<div class="gmail_quote"><div class="gmail_quote"><p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial">Apologies for multiple copies.</span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial"> </span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial">==========================</span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial">CALL for PAPERS</span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial">==========================</span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial">4th International Workshop on Managing Insider Security
Threats (MIST 2012) </span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial"><a href="http://isyou.info/conf/mist12" target="_blank">http://isyou.info/conf/mist12</a></span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial">November 8-9, 2012, Nishijin Plaza, Kyushu University,
Fukuoka, Japan</span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial">==========================</span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial"> </span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial">IMPORTANT DATES</span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial">-------------------------------------</span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial">Submission Deadline: July 31, 2012</span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial">Acceptance Notification: August 31, 2012</span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial">Camera-Ready & Registration: September 30, 2012</span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial"> </span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial">OVERVIEW</span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial">-------------------------------------</span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial">During the past two decades, information security technology
developments have been mainly concerned with intrusion detection to prevent
unauthorized attacks from outside the network.  This includes hacking,
virus propagation, spyware and more. However, according to a recent Gartner
Research Report, information leaks have drastically increased from insiders who
are legally authorized to access corporate information.</span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial"> </span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial">The unauthorized leak of critical or proprietary information
can cause significant damage to corporate image and reputation, perhaps even
weakening its competitiveness in the marketplace. On a larger scale, government
and public sectors may suffer competitive loss to other nations due to an
internal intelligence breach. While the leaking of critical information by
insiders has a lower public profile than that of viruses and hacker attacks,
the financial impact and loss can be just as devastating.</span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial"> </span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial">The objective of this workshop is to showcase the most
recent challenges and advances in security technologies and management systems
for preventing information breaches by insiders. The workshop promotes
state-of-the-art research, surveys and case analyses of practical significance. 
Physical, managerial, and technical countermeasures will be covered in the
context of an integrated security management system that protects critical
cyber-infrastructure against unauthorized internal attack. We expect that this
workshop will be a trigger for further research and technology improvements
related to this important subject.</span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial"> </span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial">TOPICS </span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial">-------- </span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial"> </span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial">-Theoretical foundations and algorithms for addressing
insider threats</span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial">-Insider threat assessment and modeling</span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial">-Security technologies to prevent, detect and predict
insider threats</span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial">-Validating the trustworthiness of staff</span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial">-Post-insider threat incident analysis</span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial">-Data breach modeling and mitigation techniques</span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial">-Registration, authentication and identification</span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial">-Certification and authorization</span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial">-Database security</span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial">-Device control system</span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial">-Digital forensic system</span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial">-Fraud detection</span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial">-Network access control system</span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial">-Intrusion detection</span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial">-Keyboard information security</span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial">-Information security governance</span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial">-Information security management systems</span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial">-Risk assessment and management</span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial">-Log collection and analysis</span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial">-Trust management</span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial">-IT compliance (audit)</span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial">-Continuous auditing</span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial">-Corporate ethics, accountability and integrity</span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial">-Decision-making modeling and process</span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial"> </span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial">**General Chair </span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial">Ilsun You (Korean Bible University, South Korea) </span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial"> </span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial">**Steering Committee</span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial">Dieter Gollmann (Hamburg University of Technology, Germany)</span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial">Kouichi Sakurai (Kyushu University, Japan)</span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial"> </span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial">**Program Co-Chairs </span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial">(1) Track: Insider Threats Prevention</span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial">Shuyuan Mary Ho (Drexel University, USA)</span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial"> </span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial">(2) Track: Information Leakage Prevention</span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial">Kangbin Yim (Soonchunhyang University, Korea)</span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial"> </span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial">**Local Arrangement Chair </span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial">Yoshiaki Hori (Kyushu University, Japan)</span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial"> </span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial">**Program Committee </span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial">Toshihiro Yamauchi (Okayama University, Japan)</span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial">Masahiro Mambo (Kanazawa University, Japan)</span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial"> </span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial"> </span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial">AUTHOR INSTRUCTION</span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial">-----------------------</span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial">Authors are invited to submit original papers: they must not
substantially duplicate work that any of the authors have published elsewhere
or have submitted in parallel to any other conferences that have proceedings. </span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial"> </span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial">The submission of contributions to MIST 2012 must occur
through the workshop submission system. </span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial">(Soon the website link will be given)</span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial"> </span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial">The submission file is in PDF or PS file format produced via
the Easychair Latex Class file (US letter size) [available at
<a href="http://jowua.yolasite.com/resources/easychair.zip" target="_blank">http://jowua.yolasite.com/resources/easychair.zip</a>]</span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial"> </span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial">Each paper should be 10-15 pages long based on the Easychair
style.</span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial">Submission of a paper implies that should the paper be
accepted, at least one of the authors will register and present the paper at
the workshop.</span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial"> </span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial"> </span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial">All papers will be published in the following journals:</span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial">Journal of Wireless Mobile Networks, Ubiquitous Computing
and Dependable Applications (JoWUA)</span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial">- ISSN (print): 2093-5374, ISSN (on-line): 2093-5382</span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial"> </span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial">Journal of Internet Services and Information Security
(JISIS)</span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial">- ISSN (print): 2182-2069, ISSN (on-line): 2182-2077</span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial"> </span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial">SPECIAL ISSUE</span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial">---------------</span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial">There will be a special issue mainly composed of the
considerable extensions of good papers presented at MIST 2012.</span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial">[Its host journal is indexed by SCI(E)]</span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial">(Pending) </span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial"> </span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial">CONTACT</span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial">---------- </span></p>

<p class="MsoNormal"><span style="font-size:10.0pt;font-family:Arial">For further information regarding the workshop and paper
submission, please contact Dr. Ilsun You (<a href="mailto:ilsunu@gmail.com" target="_blank">ilsunu@gmail.com</a>)</span></p><span><font color="#888888">

<div><br></div><div><br></div><div><br></div></font></span></div></div>--<br><div>

<div><font face="trebuchet ms,sans-serif"><b>Shuyuan Mary Ho, PhD</b><br>Assistant Professor<br></font><b><span style="color:rgb(255,0,0)"><font face="trebuchet ms,sans-serif">Computing & Security Technology</font></span><font color="#cc0000"><br>

</font><font face="trebuchet ms,sans-serif">Drexel University</font></b><br><a href="http://www.goodwin.drexel.edu/iSensor/" target="_blank"><font face="trebuchet ms,sans-serif">http://iSensorLab.com/</font></a><br><a href="mailto:smho@drexel.edu" target="_blank"><font face="trebuchet ms,sans-serif">smho@drexel.edu</font></a><br>
<font face="trebuchet ms,sans-serif"><br></font></div></div><br>