top of page

Call for Papers

 

Important dates

  • Deadline for paper submission: February 15, 2015 (EXTENDED)

 

  • Deadline for workshop proposals: February 18, 2015 (EXTENDED)

 

 

  • Notification of acceptance: March 15, 2015

 

  • Camera Ready Copies: March 29, 2015

 

  • Conference: May 27-29, 2015

 

Paper submissions

Submission file formats are PDF and Microsoft Word. Required Word/LaTex templates (IEEE two-column format) can be found on IEEE’s Publications web pages.

 

We invite academic researchers in the field of Intelligence and Security Informatics and related areas as well as law enforcement and intelligence experts, and industry consultants and practitioners in the fields to submit papers and workshop proposals at the ISI 2015 submission site. Your submission must be original. It cannot be published or under concurrent review elsewhere. We accept three types of submissions on the topics of the proposed tracks and related topics: long paper (max. six pages), short paper (max. three pages), and poster (one page). This includes figures, references, appendices and an abstract of less than 150 words long. You will indicate the type of your submission in the online submission system. The long paper should make a significant contribution to advancing the ISI field, use sound research design, and provide complete and substantial support for its results. Short paper is a concise report of recent findings or other types of innovative work relevant to the ISI community, representing work that has not reached a level of completion. A poster offers the opportunity to present thoughts and data that have the potential to stimulate substantive discussions with interested audience.

 

Publications

The accepted papers from ISI 2015 and its affiliated workshops will be published by the IEEE Press in formal Proceedings. IEEE ISI Proceedings are EI-indexed. Authors who wish to present a poster and/or demo may submit a one-page extended abstract, which, if selected, will appear in proceedings. The selected IEEE ISI 2015 best papers will be invited for contribution to the Springer Security Informatics journal.

 

 

Paper submission guidelines

Submission file formats are PDF and Microsoft Word. Required Word/LaTeX templates (IEEE two-column format) can be found at the conference Web site. Long (6,000 words, six pages max) and short (3000 words, three pages max.) Papers in English must be submitted electronically via the conference Web site. Paper submission instructions and template information can be found at on the submissions page.

 

Submissions may include systems, methodology, test-bed, modeling, evaluation, and policy papers. Research should be relevant to informatics, organization, public policy, or human behavior in applications of counter-terrorism or protection of local/national/international security in the physical world or cyberspace. Topics include but are not limited to:

 

Data Science and Analytics in Security Informatics

  • Data representation and fusion for security informatics

  • Criminal/intelligence information extraction

  • Data sharing and information visualization for security informatics

  • Web-based intelligence monitoring and analysis

  • Spatial-temporal data analysis for crime analysis and security informatics

  • Cyber-crime/threats detection and analysis

  • Criminal/intelligence machine learning and data mining

  • Crime pattern recognition and modeling

  • Bio-terrorism tracking, alerting, and analysis

  • Forecasting threats and measuring the impact of threats

  • Digital forensics and computational criminology

  • Consumer-generated content and security-related social media analytics

  • Financial and accounting fraud analysis

  • Security-related social network analysis (radicalization, recruitment, conducting operations)

  • Authorship analysis and identification

  • Intrusion and deception detection

  • Testbed development

  • Evaluation method

 

Security Infrastructure and Tools

  • Intelligence-computerized community security and surveillance system

  • Agents and collaborative systems for intelligence sharing

  • Threat pattern modeling tools

  • Criminal investigative criteria and standard of procedure on computer crime

  • Boarder security monitoring system

  • Infrastructure protection and emergency responses

  • Cyber-infrastructure design and protection

  • Bio-terrorism information infrastructure

  • Transportation and communication infrastructure

  • Border/transportation safety

  • Terrorism related analytical methodologies and software tools

  • Terrorism knowledge portals and databases

  • Terrorist incident chronology databases

  • Measuring the effectiveness of counter-terrorism campaigns

  • Framework for fraud detection and terrorism detection

 

Human Behavior in the Security Applications

  • Behavior issues in information systems security

  • HCI and user interfaces of relevance to intelligence and security

  • Social impacts of cybercrime and terrorism

  • Board activism and influence

  • Measuring the effectiveness of counter-terrorism campaigns

  • Citizen education and training

  • Understanding user behavior in that has potential security risks

  • Security risks about user behavior in information systems

  • Human behavior modeling, representation and prediction for security applications

 

Organizational, National, and International Issues in Counter-terrorism or Security Protection

  • Best practices in counter-terrorism or security protection

  • Information sharing policy and governance

  • Privacy, security, and civil liberties issues

  • Cyber-physical-social system security and incident management

  • Infrastructure protection

  • Emergency response and management

  • Disaster prevention, detection, and management

  • Communication and decision support for search and rescue

  • Assisting citizens’ responses to terrorism and catastrophic events

  • Immigration and security

  • Enterprise risk management and information systems security

  • Information security management standards

  • Information systems security policies

  • Corporate going concerns and risks

  • Accounting and IT auditing

  • Corporate governance and monitoring

The Program Schedule for this year's conference can be accessed by clicking the + button here!

Need to register for the conference?

Click the + button here to go directly to the Registration page now!

SPONSORS

Picture Link to UMBC
Picture link to College of Engineering and Information Technology
Picture link to Department of Information Systems
bottom of page