Last Update: 2008/10/20
  I N T R O D U C T I O N

Intelligence and Security Informatics (ISI) is concerned with the study of the development and use of advanced information technologies and systems for national, international, and societal security-related applications. The annual IEEE International Conference series on ISI was started in 2003. In 2006, the Workshop on ISI (http://isi.se.cuhk.edu.hk/2006/) was started in Singapore in conjunction with PAKDD, with most contributors and participants from the Pacific Asian region. The 2nd PAISI (http://isi.se.cuhk.edu.hk/2007/) was then held in Chengdu in 2007 and the 3rd PAISI (http://isi.se.cuhk.edu.hk) was held in conjunction with IEEE ISI in Taipei in 2008. The past three successful workshops had drawn 60-120 participants on average and the workshop proceedings were published by the Springer LNCS series. We expect significant interest from the PAKDD participants.

These past ISI conferences have brought together academic researchers, law enforcement and intelligence experts, information technology consultant and practitioners to discuss their research and practice related to various ISI topics including:

I. Information Sharing and Data/Text Mining

• Intelligence-related knowledge discovery
• Criminal data mining and network analysis
• Criminal/intelligence information sharing and visualization
• Web-based intelligence monitoring and analysis
• Spatio-temporal data analysis/GIS for crime analysis and security informatics
• Deception and intent detection
• Cyber-crime detection and analysis
• Authorship analysis and identification
• Applications of digital library technologies in intelligence data processing, preservation, sharing, and analysis
• Agents and collaborative systems for intelligence sharing
• HCI and user interfaces of relevance to intelligence and security
• Information sharing policy and governance

II. Infrastructure Protection and Emergency Responses

• Public/animal health and bioterrorism information infrastructure
• Transportation and communication infrastructure protection
• Cyber-infrastructure design and protection
• Intrusion detection
• Border/transportation safety
• Emergency response and management
• Disaster prevention, detection, and management
• Communication and decision support for search and rescue
• Assisting citizens’ responses to terrorism and catastrophic events

III. Terrorism Informatics

• Terrorism related analytical methodologies and software tools
• Terrorism knowledge portals and databases
• Terrorist incident chronology databases
• Terrorism root cause analysis
• Social network analysis (radicalization, recruitment, conducting operations), visualization, and simulation
• Forecasting terrorism
• Countering terrorism
• Measuring the impact of terrorism on society
• Measuring the effectiveness of counter-terrorism campaigns

In this coming year, we are broadening our scope to include:

IV. Enterprise Risk Management and Information Systems Security

• Information security management standards
• Information systems security policies
• Behavior issues in information systems security
• Fraud detection
• Cyber crime and social impacts
• Corporate going concerns and risks
• Accounting and IT auditing
• Corporate governance and monitoring
• Board activism and influence
• Corporate sentiment surveillance
• Market influence analytics and media intelligence
• Consumer-generated media and social media analytics

PAISI 2009 will provide a stimulating forum for PAKDD participants who focus on ISI research to exchange ideas and report research progress. We believe it will also attract the attendants of previous PAISI to be more actively involved in the PAKDD 2009 program.

 


Bangkok, Thailand | April 27-30, 2009
© 2004-2006 Chinese University of Hong Kong, University of Arizona