-------- Original-Nachricht --------
Betreff: [isworld] Domain Engineering workshop at CAiSE'09
Datum: Wed, 28 Jan 2009 02:09:46 -0500
Von: Iris Reinhartz-Berger <iris.rberger(a)gmail.com>
Antwort an: Iris Reinhartz-Berger <iris.rberger(a)gmail.com>
An: AISWORLD Information Systems World Network <isworld(a)lyris.isworld.org>
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
DE@CAiSE'09
Workshop on Domain Engineering
In Conjunction with CAiSE�09
June 9th, Amsterdam, The Netherlands
http://www.bgu.ac.il/~sturm/DE@CAiSE09/
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
IMPORTANT DATES
Submission deadline: February 16th 2009
Notification of acceptance: March 23rd 2009
Camera-ready papers due: April 13th 2009
Workshop: June 9th 2009
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
Domain Engineering is an engineering discipline concerned with building
reusable assets, such as specification sets, patterns, and components, in
specific domains. A domain in this context can be defined as an area of
knowledge that uses common concepts for describing phenomena,
requirements, problems, capabilities, and solutions. The purpose of domain
engineering is to identify, model, construct, catalog, and disseminate
artifacts that represent the commonalities and differences within a
domain. Although applicable to different engineering disciplines, domain
engineering methods has been recently receiving special attention in the
information systems era. Some of the reasons for this interest are the
increasing variability of applications, the need to obtain and share
expertise in different, evolving domains, and the trend towards reusing IS
artifacts and knowledge about them.
Domain engineering addresses two main layers: the domain layer, which
deals with the representation of domain elements, and the application
layer, which deals with information systems artifacts related to the
domain. More specifically, information systems applications, their
components, and their descriptions are included in the application layer,
whereas their common and variable characteristics, as can be described,
for example, by ontologies or emerging standards, are generalized and
presented in the domain layer.
Similarly to information systems engineering, domain engineering includes
three main activities: domain analysis, domain design, and domain
implementation, which are carried out in the domain layer. However, domain
engineering also supports inter-layer activities, namely interactions that
exist between the domain and application layers. Specifically, domain
layer artifacts may be used for creation and validation of the
specifications of application layer artifacts, while applications may be
generalized into domain artifacts in a process of knowledge elicitation.
Domain engineering as a discipline has practical significance as it deals
with methods and techniques that may help reduce time-to-market, product
cost, and projects risks on one hand, and improve product quality and
performance on the other hand.
The purpose of this workshop is to bring together researchers and
practitioners in the area of domain engineering in order to define the
topic, identify possible points of synergy, common problems and solutions,
and discuss visions for the future of the area. In particular, the
workshop will focus on the interaction between information systems
engineering and domain engineering.
TOPICS OF INTEREST include, but are not limited to:
· Conceptual foundations of domain engineering
· Methods and techniques to support domain engineering
· Ontology engineering
· Development and management of domain assets
· Domain-driven requirements engineering
· Application derivation (i.e., how to use domain artifacts in the
application layer)
· Variability management
· Domain engineering techniques in support of reuse, validation, and
knowledge management
· Theoretical and empirical evaluation of domain engineering methods and
techniques
· Case studies and practice reports related to domain engineering
SUBMISSION GUIDELINES
Prospective workshop participants are invited to submit a paper related to
the purpose of the workshop. The workshop will accept three types of
submissions:
1. Completed Research � this type of papers should include evidence to
support the contribution (e.g. in the form of data analysis, proof of
concept, or case studies) and discussion on research findings and their
theoretical and practical significance. The paper should not exceed 5,000
words (excluding references and appendices). Accepted completed research
papers will be allocated 30 minutes for presentation (including questions
& answers) during the workshop.
2. Research-In-Progress � this type of papers can report on research that
is under way with preliminary results available at the time of the
conference. The paper should not exceed 2,500 words (excluding references
and appendices). Accepted research-in-progress papers will be allocated 15
minutes for presentation (including questions & answers) during the
workshop.
3. Position papers � this type of papers can include lucid and
well-supported statements and suggestions on domain engineering, e.g.,
directions for the discipline, open questions, criticism on the
state-of-the-art, and novel approaches. Accepted position papers will be
allocated 15 minutes for presentation (including questions & answers)
during the workshop.
All three types of papers may refer to theoretical and/or practical
issues.
Papers should be written in Springer LNCS style (see
http://www.springer.de/comp/lncs/authors.html for details). The paper type
(completed research, research-in-progress, or a position paper) should
explicitly be indicated after the paper title. In addition, the paper
abstract should not be longer than 150 words. As the workshop will apply
double-blind reviews process, the papers should not indicate their
authors. Papers should be submitted through the on-line system at
http://www.easychair.org/conferences/?conf=decaise2009.
PUBLICATION
The paper selection will be based upon the relevance of a paper to the
main topics, on its quality and on the potential to stimulate discussion
in the workshop. Accepted papers will be published in the online
CAiSE'2009 workshop proceedings. In addition, authors of some selected
papers will be asked to consider submitting revised version of the papers
as chapters in a book on Domain Engineering to be edited by the workshop
co-chairs and published by Springer.
WORKSHOP CO-CHAIRS
Iris Reinhartz-Berger, University of Haifa, Israel.
Arnon Sturm, Ben Gurion University of the Negev, Israel.
Yair Wand, University of British Columbia, Canada
WORKSHOP PROGRAM COMMITTEE
Colin Atkinson, University of Mannheim, Germany
Mira Balaban, Ben-Gurion University of the Negev, Israel
Sholom Cohen, CMU-SEI, USA
Kim Dae-Kyoo, Oakland University, USA
Dov Dori, Technion � Israel Institute of Technology, Israel
Joerg Evermann, Memorial University of Newfoundland, Canada
Jeff Gray, University of Alabama at Birmingham, USA
Atzmon Hen-Tov, Pontis, Israel
Steven Kelly, MetaCase, Finland
Philippe Kruchten, University of British Columbia, Canada
John McGregor, Clemson University, USA
Dirk Muthig, Fraunhofer Institute for Experimental Software Engineering,
Germany
Klaus Pohl, University of Duisburg-Essen, Germany
Iris Reinhartz-Berger, University of Haifa, Israel
Michael Rosemann, The University of Queensland, Australia
Julia Rubin, IBM Haifa Research Labs, Israel
Bernhard Rumpe, Braunschweig University of Technology, Germany
Lior Schachter, Pontis, Israel
Klaus Schmid, University of Hildesheim, Germany
Keng Siau, University of Nebraska-Lincoln, USA
Pnina Soffer, University of Haifa, Israel
Il-Yeol Song, Drexel University, USA
Arnon Sturm, Ben-Gurion University of the Negev, Israel
Giancarlo Succi, the University of Alberta, Canada
Juha-Pekka Tolvanen, MetaCase, Finland
Yair Wand, University of British Columbia, Canada
Gabi Zodik, IBM Haifa Research Labs, Israel
For more information on the workshop, please contact:
Iris Reinhartz-Berger
Department of Management Information Systems
University of Haifa
Carmel Mountain, Haifa 31905, Israel
Phone: 972-4-8288502
The AISWorld LISTSERV is a service of the Association for Information Systems (http://www.aisnet.org). To unsubscribe, redirect, or change subscription options please go to http://lyris.isworld.org/. You are subscribed to AISworld as: neumann(a)wu-wien.ac.at. Each Sender assumes responsibility that his or her message conforms to the AISWorld LISTSERV policy and conditions of use available at http://lyris.isworld.org/isworldlist.htm.
-------- Original-Nachricht --------
Betreff: [WI] ETNGRID 2009 CFP
Datum: Wed, 28 Jan 2009 09:23:43 +0100
Von: giovanni morana <gmorana(a)diit.unict.it>
An: 2k(a)cs.uiuc.edu, wi(a)aifb.uni-karlsruhe.de, agents(a)cs.umbc.edu,
aiia(a)dis.uniroma1.it, anemone(a)ce.unipr.it, announce(a)globus.org,
arp(a)cines.fr, collab(a)sims.berkeley.edu, community(a)mlnet.org,
computerbookauthors(a)yahoogroups.com, corpora(a)hd.uib.no,
dai-list(a)mcc.com, daml-all(a)daml.org, dbworld(a)cs.wisc.edu,
discuss(a)globus.org, discussion(a)x-opennet.org, dl(a)dl.kr.org,
ecoop-info(a)ecoop.org, fg-db(a)informatik.uni-rostock.de,
fgcscw(a)uni-koblenz.de, ieeedln(a)cimic3.rutgers.edu, interactif(a)lri.fr,
isworld(a)lyris.isworld.org, it-announce(a)cs.usyd.edu.au,
jade-develop(a)avalon.cselt.it, jade-news(a)avalon.cselt.it,
membres-asf(a)irisa.fr, ontoweb-language-sig(a)cs.man.ac.uk, oo(a)gooal.net,
sem-grd(a)gridforum.org, seworld(a)cs.colorado.edu, sw-ergo(a)gui-design.de,
taboo-altri(a)deis.unibo.it, taboo-list(a)deis.unibo.it,
topicmapmail(a)infoloom.com, vki-list(a)dfki.de,
webminds(a)web-minds.consorzio-cini.it, www-webont-wg(a)w3.org,
yxy(a)vnet.ibm.com, pherrero(a)fi.upm.es, mperez(a)fi.upm.es,
vrobles(a)fi.upm.es, jch(a)cs.nott.ac.uk
Apologies if you receive this more than once
=
=
=
========================================================================
Fiveth Workshop on
Emerging Technologies for Next generation GRID (ETNGRID-2009)
18th IEEE International Workshops on Enabling Technologies:
Infrastructures for Collaborative Enterprises (WETICE-2009)
http://etngrid.diit.unict.it
June 29 - July 1, 2009, Groningen (The Netherlands)
=
=
=
========================================================================
The Grid was originally designed as a large network of computer
systems
able to offer an environment where computing and storage
resources are
shared on-demand.
To date, the development of standards, such as the Open Grid
Service
Architecture (OGSA), along with the introduction of new paradigms,
such as
the Semantic Grid, is leading the Grid toward an environment that
is not
only suited for computational-intensive applications, but
also for
computing scenarios typical of distributed systems, like
service and
information providing, multimedia environments, ubiquitous computing,
etc.
For these and other reasons, the Grid is becoming an
interesting and
challenging environment supporting both old and new
services for
cooperative applications. A relevant research effort is thus
needed not
only to investigate innovative Grid infrastructures but also to
make the
current Grid model suitable for these emerging usage scenarios.
The objective of this workshop is to gather researchers
working on
different emerging Grid computing aspects relevant to
enterprise
collaboration, covering issues ranging from the middleware
layer to
application development and user interaction. The goals of the
workshop
include (but are not limited to) discovering new application
scenarios,
proposing new programming abstractions and tools,
identifying the
challenging problem that still need to be solved, and reporting
results and
experiences gained by researchers in building Grid-based
middleware,
applications and alike.
Submission Requirements
-----------------------
Participants are expected to submit an original research paper
or a
position paper, not submitted or published elsewhere, by
email to
<etngrid(a)diit.unict.it>. Submission should include the title of the
paper,
the names and affiliations of the authors, a 150-word abstract and at
most
eight keywords. Submission should follow the IEEE format (single
spaced,
two columns, 10pt, Times font) and not exceed six pages, including
figures.
Accepted papers will be published along with the WETICE
2009
post-proceedings. The paper should be in either PS or PDF format.
Papers must focus on collaborative aspects of the Grid, including,
but not
limiting to, the following topics:
* Middlewares for the Grid
* Multimedia applications with the Grid
* Reflective and Aspect-Oriented Grid systems
* Reliability and Quality-of-Service aspects
* Wireless and ubiquitous access to the Grid
* Cooperative Agents and the Grid
* Grids and Peer-to-peer systems
* Web integration with the Grid
* Peer-to-peer and self-organizing approaches for the Grid
* Abstractions and tools for collaborative application
development in
Grid environments
* Semantic Grid
* Experience reports on collaborative application development in
Grid
* Scalability and Performance issues in the Grid
* Analysis of stability and bottlenecks for Grid applications
* Resource-aware applications in the Grid
* Architectures for Grid-oriented applications
* Security and Verification Issues in Large Distributed Systems
Important Dates
---------------
* Deadline for paper submission: February 20, 2009
* Decision to Authors: March 13, 2009
* Final papers in PDF format to IEEE: April 10, 2009
Program Co-Chairs
-----------------
Angelo Corsaro,
Prismtech, France
Antonella Di Stefano,
Dept. of Computer and Telecommunication Engineering,
Engineering Faculty, University of Catania, ITALY
Giuseppe Pappalardo,
Dept. of Computer Science and Mathematics,
Computer Science Faculty, University of Catania, ITALY
Corrado Santoro,
Dept. of Computer and Telecommunication Engineering,
Engineering Faculty, University of Catania, ITALY
Emiliano Tramontana,
Dept. of Computer Science and Mathematics,
Computer Science Faculty, University of Catania, ITALY
Publicity Co-Chair
------------------
Giovanni Morana,
Dept. of Computer and Telecommunication Engineering,
Engineering Faculty, University of Catania, ITALY
Luigi Toscano,
Dept. of Computer Science and Mathematics,
Computer Science Faculty, University of Catania, ITALY
Program Committee Members (pending confirmation)
------------------------------------------------
Mauro Andreolini ........ University of Modena and Reggio Emilia, Italy
Cosimo Anglano .......... University of Piemonte Orientale, Italy
Roberto Barbera ......... University of Catania, Italy
Mario Cannataro ......... University of Calabria, Italy
Walter Cazzola .......... University of Milano, Italy
Giovanni Chiola ......... University of Genova, Italy
Paolo Ciancarini ........ University of Bologna, Italy
Geoffrey Coulson ........ Lancaster Universtity, UK
Marco Fargetta .......... University of Catania, Italy
Giancarlo Fortino ....... University of Calabria, Italy
Geoffrey Fox ............ Indiana University, USA
Aniruddha Gokhale ....... Vanderbilt University, USA
Pilar Herrero ........... Universidad PolitÈcnica de Madrid, Spain
Giulio Iannello ......... University of Naples Federico II, Italy
Ryszard Janicki ......... McMaster University, Canada
Maciej Koutny ........... University of Newcastle upon Tyne, UK
Luigi Mancini ........... University of Roma "La Sapienza", Italy
Carlo Mastroianni ....... ICAR-CNR, Italy
Giovanni Morana ......... University of Catania, Italy
Agostino Poggi .......... University of Parma, Italy
Svetlana Shasharina ..... Tech-X Corporation, USA
Domenico Talia .......... University of Calabria, Italy
Sara Tucci Piergiovanni.. University of Roma "La Sapienza", Italy
Rainer Unland ........... University of Duisburg-Essen, Germany
Eric Renault ............ GET/INT, Evry Cedex, France
Ilias Savvas ............ Higher Tech. Edu. Institute of Larissa, Greece
Ian Taylor .............. University of Cardiff, UK
Giorgio Ventre .......... University of Naples Federico II, Italy
Brian Vinter ............ University of Copenhagen, Denmark
Luca Vollero ............ CINI ITeM, Italy
Ian Welch ............... Victoria University of Wellington, New Zealand
Nanbor Wang ............. Tech-X Corporation, USA
--
Mailing-Liste: WI(a)aifb.uni-karlsruhe.de
Administrator: WI-admin(a)aifb.uni-karlsruhe.de
Konfiguration: http://www.aifb.uni-karlsruhe.de/mailman/listinfo/wi
-------- Original-Nachricht --------
Betreff: [isworld] CfP: "Information systems and society: Digital
divide, e-skills and IT induced social inequality", AMCIS 2009
Datum: Tue, 27 Jan 2009 11:44:45 +0100
Von: Brandtweiner, Roman <Roman.Brandtweiner(a)wu-wien.ac.at>
Antwort an: Brandtweiner, Roman <Roman.Brandtweiner(a)wu-wien.ac.at>
An: AISWORLD Information Systems World Network <isworld(a)lyris.isworld.org>
****************************************************
CALL FOR PAPERS
"Information systems and society: Digital divide, e-skills and IT induced social inequality"
Minitrack at 15th Americas Conference on Information Systems (AMCIS 2009) August 6-9 2009, San Fransisco, California, http://amcis2009.org/
This minitrack is part of the "Social Issues in IS" track.
****************************************************
Description:
During the last few decades countries everywhere around the globe have shown increasing growth in computer and internet usage as well as a raising use of modern telecommunication facilities. Nevertheless, we can observe a slow down in the rate of growth and a persistent number of people not using these new technologies. This is not only due to effects of saturation, but also to the so-called "digital divide" which addresses primarily inequalities in internet access and differences in usage skills regarding the so called "second order digital divide". Considering the large number of public access places (especially in developed countries), access to the internet becomes at least hypothetically possible for almost everybody. Access alone does not guarantee the usage of internet. Literacy and social support play a vital role as research has already acknowledged. When considering the internet not only as an administrative tool but also as a new media, the concept of e-literacy has to be extended from mere technical skills and basic handling towards media competence in general. Therefore we want to invite especially researchers working on the relationship between digital divide and e-literacy in order to collect systematically current results on this issue. Besides contributions presenting theoretical approaches and methodological considerations, we are especially interested in papers reporting on concrete consequences of the digital divide on life chances and therefore inequalities in a society. Past experiences as well as new perspectives can be reported either from a scientific (empirical results) or a practitioner's perspective (case studies, best practice models, lessons learned). Closely linked to the usage and non-usage of IS/IT are transformations of social and economic structures, appearance of new social inequalities (employability, income ect.), and general changes in the society due to the existence, use, and abandonment of IS/IT.
This mini track serves as a forum for the presentation and discussion of new and innovative interdisciplinary approaches of IS research for coping with current and future challenges of the discipline from a social science perspective.
We invite work-in-progress or completed research that supports a better understanding of the impact of IS/IT on social as well as economic structures and the society in general.
The topics of this Mini Track include but are not limited to:
* Social, political and economic impact of IS/IT
* Computer literacy, media competence, and digital divide issues
* Technology acceptance and the digital divide in specific social groups and industries
* Theoretical approaches towards e-skills and measurement of e-skills (empirical studies and case studies, triangulation studies, Comparative studies)
* Best practice models of initiatives addressing e-skills
* E-Skills and employability
* E-skills, income and individual careers
* Staff members' e-skills and its influence on productivity and efficiency of the company
* Secure usage through e-literacy
* Role of social and economic support on acquiring e-literacy
* Private vs. public learning (responsibility of governments and individuals) and relevance of e-learning
* Barriers & drivers for the broad adoption of IS/IT among citizens
* Models for IS/IT induced social/economic change and IS/IT induced transformation of social/economic structures
* The relationships of individuals, groups and communities and their technology induced transformation
Papers will be peer-reviewed using a double-blind system and will be considered for Best Paper Awards.
Mini-track Chair(s):
Roman Brandtweiner*
Vienna University of Economics and Business, Austria
Department of Information Systems and Operations
Roman.Brandtweiner(a)wu-wien.ac.at
*primary contact
Elisabeth Donat
University of Innsbruck, Austria
Department of Sociology
Elisabeth.Donat(a)uibk.ac.at
IMPORTANT DATES
Submission Opens: January 2, 2009
Papers Due: February 20, 2009
Notification of Acceptance: April 2, 2009 Camera Ready Copy Due: April 20, 2009
INSTRUCTIONS FOR PAPER SUBMISSION
Please submit final papers via Manuscript Central. (For more details see http://amcis2009.org/).
The AISWorld LISTSERV is a service of the Association for Information Systems (http://www.aisnet.org). To unsubscribe, redirect, or change subscription options please go to http://lyris.isworld.org/. You are subscribed to AISworld as: neumann(a)wu-wien.ac.at. Each Sender assumes responsibility that his or her message conforms to the AISWorld LISTSERV policy and conditions of use available at http://lyris.isworld.org/isworldlist.htm.
-------- Original-Nachricht --------
Betreff: [WI] Call for Papers I-KNOW' 09
Datum: Tue, 27 Jan 2009 10:40:31 +0100
Von: Markus Strohmaier <markus.strohmaier(a)tugraz.at>
An: epkcommunity(a)ec01.et-inf.fho-emden.de, kaw(a)swi.psy.uva.nl,
fgcscw(a)uni-koblenz.de, sw-ergo(a)gui-design.de,
emisa(a)informatik.uni-hannover.de, wi(a)aifb.uni-karlsruhe.de,
swiss-lib(a)aletsch.switch.ch, swt-de(a)informatik.uni-siegen.de,
ankuendigungen-gimod(a)liste.es.e-technik.tu-darmstadt.de,
orgmem(a)aifb.uni-karlsruhe.de
===============================================================================
Call for Papers I-KNOW' 09
9th International Conference on Knowledge Management and Knowledge
Technologies
http://www.i-know.at <http://www.i-know.at/>
2 - 4 September 2009, messecongress|graz, Austria
===============================================================================
Important Dates:
- Paper Submission Deadline: 9 March 2009
- Notification of Acceptance: April 2009
- Submission of Camera-Ready Paper: May 2009
- I-KNOW '09 Conference: 2-4 September 2009
Introduction
I-KNOW '09 will be held concurrently with the I-SEMANTICS' 09 -
International Conference on Semantic Systems. I-KNOW reflects the
increasing importance and convergence of knowledge management and
knowledge technologies and aims at bridging the gaps between the various
communities and their technology fields. Now in its ninth year, I-KNOW
has a tradition of bringing together Europe´s leading researchers and
practitioners involved in knowledge management. Attracting more than 500
attendees, I-KNOW is the premier conference on knowledge management and
knowledge technologies in Europe.
I-KNOW provides a perfect opportunity to stay abreast of the latest
developments in these fields. The novelty and quality of the accepted
contributions are ensured by a high-level program committee featuring
international experts on a broad range of knowledge management topics.
Submissions and Conference Proceedings
I-KNOW '09 invites the submission of original contributions from
academic, public and industrial/commercial sectors. The conference focus
is on application-oriented research with emphasis on information
technologies for knowledge management and new management tools and
methods. We welcome papers which present methods, tools, technologies
best practices, and case studies.
All accepted papers of I-KNOW '09 will appear in the printed conference
proceedings. Selected papers will also be invited for an extension to be
published as journal publication in J.UCS.
Conference topics include (but are not limited to):
Basics and Theories
- Methods for Knowledge Management
- Models for Knowledge Management
- Knowledge Management Systems and Applications
Knowledge Work Support
- Knowledge Services and Mash-Ups
- User Context Detection and Attention Metadata
- Creation and Maintenance of User Profiles
- Task Management and Task Mining
- Community and Collaboration Services
- Social Network Analysis
- Informal Learning at the Workplace
- Personal Information Management
- Tags, Folksonomies, and Ontologies
- Knowledge Representation and Modelling Methods
Knowledge Services
- SOA
- Web Services
- Orchestration of Semantic Services
- Quality of Service in Semantic Services
- Service Chain Analysis
Knowledge Relationship Discovery
- Cross-Media Search and Retrieval
- Ontology Lifecycle Algorithm and Methods
- Graph Mining and Statistical Relational Learning
- Text and Knowledge Mining
- Semantic Interoperability
- Salability Aspects and Parallel Algorithms in Knowledge Relationship
Discovery
- Evolution and Alignment of Knowledge Structures
- Semantic Integration of distributed Knowledge Repositories
Knowledge Visualization
- Visualisation of search results, text and multimedia corpora
- Visualisation of knowledge, concepts, relationships and information
structures
- Visualisation of temporal and spatial data
- Human computer interfaces for knowledge and information visualisation
- Visual Analytics for Knowledge Relationship Discovery
Innovative Approaches to Knowledge Management
- Emergent Technologies for Knowledge Management
- Agile Approaches to Knowledge Management
- Peer-to-Peer Knowledge Management
- Distributed Software Architectures for Knowledge Management Systems
Knowledge Management and Web 2.0
- Web 2.0-facilitated Knowledge Management
- Web 2.0 for Knowledge Transfer, Sharing and Diffusion
- Web 2.0 for Collaboration Support
- Case Studies and Best Practises
- Empirical Studies
- User Experience Studies
Conference Chairs
Klaus Tochtermann, Know-Center and Graz University of Technology, Austria
Hermann Maurer, Graz University of Technology, Austria
Program Chairs
Stefanie Lindstaedt, Know-Center and Graz University of Technology, Austria
Michael Granitzer, Know-Center and Graz University of Technology, Austria
Horst Bischof, Graz University of Technology, Austria
Werner Haas, Joanneum Research, Austria
Dietrich Albert, University of Graz, Austria
Preliminary Program Commitee
Raffaele De Amicis, Fondazione Graphitech, Italy
Jean-Yves Blaise, Centre national de la recherche scientifique, France
Remo Burkhard, ETH Zurich, Switzerland
Richard Chbeir, Bourgogne University, France
Giuseppe Conti, Fondazione Graphitech, Italy
Ulrike Cress, Knowledge Media Research Institute Tübingen, Germany
Andreas Dengel, DFKI, Germany
Mario Döller, University of Passau, Germany
Heinz Dreher, Curtin University of Technology, Australia
Erik Duval, University of Leuven, Belgium
Martin Eppler, University of Lugano, Switzerland
Joaquim Filipe, School of Technology of Setubal, Portugal
Tom Heath, Talis, UK
Barbara Kieslinger, Centre for Social Innovation (ZSI), Austria
Ralf Klamma, RWTH Aachen, Germany
Jörn Kohlhammer, Fraunhofer IGD, Germany
Rob Koper, Open University of the Netherlands, Netherlands
Harald Kosch, University of Passau, Germany
Narayanan Kulathuramaiyer, UNIMAS University, Malaysien
Franz Lehner, University of Passau, Germany
Sheng-Tun Li, National Cheng-Kung University, Taiwan
Dickson Lukose, MIMOS, Malaysia
Mathias Lux, Alpen Adria University Klagenfurt, Germany
Ronald Maier, University of Innsbruck, Austria
Kathrine Maillet, Institut Telecom SudParis, France
Robert Meersman, Free University of Brussels, Belgium
Ambjörn Naeve, Royal Institute of Technology, Sweden
Wolfgang Nejdl, L3S, Germany
Tomas Pitner, Masaryk University of Brno, Czek Republic
Wolfgang Prinz, RWTH Aachen and Fraunhofer FIT, Germany
Martin Potthast, Bauhaus University Weimar, Germany
Uwe Riss, SAP Research, Germany
Marc Rittberger, DIPF - German Institute for International Educational
Research, Germany
Ramon Sabater, University of Murcia, Spain
Kurt Schneider, University of Hannover, Germany
Ursula Schneider, University of Graz, Austria
Luciano Serafini, Fondazione Bruno Kessler (FBK-IRST), Italy
Marc Spaniol, Germany
Benno Stein, Bauhaus University Weimar
Rudi Studer, University of Karlsruhe, Germany
Jim Thomas, Pacific Northwest Laboratory, USA
Robert Tolksdorf, Free University of Berlin, Germany
Ivan Tomek, Acadia University, Canada
Sofia Tsekeridou, Athens IT Excellence Center, Greece
Eric Tsui, Hong Kong Polytechnic University, China
Bodo Urban, Frauhofer IGD, Germany
Wibke Weber, Hochschule der Medien, Stuttgart, Germany
Martin Wolpers, Fraunhofer FIT, Germany
Yunwen Ye, Software Research Associates, Inc., Japan
Volker Zimmermann, imc AG, Germany
--------------------------------------------------
Mag. Anita Grießer (vormals Wutte)
Assistentin der Geschäftsführung
Know-Center GmbH &
Inst. f. Wissensmanagement (TU Graz)
Inffeldgasse 21a, 8010 Graz, Austria
Email: agriesser(a)know-center.at <mailto:agriesser@know-center.at>
Tel.: +43 316 873 9251
Fax: +43 316 873 9254
-------------------------------------------------------------------
--
Mailing-Liste: WI(a)aifb.uni-karlsruhe.de
Administrator: WI-admin(a)aifb.uni-karlsruhe.de
Konfiguration: http://www.aifb.uni-karlsruhe.de/mailman/listinfo/wi
-------- Original-Nachricht --------
Betreff: [isworld] Second CFP: The Third International Workshop on RFID
Technology - Concepts, Applications, Challenges
Datum: Tue, 27 Jan 2009 04:33:14 -0500
Von: Yanbo WU <yanbo.wu(a)adelaide.edu.au>
Antwort an: Yanbo WU <yanbo.wu(a)adelaide.edu.au>
An: AISWORLD Information Systems World Network <isworld(a)lyris.isworld.org>
The Third International Workshop on RFID Technology - Concepts,
Applications, Challenges (IWRT'09)
6-7 May 2009, Milan, Italy
http://www.iceis.org/Workshops/iwrt/iwrt2009-cfp.htm
In conjunction with the 11th International Conference on Enterprise
Information Systems (ICEIS'09)
Workshop Background and Goals
-----------------------------
Radio Frequency Identification (RFID) systems are emerging as one of the
most pervasive computing technologies due to their low cost and their
broad applicability. RFID systems consist of tiny integrated circuits
equipped with antennas (RFID tags) that communicate with their reading
devices (RFID readers) using radio-frequency waves without line of sight.
This creates tremendous opportunities for linking various objects from
real world. These objects are numbered, identified, cataloged, and
tracked. RFID systems present many advantages and features that cannot be
found in other ubiquitous computing environments. RFID communication is
fast, convenient and its application can substantially save time, improve
services, reduce labor cost, thwart product counterfeiting and theft,
increase productivity gains and maintain quality standards. Common
applications range from highway toll collection, supply chain management,
public transportation,controlling building access, animal trac!
king, developing smart home appliances and remote keyless entry for
automobiles to locating children. In addition, RFID technology also offers
a viable approach to implement physical user interfaces. The services
available in the local environment are advertised by RFID tags. Users
browse the services and activate the desired service by simply touching
the corresponding tag with a mobile terminal that is equipped with an RFID
reader. In the near future, these user interfaces would introduce RFID
tags into our everyday lives.
While RFID provides promising benefits such as inventory visibility and
business process automation, some significant challenges need to be
overcome before these benefits can be realized. One important issue is how
to process and manage RFID data, which is typically in large volume, noisy
and unreliable, time-dependent, dynamically changing, and of varying
ownership. Another issue is how to seamlessly integrate low-level RFID
data into (existing) enterprise information infrastructures (e.g.,
upper-level business processes). Finally, RFID systems present a number of
inherent vulnerabilities with serious potential security implications.
Indeed, given the ability of inexpensively tagging and thus monitoring a
large number of items and/or people, RFID raises some serious security and
privacy concerns. RFID systems are vulnerable to a broad range of
malicious attacks ranging from passive eavesdropping to active
interference. RFID privacy and security are stimulating research are!
as that involve rich interplay among many disciplines, such as signal
processing, hardware design, supply-chain logistics, privacy rights, and
cryptography.
The workshop's objective is to provide a forum for researchers,
practitioners, and users to exchange new ideas, developments, and
experience on issues related to this emerging field.
Topics of Interest
----------------------
We welcome papers that focus on novel RFID technologies and applications.
Topics of interests include, but are not limited to:
Data management issues in RFID applications
Innovative RFID-enabled applications
RFID and physical user interfaces
Security/privacy and RFID
RFID and sensor networks
Web services and RFID
RFID and semantic Web
RFID standards
RFID case studies and field trials
RFID middleware
Next generation RFID technologies
Commercial experience with RFID
RFID network management
COTS and Open Source RFID infrastructure
Integration of RFID with other applications
Performance evaluation
Business process redesign and RFID
Intrusion Detection in RFID systems
Behavior analysis
Situation awareness
Submission and Review of Papers
--------------------------------
All papers must be written in English. Papers should be prepared in
postscript, PDF, or Word and should be submitted through ICEIS web-based
paper submission system.
All the submitted papers will be reviewed by at least 3 reviewers. We will
also implement a rebuttal phase during the paper selection process.
Authors will be invited to supply a response to the reviewers' comments.
The paper selection will be based on both reviewers' comments and authors'
responses.
Format of the Workshop
------------------------
The workshop will consist of oral presentations. The proceedings of the
workshop will be published in the form of a book by INSTICC Press and
indexed in DBLP.
Journal Publication
--------------------
Best papers of the workshop will be considered for further publication in
a forthcoming Special issue of a well-known international journal planned
shortly after the workshop.
Workshop Co-Chairs
-------------------------
Dr. Michael Sheng
School of Computer Science
The University of Adelaide
Adelaide, SA 5005, Australia
qsheng(a)cs.adelaide.edu.au
Dr. Zakaria Maamar
College of Information Technology
Zayed University
Po Box 19282, Dubai,U.A.E
zakaria.maamar(a)zu.ac.ae
Dr. Sherali Zeadally
Department of Computer Science and Information Technology
University of the District of Columbia, USA
szeadally(a)udc.edu
Dr. Katerina Mitrokotsa
Faculty of Electrical Engineering, Mathematics and Computer Science
Technical University of Delft, The Netherlands
A.Mitrokotsa(a)TUDelft.nl
Workshop Publicity Chair
Yanbo Wu, The University of Adelaide, Australia
Workshop Program Committee
---------------------------
Thierry Bodhuin, University of Sannio, Italy
Leonid Bolotnyy, University of Virginia, USA
Mike Burmester, Florida State University, USA
Mark Cameron, CSIRO ICT Center, Australia
Hesham El-Sayed, United Arab Emirates University, UAE
Rajit Gadh, UCLA, USA
Sozo Inoue, Kyushu University, Japan
Behnam Jamali, Auto-ID Lab, The University of Adelaide, Australia
Roger Jiao, Georgia Institute of Technology, USA
Mohamed Latrach, ESEO, France
Xue Li, The University of Queensland, Australia
Weifa Liang, The Australian National University, Australia
Tao Lin, SAP Research, USA
Zongwei Luo, University of Hong Kong, China
Tom Karygiannis, National Institute of Standards and Technology (NIST)
John Mo, RMIT University, Australia
Jukka Riekki, University of Oulu, Finland
Nicolas Sklavos, University of Patras, Greece
Fusheng Wang, Siemens Corporate Research, USA
Eiko Yoneki, University of Cambridge, UK
Holger Ziekow, Humboldt-Universitaet zu Berlin, Germany
Important Dates
-----------------
Paper Submission: February 6, 2009
Author Notification: March 6, 2009
Camera-Ready and Registration: March 17, 2009
Workshop Venue
---------------------
The workshop will be held in conjunction of the 11th International
Conference on Enterprise
Information Systems (ICEIS 2009) in Milan, Italy.
Registration Information
-------------------------
At least one author of an accepted paper must register for the workshop.
The registration
information can be found from http://www.iceis.org.
Secretariat
-------------------------
ICEIS 2009 Secretariat - The Third International Workshop on RFID
Technology (IWRT 2009)
E-mail: workshops(a)iceis.org
Web site: http://www.iceis.org
The AISWorld LISTSERV is a service of the Association for Information Systems (http://www.aisnet.org). To unsubscribe, redirect, or change subscription options please go to http://lyris.isworld.org/. You are subscribed to AISworld as: neumann(a)wu-wien.ac.at. Each Sender assumes responsibility that his or her message conforms to the AISWorld LISTSERV policy and conditions of use available at http://lyris.isworld.org/isworldlist.htm.
-------- Original-Nachricht --------
Betreff: [isworld] TOC: Journal of Information Privacy and Security
(JIPS) - Volume 4 Issue 2
Datum: Mon, 26 Jan 2009 18:02:58 -0600
Von: Changchit, Chuleeporn <Chuleeporn.Changchit(a)tamucc.edu>
Antwort an: Changchit, Chuleeporn <Chuleeporn.Changchit(a)tamucc.edu>
An: AISWORLD Information Systems World Network <isworld(a)lyris.isworld.org>
In this announcement:
Table of contents of the Current Issue
Editorial Preface from the Current Issue
Please distribute to colleagues, authors and relevant lists.
----------------------------------------------------------------------------------------
Journal of Information Privacy and Security (JIPS) Volume 4, Issue 2
Editor-in-Chief: Chuleeporn Changchit, Texas A&M University - Corpus Christi Journal website: http://jips.cob.tamucc.edu
Publisher: Ivy League Publishing;
Website: http://www.ivylp.com ; Email: admin(a)ivylp.com
Table of contents
Editorial Preface
Chuleeporn Changchit
Misuse Cases for Identifying System Dependability Threats
Guttorm Sindre and Andreas L. Opdahl
A Two-phase Authentication Protocol Using the Cell Phone as a Token
Carl Adams and Alexandros Dimitriou
SVDC: Preserving Privacy in Clustering using Singular Value Decomposition
N. Maheswari and K. Duraiswamy
Expert Opinion: Interview with Alan T. Lord, Ernst and Young Professor of Accounting and Director
Valrie Chambers
Book Review: Security Metrics - Replacing Fear, Uncertainty, and Doubt by Andrew Jaquithy
Tim Klaus
*********************************************************************************************************************************************************
Editorial Preface from the current Issue:
Although we have quite a long delay for the second issue of the year (blame Hurricane Ike), all three articles published in this issue are quite interesting. As information privacy and security issues become more difficult to maintain, it is more vital for an organization to define and address necessary elements that can mitigate these violations. The three articles each suggest various techniques, methods, and potential research evaluation for identifying threats and "concealing information" effectively to improve privacy and security.
The first article, "Misuse Cases for Identifying System Dependability Threats" by Guttorm Sindre and Andreas L. Opdahl reviews current stages of techniques implemented for misuse case analysis. The authors present a review for early elicitation of security-related threats and requirements to information systems. By analyzing prior studies, the authors delve further into the application of misuse cases on other factors and point out potential considerations in misuse cases. Their findings indicate that the technique can be further explored and developed, and given the swift adaptation among the research population. The authors conclude that the technique is easy to understand and use, thus satisfies perceived need. The authors suggest that industries develop standards and security tools or misuse templates. They also recommend academic researchers to participate in the early planning stages of development projects where security issues are central.
The second article, "A Two-phase Authentication Protocol Using the Cell Phone as a Token" by Carl Adams and Alexandros Dimitriou provides an overall examination of the weaknesses intrinsic to accessibility of resources when using mobile phones as proof of identity. The authors discuss the need for authentication with remote access to resources and develop a model for a "two-phase authentication protocol". They sustain that the protocol presented in this article should provide a simplistic alternative when compared to others, as it contains a wider range of applications extending inclusively to its use of smart cards while increasing user security.
The third article, "SVDC: Preserving Privacy in Clustering using Singular Value Decomposition" by Maheswari Rajavel and Duraiswamy Karuppuswamy analyses the Privacy Preserving Data Mining (PPDM) concept that emerged from privacy protection issues of unauthorized access from a national security and a business transaction perspective. Based on the concerns that emerge from this concept, the considerations for data distortion were the element that provided incentive for this study. Therefore, the authors focus on "privacy preserving data clustering" and propose the "Singular Value Decomposition Clustering" (SVDC) method to comply with the privacy necessities by deforming the private numeric characteristics. This method is subject to study using the original database and quantifying the amount of information that is preserved when the database is transformed. Hence, the authors' focal point aims at the provision of the precise data for the clustering analysis and in addition to the protection of individual data records. The results demonstrate that the method suggested should be useful among organizations aiding them to transfer sensitive data in a secure manner by providing an increased degree of data distortion.
In the Expert Opinion section conducted by Valrie Chambers, Alan T. Lord, Ernst and Young Professor of Accounting and Director, Bowling Green State University, discusses the meanings and importance of IT audits. He suggests important ideas that industry professionals and academics in the privacy and security area might want to take into the consideration.
In the Book Review section, Tim Klaus reviews the book entitled Security Metrics - Replacing Fear, Uncertainty, and Doubt by Andrew Jaquithy. According to his opinion, this book presents many practical suggestions helpful in providing ideas relevant to many business environments. He also notes that although the book provides many useful analogies and tools, readers may be left to consider how metrics can be better incorporated into their company's unique environment.
Finally, I wish everyone a great and happy holiday season!
Chuleeporn Changchit
December 2008
The AISWorld LISTSERV is a service of the Association for Information Systems (http://www.aisnet.org). To unsubscribe, redirect, or change subscription options please go to http://lyris.isworld.org/. You are subscribed to AISworld as: neumann(a)wu-wien.ac.at. Each Sender assumes responsibility that his or her message conforms to the AISWorld LISTSERV policy and conditions of use available at http://lyris.isworld.org/isworldlist.htm.
-------- Original-Nachricht --------
Betreff: [computational.science] CfP: Intelligent Distributed Computing
2009 - IDC'2009
Datum: Mon, 26 Jan 2009 19:12:25 +0200
Von: Costin Badica <badica_costin(a)software.ucv.ro>
Organisation: "OptimaNumerics"
An: Computational Science Mailing List
<computational.science(a)lists.optimanumerics.com>
[Please apologize if you receive multiple copies]
*********************** IDC'2009 - call for papers ************************
3rd International Symposium on Intelligent Distributed Computing - IDC 2009
===========================================================================
October 12-14, 2009, Ayia Napa, Cyprus
http://www.idc2009.cs.ucy.ac.cy
Organized by
Department of Computer Science, University of Cyprus, Cyprus
Software Engineering Department, University of Craiova, Romania
Call for Papers
===============
Intelligent computing covers a hybrid palette of methods and techniques derived from classical artificial intelligence, computational intelligence, multi-agent systems a.o. Distributed computing studies systems that contain loosely-coupled components running on different networked computers and that communicate and coordinate their actions by message transfer. The emergent field of intelligent distributed computing is expected to pose special challenges of adaptation and fruitful combination of results of both areas with a great impact on the development of new generation intelligent distributed information systems. The aim of this symposium is to bring together researchers involved in intelligent distributed computing to allow cross-fertilization and synergy of ideas and to enable advancement of researches in the field.
The symposium welcomes submissions of original papers concerning all aspects of intelligent distributed computing ranging from concepts and theoretical developments to advanced technologies and innovative applications. Papers acceptance and publication will be judged based on their relevance to the symposium theme, clarity of presentation, originality and accuracy of results and proposed solutions. Topics include, but are not limited to:
- Intelligent service composition and orchestration
- E-service and Web intelligence
- Multi-agent systems
- Information extraction and retrieval in distributed environments
- Data mining and knowledge discovery in distributed environments
- Semantic and knowledge grids
- Intelligent integration of data and processes
- Distributed problem solving and decision making
- Ontologies and meta-data for describing heterogeneous resources and services
- Autonomic, adaptive and self-organising distributed computing and systems
- Intelligence in mobile, ubiquitous and pervasive computing
- Intelligence in cooperative information systems, groupware and workflows, virtual enterprises, social networks
- Intelligent distributed applications in e-business/e-commerce, e-learning, e-health, e-science, e-government, crisis management
- Intelligence in Peer-to-Peer systems
- Emerging behaviours in complex distributed systems
- Modelling and simulation of intelligent distributed systems
Paper Submission and Publication
================================
All accepted papers will be included in the Symposium Proceedings, which will be published by Springer as part of their series Studies in Computational Intelligence. Papers should have at most 10 pages length and must be formatted according to Springer format.
Submissions and reviews are automatically handled by a system provided by the organizers. Please submit your paper here:
http://www.easychair.org/conferences/?conf=idc2009
Extended versions of the best papers accepted and presented at this symposium may be considered for publication in a Special Issue of an internationally recognized journal.
Important dates
===============
Full paper submission: April 3, 2009
Notification of acceptance: May 8, 2009
Final (camera ready) paper due: June 12, 2008
Symposium: October 12-14, 2009
Organization
============
Please see: http://www.idc2009.cs.ucy.ac.cy/organization.html
Committees
==========
Please see: http://www.idc2009.cs.ucy.ac.cy/committees.html
-------- Original-Nachricht --------
Betreff: [isworld] Call For Papers - 4th Annual Symposium on
Information Assurance (ASIA '09)
Datum: Mon, 26 Jan 2009 13:59:58 -0500
Von: Kibily Demba Samake <ksamak1(a)lsu.edu>
Antwort an: Kibily Demba Samake <ksamak1(a)lsu.edu>
An: AISWORLD Information Systems World Network <isworld(a)lyris.isworld.org>
CALL FOR PAPERS
4th Annual Symposium on Information Assurance (ASIA '09) and 12th Annual
New York State Cyber Security Conference June 3-4, 2009, Empire State
Plaza (Albany, NY)
Website: http://www.albany.edu/iasymposium
IMPORTANT DATES
Paper Submission Deadline February 15, 2009
Reviewer Feedback March 15, 2009
Final Paper Submission March 31, 2009
SYMPOSIUM GENERAL CHAIR:
Sanjay Goel
Director of Research, NYS Center for Information Forensics and Assurance
(CIFA) Associate Professor, School of Business University at Albany,
State University of New York BA 310b, 1400 Washington Ave. Albany, NY
12222
PH: (518) 442-4925
goel(a)albany.edu
SYMPOSIUM CO-CHAIR:
Laura Iwan
NY State Information Security Officer, NY State Office of Cyber Security
& Critical Infrastructure Coordination
OVERVIEW:
Authors are invited to submit original and unpublished papers to the 4th
Annual Symposium on Information Assurance. Accepted papers will appear
in the symposium proceedings and selected papers may be selected for a
journal. This symposium is jointly held with the 12th Annual New York
State Cyber Security Conference. A special theme for the overall
conference is cyber warfare. This two-day event attracts practitioners,
researchers, and vendors providing opportunities for business and
intellectual engagement among attendees. The symposium is organized by
the School of Business and the NYS Center for Information Forensics and
Assurance (CIFA) at the University at Albany, State University of New
York, as well as the NYS Office of Cyber Security and Critical
Infrastructure Coordination.
SUGGESTED TOPICS (but not limited to):
Cyber Warfare
Network Security and Intrusion Detection Internet-based Terrorism and
Espionage Reverse Engineering of Viruses and Worms Security Policy
Implementation & Compliance Botnet Detection and Prevention Information
Security Risk Management Security in Wireless and Ad hoc Networks
Economics of Information Security Adaptive & Resilient Security Models
Computer & Network Forensics Biological Models of Security Computer
Crime and Digital Forensics Distributed Systems Security Privacy &
Security Database Security and Data Integrity Digital Rights Management
Forensic Accounting and Fraud Detection Linguistic Analysis for Security
and Intelligence Curriculum Development in Information Security
SUBMISSION CATEGORIES:
Submissions can be made in a number of categories: Completed research
papers, research-in-progress papers, case studies, and panel
proposals/round table discussions. Please follow the following
guidelines in preparing your submission.
1. Completed Research Papers: Typically 5,000 words long (excluding
abstract and references).
2. Research in Progress Papers: Typically 2,500 words (excluding
abstract and references).
3. Case Studies: Typically between 3,000 and 5,000 words long.
4. Round Table Discussion: Typically a 1,000 word synopsis of the topic
area.
5. Panel Proposals: Typically a 1,000 word description, identifying the
panelists to be involved.
SUBMISSION GUIDELINES:
1. Submitted papers must not have been previously published, or
currently under consideration for publication elsewhere, or have
substantial overlap with papers the author has submitted elsewhere.
2. Submissions undergo a double-blind peer review process.
3. Papers selected for presentation will be published in formal
proceedings. Arrangements are also being made with journals to publish
extended versions of selected papers from the symposium.
4. Papers in the topic areas discussed are preferred, although
contributions outside those topics may also be of interest. Please feel
free at any time to contact the symposium chair if you have questions
regarding your submission.
5. Papers should be submitted via email to the chair at goel(a)albany.edu
in IEEE format and should include the following:
a) Separate title page (in plain text) with Title, Name(s) of authors,
Organizational affiliation(s), telephone and fax number(s), postal
address(es), and email address(es), Author to contact for correspondence
about the paper.
b) Abstract (less than 250 words)
c) Paper including a brief biography of each author as appropriate at
the end of the paper
TECHNICAL PROGRAM COMMITTEE:
Alexey Salnikov, Moscow State University, Russia Anil B. Somayaji,
Carleton University, Canada George Berg, University at Albany, SUNY
Gurpreet Dhillon, Virginia Commonwealth University Hong C. Li, Intel
Corporation Martin Loeb, University of Maryland Nasir Memon, Brooklyn
Polytechnic Raghu T. Santanam, Arizona State University Stephen F. Bush,
GE Global Research Center Boleslaw Szymanski, Rensselaer Polytechnic
Institute Shambhu J. Upadhyaya, University at Buffalo, SUNY Rahul Singh,
University of North Carolina, Greensboro Michael Sobolewski, Texas Tech
University R. Sekar, Stony Brook University, SUNY Robert Bangert-Drowns,
University at Albany, SUNY S. S. Ravi, University at Albany, SUNY Raj
Sharman, University at Buffalo, SUNY Stelios Sidiroglou, Columbia
University Daniel Rice, Loyola College M.P. Gupta, Indian Institute of
Technology, Delhi Dipankar Dasgupta, University of Memphis Shiu-Kai
Chin, Syracuse University
The AISWorld LISTSERV is a service of the Association for Information Systems (http://www.aisnet.org). To unsubscribe, redirect, or change subscription options please go to http://lyris.isworld.org/. You are subscribed to AISworld as: neumann(a)wu-wien.ac.at. Each Sender assumes responsibility that his or her message conforms to the AISWorld LISTSERV policy and conditions of use available at http://lyris.isworld.org/isworldlist.htm.
-------- Original-Nachricht --------
Betreff: [isworld] CFP: GDBS Conference on Service Management in
Orlando, May 21-24, 2009
Datum: Mon, 26 Jan 2009 08:05:16 -0500
Von: mahadeo p jaiswal <mpjaiswal(a)mdi.ac.in>
Antwort an: mahadeo p jaiswal <mpjaiswal(a)mdi.ac.in>
An: AISWORLD Information Systems World Network <isworld(a)lyris.isworld.org>
Call for Papers
INTERNATIONAL CONFERENCE ON SERVICE MANAGEMENT (ICSM 2009)
Organized by Global Digital Business Society (www.gdbs.org)
MAY 21-24, 2009 at ORLANDO, FLORIDA, USA
PAPER SUBMISSION DEADLINE FEBRUARY 28, 2009
------------------------------------------------------------------
Conference Theme and Tracks:
The theme of this conference is to bring together professionals from
various parts of the world to look at Service Management Issues relating
to e-business, e-marketing, e-management area. Service Quality issues
relating to part of the business and their consequent impact on
organizational performance would be areas of particular interest. The
conference would provide insights on Global Best Business Practices in
varied economic environments that would help identify leapfrogging
strategies for emerging economies. Papers dealing with all aspects of
Online Business and Management are welcome. In particular, papers that
explore the multidisciplinary nature of the subject matter with the
following sub theme are encouraged.
� Enterprise Service Management and Architecture
� Software as Service (SaaS) and Project as Service (PaaS)
� E-Service Quality
� IT Enabled Services, E-Services, Business Process Outsourcing
� ITIL and e-SCM Standards
� E-Business Strategies and Models
� E-Learning Issues and Strategies
� E-Marketing Issues and Strategies
� Supply Chain Management
� Global Best Business Practices and Change Management
� Knowledge Management, Networking/Communities of Practice
� Customer Relationship Management
� Enterprise Systems Capabilities
� Service Oriented Architecture, Web 2.0 and MDM
� RFID Technology Integration and Applications
� Global IT Strategy and Management Innovations
� Balance Score Card and Performance Measures
Submission Instructions
Submissions can be made in a number of categories: Completed research
papers, case studies, panels and panel/round table discussion papers.
Please follow the following guidelines in preparing your submission.
Completed research papers
Typically 3000-5,000 words long (excluding abstract and references)
Case studies
Typically between 3,000 and 5,000 words long
In preparing your papers, please follow Author Guidelines link. Submission
and review process will be handled electronically. Please make your
submission as one MSWord or RTF file. Include all figures and tables in
relevant places in the text. The title page should indicate the title,
author affiliations including telephone, fax and email, in case of
multiple authors corresponding author details should be clearly
identified. All submissions will be double blind peer reviewed. All
papers (other than authors from India) should be submitted to:
GARG(a)GDBS.ORG
Best or highly selected papers may be considered for publication in the
Journal of Digital Business (JDB). JDB is a refereed journal and is listed
in Cabell directory. Selection of the papers to be included in JDB will be
made at the at the time of the conference.
Conference Co-Chair
Mahadeo Jaiswal
Mahadeo Jaiswal, PhD
Professor, Information Systems
Chairman, Research & Consultancy
Management Development Institute
Gurgaon 122007-02, INDIA
E-Mail: mpjaiswal(a)mdi.ac.in
Phone: +91-124-4560504
Fax: +91-124-2341189
The AISWorld LISTSERV is a service of the Association for Information Systems (http://www.aisnet.org). To unsubscribe, redirect, or change subscription options please go to http://lyris.isworld.org/. You are subscribed to AISworld as: neumann(a)wu-wien.ac.at. Each Sender assumes responsibility that his or her message conforms to the AISWorld LISTSERV policy and conditions of use available at http://lyris.isworld.org/isworldlist.htm.
-------- Original-Nachricht --------
Betreff: [isworld] Call for Papers IDEAS 2009
Datum: Mon, 26 Jan 2009 07:05:56 -0500
Von: Domenico Sacca <sacca(a)si.deis.unical.it>
Antwort an: Domenico Sacca <sacca(a)si.deis.unical.it>
An: AISWORLD Information Systems World Network <isworld(a)lyris.isworld.org>
Please accept our apologies for cross-posting
======================================================
I D E A S ' 0 9
(http://confsys.encs.concordia.ca/ideas09/)
International Database Engineering & Applications Symposium
Cetraro (Calabria), Italy, 16-18 September 2009
CALL FOR PAPERS
The aim of the IDEAS series of symposiums is to address the
engineering
and application aspects of databases.
IDEAS series of symposiums are scheduled annually and have been held
since 1997 in North America, Europe and Asia and has attracted
participants from governmental and non-governmental agencies,
industries,
and academia.
IDEAS'09 invites quality papers describing original research and new
findings on technological and theoretical aspects of database
engineering and applications. In particular, we welcome submissions
describing work on integrating new technologies into products and
applications, on experiences with existing and novel techniques, and on
the identification of unsolved challenges. We consider this symposium to
be an important forum to discuss experiences in applying databases to
actualmsituations.
Authors are invited to submit papers in English, reporting recent research
in the area of databases, applications, experience in related fields.
While research papers should report original research work,
experience and application papers should describe the development and
operations of challenging database related systems and applications.
The symposium plans to have focused sessions in the following areas:
* Core databases technology
* Query processing and optimization
* Databases and XML
* Data models and languages
* Data quality, integration, exchange and warehousing
* Knowledge Discovery, Data and Process mining
* Databases for e-commerce, e-governance, and other e-applications
* Bio-medical, life science and medical databases
* Privacy and security issues
* Semantic Web and Web 2.0 vs. databases
* P2P and Networked Data Management
* Stream Databases
* Emerging database technologies
IMPORTANT DATES
Paper submission deadline: April 26, 2009
Acceptance notice: June 8, 2009
Camera-ready copies due: June 29, 2009
Conference: September 16-18, 2009
SUBMISSION INSTRUCTIONS
Please visit the ConfSys
(http://confsys.encs.concordia.ca/ideas09/) web sites for further
instructions and submission guidelines. ConfSys will be used to manage all
administrative functions of the conference. The conference proceedings
will be published by BytePress. The extended version of the best papers
would also be invited for publication in reputed journals.
CALL FOR WORKSHOP PROPOSALS
Proposals are invited for workshops to be held in conjunction with the
symposium, in the areas of interest within the scope of conference. The
detailed proposals should reach the program chairs by 14 May, 2008.
It is also planned to hold a special workshop for doctoral candidates from
the field.
ORGANIZATION
Organized by: Concordia University (Montreal, Canada), University of
Calabria (Rende, Italy) and ICAR-CNR (Rende, Itay) with the cooperation of
ACM and BytePress
General Chair: Bipin C. Desai (Concordia University, Montreal, Canada)
Program Chairs: Sergio Greco and Domenico Saccà (University of Calabria,
Rende, Italy)
Local Chairs: Alfredo Cuzzocrea (ICAR-CNR, Rende, Italy), Sergio Flesca
(Universita' della Calabria, Rende, Italy)
VENUE
The Symposium venue will be Grand Hotel San Michele in Cetraro, a nice
seaside resort in Southern Italy. The hotel is located high on a cliff
above the Tyrrhenian coast of Calabria Region - a lift within the rocks
takes hotel guests to the beach. In 1981 the Summer School on Theoretical
Issues in Data Bases took place in the same hotel, which later originated
the International Conference on Database Theory (ICDT).
The hotel will apply special full board prices, per day and per person
to participants and to accompanying persons.
The AISWorld LISTSERV is a service of the Association for Information Systems (http://www.aisnet.org). To unsubscribe, redirect, or change subscription options please go to http://lyris.isworld.org/. You are subscribed to AISworld as: neumann(a)wu-wien.ac.at. Each Sender assumes responsibility that his or her message conforms to the AISWorld LISTSERV policy and conditions of use available at http://lyris.isworld.org/isworldlist.htm.