-------- Original-Nachricht --------
Betreff: [isworld] CAISE'2010: Call for Papers & Call Workshops and
Tutorials
Datum: Sat, 12 Sep 2009 14:57:28 -0400
Von: Selmin NURCAN <nurcan(a)univ-paris1.fr>
Antwort an: Selmin NURCAN <nurcan(a)univ-paris1.fr>
An: AISWORLD Information Systems World Network <isworld(a)lyris.isworld.org>
Dear Colleagues,
Please find underneath the Call for Papers for the 22nd International
Conference on Advanced Information Systems Engineering.
We invite you to submit your work in CAISE'2010.
We will be grateful to you for advertising CAISE'2010 and inviting your
colleagues and/or research students to submit their work.
I hope to meet you at Hammamet the next summer.
Best regards,
Selmin Nurcan
CAISE'2010 Publicity Chair
*****************************************************************
(We apologize if you are receiving duplicates through different
channels...)
*****************************************************************
Call for Papers
The 22nd International Conference on Advanced Information Systems
Engineering (CAiSE'2010)
Evolving Information Systems
June 7� 11, 2010 Hammamet, Tunisia
http://www.caise2010.rnu.tn
General Chairs:
Colette Rolland, University of Paris 1 - Pantheon Sorbonne, France
Henda Ben Ghezala, ENSI, Tunisia
PC Chair:
Barbara Pernici, Politecnico di Milano, Italy
Advisory Committee:
Arne Solvberg, Norwegian University of Science and Technology, Norway
Janis Bubenko Jr , Royal Institute of Technology, Sweden
Colette Rolland, University of Paris 1 - Panthéon Sorbonne, France
Papers submission deadline: November 30, 2009
The Call for Papers (PDF version) can be downloaded from the CAISE'2010
Web site
http://www.caise2010.rnu.tn/data/CFP_CAISE10.pdf
The conference proceedings will be published in Springer Lecture Notes in
Computer Science (LNCS).
*****************************************************************
-------------8
<-------------------8<-------------------8<-------------------8<-------------------8<--------
CAISE 2010
CALL FOR PAPERS
22nd International Conference on Advanced Information Systems Engineering
(CAiSE'08)
Evolving Information Systems
JUNE 7-11, 2010, Hammamet, Tunisia
Papers submission deadline: November 30, 2009
http://www.caise2010.rnu.tn
SCOPE AND TOPICS:
This year's special theme is "Evolving information systems".
Modern information systems are the result of the interconnection of
systems of many organizations, are running in variable contexts, and
require both a lightweight approach to interoperability and the capability
to actively react to changing requirements and failures. In addition,
users of information systems are becoming more and more mobile and
ubiquitous, requiring the system to adapt to their varying usage contexts
and goals.
The evolution of an information system should be a continuous process
rather than a single step, and it should be inherently supported by the
system itself and the design of the information system should consider
evolution as an inherent property of the system.
The special events and invited speakers of CAiSE '2010 will shed light on
this theme from various perspectives.
Goal: CAiSE'2010 aims to bring together researchers and practitioners in
the field of information systems engineering. CAiSE'2010 invites
submissions on the design, development, maintenance, and usage of
information systems - and especially submissions dealing with evolving
information systems.
Topics of interests include, but are not restricted to:
Methodologies and approaches for IS engineering
- Enterprise architecture and enterprise modelling
- Requirements engineering
- Business process modelling and management
- Simulation
- Model, component, and software reuse
- IS reengineering
- IS engineering approaches for adaptive and flexible information systems
- Service science
- Knowledge patterns and ontologies for IS engineering
- IS in networked & virtual organizations
- Method engineering
Innovative platforms, architectures and technologies for IS engineering
- Service-oriented architecture
- Model-driven architecture
- Component based development
- Agent architecture
- Distributed, mobile, and open architecture
- Innovative database technology
- Semantic web
- IS and ubiquitous technologies
- Adaptive and context-aware IS
Engineering of specific kinds of IS:
- eGovernment
- Enterprise systems (ERP, CRM, CRM)
- Data warehousing
- Workflow systems
- Knowledge management systems
- Content management systems
Quality concerns in IS engineering
- Knowledge, information, and data quality
- Quality of models and their languages
- Usability, security, trust, flexibility, interoperability
IMPORTANT DATES:
Tutorials & Workshops submission deadline: October 12, 2009
Papers submission deadline: NOVEMBER 30, 2009
Notification of acceptance: February 18, 2010
CAISE 2010 Conference & Workshops: June 7-11, 2010
TYPES OF CONTRIBUTIONS:
We invite four types of original and scientific papers:
o Formal and/or technical papers describe original solutions (theoretical,
methodological or conceptual) in the field of IS engineering. A technical
paper should clearly describe the situation or problem tackled, the
relevant state of the art, the position or solution suggested and the
potential - or, even better, the evaluated - benefits of the contribution.
o Empirical evaluation papers evaluate existing problem situations or
validate proposed solutions with scientific means, i.e. by empirical
studies, experiments, case studies, simulations, formal analyses,
mathematical proofs, etc. Scientific reflection on problems and practices
in industry also falls into this category. The topic of the evaluation
presented in the paper as well as its causal or logical properties must be
clearly stated. The research method must be sound and appropriate.
o Experience papers present problems or challenges encountered in
practice, relate success and failure stories, or report on industrial
practice. The focus is on 'what' and on lessons learned, not on an
in-depth analysis of 'why'. The practice must be clearly described and its
context must be given. Readers should be able to draw conclusions for
their own practice.
o Exploratory Papers can describe completely new research positions or
approaches, in order to face to a generic situation arising because of new
ICT tools or new kinds of activities or new IS challenges. They must
describe precisely the situation and demonstrate how current methods,
tools, ways of reasoning, or meta-models are inadequate. They must
rigorously present their approach and demonstrate its pertinence and
correctness to addressing the identified situation.
SUBMISSION CONDITIONS:
Papers should be submitted in PDF format. The results described must be
unpublished and must not be under review elsewhere. Submissions must
conform to Springer's LNCS format and should not exceed 15 pages,
including all text, figures, references and appendices. Submissions not
conforming to the LNCS format, exceeding 15 pages, or being obviously out
of the scope of the conference, will be rejected without review.
Information about the Springer LNCS format can be found at
http://www.springer.de/comp/lncs/authors.html. Three to five keywords
characterising the paper should be indicated at the end of the abstract.
The type of paper (technical/empirical evaluation/experience/exploratory
paper) should be indicated in the submission.
PUBLICATION:
Accepted papers will be presented at CAiSE'2010 and published in the
conference proceedings, which is published in the Springer Lecture Notes
in Computer Science (LNCS).
Advisory Committee
Arne Sølvberg, Norwegian University of Science and Technology, Norway
Janis Bubenko Jr , Royal Institute of Technology, Sweden
Colette Rolland, University of Paris 1 - Panthéon Sorbonne, France
General Co-Chairs
Colette Rolland, University of Paris 1 - Pantheon - Sorbonne, France
Henda Ben Ghezala, ENSI, Tunisia
Program Chair
Barbara Pernici, Politecnico di Milano, Italy
Organisation Chair
Naoufel Kraiem, ENSI, Tunisia
Workshop and Tutorial Co-Chairs
Pierluigi Plebani, Politecnico di Milano, Italy
Jolita Ralyte, University of Geneva, Switzerland
Forum Co-Chairs
Pnina Soffer, University of Haifa, Israel
Erik Proper, Radboud University Nijmegen, The Netherlands
Doctoral Consortium Co-Chairs
Boualem Banatallah, University of New South Wales, Australia
Anne Persson, University of Skövde, Sweden
Publicity Co-Chairs
Selmin Nurcan, University of Paris 1 - Panthéon - Sorbonne, France
Lida Xu, Old Dominion University, USA
Rim Kaabi, ISI, Tunisia
Publication Co-Chairs
Cinzia Cappiello, Politecnico di Milano, Italy
Motoshi Saeki, Tokyo Institute of Technology, Japan
Finance Chair
Yassine Jamoussi, ENSI, Tunisia
Local Arrangements
Malek Ghenima, ENSI, Tunisia
Semia Sonia Selmi, ENSI, Tunisia
Website
Jamil Dimassi, Tunisia
Slim Mesfar, ISI, Tunisia
Program Board
Hans Akkermans, NL
Sjaak Brinkkemper, NL
Valeria De Antonellis, Italy
Eric Dubois, Luxembourg
Marlon Dumas, Estonia
Pericles Loucopoulos, UK
Moira Norrie. Switzerland
Antoni Olive, Spain
Andreas Opdahl, Norway
Oscar Pastor Lopez, Spain
Anne Persson, Sweden
Klaus Pohl, Germany
Pnina Soffer, Israel
Program Committee
Wil van der Aalst, The Netherlands
Pär Ågerfalk, Sweden
Antonia Albani, The Netherlands
Marco Bajec, Slovenia
Luciano Baresi, Italy
Zorah Bellahsene, France
Boalem Benatallah, Australia
Giuseppe Berio, France
Claudio Bettini, Italy
Rafik Bouaziz, Tunisia
Nacer Boudjlida, France
Mokrane Bouzeghoub, France
Fabio Casati, Italy
Silvana Castano, Italy
Jaelson Castro, Brazil
Corine Cauvet, France
João Falcãoe Cunha, Portugal
Joerg Evermann, Canada
Xavier Franch, Spain
Mariagrazia Fugini, Italy
Claude Godart, France
Mohand-Said Hacid, France
Terry Halpin, Australia
Brian Henderson-Sellers, Australia
Willem-Jan Van den Heuvel, The Netherlands
Patrick Heymans, Belgium
Yassine Jamoussi, Tunisia
Matthias Jarke, Germany
Paul Johannesson, Sweden
Marite Kirikova, Latvia
Naoufel Kraiem, Tunisia
John Krogstie, Norway
Wilfried Lemahieu, Belgium
Michel Leonard, Switzerland
Kalle Lyytinen, USA
Raimundas Matulevicius, Belgium
Andrea Maurino, Italy
Jan Mendling, Germany
Isabelle Mirbel, France
Haris Mouratidis, UK
John Mylopoulos, Canada
Selmin Nurcan, France
Andreas Oberweis, Germany
Jeffrey Parsons, Canada
Mike Papazoglou, The Netherlands
Michael Petit, Belgium
Yves Pigneur, Switzerland
Geert Poels, Belgium
Erik Proper, The Netherlands
Jolita Ralyte, Switzerland
Manfred Reichert, Germany
Mark Roantree, Ireland
Michael Rosemann, Australia
Gustavo Rossi, Argentina
Matti Rossi, Finland
Motoshi Saeki, Japan
Camille Salinesi, France
Keng Siau, USA
Monique Snoeck, Belgium
Janis Stirna, Sweden
Arnon Sturm, Israel
Stefan Tai, Germany
David Taniar, Australia
Ernest Teniente, Spain
Bernhard Thalheim, Germany
Farouk Toumani, France
Aphrodite Tsalgatidou, Greece
Jean Vanderdonckt, Belgium
Irene Vanderfeesten, The Netherlands
Olegas Vasilecas, Lituania
Yair Wand, Canada
Mathias Weske, Germany
Hans Weigand, The Netherlands
Roel Wieringa, The Netherlands
Carson Woo, Canada
Eric Yu, Canada
Didar Zowghi, Australia
-------------8
<-------------------8<-------------------8<-------------------8<-------------------8<--------
The AISWorld LISTSERV is a service of the Association for Information Systems (http://www.aisnet.org). To unsubscribe, redirect, or change subscription options please go to http://lyris.isworld.org/. You are subscribed to AISworld as: neumann(a)wu-wien.ac.at. Each Sender assumes responsibility that his or her message conforms to the AISWorld LISTSERV policy and conditions of use available at http://lyris.isworld.org/isworldlist.htm.
-------- Original-Nachricht --------
Betreff: [isworld] CFP: Information Systems Frontiers Special Issue on
Terrorism Informatics, Extended Deadline 9/30
Datum: Sat, 12 Sep 2009 13:47:35 -0400
Von: Yilu Zhou <yzhou(a)gwu.edu>
Antwort an: Yilu Zhou <yzhou(a)gwu.edu>
An: AISWORLD Information Systems World Network <isworld(a)lyris.isworld.org>
Call for Papers
Special Issue on Terrorism Informatics
Since September 11th, the multidisciplinary field of terrorism informatics
has experienced tremendous growth, and research communities as well as
local, state, and national governments are facing increasingly more
complex and challenging issues. The challenges facing the intelligence and
national security communities worldwide include accurately and efficiently
monitoring, analyzing, predicting and preventing terrorist activities.
The development and use of advanced information technologies, including
methodologies, models and algorithms, infrastructure, systems, and tools
for national/international and homeland security related applications have
provided promising new directions for study.
Terrorism informatics has been defined as the application of advanced
methodologies, information fusion and analysis techniques to acquire,
integrate process, analyze, and manage the diversity of terrorism-related
information for international and homeland security-related applications.
It is a highly interdisciplinary and comprehensive field. The wide variety
of methods used in terrorism informatics are derived from Computer
Science, Informatics, Statistics, Mathematics, Linguistics, Social
Sciences, and Public Policy, and these methods are involved in the
collection of huge amounts of many types of multi-lingual information from
varied and multiple sources. Information fusion and information technology
analysis techniques, which include data mining, data integration, language
translation technologies, and image and video processing, play central
roles in the prevention, detection, and remediation of terrorism.
The purpose of this special issue is to bring together international
researchers, engineers, policy makers, and practitioners working on
terrorism informatics as well as related fields such as the organizational
and social sciences. This special issue will outline the major challenges
in supporting terrorism prevention, detection and response worldwide, as
well as future perspectives on counterterrorism research in the
information age.
Topics
The special issue will cover the scope of research relevant to terrorism
informatics, including but not limited to the following topics:
� Terrorism knowledge portals and databases
� Terrorist incident chronology databases
� Terrorism social network analysis, visualization and simulation
� Terrorism analytical tools and methodologies
� Terrorism data mining and text mining
� Terrorism root cause analysis
� Bioterrorism
� Cyber terrorism
� Forecasting terrorism
� Countering terrorism
� Impact of terrorism on society
� National and international security and webmetrics
� Web-based intelligence terrorism monitoring and event detection
Important Dates
� Submission deadline: September 30, 2009
� Notification of first round reviews: December 31, 2009
� Revised manuscripts due: March 31, 2009
� Final acceptance notification: June 30, 2010
� Submission of final paper: August 31, 2010
� Publication date: Fall 2010
Submission
Manuscripts must be submitted electronically in Microsoft Word or LaTex
format via http://www.editorialmanager.com/isfi/ no later than September
30, 2009 with the phrase - "submitted for consideration for the special
issue of ISF on Terrorism Informatics." Paper submissions must use the
layout and format guidelines in Information Systems Frontiers.
Instructions for Contributors can be found at:
http://www.som.buffalo.edu/isinterface/ ISFrontiers/.
To enable anonymous review, papers submitted should have a separate title
page to include only the article title, author name(s), institute, and
email addresses. The remainder will contain an abstract, 4-10 keywords,
and the paper itself.
We will also invite authors of selected best papers to submit an extended
version from the IEEE International Conference on Intelligence and
Security Informatics (ISI) 2009 that the guest editors are organizing. The
conference Website is at http://www.isiconference.org/2009/.
Guest Editors
Hsinchun Chen
Department of Management Information Systems
University of Arizona, U.S.A.
Email: hchen(a)eller.arizona.edu
Yilu Zhou
Department of Information Systems and Technology Management
George Washington University, U.S.A.
Email: yzhou(a)gwu.edu
Edna F. Reid
Department of Library Science
Clarion University, U.S.A.
Email: ereid(a)clarion.edu
Catherine A. Larson
Department of Management Information Systems
University of Arizona, U.S.A.
Email: cal(a)eller.arizona.edu
The AISWorld LISTSERV is a service of the Association for Information Systems (http://www.aisnet.org). To unsubscribe, redirect, or change subscription options please go to http://lyris.isworld.org/. You are subscribed to AISworld as: neumann(a)wu-wien.ac.at. Each Sender assumes responsibility that his or her message conforms to the AISWorld LISTSERV policy and conditions of use available at http://lyris.isworld.org/isworldlist.htm.
-------- Original-Nachricht --------
Betreff: [isworld] ISM Special Issue on Servitizing IT Deadline Sept 15
with upload instructions
Datum: Fri, 11 Sep 2009 14:55:52 -0400
Von: Sue Conger <sue.conger(a)gmail.com>
Antwort an: Sue Conger <sue.conger(a)gmail.com>
An: AISWORLD Information Systems World Network <isworld(a)lyris.isworld.org>
Information Systems Management -- Special Issue on Servitizing IT
Important dates:
Deadline for submission: September 15, 2009
Editorial decision to authors: November 1, 2009
Deadline for revisions: January 15, 2010
Submissions to Manuscript Central at http://mc.manuscriptcentral.com/uism
Guest Editor: Sue Conger, University of Dallas
You are cordially invited to submit a complete, original, unpublished
manuscript for the Information Systems Management Special Issue on
Servitizing IT.
IT's role in an organization is the cost-effective provision of IT
services that focus on delivery of high-quality, low-cost IT services,
and, hopefully, align with organizational strategy. IT Services has
emerged as a strategic focus for industry. .
Private industry is active in this space, with IBM, HP, and others
selling both services and software to support IT services. Industry
groups, such as ITSMF-USA, have active academic groups that have
sponsored three academic fora at which academics learn about ITSM and
how to develop course materials for teaching ITSM. In addition, the
Association for Information Systems (AIS) special interest group for
Services, SIG SVC, has over 40 charter members and expects about 90
members by the end of 2009.
There are three current types of research that fall under the
definition of IT Services: IT Service Management (ITSM) – focusing on
spanning the gap between operations and development; Services
Computing – focusing on technical delivery of software services, and
Service Sciences Management and Engineering (SSME) – focusing on
organizational servitization. The track co-chairs reflect these three
genres. This track will encourage both research and education papers
and panels.
With all new ACM Curriculum guidelines that do not even include the
word 'service' in relation to IT course work, it is appropriate that
the profession begin to develop an understanding of this new
discipline as an emerging direction in IT practice, research, and
education.
The following topics are suggested but other related topics will be considered:
• Theoretical underpinnings of IT Servitization
• Development and use of models for measuring IT Servitization
• Maturity of IT Servitization in industry
• The relationship between IT Servitization and ICT Governance
• Frameworks and standards for IT Service Management (e.g., ITIL,
ISO/IEC 20000)
• Relationship and management of Services in the real (e.g., ITSM) and
software worlds (e.g., SOA)
• Critical success factors in IT Servitizing initiatives
• Organization structure, roles and responsibilities for IT
Servitization initiatives.
• Intersections in IT Servitization (e.g., Governance with IT,
Application Development with
Operations, Operations with Marketing)
• Education for IT Servitization
Instructions for Authors
The ideal length of the submissions is 7,500 words, but if justified,
shorter and longer manuscripts will be considered. All submissions
should follow the general guidelines of the journal as specified at
www.tandf.co.uk/10580530. The manuscripts will be peer-reviewed
according to the journal’s general policy; all reviews are double
blind.
Address questions to Dr. Sue Conger (sue.conger(a)gmail.com).
Important dates:
Deadline for submission: September 15, 2009
Editorial decision to authors: November 1, 2009
Deadline for revisions: January 15, 2010
Submissions to Manuscript Central at http://mc.manuscriptcentral.com/uism
--
Sue Conger
University of Dallas
Director, IT and
IT Service Management Programs
Ph: 214.850.6424
The AISWorld LISTSERV is a service of the Association for Information Systems (http://www.aisnet.org). To unsubscribe, redirect, or change subscription options please go to http://lyris.isworld.org/. You are subscribed to AISworld as: neumann(a)wu-wien.ac.at. Each Sender assumes responsibility that his or her message conforms to the AISWorld LISTSERV policy and conditions of use available at http://lyris.isworld.org/isworldlist.htm.
-------- Original-Nachricht --------
Betreff: [isworld] WISP 2009 extended deadline (pre-ICIS Workshop on
Info Security & Privacy)
Datum: Fri, 11 Sep 2009 13:38:39 -0500
Von: Merrill Warkentin <m.warkentin(a)msstate.edu>
Antwort an: Merrill Warkentin <m.warkentin(a)msstate.edu>
Organisation: Mississippi State University
An: AISWORLD Information Systems World Network <isworld(a)lyris.isworld.org>
Call for Papers - WISP 2009 (revised - extended deadline)
Pre-ICIS SIGSEC Workshop on Information Security and Privacy (WISP)
The AIS Special Interest Group on Information Security and Privacy (SIGSEC)
is pleased to announce its fourth annual Workshop on Information Security
and Privacy (WISP) to be held pre-ICIS on Monday, December 14, 2009 in
Phoenix, Arizona (USA). This workshop is intended to be a forum for
scholars, practitioners, and doctoral students interested in information
security and privacy to exchange ideas and encourage collaboration among the
members of the SIGSEC community and others. We invite individuals to submit
research articles, case studies, position papers, research-in-progress, and
panel discussion proposals that address all interesting aspects of
information security and assurance, including but not limited to:
-Socio-technical analysis of information security and privacy issues
-Cultural issues in management of information security and privacy
-IT risk analysis and management issues
-Economic analysis of information security strategies and privacy measures
-Behavioral and cognitive research into security technology acceptance and
use
-Psychological and criminological perspectives on violators and abusers
-Compliance with information security and privacy policies, procedures, and
regulations
-Strategies for decreasing risky habits and behaviors
-Analysis of system vulnerabilities and risk exposure
-Protection of organizational knowledge and proprietary data
-Ensuring efficacy of operations for high integrity
-Management of electronic espionage and technological crime
-Cases in infrastructure protection
-Forensic analysis issues
-Legal, societal, and ethical issues in high technology crime
-Issues of information security and privacy in e-government technologies
-Issues of information security and privacy issues in online communities
-Simulation of information security and risk management
All submitted papers undergo a double blind peer review process. Selected
papers will be fast tracked to Journal of Information System Security.
Please submit your papers using our conference submission system located at
http://www.security-conference.org/sigsec/
Send panel proposals to Rita Walczuch - r.walczuch(a)maastrichtuniversity.nl
All submission should use Microsoft Word or RTF format only, with no author
names or other identification in the manuscript file, including document
properties and tracked changes (blind the submission, please). Please use
MISQ style for your paper and references. Please limit your completed
research and case study papers to 12 pages and research-in-progress papers
to 6 pages, single-spaced with 12-point Times New Roman font.
Important Dates:
Submission deadline (extended):
October 2, 2009 (Friday)
Notification of acceptance:
October 30, 2009
Revised, formatted document due:
November 14, 2009
Workshop date:
December 14, 2009 (Monday)
Workshop Co-Chairs
Merrill Warkentin
Mississippi State University
Rita Walczuch
Maastricht University
Workshop Sponsors
AIS Special Interest Group on Security and Privacy (SIGSEC)
(Gurpreet Dhillon, Virginia Commonwealth University, SIGSEC Chair)
Journal of Information System Security
(Gurpreet Dhillon, Editor)
The AISWorld LISTSERV is a service of the Association for Information Systems (http://www.aisnet.org). To unsubscribe, redirect, or change subscription options please go to http://lyris.isworld.org/. You are subscribed to AISworld as: neumann(a)wu-wien.ac.at. Each Sender assumes responsibility that his or her message conforms to the AISWorld LISTSERV policy and conditions of use available at http://lyris.isworld.org/isworldlist.htm.
-------- Original-Nachricht --------
Betreff: [isworld] CFP - International Conference on Organizational
Learning, Knowledge and Capabilities
Datum: Fri, 11 Sep 2009 12:21:08 -0400
Von: Michael Zack <m.zack(a)neu.edu>
Antwort an: Michael Zack <m.zack(a)neu.edu>
An: AISWORLD Information Systems World Network <isworld(a)lyris.isworld.org>
First Call for Papers
International Conference on Organizational Learning, Knowledge and
Capabilities (OLKC 2010)
3-6 June 2010,
Northeastern University, Boston, Massachusetts, USA
OLKC is a leading international conference for researchers in the area of
organizational knowledge and learning. The conference is international in
scope, and inclusive of the wide range of intellectual perspectives that
have helped to make organizational knowledge and learning one of the most
vibrant areas for contemporary research and debate. We therefore welcome
theoretical, empirical and combined contributions.
The theme of the 2010 OLKC conference is �Learning to Innovate; Innovating
to Learn.� The world economy in which we are living poses challenges that
lead to a realization that �more of the same� will be difficult to
sustain. Thus, innovation becomes a critical means for organizational
success. Broadly defined, innovation can be related to organizational
input, managerial process or organizational output. The OLKC community of
scholars has already initiated dialogue that links its particular
strengths to innovation issues. This conference aims to further that
dialogue by attracting leading edge work that leverages the OLKC
community�s in-depth understanding of learning and knowledge to better
understand innovation. Our aim is to stimulate breakthrough research
streams linking organizational learning, knowledge management and
innovation.
Regarding the MIS community, we encourage submissions that deal with the
organization impacts of information technology applied to knowledge
management, organizational learning, and innovation.
Key Dates:
Submission deadline for 800 word abstract: 15 November 2009;
Authors will be advised of the abstract decision: 15 January 2010
Full papers of 5,000 to 7,000 words due: 15 April 2010
Abstracts and papers can be submitted at www.conftool.net/olkc2010 (Note:
website will not be accepting submissions until the end of September.)
Round table sessions
To enable more interactive sessions, we plan to organize, next to regular
paper presentations, round table sessions in which up to four related
papers will be discussed interactively. To ensure high quality discussion,
each session will be chaired by an experienced discussant and each
participant of such a session will be asked to read all the session�s
papers in advance. At the time of submission of your abstract(s) please
indicate whether you would be willing to present your paper in a round
table session instead of in a �regular� session. The conference organizers
will allocate submissions as appropriate to meet the convention�s time and
space constraints.
Doctoral Consortium
A one day pre-conference doctoral consortium will be held in collaboration
with Queen�s University (Ontario) on Thursday evening, June 3nd through
Friday, June 4th, 2009. The workshop will be chaired by Yolande Chan.
Additional faculty will be announced by September 15, 2009.
Further information can be found at http://www.cba.neu.edu/olkc2010
Teaching Workshop
A one day pre-conference workshop for junior faculty will be held on
Thursday evening, June 3nd through Friday, June 4th, 2009. The theme of
the workshop will be Learning and Innovation in the Classroom. The
workshop will be chaired by Russ Vince, Professor of Leadership and
Change, University of Bath
Further information can be found at http://www.cba.neu.edu/olkc2010
Publishing Opportunity
Best papers from the conference will be eligible for publication in an
issue of Management Learning or The International Journal of Intellectual
Capital and Learning.
Conference Organizers
Mike Zack, Northeastern University, m.zack(a)neu.edu
Nick Athanassiou, Northeastern University, n.athanassiou(a)neu.edu
Contacts
For general conference information: Mike Zack (m.zack(a)neu.edu)
For program-specific information: Nick Athanassiou (n.athanassiou(a)neu.edu)
For more information on OLKC 2010: http://www.cba.neu.edu/olkc2010
For more information on OLKC and previous conferences: http://www.olkc.net
The AISWorld LISTSERV is a service of the Association for Information Systems (http://www.aisnet.org). To unsubscribe, redirect, or change subscription options please go to http://lyris.isworld.org/. You are subscribed to AISworld as: neumann(a)wu-wien.ac.at. Each Sender assumes responsibility that his or her message conforms to the AISWorld LISTSERV policy and conditions of use available at http://lyris.isworld.org/isworldlist.htm.
-------- Original-Nachricht --------
Betreff: [WI] Call for Participation Workshop "MDD, SOA and
IT-Management (MSI 2009)"
Datum: Thu, 10 Sep 2009 15:01:25 +0200
Von: Jan Stefan Addicks <jan.stefan.addicks(a)offis.de>
An: wi(a)aifb.uni-karlsruhe.de
========================================================================
Call for Participation
Workshop "MDD, SOA and IT-Management 2009"
organised by
OFFIS - Institute for Information Technology and the
GI-Fachgruppe "Software-Architektur"
October, 6th and 7th 2009
OFFIS, Oldenburg
_http://www.msi2009.de_ <http://www.msi2008.de/>
========================================================================
Motivation
==========
Model-driven software development (MDD), service-oriented architectures
(SOA) and enterprise architectures (EA) are current topics, intensely
discussed both in industry and science. Individually, each concept
represents a considerable contribution to professional software
development and to enterprises' IT management alone. Combined however,
strong interrelations can be discovered, raising the hope of synergy. A
service-oriented architecture, for example, is a typical target
architecture in model-driven software development whereas an appropriate
documentation of an enterprise architecture can provide initial
domain-specific models for use by model-driven transformations.
In its third instalment, the workshop "MDD, SOA, and IT-Management"
gives experts adept in model-driven development, service-oriented
architectures and enterprise architectures the opportunity to bring
together current research results and real-world requirements of IT
management as well as a chance to discuss future challenges common to
these topics.
Registration
============
Please register for the workshop at _http://www.msi2009.de/_. The
registration fee will be 75 EUR (50 EUR for GI members).
Developer Day
==============
In conjunction with MSI there will be a developer day on "Practice-
oriented application scenarios for model-driven development" on
October, 7th and 8th. The developer day will be in german. For
more information see
_http://www.mdsdpraxis.de/_
Program
=======
Tuesday October 6, 2009
13:00 - 13:15 Welcome
13:15 - 14:00 Probabilistic Analysis of Enterprise Architecture
Pontus Johnson, KTH - Royal Institute of Technology
14:00 - 14:30 Application landscape transformation and the role of
Enterprise Architecture frameworks
Daniel Simon, act! consulting GmbH
14:30 - 15:00 On the Architecture Development of Utility Enterprises
with Special Respect to the Gap Analysis of Application
Landscapes
José Gonzalez, OFFIS
15:00 - 15:30 Coffee break
15:30 - 16:00 Constructing an Enterprise-specific Radar System for
Assisted Project Surveillance
Christopher Schulz, Technische Universität München
16:00 - 17:00 Panel Discussion
Wednesday October 7, 2009
09:00 - 09:15 Welcome
09:15 - 10:00 Orthographic Software Modeling: A Practical Approach to
View-Based Development
Colin Atkinson, Universität Mannheim
10:00 - 10:30 An Approach to Architecture-centric Design and Management
in Large Heterogeneous Research Projects
Aneta Kabzeva, Technische Universität Kaiserslautern
10:30 - 11:00 Coffee break
11:00 - 11:30 The Architecture Documentation Maturity Model ADM2
Christoph Rathfelder, FZI Forschungszentrum Informatik
11:30 - 12:00 Towards Applying Model-Transformations and -Queries for
SOA-Migration
Tassilo Horn, Universität Koblenz-Landau
12:00 - 12:45 Overcoming the Impedance Mismatch Between Source Code
and Architecture
Peter Friese, itemis AG
10:30 - 11:00 Closing
Organisation
============
Jan Stefan Addicks, OFFIS, Oldenburg
Matthias Postina, OFFIS, Oldenburg
Ulrike Steffens, OFFIS, Oldenburg
Niels Streekmann, OFFIS, Oldenburg
Program committee
=================
Stephan Aier, University of St. Gallen, Switzerland
Hans-Jürgen Appelrath, University of Oldenburg, Germany
Achim Baier, itemis AG, Germany
Ulrich Frank, University of Duisburg-Essen, Germany
Jens Happe, FZI, Karlsruhe, Germany
Wilhelm Hasselbring, University of Kiel, Germany
Bernhard Humm, University of Applied Sciences Darmstadt, Germany
Arne Koschel, University of Applied Sciences and Arts Hannover, Germany
Marc Lankhorst, Novay, The Netherlands
Till Luhmann, BTC AG, Oldenburg, Germany
Florian Matthes, Technische Universität München, Germany
Sven Overhage, University of Augsburg, Germany
Claus Pahl, Dublin City University, Ireland
Manfred Reichert, University of Ulm, Germany
Ralf Reussner, University of Karlsruhe, Germany
Ulrike Steffens, OFFIS - Institute for Information Technology, Germany
Andreas Winter, University of Oldenburg, Germany
--
Dipl.-Inform. Jan Stefan Addicks
Technologiecluster "Enterprise Application Integration" |
Technology Cluster "Enterprise Application Integration"
OFFIS
FuE Bereich Energie | R&D Division Energy
Escherweg 2 - 26121 Oldenburg - Germany
Phone/Fax: +49 441 9722-216/102
E-Mail: addicks(a)offis.de
URL: http://www.offis.de <http://www.offis.de/>
--
Mailing-Liste: WI(a)aifb.uni-karlsruhe.de
Administrator: WI-admin(a)aifb.uni-karlsruhe.de
Konfiguration: http://www.aifb.uni-karlsruhe.de/mailman/listinfo/wi
-------- Original-Nachricht --------
Betreff: [isworld] CFP: Journal of Information Privacy and Security (JIPS)
Datum: Thu, 10 Sep 2009 16:00:04 -0500
Von: Changchit, Chuleeporn <Chuleeporn.Changchit(a)tamucc.edu>
Antwort an: Changchit, Chuleeporn <Chuleeporn.Changchit(a)tamucc.edu>
An: AISWORLD Information Systems World Network <isworld(a)lyris.isworld.org>
Journal of Information Privacy and Security (JIPS)
http://jips.cob.tamucc.edu/
CALL FOR PAPERS:
Editor-in-Chief: Chuleeporn Changchit, Texas A&M University - Corpus
Christi
Mission
The mission of the Journal of Information Privacy and Security (JIPS) is
to serve both academics and practitioners as a reliable source on issues
of information privacy and security. The Journal is a high quality
refereed journal that seeks support from academicians, industry experts
and specific government agencies. The JIPS focuses on publishing
articles that address the paradoxical nature of privacy versus security
amidst current global conditions. It is increasingly important that
various constituents of information begin to understand their role in
finding solutions to achieve a delicate balance between security and
privacy.
The JIPS will facilitate understanding of the information assurance
technical framework as it pertains to government agencies, companies and
individuals. The topics may include the information privacy and security
issues pertaining to initiatives on counter-terrorism efforts around the
world, the impact of U.S. federal regulation and compliance issues
facing global corporations, the impact of privacy and security
initiatives within small and medium enterprises (SMEs), and e-gambling.
Article submissions are encouraged from both academics and
practitioners. Each issue will include high quality articles from
academics and practitioners, case studies, book reviews, and industry
interviews. The Journal addresses issues of privacy and security from a
global perspective and will consider articles with a cross-functional
focus. The Journal will include articles in the following areas:
- Information Assurance frameworks
- Network security and impact on corporate infrastructure
- Privacy laws and impact on information compliance issues
- The duality of privacy and security and impact on corporate operations
- Governmental regulations and changes on information security
requirements
- Data transfer issues across nations, states, and corporations
- Privacy and security requirements in B2B and B2C information flows
- Cross-functional aspects of information assurance and requirements
faced by various business functions within companies
- Web sites, portals and the issue of trust
- Information privacy and security as it relates to end-users
- Applications and case studies in privacy and security issues facing
business organizations, government agencies and individuals
- Emerging topics such as biometrics, software utilities, and IT
obligations and how they change the business environment
Review Process
Each article will be blind-reviewed by three members of the editorial
review board. Reviewer recommendation will be considered by the
Editor-in-Chief or an Associate Editor. For a revision and rewrite, a
revised paper will be sent to one of the Editors for final approval. The
final decision will be made by the Editor-in-Chief.
Interested authors should consult the journal's manuscript submission
guidelines at http://jips.cob.tamucc.edu/submission.htm
All inquiries and submissions should be sent to:
Editor-in-Chief: Dr. Chuleeporn Changchit at
chuleeporn.changchit(a)tamucc.edu
************************************************************************
***************************
Chuleeporn Changchit, Ph. D. Phone: (361) 825-5832
Professor of MIS Fax: (361) 825-5609
Room 136 Faculty Center E-mail:
chuleeporn.changchit(a)tamucc.edu
College of Business, Unit 5808
Texas A&M University - Corpus Christi
6300 Ocean Dr., Corpus Christi, TX 78412
Editor-in-Chief, Journal of Information Privacy and Security (JIPS)
http://jips.cob.tamucc.edu
************************************************************************
***************************
The AISWorld LISTSERV is a service of the Association for Information Systems (http://www.aisnet.org). To unsubscribe, redirect, or change subscription options please go to http://lyris.isworld.org/. You are subscribed to AISworld as: neumann(a)wu-wien.ac.at. Each Sender assumes responsibility that his or her message conforms to the AISWorld LISTSERV policy and conditions of use available at http://lyris.isworld.org/isworldlist.htm.
-------- Original-Nachricht --------
Betreff: [isworld] TOC: Latest Issue of the International Journal of
Virtual Communities and Social Networking (IJVCSN)
Datum: Thu, 10 Sep 2009 10:48:54 -0400
Von: Subhasish Dasgupta <dasgupta(a)gwu.edu>
Antwort an: Subhasish Dasgupta <dasgupta(a)gwu.edu>
An: AISWORLD Information Systems World Network <isworld(a)lyris.isworld.org>
Here are the contents of the latest issue of:
International Journal of Virtual Communities and Social Networking (IJVCSN)
Official Publication of the Information Resources Management Association
Volume 1, Issue 3, July-September 2009
Published: Quarterly in Print and Electronically
ISSN: 1942-9010 EISSN: 1942-9029
Published by IGI Publishing, Hershey-New York, USA
http://www.igi-global.com/ijvscn
Editor-in-Chief: Subhasish Dasgupta, George Washington University, USA
Special issue: Formation and Dynamics of Virtual Communities
Special Issue Editor: Krzysztof Juszczyszyn, Wrocław University of Technology, Poland
GUEST EDITORIAL PREFACE
Formation and Dynamics of Virtual Communities
Krzysztof Juszczyszyn, Wrocław University of Technology, Poland
This special issue of IJVCSN is devoted to computational technologies boosting the creation of Internet-based social networks and communities. In recent years, we have experienced rapid development in the area of advanced groupware and social software frameworks. It has become obvious the impact dynamic changes in virtual communities have on performance, service quality, and function properties of information systems and cannot be neglected. The structure and internal organization of virtual communities determines the resource consumption patterns, their temporal changes, and predicts future behavior. Cooperation between community members appears to be a key factor in various knowledge management and problem-solving tasks. In this issue, the authors focus on dynamic processes, which underline wide spectrum of phenomena emerging in virtual networks–from knowledge and resources management issues, formation of trust networks to practical applications in real-life business s
cenarios. Six interesting papers discuss the above issues and attack different, formal, and practical challenges met in virtual communities of different sizes and origins.
To read the guest editorial preface, please consult this issue of IJVCSN in your library.
PAPER ONE
Measuring Similarity of Interests for Clustering Taggers and Resources
Christo Dichev, Winston-Salem State University, USA
Jinsheng Xu, NC A&T, USA
Darina Dicheva, Winston-Salem State University, USA
Jinghua Zhang, Winston-Salem State University, USA
Collaborative tagging systems demonstrate the potential to generate collectively built organization structures forming the basis for social navigation and shared knowledge. The effectiveness of these systems for finding and re-finding information depends not only on the created tag structures but also on the ability to identify similar users. In this article, the authors present a study on measuring user similarity, based on shared interests and utilizing data from del.icio.us. This article proposes several methods for measuring similarities aimed at clustering tags and users and reports initial results related to implicit grouping of tags and users.
To obtain a copy of the entire article, click on the link below.
http://www.infosci-on-demand.com/content/details.asp?ID=34156
PAPER TWO
Social Support for Ontological Mediation and Data Integration
Gianluca Correndo, University of Southampton, UK
Harith Alani, University of Southampton, UK
Manuel Salvadores, University of Southampton, UK
Most organizations store their data in several databases with no flexible mechanism for integration and access and with no common vocabulary in place. Maintaining local vocabularies while realizing distributed access is a challenge that most organizations face regularly. For several years, the Semantic Web community has been developing algorithms for mapping data models (ontologies). Nevertheless, ontology mapping remains to be a great challenge, and humans are always expected to verify the results of existing automatic mapping tools. The spread of social Web demonstrate the possibility of using collaborative techniques for reaching consensus and fostering user participation. In this article, the authors describe an approach that combines off-the-shelf ontology mapping tools with social software techniques to enable users to collaborate on mapping ontologies.
To obtain a copy of the entire article, click on the link below.
http://www.infosci-on-demand.com/content/details.asp?ID=34157
PAPER THREE
An Abstract Framework for Modeling Argumentation in Virtual Communities
Tudor Groza, National University of Ireland, Ireland
Siegfried Handschuh, National University of Ireland, Ireland
John G. Breslin, National University of Ireland, Ireland
Stefan Decker, National University of Ireland, Ireland
Classic argumentative discussions can be found in a variety of domains from traditional scientific publishing to today’s modern social software. An interactive argumentative discussion usually consists of an initial proposition stated by a single creator and followed by supporting propositions or counter-propositions from other contributors, usually part of the same virtual community. Thus, the actual argumentation semantics is hidden in the content created by the contributors. In this article, the authors describe an abstract model for argumentation, which captures the semantics independently of the domain. Following a modularized approach, the authors also take into account additional important aspects of the argumentation and present a possible use of the framework in the context of virtual communities.
To obtain a copy of the entire article, click on the link below.
http://www.infosci-on-demand.com/content/details.asp?ID=34158
PAPER FOUR
Trust Modeling in a Virtual Organization Using Social Network Metrics
Grzegorz Kołaczek, Wrocław University of Technology, Poland
One of the most important factors in human interaction and communication is trust. Each organization performing its quotidian tasks use involuntary established trust relations to estimate the probability of achieving the expected results or level of confidentiality. As in societies that evolve from real world relationship (e.g. school, office, sport activity, etc.) to virtual communities (e.g. chat rooms, Web boards, mailing lists, etc.), trust is one of the most fundamental types of binding among the group members. In this article, the author investigates the trust relation establishment and evolution in virtual communities and presents a model using some typical parameters like node degree and centrality coefficient related to social network description and analysis.
To obtain a copy of the entire article, click on the link below.
http://www.infosci-on-demand.com/content/details.asp?ID=34159
PAPER FIVE
The Impact of Customer Churn on Social Value Dynamics
Przemysław Kazienko, Wrocław University of Technology, Poland and BT Innovate, British Telecom Group, Intelligent Systems Research Centre (ISRC), UK
Dymitr Ruta, BT Innovate, British Telecom Group, Intelligent Systems Research Centre (ISRC), UK
Piotr Bródka, Wrocław University of Technology, Poland
Modern telecommunication service providers implicitly create interactive social networks of individuals that both depend on and influence each other through complex social relationships grown on friendship, shared interests, locality, and so forth. While delivering services on the individual basis, the network effects exerted from customer-to-customer interactions remain virtually unexplored and unexploited. The focus of this article is on customer churn, where social network effects are widely ignored yet may play a vital role in revenue protection. The authors evaluate the direction and strength of this impact by direct measurements of the total neighborhood value of the churning customer along with other standard social network measures taken before and after the churn event.
To obtain a copy of the entire article, click on the link below.
http://www.infosci-on-demand.com/content/details.asp?ID=34160
PAPER SIX
Digital Energy: Clustering Micro Grids for Social Networking
Mikhail Simonov, Politecnico di Milano, Italy, and ISMB, Italy
Marco Mussetta, Politecnico di Milano and Politecnico di Torino, Italy
Riccardo Zich, Politecnico di Milano, Italy
Since energy use is a type of consumer behavior reflecting the interests to maximize an objective function, human being activities seen in energy terms might be used to create the social aggregations or groups. Electric energy generated from ecologic sources brings some unpredictability. The authors model the unpredictability of the distributed generation in order to create a tool for minimization. This article proposes a novel method to build real-life smart micro grids in the distributed generation context characterized by zero emissions. The proposed tool becomes an instrument to create the social aggregation of users and negotiate locally the “social” energy in real time.
To obtain a copy of the entire article, click on the link below.
http://www.infosci-on-demand.com/content/details.asp?ID=34161
****************************************************
For full copies of the above articles, check for this issue of the International Journal of Virtual Communities and Social Networking (IJVCSN) in your institution's library. This journal is also included in the IGI Global aggregated "InfoSci-Journals" database: www.infosci-journals.com.
*****************************************************
CALL FOR PAPERS
Mission of IJVCSN:
The primary objective of the International Journal of Virtual Communities
and Social Networking (IJVCSN) is to provide comprehensive coverage and
understanding of the social, cultural, organizational, human, and cognitive
issues related to the virtual communities and social networking. These
issues include design, implementation, participation, and use of virtual
communities and social networks. The secondary objective of this journal is
to broaden the overall body of knowledge regarding participation of
individuals, groups, and organizations in these communities and networks by
providing an outlet for scholarly research in the area.
Coverage of IJVCSN:
IJVCSN covers research in all areas of virtual communities and social
networking. Research on the technical, social, legal, and cross-cultural
issues are appropriate for the journal. Among topics to be included (but not
limited to) are the following:
Cross-cultural issues in virtual communities and social networks:
Cross-cultural studies
Culture in virtual communities and social networks
Design issues
Multi-cultural environments
Human computer interfaces, virtual communities, and social networks:
Design of peer-to-peer networks
Design of virtual communities
Mobile technologies and HCI
User friendly interfaces
Models for virtual communities:
Business models
E-learning models
Knowledge management models
Social models
Technology-based models
Privacy and security:
Business implications
Copyright issues
Privacy issues
Trust issues
Social issues in virtual communities:
Economic impact of virtual communities
Individual behavior and group dynamics in virtual communities
Political impact of virtual communities
Social impact of virtual communities
Trust in communities
Social networking:
Culture in social networks
Social network analysis
Social relationships
Social structures
Success of virtual environments and social networks:
Collaborative work in virtual environments
Effectiveness of virtual environments and social networks
ROI in business-oriented virtual communities
Service quality of virtual community and social networking sites
Technology in virtual environments and social networks:
Hardware and software
Peer-to-peer networks
Platforms
Web services, SOA, and Web 2.0
Wiki's and blogs
Virtual communities for gaming:
Cultural issues
Game design
Social issues
Virtual worlds
Computer-based simulated environments:
Social and cultural issues
Technological issues
Interested authors should consult the journal's manuscript submission
guidelines at http://www.igi-global.com/ijvcsn.
All inquiries and submissions should be sent to:
Editor-in-Chief: Subhasish Dasgupta at dasgupta(a)gwu.edu
--
Subhasish Dasgupta, Ph.D.
Associate Professor of Information Systems
Director, MS Program in Information Systems Technology
George Washington University
2201 G Street, NW, Funger Hall 515
Washington, DC 20052
dasgupta(a)gwu.edu
phone: 202.994.7408/fax: 202.994.5830
The AISWorld LISTSERV is a service of the Association for Information Systems (http://www.aisnet.org). To unsubscribe, redirect, or change subscription options please go to http://lyris.isworld.org/. You are subscribed to AISworld as: neumann(a)wu-wien.ac.at. Each Sender assumes responsibility that his or her message conforms to the AISWorld LISTSERV policy and conditions of use available at http://lyris.isworld.org/isworldlist.htm.
-------- Original-Nachricht --------
Betreff: [isworld] cfp: 9th Annual Security Conference, Las Vegas, NV.
April 7-8, 2010
Datum: Thu, 10 Sep 2009 08:35:02 -0400
Von: Gurpreet Dhillon <gdhillon(a)vcu.edu>
Antwort an: Gurpreet Dhillon <gdhillon(a)vcu.edu>
An: AISWORLD Information Systems World Network <isworld(a)lyris.isworld.org>
The 9th Annual Security Conference
Discourses in Security, Assurance and Privacy
April 7-8, 2010
The Orleans Hotel and Casino
Las Vegas, Nevada, USA
www.security-conference.org
CALL FOR PAPERS
Submissions Deadline: January 15, 2010
The nature and scope of the Information Security field has evolved
over the past several years. No longer are we just concerned with
protecting the technical edifice. Our emphasis has become more
holistic and we tend to consider all aspects of information protection
as central to the field of security. The Annual Security Conference
provides a forum for discourses in Security, Assurance and Privacy
that will define the moment and provide a useful basis for nurturing
further dialogues.
Contributions in the form of research papers, panel proposals and case
studies are invited. All submissions are peer reviewed and automatically
considered for publication in the Journal of Information System
Security (http://www.jissec.org) and in special issues of other
major publications.
Further details and submission instructions can be found at:
www.security-conference.org
General Chair
Gurpreet Dhillon, PhD
Professor of Information Systems
Editor, Journal of Information System Security
Virginia Commonwealth University, USA
http://www.isy.vcu.edu/~gdhillonhttp://security-conference.org
The AISWorld LISTSERV is a service of the Association for Information Systems (http://www.aisnet.org). To unsubscribe, redirect, or change subscription options please go to http://lyris.isworld.org/. You are subscribed to AISworld as: neumann(a)wu-wien.ac.at. Each Sender assumes responsibility that his or her message conforms to the AISWorld LISTSERV policy and conditions of use available at http://lyris.isworld.org/isworldlist.htm.