Submission
guidelines:
The online submission system is now ready at https://www.easychair.org/login.cgi?conf=paisi2009
All papers must be submitted through the system.
Long papers (12 pages),
short papers (6 pages), and posters (2 pages), following the Springer LNCS paper templates
in English, may be submitted electronically via the site above.
Submission file formats are PDF or
Microsoft Word. We are in the
process of making arrangements with Springer to publish accepted
PAISI 2009 papers in its Lecture Notes in Computer Science (LNCS)
series, as for PAISI 2008, PAISI 2007, and WISI 2006.
Microsoft Word/LaTeX templates for the required Springer LNCS format can be found
here.
Submissions
may include systems, methodology,
testbed, modeling, evaluation, and
policy papers. Research should be
relevant to both informatics and
national/international security.
Topics include but are not limited
to:
I. Information Sharing and Data/Text Mining
- Intelligence-related
knowledge discovery
- Criminal data
mining and network analysis
- Criminal/
intelligence information sharing and visualization
- Web-based
intelligence monitoring and analysis
- Spatio-temporal data
analysis/GIS for crime analysis and security informatics
- Deception and
intent detection
- Cyber-crime
detection and analysis
- Authorship
analysis and identification
- Applications of
digital library technologies in intelligence data
processing, preservation, sharing, and analysis
- Agents and
collaborative systems for intelligence sharing
- HCI and user
interfaces of relevance to intelligence and security
- Information
sharing policy and governance
- Privacy,
security, and civil liberties issues
II.
Infrastructure Protection and Emergency Responses
- Public/animal
health and bioterrorism information infrastructure
- Transportation
and communication infrastructure protection
- Cyber-infrastructure
design and protection
- Intrusion
detection
- Border/transportation
safety
- Emergency
response and management
- Disaster
prevention, detection, and management
- Communication and
decision support for search and rescue
- Assisting
citizens' responses to terrorism and catastrophic events
III.
Terrorism Informatics
- Terrorism related
analytical methodologies and software tools
- Terrorism
knowledge portals and databases
- Terrorist
incident chronology databases
- Terrorism root
cause analysis
- Social network
analysis (radicalization, recruitment, conducting
operations), visualization, and simulation
- Forecasting
terrorism
- Countering
terrorism
- Measuring the
impact of terrorism on society
- Measuring the
effectiveness of counter-terrorism campaigns
IV.
Enterprise Risk Management and Information Systems Security
- Information security management standards
- Information systems security policies
- Behavior issues in information systems security
- Fraud detection
- Cyber crime and social impacts
- Corporate going concerns and risks
- Accounting and IT auditing
- Corporate governance and monitoring
- Board activism and influence
- Corporate sentiment surveillance
- Market influence analytics and media intelligence
- Consumer-generated media and social media analytics
|