Skip to content

Call for Papers: European Intelligence & Security Informatics Conference (EISIC 2012)

25 gennaio 2012

European Conference on Counterterrorism and Criminology  – Odense, Denmark August 22-24, 2012 – http://www.eisic.org

Call for papers is open! Share it…

The goal of EISIC 2012 is to gather people from different communities to provide a stimulating forum for exchange of ideas and results. We invite academic researchers (in information technologies, computer science, public policy, and social and behavioral studies), law enforcement and intelligence experts, as well as information technology companies, industry consultants and practitioners in the fields involved. EISIC 2012 will be held in Odense, Denmark.

EISIC 2012 will be organized in five main streams focusing on:

  • Information Sharing and Data/Text Mining
  • Infrastructure Protection and Emergency Responses
  • Terrorism Informatics
  • Computational Criminology
  • Enterprise Risk Management and Information Systems Security

Submissions may include systems, methodology, testbed, modeling, evaluation, policy, and position papers. Research should be relevant to informatics, organization, and/or public policy in applications of counter-terrorism or protection of local/ national/ international/ global security in the physical world and/or cyberspace. The accepted papers will be published by the IEEE Computer Society Press (approval pending) in formal Proceedings.

EISIC 2012 will be organized in five main streams focusing on:

  • Information Sharing and Data/Text Mining
  • Infrastructure Protection and Emergency Responses
  • Terrorism Informatics
  • Computational Criminology
  • Enterprise Risk Management and Information Systems Security

Topics include but are not limited to:

  1. Information Sharing and Data/Text Mining
    • Intelligence-related knowledge discovery
    • Computer or cyber crime investigations and digital forensics
    • Criminal investigative criteria and standard of procedure on Computer crime
    • Criminal data mining and network analysis
    • Criminal/ intelligence information sharing and visualization
    • Web-based intelligence monitoring and analysis
    • Spatial-temporal data analysis/GIS for crime analysis and security informatics
    • Deception and intent detection
    • Cyber-crime detection and analysis
    • Authorship analysis and identification
    • Applications of digital library technologies in intelligence data processing, preservation, sharing, and analysis
    • Agents and collaborative systems for intelligence sharing
    • HCI and user interfaces of relevance to intelligence and security
    • Information sharing policy and governance
    • Privacy, security, and civil liberties issues
    • Intelligence-computerized community security and surveillance system
  2. Infrastructure Protection and Emergency Responses
    • Cyber-infrastructure design and protection
    • Intrusion detection
    • Bio-terrorism tracking, alerting, and analysis
    • Bio-terrorism information infrastructure
    • Transportation and communication infrastructure protection
    • Border/transportation safety
    • Emergency response and management
    • Disaster prevention, detection, and management
    • Communication and decision support for search and rescue
    • Assisting citizens’ responses to terrorism and catastrophic events
    • Computer forensics and crime lead discovery
    • Anti-fraud information technology
  3. Terrorism Informatics
    • Terrorism related analytical methodologies and software tools
    • Terrorism knowledge portals and databases
    • Terrorist incident chronology databases
    • Terrorism root cause analysis
    • Social network analysis (radicalization, recruitment, conducting operations), visualization, and simulation
    • Forecasting terrorism
    • Countering terrorism
    • Measuring the impact of terrorism on society
    • Measuring the effectiveness of counter-terrorism campaigns
    • Crime intelligence and cyberspace crime investigation
    • Immigration and security
  4. Computational Criminology
    • Crime pattern recognition and modeling tools
    • Offender social network analysis (infrequent to frequent offenders)
    • Crime generators and crime attractors
    • Forecasting crime and the impact of crime
    • Drug, gang and special crime analysis and modeling tools
    • Data mining and data fusion of crime – urban databases
    • Dynamic information systems analysis for crime and place
    • Privacy and security in crime and justice system data
    • Spatial and temporal analysis and software tools
    • Law Enforcement decision support systems
    • Cybercrime
  5. Enterprise Risk Management and Information Systems Security
    • Information security management standards
    • Information systems security policies
    • Behavior issues in information systems security
    • Fraud detection
    • Cyber crime and social impacts
    • Corporate going concerns and risks
    • Accounting and IT auditing
    • Corporate governance and monitoring
    • Board activism and influence
    • Corporate sentiment surveillance
    • Market influence analytics and media intelligence
    • Consumer-generated media and social media analytics

Paper submission:

Submission file formats are PDF and Microsoft Word. Required Word/LaTeX templates (IEEE two‐column format) can be found at the conference Web site. Long (8,000 words, 8 pages max.) and short (4000 words, 4 pages max.) papers in English must be submitted electronically via the conference Web site. The authors who wish to present a poster and/or demo may submit a 1‐page extended abstract, which, if selected, will appear in Proceedings.

The best papers will be invited to submit an extended version for consideration at the SpringerSecurity Informatics journal.

Download EISIC 2012 Call for Papers

The Call for Paper is also available in PDF or Text format.

Annunci
No comments yet

Rispondi

Inserisci i tuoi dati qui sotto o clicca su un'icona per effettuare l'accesso:

Logo WordPress.com

Stai commentando usando il tuo account WordPress.com. Chiudi sessione / Modifica )

Foto Twitter

Stai commentando usando il tuo account Twitter. Chiudi sessione / Modifica )

Foto di Facebook

Stai commentando usando il tuo account Facebook. Chiudi sessione / Modifica )

Google+ photo

Stai commentando usando il tuo account Google+. Chiudi sessione / Modifica )

Connessione a %s...

%d blogger hanno fatto clic su Mi Piace per questo: