PIIPES 2010 - Personal Identifiable Information: Privacy, Ethics, and Security (ADBIS 2010 Track)
Topics/Call fo Papers
Personal Identifiable Information: Privacy, Ethics, and Security (PIIPES)
TRACK:14th EastEuropean Conference on Advances in Databases and Information Systems
Novi Sad, September 20-24,2010
"Breaches of personally identifiable information (PII) have increased dramatically over the past few years and have resulted in the loss of millions of records. Breaches of PII are hazardous to both individuals and organizations. Individual harms may include identity theft, embarrassment, or blackmail. Organizational harms may include a loss of public trust, legal liability, or high costs to handle the breach." (USA National Institute of Standards and Technology, 2009)
PII ? information in an IT system or online collection: (1) that directly identifies an individual (e.g.,name, address, social security number or other identifying number or code, telephone number, email address, etc.), or (2) by which an agency intends to identify specific individuals in conjunction with other data elements, i.e., indirect identification. (These data elements may include a combination of gender, race, birth date, geographic indicator, and other descriptors.) (U.S. Department of Health & Human
Services)
PII ? information which can be used to distinguish or trace an individual's identity, such as their name, social security number, biometric records, etc. alone, or when combined with other personal or identifying information which is linked or linkable to a specific individual, such as date and place of birth, mother’s maiden name, etc. (OMB Memorandum 0716)
PII ? 'personal data' shall mean any information relating to an identified or identifiable natural person('data subject'); an identifiable person is one who can be identified, directly or indirectly, in particular by reference to an identification number or to one or more factors specific to his physical, physiological, mental, economic, cultural or social identity;( EU directive 95/46/EC)
Track program committee cochairs:
Dr. Sabah Al-Fedaghi, Computer Engineering Department, Kuwait University.
Dr. Mikaël Ates, Entr'Ouvert, France.
Topics include but not limited to:
PII Definition,
PII Value,
PII Effects and uses,
PII Laws,
PII Health records,
PII Economics,
PII Trust issues,
PII Ownership,
PII Impact Assessment,
PII on the Internet,
PII in ecommerce,
PII and the Semantic Web,
PII and Banking systems,
PII and Social networks,
PII and Digital Rights Management,
PII and Media content streaming,
PII Classification,
PII Processing,
PII Sensitivity,
PII Lying,
PII Flow,
PII Seeking,
Nontextual PII,
PII Biometrics,
PII and Data mining,
PII and Security,
PII and Privacy,
PII Protection,
PII Surveillance,
PII and Access Control,
PII Confidentiality issues,
PII and Anonymity,
PII and Personal identifiable misinformation,
PII and Privacybydesign,
PII Access and Dissemination,
PII Management systems,Capture, archival and retrieval of PII,
PII Policies,
PII Databases,
PII Warehouses,
PII Online stores,
PII into RDF,
PII in P3P,
PII Lifecycles
Important Dates:
* Submission of papers: March 27, 2010
* Notification of acceptance: May 15, 2010
* Camera ready: June 15, 2010
* Conference: September 20 - 24, 2010
Publication:
Contributions are solicited for the following categories:
? full research papers describing research accomplishments (aproximatelly 5000 words),
? demonstrations and short communications (aproximatelly 2000-3000 words), i.e. experience reports, project overviews, etc. which do not fully adhere to the standards of a first rate scientific publication, but are nevertheless of interest and value for the participants of the conference,
The program committee may decide to accept a submission as a short paper (2000?3000 words) if it reports interesting results but does not justify publication of a full paper. Research papers will be published in the LNCS series of Springer Verlag. Communications will be included in additional local proceedings. A selection of outstanding papers from the conference may be invited for publication in an
internationally recognized journal (subject to additional reviewing). All contributions should be in PDF format and should be submitted electronically via the ADBIS `Submission and Review System’. For their submissions, authors are encouraged to consider the final paper format requirements, as specified at the
conference site.
Research papers should be original contributions and should not be accepted or submitted elsewhere until the decisions of the ADBIS 2010 program committee are announced. At least one author from every submission accepted to appear in the Springer proceedings or the local proceedings is obliged to register and attend the conference.
Submission:
Submit your paper on the conference website: http://www.adbis2010.org/
Further information on:
http://www.adbis2010.org/
TRACK:14th EastEuropean Conference on Advances in Databases and Information Systems
Novi Sad, September 20-24,2010
"Breaches of personally identifiable information (PII) have increased dramatically over the past few years and have resulted in the loss of millions of records. Breaches of PII are hazardous to both individuals and organizations. Individual harms may include identity theft, embarrassment, or blackmail. Organizational harms may include a loss of public trust, legal liability, or high costs to handle the breach." (USA National Institute of Standards and Technology, 2009)
PII ? information in an IT system or online collection: (1) that directly identifies an individual (e.g.,name, address, social security number or other identifying number or code, telephone number, email address, etc.), or (2) by which an agency intends to identify specific individuals in conjunction with other data elements, i.e., indirect identification. (These data elements may include a combination of gender, race, birth date, geographic indicator, and other descriptors.) (U.S. Department of Health & Human
Services)
PII ? information which can be used to distinguish or trace an individual's identity, such as their name, social security number, biometric records, etc. alone, or when combined with other personal or identifying information which is linked or linkable to a specific individual, such as date and place of birth, mother’s maiden name, etc. (OMB Memorandum 0716)
PII ? 'personal data' shall mean any information relating to an identified or identifiable natural person('data subject'); an identifiable person is one who can be identified, directly or indirectly, in particular by reference to an identification number or to one or more factors specific to his physical, physiological, mental, economic, cultural or social identity;( EU directive 95/46/EC)
Track program committee cochairs:
Dr. Sabah Al-Fedaghi, Computer Engineering Department, Kuwait University.
Dr. Mikaël Ates, Entr'Ouvert, France.
Topics include but not limited to:
PII Definition,
PII Value,
PII Effects and uses,
PII Laws,
PII Health records,
PII Economics,
PII Trust issues,
PII Ownership,
PII Impact Assessment,
PII on the Internet,
PII in ecommerce,
PII and the Semantic Web,
PII and Banking systems,
PII and Social networks,
PII and Digital Rights Management,
PII and Media content streaming,
PII Classification,
PII Processing,
PII Sensitivity,
PII Lying,
PII Flow,
PII Seeking,
Nontextual PII,
PII Biometrics,
PII and Data mining,
PII and Security,
PII and Privacy,
PII Protection,
PII Surveillance,
PII and Access Control,
PII Confidentiality issues,
PII and Anonymity,
PII and Personal identifiable misinformation,
PII and Privacybydesign,
PII Access and Dissemination,
PII Management systems,Capture, archival and retrieval of PII,
PII Policies,
PII Databases,
PII Warehouses,
PII Online stores,
PII into RDF,
PII in P3P,
PII Lifecycles
Important Dates:
* Submission of papers: March 27, 2010
* Notification of acceptance: May 15, 2010
* Camera ready: June 15, 2010
* Conference: September 20 - 24, 2010
Publication:
Contributions are solicited for the following categories:
? full research papers describing research accomplishments (aproximatelly 5000 words),
? demonstrations and short communications (aproximatelly 2000-3000 words), i.e. experience reports, project overviews, etc. which do not fully adhere to the standards of a first rate scientific publication, but are nevertheless of interest and value for the participants of the conference,
The program committee may decide to accept a submission as a short paper (2000?3000 words) if it reports interesting results but does not justify publication of a full paper. Research papers will be published in the LNCS series of Springer Verlag. Communications will be included in additional local proceedings. A selection of outstanding papers from the conference may be invited for publication in an
internationally recognized journal (subject to additional reviewing). All contributions should be in PDF format and should be submitted electronically via the ADBIS `Submission and Review System’. For their submissions, authors are encouraged to consider the final paper format requirements, as specified at the
conference site.
Research papers should be original contributions and should not be accepted or submitted elsewhere until the decisions of the ADBIS 2010 program committee are announced. At least one author from every submission accepted to appear in the Springer proceedings or the local proceedings is obliged to register and attend the conference.
Submission:
Submit your paper on the conference website: http://www.adbis2010.org/
Further information on:
http://www.adbis2010.org/
Other CFPs
- Third Workshop on Transforming and Weaving OWL Ontologies in MDE/MDA
- Special Track on Artificial Intelligence and Software Engineering
- 2010 IEEE International Workshop on Robotic and Sensors Environments (ROSE 2010)
- 3rd International ICST Conference on Electronic Healthcare for the 21st century
- 2nd International ICST Conference on Arts and Technology
Last modified: 2010-06-04 19:32:22