| Submission is now closed.Submission
                                            guidelines:
                                          The online submission system is at https://www.easychair.org/conferences/?conf=paisi2019 All papers must be submitted through the system.
 Long papers (12 pages),
											              and short papers (6 pages), following the Springer LNAI paper templates
											              in English, may be submitted electronically via the site above.
											              Submission file formats are PDF or
											              Microsoft Word. 
 Selected
											              PAISI 2019 papers will be published in Springer's Lecture Notes in Artificial Intelligence (LNAI)
											              series, which is indexed by EI Compendex, ISI Proceedings, and Scopus.
											
											              Microsoft Word/LaTeX templates for the required Springer LNCS format can be found
											              here.
											               
                                            Submissions
                                            may include systems, methodology,
                                            testbed, modeling, evaluation, and
                                            policy papers. Research should be
                                            relevant to both informatics and
                                            national/international security.
                                            Topics include but are not limited
                                            to:I. Information Sharing and Big Data Analytics 
                                            Intelligence-related
                   knowledge discovery Big data analytics and mining
                                             Criminal data
                   mining and network analysisCriminal/intelligence information sharing and visualizationWeb-based
                   intelligence monitoring and analysisSpatio-temporal data
                   analysis/GIS for crime analysis and security informaticsCyber-crime
                   detection and analysisAuthorship
                   analysis and identificationPrivacy and civil liberties issues
											Text processing and mining II.
              Infrastructure Protection and Emergency Responses 
                                            Public health and bioterrorism information infrastructureTransportation
                   and communication infrastructure protectionCyber-infrastructure
                   design and protectionIntrusion
                   detection Border/transportation
                   safetyEmergency
                   response and managementDisaster
                   prevention, detection, and managementCommunication and
                   decision support for search and rescueInfrastructure for big data analytics III.
              Cybercrime and Terrorism Informatics and Analytics  
											Cyber-crime and social impactsTerrorism related
                   analytical methodologies and software toolsTerrorism
                   knowledge portals and databasesSocial network
                   analysis (radicalization, recruitment, conducting
                   operations), visualization, and simulationForecasting
                   terrorismCountering
                   terrorismMeasuring the
                   impact of terrorism on societyComputer forensics IV.
             Enterprise Risk Management, IS Security, and Social Media Analytics  
                                            Information systems security policiesBehavior issues in information systems securityFraud detection and deception detectionViruses and malwareCorporate ongoing concerns and risksAccounting and IT auditingCorporate governance and monitoringBoard activism and influenceCorporate sentiment surveillanceMarket influence analytics and media intelligenceConsumer-generated media and social media analytics  
                                               |