ISI 2016 - ASONAM International Workshop on Intelligence and Security Informatics (ISI 2016)
Topics/Call fo Papers
Intelligence and Security Informatics (ISI) is concerned with the study of the development and use of advanced information technologies and systems for national, international, and societal security-related applications. ISI is an interdisciplinary research field involving academic researchers in information technologies, computer science, public policy, bioinformatics, medical informatics, and social and behavior studies as well as local, state, and federal law enforcement and intelligence experts, and information technology industry consultants and practitioners to support counterterrorism and homeland security missions of anticipation, interdiction, prevention, preparedness and response to terrorist acts.
Topics of Interest
I. Information Sharing and Data/Text/Web Mining
? Intelligence-related knowledge discovery
? Criminal data mining and network analysis
? Criminal/intelligence information sharing and visualization
? Web-based intelligence monitoring and analysis
? Spatial-temporal data analysis/GIS for crime analysis and security informatics
? Deception and intent detection
? Cyber-crime detection and analysis
? Authorship analysis and identification
? Applications of digital library technologies in intelligence data processing, preservation, sharing, and analysis
? Agents and collaborative systems for intelligence sharing
? HCI and user interfaces of relevance to intelligence and security
? Information sharing policy and governance
II. Infrastructure Protection and Emergency Responses
? Public/animal health and bioterrorism information infrastructure
? Transportation and communication infrastructure protection
? Cyber-infrastructure design and protection
? Intrusion detection
? Border/transportation safety
? Emergency response and management
? Disaster prevention, detection, and management
? Communication and decision support for search and rescue
? Assisting citizens’ responses to terrorism and catastrophic events
III. Terrorism Informatics
? Terrorism related analytical methodologies and software tools
? Terrorism knowledge portals and databases
? Terrorist incident chronology databases
? Terrorism root cause analysis
? Social network analysis (radicalization, recruitment, conducting operations), visualization, and simulation
? Forecasting terrorism
? Countering terrorism
? Measuring the impact of terrorism on society
? Measuring the effectiveness of counter-terrorism campaigns
IV. Enterprise Risk Management and Information Systems Security
? Information security management standards
? Information systems security policies
? Behavior issues in information systems security
? Fraud detection
? Cyber crime and social impacts
? Corporate going concerns and risks
? Accounting and IT auditing
? Corporate governance and monitoring
? Board activism and influence
? Corporate sentiment surveillance
? Market influence analytics and media intelligence
? Consumer-generated media and social media analytics
Topics of Interest
I. Information Sharing and Data/Text/Web Mining
? Intelligence-related knowledge discovery
? Criminal data mining and network analysis
? Criminal/intelligence information sharing and visualization
? Web-based intelligence monitoring and analysis
? Spatial-temporal data analysis/GIS for crime analysis and security informatics
? Deception and intent detection
? Cyber-crime detection and analysis
? Authorship analysis and identification
? Applications of digital library technologies in intelligence data processing, preservation, sharing, and analysis
? Agents and collaborative systems for intelligence sharing
? HCI and user interfaces of relevance to intelligence and security
? Information sharing policy and governance
II. Infrastructure Protection and Emergency Responses
? Public/animal health and bioterrorism information infrastructure
? Transportation and communication infrastructure protection
? Cyber-infrastructure design and protection
? Intrusion detection
? Border/transportation safety
? Emergency response and management
? Disaster prevention, detection, and management
? Communication and decision support for search and rescue
? Assisting citizens’ responses to terrorism and catastrophic events
III. Terrorism Informatics
? Terrorism related analytical methodologies and software tools
? Terrorism knowledge portals and databases
? Terrorist incident chronology databases
? Terrorism root cause analysis
? Social network analysis (radicalization, recruitment, conducting operations), visualization, and simulation
? Forecasting terrorism
? Countering terrorism
? Measuring the impact of terrorism on society
? Measuring the effectiveness of counter-terrorism campaigns
IV. Enterprise Risk Management and Information Systems Security
? Information security management standards
? Information systems security policies
? Behavior issues in information systems security
? Fraud detection
? Cyber crime and social impacts
? Corporate going concerns and risks
? Accounting and IT auditing
? Corporate governance and monitoring
? Board activism and influence
? Corporate sentiment surveillance
? Market influence analytics and media intelligence
? Consumer-generated media and social media analytics
Other CFPs
- 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
- Ninth International C* Conference on Computer Science & Software
- A Stream on “Dance Perspectives: Artistic & Authentic Movement”
- A Stream on “The Role of Small and Medium-Sized Enterprises in a Globalized World”
- A Stream on “The Influence of Psychosocial Factors on Wellbeing and the Experience of Illness in Diaspora”
Last modified: 2016-03-06 16:03:56