posted by system || 2177 views || tracked by 3 users: [display]

PAISI 2009 : Pacific Asia Workshop on Intelligence and Security Informatics


Conference Series : Pacific Asia Workshop on Intelligence and Security Informatics
When Apr 27, 2009 - Apr 27, 2009
Where Bangkok, Thailand
Submission Deadline Dec 22, 2008
Notification Due Jan 30, 2009
Final Version Due Feb 6, 2009
Categories    data mining

Call For Papers

Pacific Asia Workshop on Intelligence and Security Informatics
***** PAISI 2009 *****

(to be held in conjunction with PAKDD 2009)

Workshop Website:

April 27, 2009, Bangkok, Thailand

Important Dates
Submission due: December 22, 2008
Notification of acceptance: January 30, 2009
Camera-ready copy due: February 6, 2009

Workshop Scope
Intelligence and Security Informatics (ISI) is concerned with the
study of the development and use of advanced information
technologies and systems for national, international, and societal
security-related applications. The annual IEEE International
Conference series on ISI was started in 2003. In 2006, the Workshop
on ISI ( was started in Singapore
in conjunction with PAKDD, with most contributors and participants
from the Pacific Asian region. The 2nd PAISI
( was then held in Chengdu in 2007
and the 3rd PAISI ( was held in
conjunction with IEEE ISI in Taipei in 2008. We continue this stream
of ISI conferences by organizing the PAISI 2009 in conjunction with
PAKDD 2009 ( PAISI 2009 will
provide a stimulating forum for ISI researchers in Pacific Asia and
other regions of the world to exchange ideas and report research
progress. The workshop also welcomes contributions dealing with ISI
challenges specific to the Pacific Asian region.

Paper Submission/Areas of Interest
Submissions may include systems, methodology, testbed, modeling,
evaluation, and policy papers. Topics include but are not limited to:

I. Information Sharing and Data/Text Mining
- Intelligence-related knowledge discovery
- Criminal data mining and network analysis
- Criminal/intelligence information sharing and visualization
- Web-based intelligence monitoring and analysis
- Spatio-temporal data analysis/GIS for crime analysis and security
- Deception and intent detection
- Cyber-crime detection and analysis
- Authorship analysis and identification
- Applications of digital library technologies in intelligence data
processing, preservation, sharing, and analysis
- Agents and collaborative systems for intelligence sharing
- HCI and user interfaces of relevance to intelligence and security
- Information sharing policy and governance
- Privacy and civil liberties issues

II. Infrastructure Protection and Emergency Responses
- Public/animal health and bioterrorism information infrastructure
- Transportation and communication infrastructure protection
- Cyber-infrastructure design and protection
- Intrusion detection
- Border/transportation safety
- Emergency response and management
- Disaster prevention, detection, and management
- Communication and decision support for search and rescue
- Assisting citizens? responses to terrorism and catastrophic events

III. Terrorism Informatics
- Terrorism related analytical methodologies and software tools
- Terrorism knowledge portals and databases
- Terrorist incident chronology databases
- Terrorism root cause analysis
- Social network analysis (radicalization, recruitment, conducting
operations), visualization, and simulation
- Forecasting terrorism
- Countering terrorism
- Measuring the impact of terrorism on society
- Measuring the ?effectiveness of counter-terrorism campaigns

IV. Enterprise Risk Management and Information Systems Security
- Information security management standards
- Information systems security policies
- Behavior issues in information systems security
- Fraud detection
- Cyber crime and social impacts
- Corporate going concerns and risks
- Accounting and IT auditing
- Corporate governance and monitoring
- Board activism and influence
- Corporate sentiment surveillance
- Market influence analytics and media intelligence
- Consumer-generated media and social media analytics

Long (12-page) and short (6-page) papers following the Springer
LNCS paper templates in English may be submitted electronically via
the online submission site
( Submission
file formats are PDF, Microsoft Word, or LaTeX. We are in the process
of making arrangements with Springer to publish accepted PAISI 2009
papers in its Lecture Notes in Computer Science (LNCS) series, as for
PAISI 2008, PAISI2007, and WISI2006. Required LNCS Microsoft Word/
LaTeX templates can be found on the workshop Website. Authors who wish
to only present a poster may submit a 2-page extended abstract, which
will be reviewed and will appear in the Proceedings if accepted.

Hosts and Major Sponsors
The University of Arizona

Workshop Co-chairs
Hsinchun Chen, The University of Arizona, USA
Chris Yang, Drexel University, USA
Michael Chau, The University of Hong Kong
Shu-hsing Li, National Taiwan University

Related Resources

DEPLING 2023   International Conference on Dependency Linguistics
MLDM 2023   18th International Conference on Machine Learning and Data Mining
PAKDD 2023   The 27th Pacific-Asia Conference on Knowledge Discovery and Data Mining
ICACII 2023   2nd International Conference on Advances in Computational Intelligence and Informatics
AP-EduTeach 2023   5th Asia-Pacific Conference on Education, Teaching & Technology 2023
SDM 2023   SDM 2023 : SIAM International Conference on Data Mining
ACM-Ei/Scopus-CWCBD 2023   2023 4th International Conference on Wireless Communications and Big Data (CWCBD 2023) -EI Compendex
IEEE ACIRS 2023   IEEE--2023 8th Asia-Pacific Conference on Intelligent Robot Systems (ACIRS 2023)