HIASCIT 2017 - 5th International Conference on Horizons for Information Architecture, Security and Cloud Intelligent Technology (HIASCIT 2017) :: Sanremo, Italy :: July 3 - 5, 2017
Date2017-07-03 - 2017-07-05
Deadline2017-06-12
Venue, Italy
KeywordsInformation Architecture; Web; Security
Topics/Call fo Papers
CfP * Extended Deadline: 06.12.2017 * The 5th International Conference “Horizons for Information Architecture, Security and Cloud Intelligent Technology (HIASCIT 2017): Programming, Software Quality, Online Communities, Cyber Behaviour and Business” is a premier scientific meeting for discussing the latest advances in the emerging areas of computer sciences and technologies for Internet, intranet, extranet, cloud computing, programing, safety and security, human and social factors, business, software quality, etc.
Many conferences are focussed on specific aspects of computer science, telecommunications, multimedia, etc., and bring together leading experts in a particular field or sometimes on a specific technology. At such large conferences students are often marginalized or relegated to poster sessions. The conferences, workshops, symposiums, etc., are not a big scale and aim to promote dialogue between established professors and graduate students working on new directions. Hence topics from the whole range of human-computer interaction, multimedia, software, design, etc. are welcomed. Last year’s symposiums, workshops, conferences, etc., organized by ALAIPO and AInCI, for instance, included papers on the topics (see below the alphabetical order). An extensive listing connotes and reflects the requirement and also skill necessary to find intersection zones of the disciplines among the different domains, fields, and specialities; which at the same time potentially boosts and merges the formerly different scientific views.
All contributions ?papers, workshops, demos, posters, research-in-progress and doctoral consortium, should be of high quality, originality, clarity, significance and impact. In the current international conference it is demonstrated how with a correct integration among professionals of formal and factual sciences interesting research lines in the following subjects Innovative Design for Information Architecture, Virtual Communities, Emerging Interactive Technologies, Mobile Computing, Intelligent Web-Based Business, Metrics and Quality Evaluation, Security, Social and Human Factors, Communicability, Computer Sciences, Systems and Software Engineering, and other computational areas are solicited on, but not limited to (alphabetical order):
Information Architecture
:: Cloud Computing for Service Oriented Architectures
:: Cloud Computing Infrastructure
:: Cloud Computing Models, Techniques and Architecture
:: Information Architecture Design for Cloud Computing and Security
:: Library Systems and Database Development for Information Architecture
:: Usability Engineering and Communicability for Information Architecture
Security
:: Administration Security Policy
:: Data Privacy and Security
:: Security Certification: Standardization and Guidelines
:: Security in Grid
:: Security Policies and User Behaviour
:: Semantic Computing and Security
Cloud Intelligent
:: Cloud Computing for Big Data
:: Cloud Computing for Internet of Things
:: Cloud Development Tools and Applications
:: Federated Database System and Cloud Computing
:: Green and Original Cloud Applications
:: Mobile Cloud for Industrial Production and Business
:: Strategies for Cloud Assessment
Technology
:: Advanced Multi-modal Interfaces for Security
:: Authentication Mechanisms and Systems
:: Cyber Security Automation
:: Firewall Systems and Management
:: ICT, Servers and Networking: Hardware and Software Configuration
:: Multimedia Mobile Phone for Business Intelligence
:: Network Security Issues and Protocols
:: Voice, Face and Signature Recognition Systems for Security
Programming
:: Cloud Programming Models and Paradigms
:: Database: Design, Security and Authorization
:: Interactive Design for International Users Security and Privacy Information
:: Special Algorithms for Optimization Security and Cloud Computing Information
:: Theory and Applications of of Cryptology
:: Vulnerability Analysis
Software Quality
:: Attack Information: Analysis for Detection and Prevention
:: Heuristic Evaluation for Cyber Attacks
:: Human and Social Factors in Software Engineering for Security and Confidential Information
:: Interactive Design for International Users Security and Privacy Information
:: Natural Interfaces, Communicability and Strong Security for Interactive Systems
:: Open Software and Commercial Software for Anti-virus
:: Techniques and Methodologies for Virtual Defense
Online Communities
:: Access to Online Information: Rights and Obligations
:: Consequences of the Cyber Destruction and International Legislation
:: Digital Contents and Copyright Protection Techniques
:: Ethics and Aesthetics of the Interactive Contents Online and Off-line
:: Evaluation of the Impact of Security Efficiency on User Satisfaction
:: Hacking Democracy
:: Information Society and International Legislation for New Technologies
Cyber Behaviour
:: Cyber Destructors and Parochialism
:: Intellectual Property and Copyright
:: Methods and Techniques for Stopping Attacks in Social Networking
:: Psychiatry for Cyber Destructors
:: Quality Attributes and Metrics for the Evaluation of the Cyber Destructors
:: Security Policies and User Behaviour
:: Social Psychology and Human Behaviour in Safety, Security and Privacy
Business
:: Business and Security Risk Models
:: Business Intelligence and Business Analytics
:: Business Quality Models for Universities, Enterprises and Industries
:: Communicability for Business Intelligence
:: Mobile Cloud for Industrial Production and Business
:: Security, Trust and Privacy in Commerce Online
Many conferences are focussed on specific aspects of computer science, telecommunications, multimedia, etc., and bring together leading experts in a particular field or sometimes on a specific technology. At such large conferences students are often marginalized or relegated to poster sessions. The conferences, workshops, symposiums, etc., are not a big scale and aim to promote dialogue between established professors and graduate students working on new directions. Hence topics from the whole range of human-computer interaction, multimedia, software, design, etc. are welcomed. Last year’s symposiums, workshops, conferences, etc., organized by ALAIPO and AInCI, for instance, included papers on the topics (see below the alphabetical order). An extensive listing connotes and reflects the requirement and also skill necessary to find intersection zones of the disciplines among the different domains, fields, and specialities; which at the same time potentially boosts and merges the formerly different scientific views.
All contributions ?papers, workshops, demos, posters, research-in-progress and doctoral consortium, should be of high quality, originality, clarity, significance and impact. In the current international conference it is demonstrated how with a correct integration among professionals of formal and factual sciences interesting research lines in the following subjects Innovative Design for Information Architecture, Virtual Communities, Emerging Interactive Technologies, Mobile Computing, Intelligent Web-Based Business, Metrics and Quality Evaluation, Security, Social and Human Factors, Communicability, Computer Sciences, Systems and Software Engineering, and other computational areas are solicited on, but not limited to (alphabetical order):
Information Architecture
:: Cloud Computing for Service Oriented Architectures
:: Cloud Computing Infrastructure
:: Cloud Computing Models, Techniques and Architecture
:: Information Architecture Design for Cloud Computing and Security
:: Library Systems and Database Development for Information Architecture
:: Usability Engineering and Communicability for Information Architecture
Security
:: Administration Security Policy
:: Data Privacy and Security
:: Security Certification: Standardization and Guidelines
:: Security in Grid
:: Security Policies and User Behaviour
:: Semantic Computing and Security
Cloud Intelligent
:: Cloud Computing for Big Data
:: Cloud Computing for Internet of Things
:: Cloud Development Tools and Applications
:: Federated Database System and Cloud Computing
:: Green and Original Cloud Applications
:: Mobile Cloud for Industrial Production and Business
:: Strategies for Cloud Assessment
Technology
:: Advanced Multi-modal Interfaces for Security
:: Authentication Mechanisms and Systems
:: Cyber Security Automation
:: Firewall Systems and Management
:: ICT, Servers and Networking: Hardware and Software Configuration
:: Multimedia Mobile Phone for Business Intelligence
:: Network Security Issues and Protocols
:: Voice, Face and Signature Recognition Systems for Security
Programming
:: Cloud Programming Models and Paradigms
:: Database: Design, Security and Authorization
:: Interactive Design for International Users Security and Privacy Information
:: Special Algorithms for Optimization Security and Cloud Computing Information
:: Theory and Applications of of Cryptology
:: Vulnerability Analysis
Software Quality
:: Attack Information: Analysis for Detection and Prevention
:: Heuristic Evaluation for Cyber Attacks
:: Human and Social Factors in Software Engineering for Security and Confidential Information
:: Interactive Design for International Users Security and Privacy Information
:: Natural Interfaces, Communicability and Strong Security for Interactive Systems
:: Open Software and Commercial Software for Anti-virus
:: Techniques and Methodologies for Virtual Defense
Online Communities
:: Access to Online Information: Rights and Obligations
:: Consequences of the Cyber Destruction and International Legislation
:: Digital Contents and Copyright Protection Techniques
:: Ethics and Aesthetics of the Interactive Contents Online and Off-line
:: Evaluation of the Impact of Security Efficiency on User Satisfaction
:: Hacking Democracy
:: Information Society and International Legislation for New Technologies
Cyber Behaviour
:: Cyber Destructors and Parochialism
:: Intellectual Property and Copyright
:: Methods and Techniques for Stopping Attacks in Social Networking
:: Psychiatry for Cyber Destructors
:: Quality Attributes and Metrics for the Evaluation of the Cyber Destructors
:: Security Policies and User Behaviour
:: Social Psychology and Human Behaviour in Safety, Security and Privacy
Business
:: Business and Security Risk Models
:: Business Intelligence and Business Analytics
:: Business Quality Models for Universities, Enterprises and Industries
:: Communicability for Business Intelligence
:: Mobile Cloud for Industrial Production and Business
:: Security, Trust and Privacy in Commerce Online
Other CFPs
- 2nd International Conference on Business & Entrepreneurship, Supply Chain Management & Information Systems
- 5th European Conference on the Engineering of Computer Based Systems
- 8th International Conference on Mining, Manufacturing and Metallurgical Engineering (ICMMME'2017)
- 8th International Conference on Trends in Mechanical and Industrial Engineering (ICTMIE'2017)
- 8th International Conference on Advancements in Electronics and Power Engineering (ICAEPE'2017)
Last modified: 2017-05-29 00:40:25