11 February 2013

IEEE Intelligence and Security Informatics (ISI) 2013

Call for Papers and Workshop Proposals

June 4-7, 2013, Seattle, WA, USA
THEME: Big Data, Emergent Threats and Decision-Making in Security Informatics
HOST: Pacific Northwest National Laboratory
Conference website: http://ISIconference2013.org/

Intelligence and Security Informatics (ISI) research is an interdisciplinary research field involving academic researchers in information technologies, computer science, public policy, bioinformatics, and social and behavior studies as well as local, state, and federal law enforcement and intelligence experts, and information technology industry consultants and practitioners to support counterterrorism and homeland security missions of anticipation, interdiction, prevention, preparedness and response to terrorist acts. The annual IEEE International ISI Conference series was started in 2003. Meetings have been held in Tucson, AZ (twice); Atlanta, GA; San Diego, CA; New Brunswick, NJ; Taipei, Taiwan; Dallas, TX; Vancouver, Canada; and Beijing, China, and Washington D.C. Proceedings of these ISI meetings and workshops have been published by the IEEE Press and in the Springer Lecture Notes in Computer Science (LNCS) series.

ISI 2013 will be organized in three main streams focusing on
  • Big Data in Security Informatics
  • Emergent Threats
  • Decision-Making in Security Informatics

Submissions may include systems, methodology, test-bed, modeling, evaluation, and policy papers. Research should be relevant to informatics, organization, or public policy in applications of counter-terrorism or protection of local/national/international security in the physical world or cyberspace. Topics include but are not limited to:

Big Data in Security Informatics
  • Information Sharing and Data/Text Mining Intelligence-related knowledge discovery
  • Computer or cybercrime investigations and digital forensics
  • Criminal investigative criteria and standard of procedure on Computer crime
  • Criminal data mining and network analysis
  • Forecasting crime and the impact of crime
  • Criminal/intelligence information sharing and visualization
  • Crime pattern recognition and modeling tools
  • Web-based intelligence monitoring and analysis
  • Spatial-temporal data analysis/GIS for crime analysis and security informatics
  • Deception and intent detection
  • Cyber-crime detection and analysis
  • Authorship analysis and identification
  • Applications of digital library technologies in intelligence data processing, preservation, sharing, and analysis
  • Agents and collaborative systems for intelligence sharing
  • HCI and user interfaces of relevance to intelligence and security
  • Information sharing policy and governance
  • Privacy, security, and civil liberties issues
  • Intelligence-computerized community security and surveillance system

Emergent Threats
  • Infrastructure Protection and Emergency Responses
  • Cyber-Physical-Social system security and incident management
  • Cyber-infrastructure design and protection
  • Intrusion detection
  • Bio-terrorism tracking, alerting, and analysis
  • Bio-terrorism information infrastructure
  • Transportation and communication infrastructure protection
  • Border/transportation safety
  • Law Enforcement decision support systems
  • Emergency response and management
  • Disaster prevention, detection, and management
  • Communication and decision support for search and rescue
  • Assisting citizens' responses to terrorism and catastrophic events
  • Computer forensics and crime lead discovery
  • Anti-fraud information technology
  • Terrorism Informatics
  • Terrorism related analytical methodologies and software tools
  • Terrorism knowledge portals and databases
  • Terrorist incident chronology databases
  • Terrorism root cause analysis
  • Social network analysis (radicalization, recruitment, conducting operations), visualization, and simulation
  • Forecasting terrorism
  • Countering terrorism
  • Measuring the impact of terrorism on society
  • Measuring the effectiveness of counter-terrorism campaigns
  • Crime intelligence and cyberspace crime investigation
  • Immigration and security

Decision-Making in Security Informatics
  • Enterprise Risk Management and Information Systems Security
  • Information security management standards
  • Information systems security policies
  • Behavior issues in information systems security
  • Fraud detection
  • Cybercrime and social impacts
  • Corporate going concerns and risks
  • Accounting and IT auditing
  • Corporate governance and monitoring
  • Board activism and influence
  • Corporate sentiment surveillance
  • Market influence analytics and media intelligence
  • Consumer-generated media and social media analytics

  • Paper submission due date: March 11, 2013 (Extended from February 15, 2013)
  • Notification of acceptance: April 8, 2013
  • Due date for Workshop proposals: February 18, 2013

Submission file formats are PDF and Microsoft Word. Required Word/LaTeX templates (IEEE two-column format) can be found at the conference Web site. Long (6,000 words, 6 pages max) and short (3000 words, 3 pages max.) Papers in English must be submitted electronically via the conference Web site. The accepted papers from ISI 2013 and its affiliated workshops will be published by the IEEE Press in formal Proceedings. IEEE ISI Proceedings are EI-indexed. Authors who wish to present a poster and/or demo may submit a 1-page extended abstract, which, if selected, will appear in Proceedings. The selected IEEE ISI 2013 best papers will be invited for contribution to the Springer Security Informatics journal. The deadline for paper submissions is February 15, 2013. Paper submission instructions and template information can be found at on the Submissions page at https://www.easychair.org/conferences/?conf=ieeeisi2013.

Best papers awards will be given in three categories:
  • Best paper
  • Runner-up paper
  • Best student paper
  • Runner-up student paper.

In conjunction with ISI 2013, several workshops will be held on June 4, 2013.Special-topic workshops in any areas of Intelligence and Security Informatics research and practice are welcome. Such events will be an integral part of the ISI-2013 conference program. Proposals in PDF or Microsoft Word not exceeding 3 pages should be emailed to the conference organizing committee at antonio@pnnl.gov by February 18, 2012 and contain the following information.
  • Title of tutorial/workshop
  • Preferred duration (half day vs. full day)
  • Brief bios of proposed instructor(s)/organizer(s)
  • Objectives to be achieved
  • Scope of topics to be covered
  • Target audience and the list of potential presenters/contributors

No comments:

Post a Comment