================
>
> Full list of the IPC is available at www.sinconf.org.
>
> GENERAL INQUIRIES
> =================
>
> For updated information, please refer to www.sinconf.org or the
> Conference e-mail sin2015 at sinconf.org.
>
> Dated 2015-01-20.
>
> ------------------------------
>
> Message: 9
> Date: Mon, 9 Feb 2015 14:27:37 +0000
> From: Rachel Daeger <rachel at aisnet.org>
> To: "aisworld at lists.aisnet.org" <aisworld at lists.aisnet.org>
> Subject: [AISWorld] Laboring Online: AIS Journal Club Webinar on Feb.
>         11
> Message-ID:
>         <62C5C19B80E0E9468781C9858B6018172B231886 at NDANT-01.ndadarts.local>
> Content-Type: text/plain; charset="utf-8"
>
>
>
>
> [https://origin.ih.constantcontact.com/fs143/1102108705356/img/380.jpg]
>
>
>
> AIS Journal Club Webinar Series - Spring 2015
>
> Session # 2:
>
> Laboring Online: Are There "New" Labor Processes In Virtual Game Worlds?
>
>
> Register<
> https://attendee.gotowebinar.com/rt/6488832006793066498?source=list>
>
> Wednesday, February 11 at 1 p.m. EST
>
> presented by Anita Greenhill, PhD, University of Manchester and Gordon
> Fletcher, PhD, University of Salford
>
>
>
> Digital Labour Webinar learning objectives:
>
>
>
> To understand contemporary capitalism as the mixture of high-technology
> advances, the concentration of speculative financial capital, and the
> increasing differentiation between those who are better and worse off.
>
>
>
> To illustrate that a pivotal element of contemporary capitalism is an
> appropriation of social activities into the capitalist mode of production
> and the construction of social life as forms of labour. The labour aspects
> of everyday life are hidden and couched as entertainment, leisure, arts and
> crafts as well as artistic endeavours
>
>
>
> To highlight the ways in which social activities enabled through
> technologies - including multiplayer games - are complicit in incorporating
> youth into prevailing economic hegemonies - and at an extreme are training
> youth to become workers in the digital economy.
>
> About the Authors:
>
>
>
> Dr. Anita Greenhill received her PhD from the Engineering & Information
> Technology Faculty, Griffith University in 2002. She also received her
> Bachelor of Arts (Hons) II from the Arts Faculty, Griffith University in
> 1993. Prior to her appointment Anita was employed as a lecturer in
> Information Systems in the Faculty of Management and Commerce, Griffith
> University, and in the Faculty of Computing & Information Technology,
> Griffith University. Anita has over 60 published articles in various fields
> of interest and expertise: Information Systems, Virtual Communities,
> Sociology, Skills acquisition in Information Technology, Gender an
> Information Technology, Information Technology, Policy and Education,
> Qualitative Research Methods.
>
>
>
> Dr. Gordon Fletcher is head of the International Operations and
> Information Management academic unit at Salford Business School. I have
> been at the University of Salford for 12 years researching around all
> aspects of digital culture and business while teaching programming, systems
> development and web design. I am a motivated educator, manager and
> innovator with an eye for the distinctive, inspirational and new. My
> objective is to disseminate and share knowledge to the broadest possible
> audience with the goal of enabling the success of others in a digitally
> rich business and social environment.
>
>
> About AIS:
> AIS Members attend webinars free as a benefit of membership. Members of
> student chapters also receive free registration. Cost to attend as a
> non-member is $25. If you are not an AIS member you will receive an email
> with payment instructions after registering. If you indicated an interest
> in joining, you'll be contacted with membership details.
>
>
> If you have any questions about attending or sponsoring this webinar
> series, please contact Rachel Daeger at rachel at aisnet.org<mailto:
> rachel at aisnet.org>.
>
> Journal Clubs were established more than 150 years ago for professors and
> students to share and discuss current research. Today, this same
> educational exchange can take place worldwide through online webinars.
>
>
>
>
>
>
>
>
>
>
> -------------- next part --------------
> An HTML attachment was scrubbed...
> URL: <
> http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20150209/a16a822e/attachment-0001.html
> >
>
> ------------------------------
>
> Message: 10
> Date: Mon, 9 Feb 2015 14:53:40 +0000
> From: "Hopkins, Abigail" <abi.hopkins at wlv.ac.uk>
> To: "aisworld at lists.aisnet.org" <aisworld at lists.aisnet.org>
> Subject: [AISWorld] UKAIS2015 Conference Registrations now open
> Message-ID:
>         <
> 95EE6BC8F5A66B4AB63946778598B06001063D32EC at EXCHMBX10X05.unv.wlv.ac.uk>
>
> Content-Type: text/plain; charset="us-ascii"
>
> Dear Colleagues
>
> We are pleased to announce that the UKAIS 2015 annual conference is now
> accepting delegate registrations.  The conference will take place on
> 17-18th March 2015 at Keble College, Oxford, UK.
>
> Keynote Speakers
> Professor Robert D. Galliers will be our academic key-note speaker. Bob
> will be known to many colleagues in the UKAIS. He is University
> Distinguished Professor at Bentley University, holding joint appointments
> as Professor in the Information & Process Management and Sociology
> departments. Bob also has a fractional professorial appointment in the
> University of Loughborough's School of Business & Economics in the UK.
> Amongst other illustrious achievements, Bob is editor-in-chief of the
> Journal of Strategic Information Systems and was awarded the AIS LEO Award
> for exceptional lifetime achievement in Information Systems in 2012.
>
> We are also delighted to announce that Mary Visser will give our key-note
> address on the practice "side". Mary, who has 23 years of experience in the
> IT industry, is the Chief Information Officer for Nottingham University.
> She is responsible for developing and executing the University's strategy
> for transforming IT capability across its campuses in the UK, China and
> Malaysia.
>
> The full conference package includes accommodation for the evening of the
> 17 March, attendance at the conference and the associated conference dinner
> and a year's membership of the UKAIS.  We have kept costs as low as
> possible making it affordable and accessible for as many of our academic
> community as possible.  There are also other packages available for those
> who may only be able to attend for the day.   I have attached the booking
> form for interested attendees.
>
> Please note, it is not too late to submit a short paper or a panel
> proposal, or to register for the doctoral consortium. For further details,
> please visit the conference website at: www.ukais2015.org
>
> Please feel free to contact me in the first instance if you have any
> queries regarding the conference.  We look forward to welcoming you to
> Oxford in March 2015.
>
> Kind regards
>
> Abi
>
> Abi Hopkins
> Conference Coordinator
> Tel:  01902 321105
> Email:  Ab.Hopkins at wlv.ac.uk<mailto:Ab.Hopkins at wlv.ac.uk>
> Website:  www.ukais2015.org<http://www.ukais2015.org>
>
>
>
> --
> Scanned by iCritical.
>
> -------------- next part --------------
> An HTML attachment was scrubbed...
> URL: <
> http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20150209/2f7735e1/attachment-0001.html
> >
> -------------- next part --------------
> A non-text attachment was scrubbed...
> Name: Registration form 2015 final.docx
> Type:
> application/vnd.openxmlformats-officedocument.wordprocessingml.document
> Size: 70134 bytes
> Desc: Registration form 2015 final.docx
> URL: <
> http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20150209/2f7735e1/attachment-0001.docx
> >
>
> ------------------------------
>
> Message: 11
> Date: Mon, 9 Feb 2015 10:03:58 -0500
> From: zhoul at umbc.edu
> To: aisworld at lists.aisnet.org
> Subject: [AISWorld] Final CFP: 2015 IEEE International Conference on
>         Security Informatics
> Message-ID:
>         <c39aeef94377db49a1e322031301c70b.squirrel at webmail.umbc.edu>
> Content-Type: text/plain;charset=iso-8859-1
>
>                             Final Call for Papers
>
> IEEE International Conference on Intelligence and Security Informatics
> (ISI) 2015
>
> "Securing the world through an alignment of technology, intelligence,
> humans and organizations"
>
> 26-29 May 2015
> Baltimore, MD, USA
> http://2015.ieee-isi.org
>
>
> IMPORTANT DATES
>
>   * Deadline for paper submission: February 15, 2015
>   * Deadline for workshop proposals: February 18, 2015
>   * Notification of acceptance: March 15, 2015
>   * Camera ready copies: March 29, 2015
>   * Conference: May 26-29, 2015
>
> INTRODUCTION
>
> Over the past 12 years, the IEEE International ISI Conference has evolved
> from its traditional orientation of intelligence and security domain
> towards a more integrated alignment of multiple domains, including
> technology, humans, organization, and security. The scientific community
> has increasingly recognized the need to address intelligence and security
> threats by understanding the interrelationships between these different
> components, and by integrating recent advances from different domains.
>
> We invite academic researchers in the field of Intelligence and Security
> Informatics and related areas as well as law enforcement and intelligence
> experts, and industry consultants and practitioners in the fields to
> submit papers and workshop proposals. In conjunction with ISI 2015,
> several workshops will be held on May 26.
>
> ISI 2015 will be organized in four main tracks focusing on:
>   * Data Science and Analytics in Security Informatics
>   * Security Infrastructure and Tools
>   * Human Behavior in the Security Applications
>   * Organizational, National, and International Issues in
>     Counter-terrorism or Security Protection
>
> Submissions may include systems, methodology, test-bed, modeling,
> evaluation, and policy papers. Research should be relevant to informatics,
> organization, public policy, or human behavior in
> applications of counter-terrorism or protection of local/national/
> international security in the physical world or cyberspace.  See specific
> topic suggestions below.
>
>
> SUBMISSION FORMAT AND PUBLICATION
>
> We accept three types of paper submissions on the topics of the proposed
> tracks and related topics: long paper (max. six pages),
> short paper (max. three pages), and poster (one page). Submission format
> is PDF.  See more information on the CFP page at
> http://ieee-isi.org/2015/call-for-papers/
>
> SUBMISSION SYSTEM
> Papers in English must be submitted electronically via the submission
> website at https://www.easychair.org/conferences/?conf=ieeeisi2015
>
> The accepted papers from ISI 2015 and its affiliated workshops will be
> published by the IEEE Press in formal Proceedings. IEEE ISI Proceedings
> are EI-indexed.
>
>
> WORKSHOPS
>
> Proposals in PDF or Microsoft Word not exceeding three pages should be
> emailed to the conference organizing committee at
> zhangd at umbc.edu by February 18, 2015 and contain the following
> information.
>   * Title of tutorial/workshop
>   * Preferred duration (half day vs. full day)
>   * Brief bios of proposed instructor(s)/organizer(s)
>   * Objectives to be achieved
>   * Scope of topics to be covered
>   * Target audience and the list of potential  presenters/contributors
>
>
> SUBMISSION TOPIC SUGGESTIONS
> Details can be found from: http://ieee-isi.org/2015/call-for-papers/
>
>
>
>
> ------------------------------
>
> Subject: Digest Footer
>
> _______________________________________________
> AISWorld mailing list
> AISWorld at lists.aisnet.org
>
> ------------------------------
>
> End of AISWorld Digest, Vol 980, Issue 1
> ****************************************
>



-- 

Cheers,

Atilla Elci, PhD.

http://www.computer.org/portal/web/COMPSAC/COMPSAC-WEDA

*http://www.sinconf.org/ <http://www.sinconf.org/sin2014/index.php/keynote>*

http://member.acm.org/~aelci

http://aksaray.academia.edu/AtillaEl%C3%A7i

http://lnkd.in/i4RAxn

http://eem.aksaray.edu.tr/

PS: nemo judex in sua causa
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20150209/88b78e29/attachment.html>
-------------- next part --------------
We apologize if you receive multiple copies of this email.

..........................................................

ESAS: The 10th IEEE International Workshop on E-Health Systems and Semantic Web (ESAS 2015)

http://www.computer.org/web/compsac/esas

(In conjunction with COMPSAC 2015: The 39th Annual International Computer, Software & Applications Conference Taichung, Taiwan July 1-5, 2015: http://www. compsac.org)

..........................................................

Paper submission URL: http://myreview.cs.iastate.edu/ESAS2015/
..........................................................

Authors are invited to submit original technical papers and novel research contributions in any aspect of e-health and covering but not limited to the topics of interest listed below.

Main Topics of Interest:
............................
*Smart e-health Systems through Web technologies by considering:
*Autonomic analysis, monitoring and situation alertness
*Body sensor networks and wearable sensor systems on e-health
*Medical biofeedback
*Medical decision support systems and tools 
*Context awareness and autonomous computing for ambient assisted living
*e-health oriented software architectures (Agent, SOA, Middleware, etc.)
*e-health virtual and augmented reality
*Emerging e-health applications
*Mobile e-health applications
*Health grid and health cloud
*Health monitoring and traffic classification
*Healthcare management systems
*ICT-enabled personal health system
*Image and video processing on e-health
*e-health devices and smart parts for healthcare systems
*e-health bigdata: Access,  aggregation and use 
*Semantic Web rule languages and e-health systems
*Ontology engineering and inference on the e-health systems
*Semantic processing in e-health

Important Dates:
----------------

* Deadline for paper submission: March 18th, 2015
* Notification of acceptance: April 10th, 2015
* Camera-ready due: April 24th, 2015

Program Committee:
------------------
- Alex Abramovich, Gordon College, Israel
- Behnam Rahnama, Okan University, Turkey
- Bo Hu, University of Southampton, UK
- Chattrakul Sombattheera, Mahasarakham University, Thailand
- �brahim G�k�en, GE International, Turkey
- Laurentiu Vasiliu, Peracton Ltd., Ireland
- Levent Y�lmaz, Auburn University, USA
- M. Osman �nal�r, Egean University, Turkey
- Maurice Pagnucco, University of New South Wales, Australia
- Mehmet Emin Ayd�n, University of Bedfordshire, UK
- Metin Zontul, Istanbul Ayd�n University, Turkey
- Mustafa Jarrar, Sina Institute - Birzeit University, Palestine
- Ovunc Ozturk, Celal Bayar University, Turkey
- R. Cenk Erdur, Agean University, Turkey
- R. Rajesh, Bharathiar University, India
- Rym Z. Mili, University of Texas at Dallas, USA 
- Sule Y�ld�r�m Yay�lgan, Gjovik University College, Norway
- Tugba Ozacar Ozturk, Celal Bayar University, Turkey 
- Vassilya Abdulova, Istanbul Ayd�n University, Turkey
- Vijayan Sugumaran, Oakland University, USA
- Vitaliy Mezhuev, Berdyansk State University, Ukraine
- Zeki Bayram, Eastern Mediterranean University, TRNC

Paper Submission:
-----------------

Papers must be submitted electronically via the ESAS 2015 site at http://myreview.cs.iastate.edu/ESAS2015/

The format of submitted papers should follow the guidelines for the IEEE conference proceedings.

All papers will be carefully reviewed by at least two reviewers.

Papers should be no more than 6 pages.

 
Organizers:

--------------

Atilla Elci

Aksaray University, Turkey
Email: atilla.elci (at) gmail.com


Duygu Celik

Istanbul Aydin University, Turkey
Email: duygucelik (at) msn.com, duygucelik (at) aydin.edu.tr
-------------- next part --------------
[Apologies for cross postings.  Please circulate to colleagues and prospective interested parties.]

CALL FOR CONTRIBUTIONS
======================

8th International Conference on Security of Information and Networks (SIN 2015)
8-10 September 2015
Sochi, Russia

www.sinconf.org

In Technical Cooperation with ACM Special Interest Group on Security, Audit and Control (SIGSAC)
-------------------------
Proceedings by ACM Press; all papers will be inserted into the ACM Digital Library.
-------------------------

In succession to the successful SIN 2007 - SIN 2014, the 8th International Conference on Security of Information and Networks (SIN 2015) provides an international forum for presentation of research and applications of security in information and networks. SIN 2015 conference features contributed as well as invited papers, special sessions, workshops, and tutorials on theory and practice. 

SIN 2015 will feature the following keynote papers and talks:
TBA

Future SIN Conferences are scheduled to take place in the USA (2016) and Australia (2017).

PROPOSALS 
==================

Papers, special sessions, tutorials, and workshops addressing all aspects of security in information and networks are being sought. Researchers and industrial practitioners working on the following and related subjects are especially encouraged: development and realization of cryptographic solutions, security schemes, new algorithms; critical analysis of existing approaches; secure information systems, especially distributed control and processing applications, and security in networks; interoperability, service levels and quality issues in such systems; information assurance, security, and public policy; detection and prevention of cybercrimes such as fraud and phishing; next generation network architectures, protocols, systems and applications; industrial experiences and challenges of the above. Doctoral students are encouraged to propose papers on ongoing research.

Original papers will be considered; submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel to any other conference or workshop that has proceedings. All submitted papers will be reviewed by at least three members of the program committee judging its originality, significance, correctness, presentation and relevance. Authors are also encouraged to propose position papers on practical studies and experiments, critique of existing work, emerging issues, and novel ideas under development. 

Enterprises and research centers developing, implementing, or using security tools and frameworks are encouraged to propose application / tool demo. 

Proposals of half-day tutorials on fundamental to advanced subjects covering practical implementation aspects of security are welcome.

Proposals of special session(s) to be held in the main conference are welcome.

Proposals are invited for workshops to be held in conjunction with SIN 2015 Conference. The workshop proposal theme should be closely related to the conference topics.

Broad areas of interest in security theory, technology and applications will include, but are not limited to, the following: 

* Access control and intrusion detection
* Security of cyber-physical systems
* Autonomous and adaptive security
* Security tools and development platforms
* Computational intelligence techniques in security
* Security ontology, models, protocols & policies
* Computer network defense
* Standards, guidelines and certification
* Cryptographic techniques and key management
* Security-aware software engineering
* Industrial applications of security
* Trust and privacy
* Information assurance
* Next generation network architectures
* Malware analysis
* Network security and protocols
* Security challenges in Mobile/Embedded Systems
* Cloud security

SUBMISSION OF PROPOSALS
=======================

Papers must be submitted electronically via the SIN 2015 Submission Site at https://cmt.research.microsoft.com/SIN2015/. Title, author's name(s), affiliation, mailing address, telephone, fax and email of the principal author should be included. Maximum length for the proceedings is 8 pages for full paper, 4 pages for short paper, 2 pages for fast abstract and position statement, and 2 pages for demo and tutorial proposals.�Extra page charges apply. All papers should be written according to double-column ACM conference format (http://www.acm.org/sigs/publications/proceedings-templates). 

All proposals for organizing workshops, tutorials, demos, and special sessions are expected at the conference e-mail sin2015 at sinconf.org.

All accepted papers will be published by ACM Press in a conference proceedings and placed into ACM Digital Library. Extended versions of selected papers will be invited for possible publication in a special issue of an archival journal (TBA). Each accepted paper must be registered to be included in the proceedings. Papers not presented during the conference may be removed from the online proceedings.

IMPORTANT DATES
===============

Please consult www.sinconf.org site for the most up-to-date info on the following:

Workshop / Special Session Proposals: 1 March 2015
Paper Submission by: 20 April 2015
Tutorial Proposal by: 10 May 2015
Tutorial Notification: 20 May 2015
All Author Notification: 17 May 2015
All Papers Camera Ready by:  1 June 2015
Author Registration due date: 1 June 2015
Tutorial Date: 7 September 2015
Conference Dates: 8�10 September 2015
Workshops Date: 10 September 2015

ORGANIZATION & SPONSORS
=======================

Organized by
------------
- Southern Federal University, Taganrog, Rostov-on-Don, Russia
- The University of Glasgow, Glasgow, UK
- Aksaray University, Aksaray, Turkey
- Malaviya National Institute of Technology, Jaipur, India
- Macquarie University, Sydney, Australia

Supported by
------------
Southern Federal University, Russia (pending)
Russian Foundation for Basic Research (pending)

Sponsored by
------------
TBA

Hosted by
---------
Department of Security of Information Technologies and South-Russian Regional Scientific-Educational Center for Information Security Problems, Southern Federal University, Taganrog, Rostov-on-Don, Russia

ORGANIZATION COMMITTEE
=====================

Honorary Chair:	Marina Borovskaya, Rector of Southern Federal University, Russia

Conference Chair: Oleg Makarevich, Southern Federal University, Russia
Conference Co-Chair: Ron Poet, University of Glasgow, UK
Conference Co-Chair: Atilla Elci, Aksaray University, Turkey
Conference Co-Chair: Manoj Singh Gaur, Malaviya National Institute of Technology, India
Conference Co-Chair: Mehmet Orgun, Macquarie University, Australia

Program Chair: Ludmila Babenko, Southern Federal University, Russia
Program Co-Chair: Sadek Ferdous, University of Glasgow, UK
Program Co-Chair: Anthony T.S. Ho, University of Surrey, UK
Program Co-Chair: Vijay Laxmi, Malaviya National Institute of Technology, India
Program Co-Chair: Josef Pieprzyk, Queensland University of Technology, Australia

Tutorials Chair: Evgeny Abramov, Southern Federal University, Russia
Tutorials Co-Chair: Hani Aljahdali, University of Glasgow, UK
Tutorials Co-Chair: Behnam Rahnama, Okan University, Turkey
Tutorials Co-Chair: Chhagan Lal, SKIT, India

Workshops Chair: Peter Zegzhda, Saint-Petersburg State Polytechnical University, Russia
Workshops Co-Chair: Maria Evangelopoulou, University of Glasgow, UK
Workshops Co-Chair: Hossain Shahriar, Kennesaw State University, USA
Workshops Co-Chair: Chhagan Lal, SKIT, India

Publication Chair: Alexander Chefranov, Eastern Mediterranean University, North Cyprus
Publication Co-Chair: Jaideep Vaidya, Rutgers Business School, USA,

Treasurer: Vladimir Strukov, Southern Federal University, Russia

Registration Chair: Olga Peskova, Southern Federal University, Russia

Local Arrangements Chair: Maxim Anikeev, Southern Federal University, Russia

e-Presence Chair: Ivan Polovko, Southern Federal University, Russia
e-Presence Co-Chair: Muhammet Saygin, Mersin University, Silifke Vocational School, Turkey

Promotion Chair: Maxim Anikeev, Southern Federal University, Russia
Promotion Co-Chair: Alexey Nekrasov, Southern Federal University, Russia
Promotion Co-Chair: Soum Chowdhury, University of Glasgow, UK
Promotion Co-Chair: Duygu �elik, Istanbul Aydin University, Turkey
Promotion Co-Chair: Parvez Faruki, BPTI, Bhavnagar, India

Liaison for South America: Carlos Becker Westphall, Federal University of Santa Catarina, Brazil

Logo, certificates & covers designs: Efe Cem El�i, Turkey

Volunteers Team: Nikita Sushkin, Students of IT-Security Department (Southern Federal University, Russia)

Advisory Committee Members:
	Bart Preneel, Katholieke Universiteit Leuven, Belgium
	B�lent �rencik, Beykent University, Turkey
	Cetin Kaya Koc, University of California Santa Barbara, USA
	Edward Dawson, Queensland University of Technology, Australia
	Elisa Bertino, Purdue University, USA
	Gene Spafford, Purdue University, CERIAS, USA
	N. Balakrishnan, IISc Bangalore, India
	Willy Susilo, University of Wollongong, Australia

INTERNATIONAL PROGRAM COMMITTEE
===============================

Full list of the IPC is available at www.sinconf.org.

GENERAL INQUIRIES
=================

For updated information, please refer to www.sinconf.org or the Conference e-mail sin2015 at sinconf.org.

Dated 2015-01-20.


More information about the AISWorld mailing list