P A P E R   S U B M I S S I O N :

Submission guidelines:

The online submission system is at https://www.easychair.org/conferences/?conf=paisi2012
All papers must be submitted through the system.

Paper submission is now closed.

Long papers (15 pages), and short papers (8 pages), following the Springer LNCS paper templates in English, may be submitted electronically via the site above. Submission file formats are PDF or Microsoft Word.

Springer is reviewing our proposal to publish accepted PAISI 2012 papers in its Lecture Notes in Computer Science (LNCS) series (indexed by EI Compendex, ISI Proceedings, and Scopus). All past PAISI proceedings (2006 to 2011) were published in the Springer LNCS series.

Microsoft Word/LaTeX templates for the required Springer LNCS format can be found here.

Submissions may include systems, methodology, testbed, modeling, evaluation, and policy papers. Research should be relevant to both informatics and national/international security. Topics include but are not limited to:

I. Information Sharing and Data/Text Mining 
  • Intelligence-related knowledge discovery 
  • Criminal data mining and network analysis
  • Criminal/ intelligence information sharing and visualization
  • Web-based intelligence monitoring and analysis
  • Spatio-temporal data analysis/GIS for crime analysis and security informatics
  • Deception and intent detection 
  • Cyber-crime detection and analysis
  • Authorship analysis and identification
  • Applications of digital library technologies in intelligence data processing, preservation, sharing, and analysis
  • Agents and collaborative systems for intelligence sharing
  • HCI and user interfaces of relevance to intelligence and security
  • Information sharing policy and governance
  • Privacy, security, and civil liberties issues

II. Infrastructure Protection and Emergency Responses

  • Public/animal health and bioterrorism information infrastructure
  • Transportation and communication infrastructure protection
  • Cyber-infrastructure design and protection
  • Intrusion detection 
  • Border/transportation safety
  • Emergency response and management
  • Disaster prevention, detection, and management
  • Communication and decision support for search and rescue
  • Assisting citizens' responses to terrorism and catastrophic events

III. Terrorism Informatics 

  • Terrorism related analytical methodologies and software tools
  • Terrorism knowledge portals and databases
  • Terrorist incident chronology databases
  • Terrorism root cause analysis
  • Social network analysis (radicalization, recruitment, conducting operations), visualization, and simulation
  • Forecasting terrorism
  • Countering terrorism
  • Measuring the impact of terrorism on society
  • Measuring the effectiveness of counter-terrorism campaigns

IV. Enterprise Risk Management and Information Systems Security 

  • Information security management standards
  • Information systems security policies
  • Behavior issues in information systems security
  • Fraud detection
  • Cyber crime and social impacts
  • Corporate going concerns and risks
  • Accounting and IT auditing
  • Corporate governance and monitoring
  • Board activism and influence
  • Corporate sentiment surveillance
  • Market influence analytics and media intelligence
  • Consumer-generated media and social media analytics


Kuala Lumpur, Malaysia | May 29, 2012
© 2004-2012 University of Hong Kong, University of Arizona