-------- Original-Nachricht --------
Betreff: [WI] CFP Service Matchmaking and Resource Retrieval in the
Semantic Web
Datum: Tue, 13 Jul 2010 11:20:50 +0200
Von: Paolucci, Massimo <paolucci(a)docomolab-euro.com>
An: <semanticweb(a)yahoogroups.com>, <seweb-list(a)lists.deri.org>,
<agents(a)cs.umbc.edu>, <news-announce-conferences(a)uunet.uu.net>,
<kweb-all(a)lists.deri.org>, <seweb-list(a)cs.vu.nl>,
<wi(a)aifb.uni-karlsruhe.de>, <semantic-web(a)w3.org>,
<info-ic(a)listes.irisa.fr>, <agents(a)cs.umbc.edu>,
<ai-sges(a)jiscmail.ac.uk>, <aila(a)disi.unige.it>, <aiia(a)dis.uniroma1.it>,
<aisb(a)cogs.sussex.ac.uk>, <cadeinc(a)cs.albany.edu>, <cg(a)cs.uah.edu>,
<cl-adverts(a)janeway.inf.tu-dresden.de>,
<cl-adverts(a)spock.inf.tu-dresden.de>, <cladv(a)iccl.tu-dresden.de>,
<colognet-all(a)janeway.inf.tu-dresden.de>, <colognet(a)ucy.ac.cy>,
<community(a)mlnet.org>, <compulog(a)doc.imperial.ac.uk>,
<compulognet-parimp(a)dia.fi.upm.es>, <dbitaly(a)dia.uniroma3.it>,
<dl(a)dl.kr.org>, <e-eu-contact(a)dfki.de>, <elsnet-list(a)elsnet.org>,
<esap-news(a)disputatio.com>, <event(a)in.tu-clausthal.de>,
<folli(a)coli.uni-sb.de>, <grin(a)di.unipi.it>, <gulp(a)dimi.uniud.it>,
<ieeesb-vr(a)metropolis.sci.univr.it>, <kaw(a)swi.psy.uva.nl>,
<kif(a)philebus.tamu.edu>, <kr2004org(a)it.uts.edu.au>,
<loom-forum(a)isi.edu>, <noe_interop(a)drimm.u-bordeaux1.fr>,
<public-sws-ig(a)w3.org>, <semanticweb(a)yahoogroups.com>,
<swws-list(a)isoco.com>, <taboo-list(a)deis.unibo.it>,
<www-rdf-logic(a)w3.org>, <www-webont-wg(a)w3.org>, <cl(a)philebus.tamu.edu>,
<dbitaly(a)dia.uniroma3.it>, <aiia(a)dis.uniroma1.it>, <gulp(a)dimi.uniud.it>,
<grin(a)di.unipi.it>, <aila(a)disi.unige.it>, <swing-project(a)set.sintef.no>,
<semantic-web(a)w3.org>
Apologies for cross-postings
--------------------------------------------------------------------------
CALL FOR PAPERS
--------------------------------------------------------------------------
*SMR2-2010*
Third International Workshop on
http://www-ags.dfki.uni-sb.de/~klusch/smr2-10/
9th International Semantic Web Conference (ISWC 2010)
November 8, 2010
Shanghai, China
* *
*Aims & Scope:*
One central challenge of service coordination in the Semantic Web is how
to best relate requests for services with the services that are
available. This functionality is usually provided by matchmaking
capabilities (which may themselves be deployed as services, brokers or
middle agents) that select the services that are closest to a requested
service on the basis of a declarative characterization of the
capabilities of both service requested and services provided.
More generally, resource retrieval extends the notion of service
matchmaking to the process of discovering any kind of resource
(services, data, information, knowledge, even persons and organizations)
for given settings, participating entities, and purposes. It is at the
core of several scenarios in the Semantic Web area, spanning from Web
services, Grid and cloud computing, and Peer-to-Peer computing, to
applications such as e-commerce, human resource management, and social
networking applications such as dating services.
The primary objective of this workshop is to bring together academic and
industry researchers and industry practitioners who tackle semantic
service matchmaking and discovery /from/ /various points of view/. In
particular, we intend to build bridges to the software engineering and
model-driven development communities in order to share requirements,
technologies, and experiences that might be helpful in advancing the
state of the art in semantic service matchmaking and resource retrieval.
*/Going to Practice: The Third Semantic Service Selection (S3) Contest/*//
The SMR2 workshop also integrates the third edition of the open
international contest on semantic service selection (S3)
<http://www.dfki.de/%7Eklusch/s3> executed in collaboration with the
Semantic Web Service Challenge. The S3 contest provides the means and
a forum for evaluating the retrieval performance of Semantic Web service
matchmakers in terms of recall, precision, F1, response time etc., over
given test collections based on the prominent semantic service formats
such as OWL-S, WSML and the standard SA-WSDL.
*Publication*:
Accepted papers will be available online as a volume of */CEUR
proceedings/*. In addition, selected papers will be published in a
special issue of the International Journal on */Software Tools for
Technology Transfer/* (STTT, Springer Verlag).
* *
* *
*Topics of interest include (but are not limited to):*
* Advanced searching of services and other resources in the Semantic Web
* Novel approaches to matchmaking and brokering in the Semantic Web,
with a particular emphasis on Semantic Web services
* Model-driven semantic service engineering and matchmaking
* Semantic retrieval of resources and services in P2P and Grid networks
* Semantic retrieval of resources and services in Cloud Computing
* Matchmaking in e-commerce scenarios: auctions, e-marketplaces, supply
chains
* Matchmaking in other application scenarios: e-government, biopharma, etc.
* Composition planning of Semantic Web services
* Negotiation of Semantic Web services and resources
* Interleaving of discovery, composition, and negotiation of Semantic
Web services
* Semantic Web services selection
* Formal description and handling of Semantic Web services, queries, and
resources
* Non-functional service properties and their use for discovery (and
composition)
* Trust issues of Semantic Web service discovery
* Prototypes and tools for Semantic Web services engineering
* Middleware solutions for semantic service discovery and composition
* Novel approaches to achieving interoperability between services in the
Semantic Web
* Practical business and user-oriented issues and experiences of
implementing SW service retrieval tools
* Experimental comparative evaluation of implemented SW service
retrieval tools
* *
* *
*Submissions :*
Contributions to the workshop can be made as technical papers,
addressing different issues of service / resource matching. The papers
should be not longer than 12 pages using the LNCS Style:
http://www.springeronline.com/sgw/cda/frontpage/0,11855,5-164-2-72376-0,00.…
All contributions should be prepared in PDF format and should be submitted
through the workshop submission site at:
http://www.easychair.org/conferences/?conf=smr22010
*Important Dates:
*September 1, 2010: Deadline for the submission of papers.
September 20, 2010: Deadline for the notification of acceptance/rejection.
October 2, 2010: Camera ready copy submission.
November 8, 2010: SMR2-2010, Shanghai, China
*Organizing Committee: *
Abraham Bernstein (University of Zurich, Switzerland)
Matthias Klusch (DFKI, Germany)
Paul Grace (University of Lancaster, UK)
Massimo Paolucci (NTT DoCoMo Research Europe, Germany)
*Program Committee (under construction):*
Abraham Bernstein U. Zurich, Switzerland
Paul Grace, Lancaster U, UK
Matthias Klusch DFKI, Germany
Alain Leger, France Telecom, France
David Martin, Apple, USA
Oliver Müller, U Muenster, Germany
Massimo Paolucci, NTT Docomo, Germany
Stefan Schulte TU Darmstadt, Germany
Eugenio Di Sciascio, U Bari, Italy
Marco Luca Sbodio, HP, Italy
---------------------------------------------------
Massimo Paolucci
DOCOMO Communications Laboratories Europe GmbH
Landsberger Strasse 308-312, 80687 Munich
Phone: +49-89-56824-238
Fax: +49-89-56824-300
Mobile: +49-162-2919238
mailto:paolucci@docomolab-euro.com <mailto:wagner@docomolab-euro.com>
http://www.docomolab-euro.com
Managing Directors (Geschaeftsfuehrer):
Dr. Masami Yabusaki, Mr. Naoki Tani, Mr. Tsutomu Sakai
Amtsgericht Muenchen, HRB 132976
--------------------------------------------------
-------- Original-Nachricht --------
Betreff: [AISWorld] JGITM, Vol 13, No 3, July 2010
Datum: Mon, 12 Jul 2010 15:31:09 -0400
Von: Prashant Palvia <pcpalvia(a)uncg.edu>
An: AISWorld <aisworld(a)lists.aisnet.org>
Please distribute to colleagues and relevant lists.
*************************
CONTENTS OF VOLUME 13, NUMBER 3, (July 2010) OF THE JOURNAL OF GLOBAL
INFORMATION TECHNOLOGY MANAGEMENT (JGITM)
Note that JGITM is now among the elite group of MIS journals included in
the prestigious Social Sciences Citation Index (SSCI). It will be
included in both SSCI and CC/S&BS, both produced by Thomson Reuters.
http://jgitm.uncg.edu/
Publisher: Ivy League Publishing, http://www.ivylp.com
<http://www.ivylp.com/>, email: admin(a)ivylp.com <mailto:admin@ivylp.com>
******************************************************************************
IF YOU HAVE NOT RECEIVED A FREE SAMPLE IN THE PAST AND WOULD LIKE TO
RECEIVE ONE, PLEASE WRITE OR SEND AN EMAIL MESSAGE TO THE
EDITOR-IN-CHIEF: Prashant Palvia, Ph.D.,
The University of North Carolina at Greensboro (pcpalvia(a)uncg.edu
<mailto:pcpalvia@uncg.edu> and rmouzts(a)uncg.edu <mailto:rmouzts@uncg.edu>).
******************************************************************************
CALL FOR MANUSCRIPTS: The journal invites contributions from all parts
of the world from academic and industry scholars involved in research,
management, and the utilization of global information resources. Besides
quality work, at a minimum each submitted article should have the
following three components: an IS topic, an international orientation
(e.g., cross cultural studies or strong international implications), and
strong evidence (e.g., survey data, case studies, experiments, secondary
data, etc.). Please submit your manuscript electronically to the
Editor-in-Chief at pcpalvia(a)uncg.edu <mailto:pcpalvia@uncg.edu>.
REVIEW PROCESS: Each suitable article is blind-reviewed by three members
of the editorial review board. A recommendation is then made by the
Editor-in-Chief or an Associate Editor. The final decision is made by
the Editor-in-Chief. If a revision is recommended, the revised paper is
sent for final approval to one of the Editors.
CONTENTS OF THIS ISSUE OF JGITM (VOL. 13, NO.3, JULY 2010)
EDITORIAL PREFACE: PROMISES AND PERILS OF INTERNET BASED NETWORKING
Shailendra C. Jain Palvia, Long Island University, spalvia(a)liu.edu
<mailto:spalvia@liu.edu>
Rudy Pancaro, Long Island University, rpancaro(a)epcomworld.com
<mailto:rpancaro@epcomworld.com>
Social, professional, and entertainment networking on cyberspace are
becoming the norm in today’s society. Several issues are discussed in
this essay: online and offline social capital; where the real and
virtual meet; humans turning into hermits in a prospering hangout
culture; generation gap among users; legal and privacy issues; fraud and
misuse; is Facebook the next Google?; social networking in classrooms;
marketing innovations with social networking; cyber bullying; and
quality, security, and trust.
IT DOESN’T FIT! THE INFLUENCE OF CULTURE ON B2B IN THAILAND
Savanid Vatanasakdakul, Macquarie University, Australia,
savanid.vatanasakdakul(a)mq.edu.au <mailto:savanid.vatanasakdakul@mq.edu.au>
John D'Ambra, University of New South Wales, Australia,
j.dambra(a)unsw.edu.au <mailto:j.dambra@unsw.edu.au>
Prem Ramburuth, University of New South Wales, Australia,
p.ramburuth(a)unsw.edu.au <mailto:p.ramburuth@unsw.edu.au>
This study investigates how Thai culture affects the use of
internet-based business-to-business (B2B) technology in the Thai tourism
industry. Extending Goodhue and Thompson’s Task-Technology-Fit (TTF)
model (1995), the study explores, in particular, five dimensions of
cultural fit and their implications for how the B2B technology is
adopted. These dimensions are personal relationships, long-term
relationships, inter-organisational trust, ability to communicate in the
English language and western influence. Results showed that more the B2B
technology was perceived by the users to fit their culture, the more
likely they were to use the technology. Nevertheless, task-technology
fit still had a greater impact than culture on a firm’s perceived
performance.
AN ONLINE BANKING SECURITY FRAMEWORK AND A CROSS-CULTURAL COMPARISON
Nena Lim, Curtin University of Technology, Australia,
n.lim(a)curtin.edu.au <mailto:n.lim@curtin.edu.au>
Paul H. P. Yeow, Monash University, Sunway Campus, Malaysia,
paul.yeow(a)buseco.monash.edu.my <mailto:paul.yeow@buseco.monash.edu.my>
Yee Yen Yuen, Multimedia University, Malaysia, yyyuen20302000(a)yahoo.com
<mailto:yyyuen20302000@yahoo.com>
This research develops a security framework for online banking based on
security information posted on websites of eight major banks in
Australia and Malaysia and to investigate whether and why banks in
culturally different countries manage security differently. Twenty-five
security measures were identified and classified into three categories –
physical, administrative, and technical. Results show that Australian
banks provide general security information more often than Malaysian
banks. Moreover, Australian banks pay attention to all categories of
security measures whereas Malaysian banks lack physical security
measures. Such differences are attributed to cultural factors such as
individualism, power distance, and uncertainty avoidance. Results help
customers in Australia and Malaysia assess the security of their online
banks and are useful as a benchmark to banks worldwide.
LOCUS OF CONTROL AND LOCATION PRIVACY: AN EMPIRICAL STUDY IN SINGAPORE
Heng Xu, The Pennsylvania State University, hxu(a)ist.psu.edu
<mailto:hxu@ist.psu.edu>
Privacy concerns are particularly salient for Location-Based Services
(LBS), because LBS could potentially associate the lifestyle habits,
behaviors, and movements with a consumer’s personal identity. Drawing on
psychological control literature, the authors conducted an experiment to
test: i) whether the presence of privacy assurance approaches has a
considerable influence on alleviating consumers’ privacy concerns, and
ii) whether such influence will be moderated by the individual
difference variable – locus of control (LOC). Results demonstrate the
importance of LOC in moderating the effects of privacy assurance
approaches on alleviating consumers’ privacy concerns. The marriage of
the privacy and social psychology literature may provide a rich
understanding of consumers’ privacy reactions to LBS usage, and
therefore benefit the privacy research in IS.
THE EXPERT OPINION: AN INTERVIEW WITH MIKE UWE DICKERSBACH, VICE
PRESIDENT, INFORMATION TECHNOLOGY - THAYER LODGING GROUP
Conducted by M. Naveed Baqir, University of Delaware, mnbaqir(a)udel.edu
<mailto:mnbaqir@udel.edu>
The interview discusses the role of information technology (IT) in the
global hospitality industry in general, and Thayer Lodging Group in
particular. Also explored are the emerging trends in the use of IT for
improved customer experience and strategic IT applications in the next
several years.
BOOK REVIEW: IS OFFSHORING: ESSAYS ON PROJECT SUITABILITY AND SUCCESS, BY
MARKUS K. WESTNER, GABLER VERLAG; WIESBADEN, GERMANY; 2009
Reviewed by Roberto Vinaja, Texas A&M University - San Antonio,
robertvinaja(a)gmail.com <mailto:robertvinaja@gmail.com>
The book “IS Offshoring” is an outstanding work that integrates an
extensive literature review and two major empirical studies. One
qualitative research study focuses on project suitability, while the
other study focuses on project success and it is based on a quantitative
approach.
**********************************************
For copies of the above articles, please check for the Journal
of Global Information Technology Management (JGITM) in your
institution's library.
********************************************
MISSION: The mission of the Journal of Global Information
Technology Management (JGITM) is to continue to be the premier
journal on Global Information Technology Management. It is a
refereed international journal supported by global IT scholars
from all over the world. JGITM publishes articles and reports
related to all aspects of the application of information
technology for international business. For example, it will
report on information resource management, managerial and
organizational concerns, educational issues, and innovative
applications related to global IT. Very important to the
journal is its emphasis on quality and relevance. The journal
disseminates this knowledge to researchers, practitioners,
academicians, and educators all over the world on a timely
basis. Finally, the journal is international in all respects:
content, article authorship, readership, and the editorial board.
SCOPE AND COVERAGE: The journal's scope is multidisciplinary. It
publishes research, applied, and educational articles from all areas of
MIS as well as functional IT applications that have international focus.
The journal also entertains a variety of methodological approaches. It
encourages manuscript submissions from authors all over the world, both
from academia and industry. In addition, the journal will also include
educational cases and reviews of MIS books that have bearing on global
aspects. Practitioner input will be specifically solicited from
time-to-time in the form of industry columns and CIO interviews.
Articles in the journal include, but are not limited to the following
areas: Frameworks and models for global information systems (GIS),
Development, evaluation and management of GIS, Electronic Commerce,
Internet related issues, Societal impacts of IT in developing countries,
IT and Economic development, IT Diffusion in developing countries, IT
human resource issues, DSS/EIS/ES in international settings,
Organizational and management structures for GIS, Transborder data flow
issues, Electronic data interchange, Telecommunications, Distributed
global databases and networks, Cultural and societal impacts,
Comparative studies of nations, and Applications and case studies (both
educational and research).
********************************
The 12^th annual Global Information Technology Management Association
(GITMA) World Conference will be held in Las Vegas, Nevada, USA on June
5, 6, & 7, 2011. The submission deadline is Nov. 15, 2010.
http://www.gitma.org
-------- Original-Nachricht --------
Betreff: [computational.science] Call for Papers: CPSRT 2010 -
Deadlines Extended!
Datum: Tue, 13 Jul 2010 00:22:38 -0400
Von: George Yee <gmyee(a)sce.carleton.ca>
Organisation: "ICCSA"
An: Computational Science Mailing List
<computational.science(a)lists.iccsa.org>
DEADLINES EXTENDED!!
CALL FOR PAPERS (For HTML version, please visit http://CPSRT.cloudcom.org/)
INTERNATIONAL WORKSHOP ON CLOUD PRIVACY, SECURITY, RISK& TRUST (CPSRT 2010)
In conjunction with 2nd IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2010), November 30 - December 3, 2010 Indiana University, USA, http://2010.cloudcom.org/
IMPORTANT DATES - EXTENDED!
Submission deadline: 15 August 2010
Author notification: 15 September 2010
Camera-ready manuscript: 1 October 2010
Author registration: 1 October 2010
Workshop date: 30 November 2010
WORKSHOP CHAIRS
Latifur Khan – University of Texas at Dallas, USA
email: lkhan(a)utdallas.edu
Siani Pearson – Hewlett-Packard Laboratories, Bristol, UK
e-mail: Siani.Pearson(a)hp.com
George Yee – Carleton University, Canada
e-mail: gmyee(a)sce.carleton.ca
WORKSHOP STEERING COMMITTEE (in progress)
Martin Gilje Jaatun, Department of Software Engineering, Safety and Security, SINTEF, Trondheim, Norway
Chunming Rong, Center of IP-based Services Innovation (CIPSI), University of Stavanger, Stavanger, Norway
Bhavani Thuraisingham, Cyber Security Research Center, University of Texas at Dallas, U.S.A.
WORKSHOP PROGRAM COMMITTEE
Carlisle Adams, University of Ottawa, Canada
Andrew Charleswoth, University of Bristol, UK
Giles Hogben, ENISA, Greece
Paul Hopkins, University of Warwick, UK
Latifur Khan, University of Texas at Dallas, USA
Steve Marsh, Communications Research Centre Canada, Canada
Christopher Millard, University of London, UK
Andrew Patrick, Office of the Privacy Commissioner of Canada, Canada
Siani Pearson, HP Labs, UK
Simon Shiu, HP Labs, UK
Sharad Singhal, HP Labs, USA
Ronggong Song, National Research Council Canada, Canada
Anthony Sulistio, Hochschule Furtwangen University, Germany
George Yee, Carleton University, Canada
WORKSHOP OBJECTIVE
Cloud computing has emerged to address an explosive growth of web-connected devices, and handle massive amounts of data. It is defined and characterized by massive scalability and new Internet-driven economics. Yet, privacy, security, and trust for cloud computing applications are lacking in many instances and risks need to be better understood.
Privacy in cloud computing may appear straightforward, since one may conclude that as long as personal information is protected, it shouldn’t matter whether the processing is in a cloud or not. However, there may be hidden obstacles such as conflicting privacy laws between the location of processing and the location of data origin. Cloud computing can exacerbate the problem of reconciling these locations if needed, since the geographic location of processing can be extremely difficult to find out, due to cloud computing’s dynamic nature. Another issue is user-centric control, which can be a legal requirement and also something consumers want. However, in cloud computing, the consumers' data is processed in the cloud, on machines they don't own or control, and there is a threat of theft, misuse or unauthorized resale. Thus, it may even be necessary in some cases to provide adequate trust for consumers to switch to cloud services.
In the case of security, some cloud computing applications simply lack adequate security protection such as fine-grained access control and user authentication (e.g. Hadoop). Since enterprises are attracted to cloud computing due to potential savings in IT outlay and management, it is necessary to understand the business risks involved. If cloud computing is to be successful, it is essential that it is trusted by its users. Therefore, we also need studies on cloud-related trust topics, such as what are the components of such trust and how can trust be achieved, for security as well as for privacy.
MISSION
This year, the CPSRT workshop will bring together a diverse group of academics and industry practitioners in an integrated state-of-the-art analysis of privacy, security, risk, and trust in the cloud. The workshop will address cloud issues specifically related to access control, trust, policy management, secure distributed storage and privacy-aware map-reduce frameworks.
TOPICS OF INTEREST
The workshop includes but is not limited to the following topics that refer to computing in the cloud:
* Access control and key management
* Security and privacy policy management
* Identity management
* Remote data integrity protection
* Secure computation outsourcing
* Secure data management within and across data centers
* Secure distributed data storage
* Secure resource allocation and indexing
* Intrusion detection/prevention
* Denial-of-Service (DoS) attacks and defense
* Web service security, privacy, and trust
* User requirements for privacy
* Legal requirements for privacy
* Privacy enhancing technologies
* Privacy aware map-reduce framework
* Risk or threat identification and analysis
* Risk or threat management
* Trust enhancing technologies
* Trust management
These topics give rise to a number of interesting research questions to be discussed at the workshop, such as the following:
* How can consumers retain control over their data when it is stored and processed in the cloud?
* How can users' trust in cloud computing be enhanced? How can reputation management be used in a practical way?
* How can transborder data flow regulations be enforced within the cloud?
* How can solutions be tailored to a specific context? For example, how can privacy and security requirements be gathered and matched to service provisioning in an automated or semi-automated way, and on an ongoing basis?
* How can adequate assurance be given about the way in which cloud providers process and protect data?
* How can audit mechanisms be provided for the cloud?
Software demonstrations are welcome. We encourage submissions of ‘greenhouse’ work, which present early stages of cutting-edge research and development.
SUBMISSION
The submission format must conform to the following: 10 pages maximum including figures, tables and references (see http://CPSRT.cloudcom.org/). Authors should submit the manuscript in PDF format. The official language of the meeting is English. Please submit your paper to the CPSRT 2010 Workshop submission server (https://www.easychair.org/account/signin.cgi?conf=cpsrt2010) via an EasyChair account.
DISSEMINATION
Peer-reviewed papers that are accepted for presentation at the workshop will be published in the CloudCom 2010 IEEE proceedings, and will be available in IEEExplore (EI indexing). The workshop organisers plan to invite the authors of selected high quality papers to revise and lengthen their papers for a special issue of a related journal or an edited book.
For further details, please visit the workshop Web site: http://CPSRT.cloudcom.org/
-------- Original-Nachricht --------
Betreff: [AISWorld] IJITSA special issue on System Dynamics and other
Simulation-based Approaches for Information Systems
Datum: Mon, 12 Jul 2010 16:02:57 -0500 (CDT)
Von: Manuel Mora T. <mmora(a)securenym.net>
Antwort an: mmora(a)securenym.net
An: aisworld(a)lists.aisnet.org
CC: ottop(a)union.edu, frank.stowell(a)port.ac.uk, andrej.skraba(a)fov.uni-mb.si
****************************************************************************
SUBMISSION DUE DATE: September 30, 2010
-------------------------------------------------------------------------
SPECIAL ISSUE ON System Dynamics and other Simulation-based Approaches for
Information Systems for the International Journal of Information
Technologies and the Systems Approach (IJITSA)
-------------------------------------------------------------------------
Published: Semi annual (both in Print and Electronic form)
http://www.igi-global.com/ijitsa
-------------------------------------------------------------------------
Guest Editors:
Dr. Peter Otto, Union Graduate College, USA, ottop(a)union.edu
Dr. Andrej Skraba, University of Maribor, Slovenia,
andrej.skraba(a)fov.uni-mb.si
-------------------------------------------------------------------------
INTRODUCTION:
IS research aims to help decision-makers understand and anticipate
opportunities to deploy IS and adding business value for organizations in
today?s competitive environment. Decisions concerning IS are complex and
challenging for a decision-maker; time pressure, incomplete information,
unknown feedback loops, organizational contexts, and selfish motivations
strongly influence such decisions. Inadequate decisions and subsequent
actions might lead to undesired results. Enhancing the knowledge of
gaining business value from IS is possible by achieving insights into the
complex behavior of the system and the interaction among decision
variables. Using simulation models permit the testing of various
assumptions and provide decision-makers with the ability to explore the
consequences of various scenarios and alternative functional relationships
among variables in the system.
OBJECTIVE OF THE SPECIAL ISSUE:
It is important to gain a broader, systemic view on the management and
control problems in the fields of systems engineering, software
engineering and information systems. This would contribute to better
understanding of underlying system structure, dynamics and possibilities
for efficient control. Papers in the special issue should therefore
address practical application of System Dynamics and other
simulation-based approaches in the field of Information Systems to improve
understanding of business structures and decision making. Methodological
papers as well as case studies are welcome.
RECOMMENDED TOPICS:
Topics to be discussed in this special issue include (but are not limited
to) the following:
? Diffusion of new IS technology
? IS development
? IS-individuals interaction
? Implementation issues
? Outsourcing and country selection issues
? Social media and Web 2.0 issues
? Health informatics
? E-commerce and web-enabled delivery systems
? CRM, SCM applications
? Models and dynamics of efficient application of human resources and
knowledge
? Organization structure, dynamics and improvements
? Optimization of systems engineering, software engineering and
information systems by system dynamics models
? Sustainable financing dynamics in IT projects
SUBMISSION PROCEDURE:
Researchers and practitioners are invited to submit papers for this
special theme issue System Dynamics and Other Simulation-Based Approaches
for Information Systems on or before September 30, 2010. All submissions
must be original and may not be under review by another publication.
INTERESTED AUTHORS SHOULD CONSULT THE JOURNAL?S GUIDELINES FOR MANUSCRIPT
SUBMISSIONS at
http://www.igi-global.com/development/author_info/guidelines%20submission.p….
All submitted papers will be reviewed on a double-blind, peer review
basis. Papers must follow APA style for reference citations.
ABOUT International Journal of Information Technologies and the Systems
Approach (IJITSA): The Journal of Information Technologies and Systems
Approach (IJITSA) is an academic and practitioner journal created to
disseminate and discuss high quality research results on Information
Systems and related upper and lower level Systems as well as on its
interactions with Software Engineering, Systems Engineering, Complex
Systems and Philosophy issues, through rigorous Theoretical, Modeling,
Engineering or Behavioral studies in order to explore, describe, explain,
predict, design, control, evaluate, interpret, intervene and/or develop
organizational systems where Information Systems are the main objects of
study and the Systems Approach ?any variant- is the main research
methodology and philosophical stance used. This journal is an official
publication of the Information Resources Management Association
(http://www.igi-global.com/ijitsa)
IJITSA EDITORIAL BOARD
?Frank Stowell (EiC), University of Portsmouth, England
?Manuel Mora (co OEiC and OEiC), Autonomous University of Aguascalientes,
México
?Denis Edgar-Nevill, Canterbury Christ Church University, UK
?Miroljub Kljajic, University of Maribor, Slovenia
?Amitava Dutta, George Mason University, USA
?Yasmin Merali, University of Warwick, UK
?David Brown, University of Lancaster, UK
?Robert Cloutier, Stevens Institute of Technology, USA
?James R. Burns, Texas Tech University, USA
?RRory O'Connor, Dublin City University, Ireland
PUBLISHER:
The International Journal of Information Technologies and the Systems
Approach (IJITSA) is published by IGI Global (formerly Idea Group Inc.),
publisher of the ?Information Science Reference? (formerly Idea Group
Reference), ?Medical Information Science Reference?, ?Business Science
Reference?, and ?Engineering Science Reference? imprints. For additional
information regarding the publisher, please visit www.igi-global.com
All submissions should be directed to the attention of:
Guest Editors:
Dr. Peter Otto, ottop(a)union.edu
Dr. Andrej Skraba, andrej.skraba(a)fov.uni-mb.si
----------------------------------------------
Manuel Mora, EngD.
Full Professor and Researcher "C" Level
Autonomous University of Aguascalientes
Ave. Universidad 940
Aguascalientes, Ags.
México 20100
www.uaa.mx
----------------------------------------------
_______________________________________________
AISWorld mailing list
AISWorld(a)lists.aisnet.org
-------- Original-Nachricht --------
Betreff: [computational.science] Call for Papers - AusPDC2010
Datum: Tue, 13 Jul 2010 17:40:50 +1000
Von: Jinjun Chen <jinjun.chen(a)gmail.com>
Organisation: "ICCSA"
An: Computational Science Mailing List
<computational.science(a)lists.iccsa.org>
-------------------------------------------------------------------------
The 9th Australasian Symposium on Parallel and Distributed Computing
(AusPDC 2011)
Perth, Australia, 17-20 January, 2011
http://www.swinflow.org/confs/auspdc2011/
in conjunction with
Australasian Computer Science Week, 17-20 January 2011
-------------------------------------------------------------------------
Submission deadline: 16 August 2010
Type of submission: full research paper, full industry experience/demo
paper, or extended abstract.
Submission site: http://www.easychair.org/conferences?conf=auspdc2011
-------------------------------------------------------------------------
Overview/Scope:
The 9th Australasian Symposium on Parallel and Distributed (AusPDC 2011)
will be held in January, in Perth, Australia in conjunction with
Australasian Computer Science Week, 17-20 January 2011.
Scope of the Symposium
In 2010, AusGrid event was broadened to include all aspects of parallel
and distributed computing and hence was called as Australasian Symposium
on Parallel and Distributed Computing (AusPDC). Following this successful
event, it comes to the 9th this year in the series. In both New Zealand
and Australia parallel and distributed computing has been recognised as
strategic technologies for driving their moves towards knowledge economies.
A number of projects and initiatives are underway in both countries in
these areas. There is a natural interest in tools which support
collaboration
and access to remote resources given the challenges of the countries
location and sparse populations.
Topics of interest for the symposium include but not limited to:
* Multicore
* GPUs and other forms of special purpose processors
* Cluster computing
* Grid computing
* Green computing
* Cloud computing
* Peer-to-peer computing
* Service computing and workflow management
* Managing large distributed data sets
* Middleware and tools
* Performance evaluation and modeling
* Performance accelerators
* Problem-solving environments
* Parallel programming models, languages and compilers
* Runtime systems
* Operating systems
* Resource scheduling and load balancing
* Data mining
* Computational Science and Engineering
* Agent-based computing
* Reliability, security, privacy and dependability
* Applications and e-Science
The symposium is primarily targeted at researchers from Australia and New
Zealand, however in the spirit of parallel and distributed computing,
which aims to enable collaboration of distributed virtual organizations,
we encourage papers and participation from international researchers.
Best Paper Award:
A best paper award sponsored by Manjrasoft Pty. Ltd, Australia will be
presented to a paper receiving the highest quality rating. In addition, a
special issue in a high quality international journal will be organized
for selected best papers.
Program Committee Chairs:
- Jinjun Chen, Swinburne University of Technology
- Rajiv Ranjan, University of Melbourne
Program Committee:
Jemal Abawajy, Deakin University, Australia
David Abramson, Monash University, Australia
David Bannon, Victoria Partnership for Advanced Computing, Australia
Peter Bertok, RMIT, Australia
Rajkumar Buyya, University of Melbourne, Australia
Phoebe Chen, La Trobe University, Australia
Geoffrey Fox, Indiana University, USA
Andrzej Goscinski, Deakin University, Australia
Kenneth Hawick, Massey University, NZ
John Hine, Victoria University of Wellington, NZ
Michael Hobbs, Deakin University, Australia
Jiankun Hu, RMIT University, Australia
Zhiyi Huang, Otago University, NZ
Nick Jones, University of Auckland, NZ
Wayne Kelly, Queensland University of Technology, Australia
Kevin Lee, Murdoch University, Australia
Young Choon Lee, The University of Sydney, Australia
Laurent Lefevre, INRIA, University of Lyon, France
Andrew Lewis, Griffith University, Australia
Jiuyong Li, University of South Australia, Australia
Weifei Liang, Australian National University, Australia
Teo Yong Meng, National University of Singapore, Singapore
Lin Padgham, RMIT, Australia
Judy Qiu, Indiana University, USA
Paul Roe, Queensland University of Technology, Australia
Justin Rough, Deakin University, Australia
Hong Shen, The University of Adelaide, Australia
Jun Shen, University of Wollongong, Australia
Michael Sheng, The University of Adelaide, Australia
Gaurav Singh, CSIRO Mathematical and Information Sciences, Australia
Peter Strazdins, The Australian National University, Australia
Srikumar Venugopal, The University of New South Wales, Australia
Yan Wang, Macquarie University, Australia
Andrew Wendelborn, The University of Adelaide, Australia
Jingling Xue, The University of New South Wales, Australia
Jun Yan, University of Wollongong, Australia
Yun Yang, Swinburne University of Technology, Australia
Yanchun Zhang, Victoria University, Australia
Rui Zhang, The University of Melbourne, Australia
Albert Zomaya, The University of Sydney, Australia
--
*************************************************
Dr. Jinjun Chen
Senior Lecturer
CS3 - Centre for Complex Software Systems and Services
Faculty of Information and Communication Technologies
Swinburne University of Technology,
1, Alfred Street, Hawthorn,
Melbourne, Victoria 3122, Australia.
Tel: +61 3 9214 8739
Fax: +61 3 9819 0823
Office: EN506e, Engineering Building, Hawthorn Campus
Email: jinjun.chen(a)gmail.com
URL: http://www.swinflow.org/~jchen/
*************************************************
-------- Original-Nachricht --------
Betreff: [AISWorld] CFP: 2nd International Workshop on Comparative
Informatics (IWCI 2010) at NordiCHI 2010
Datum: Sun, 11 Jul 2010 19:59:29 +0200
Von: Ravi Vatrapu <rv.caict(a)cbs.dk>
An: aisworld(a)lists.aisnet.org <aisworld(a)lists.aisnet.org>
<<<Apologies for Cross-Posting>>>
*******************************************************************************************
Call for Papers: 2nd International Workshop on Comparative Informatics (IWCI 2010): Understanding Cultural Influences in Usability, Gaming, Collaboration, Government and Design Workshop Webpage: http://www.itu.dk/people/rkva/2ndICIW/
Full-day Workshop at NordiCHI 2010 (http://www.yourhost.is/nordichi2010) on Sunday, 17-October-2010.
*********************************************************************************************
<Overview>
Comparative informatics is the study of design, development, evaluation, use, and impact of information technologies across a diverse set of domains, organizations, contexts, cohorts, cultures, and countries. The scientific focus of the 2nd International Workshop on Comparative Informatics (IWCI 2010) is on the following core questions:
* How can we better understand the mutual relations between information and communication technologies and cultures?
* To what extent is the appropriation of technologies culturally relative?
* To what extent do technologies exert their own agency regardless of local practices and cultural accommodations?
* To what extent do people shape, alter, bend, adapt, adjust, align, configure, reconfigure, and re-imagine technologies?
Layered into the inherent complexities of technologies themselves as artifact whose qualities we do not fully understand are the technologies' uptake and appropriation in multiple cultural contexts. Temporality will be a key discussion point at the workshop and we will discuss methodological and epistemological aspects of time and its relation to technologically mediated activity. Methodological discussion will also examine the applicability of the comparative method to informatics and will proceed to identify a range of appropriate research methods. The workshop has five themes: online gaming, e-government, collaboration, usability, and design
<Outcomes of the workshop>
Given globalization and the multicultural social reality of the 21st century, it is clear that the core questions outlined about culture and technology cannot be approached without a coordinated global effort. A federation of researchers is required, for both practical and intellectual reasons, to shape and inform such investigations. IWCI 2010 aims to create such a research federation and a socio-technical environment to help sustain it. An edited collection or special issue of the workshop papers is planned.
<To Participate>
We invite position papers from researchers, practitioners, and students from a diversity of fields including but not limited to human-computer interaction (HCI), computer supported cooperative work (CSCW), computer supported intercultural collaboration (CSIC), information systems (IS), and learning sciences. languages, organizations and nations.
* Author Guidelines:
o Length& Format: A position paper of maximum 4 pages formatted using the ACM SIGCHI template (http://www.sigchi.org/publications/chipubform).
o Relevance and Substance: Ideally, the position paper should address one or more of the core questions and/or focus on one of the five themes outlined above. We also welcome conceptual and methodological papers on comparative research in general.
* Submission Guidelines:
o Please submit your position paper no later than 02-August-2010 by email to vatrapu(a)cbs.dk.
* Important Dates
o Submission of Position Papers: 01-August-2010
o Author Notifications: 15-August-2010
o Final Versions for Accepted Papers: 17-September-2010
o Workshop Date: Sunday, 17-October-2010
<Workshop Organizers>
Ravi Vatrapu, Copenhagen Business School, Denmark
Bonnie Nardi , University of California, Irvine, USA
Scott Robertson, University of Hawaii at Manoa, USA
Zhengjie Liu, Dalian Maritime University, China
Pradeep Yammiyavar, Indian Institute of Technology-Guwahati, India
Yair Amichai-Hamburger, Interdisciplinary Center (IDC) Herzliya, Israel
If you have any questions or need further information, please email vatrapu(a)cbs.dk
*************************************************************************************************
_______________________________________________
AISWorld mailing list
AISWorld(a)lists.aisnet.org
-------- Original-Nachricht --------
Betreff: [AISWorld] Contents of JGIM 18(3) Jul-Sep 2010
Datum: Mon, 12 Jul 2010 07:47:17 +1200
Von: Felix Tan <felix.tan(a)aut.ac.nz>
An: <aisworld(a)lists.aisnet.org>
The contents of the latest issue of:
Journal of Global Information Management (JGIM)
Official Publication of the Information Resources Management
Association
Volume 18, Issue 3, July-September 2010
Published: Quarterly in Print and Electronically
ISSN: 1062-7375 EISSN: 1533-7995
Published by IGI Publishing, Hershey-New York, USA
www.igi-global.com/jgim
Editor-in-Chief: Felix B. Tan, Auckland University of Technology, New
Zealand
PAPER ONE
The Impact of National Culture on Information Systems Planning
Autonomy
Dinesh Mirchandani, University of Missouri - St. Louis, USA
Albert Lederer, University of Kentucky, USA
Hofstedes national culture model has been applied in prior research to
better understand the management of multinational firms. That research
suggests that national culture may influence the information systems
planning autonomy of the subsidiaries of multinational firms, but such
an impact has not yet been tested empirically. A postal survey of 131
chief information officers and 103 senior non-IS managers of U.S.
subsidiaries of such firms collected data to test hypotheses based on
the model. Structural equation modeling using PLS-Graph 3.0 revealed
that Individualism-Collectivism, Masculinity-Femininity, and Uncertainty
Avoidance predicted autonomy for particular IS planning phases (as rated
by the CIOs). On the basis of the supported hypotheses, the study
provides evidence of the relevance of the national culture model to IS
planning effectiveness and IS contribution. The study also suggests to
subsidiary managers that an understanding of the national culture of
their parent firm can help them gain an insight into the parents
management perspective.
To obtain a copy of the entire article, click on the link below.
http://igi-global.com/Bookstore/Article.aspx?TitleId=43737
PAPER TWO
Cultural Impacts on Acceptance and Adoption of Information Technology
in a Developing Country
Elizabeth Baker, Virginia Military Institute, USA
Said Al-Gahtani, King Khalid University, Saudi Arabia
Geoffrey Hubona, Georgia State University, USA
This study investigates technology adoption behavior of Saudi Arabian
knowledge workers using desktop computers within the context of TAM2,
and the unique effects of Saudi culture on IT adoption within the
developing, non-Western, country. Following the guidelines of the
etic-emic research tradition, which encourages cross-cultural theory and
framework testing, the study findings reveal that the TAM2 model
accounts for 40.3% of the variance in behavioral intention among Saudi
users, which contrasts Venkatesh and Davis (2000) explained 34-52% of
the variance in usage intentions among U.S. users. The models
explanatory power differs due to specific Saudi Arabian emic constructs,
including its collectivist culture and the workers focus on the
managerial father figures influence on individual performance, a stark
difference from TAM findings in more individualistic societies. The
authors findings contribute to understanding the effects of cultural
contexts in influencing technology acceptance behaviors, and demonstrate
the need for research into additional cultural factors that account for
technology acceptance.
To obtain a copy of the entire article, click on the link below.
http://igi-global.com/Bookstore/Article.aspx?TitleId=43738
PAPER THREE
Do Foreign Direct Investment (FDI) and Trade Openness Explain the
Disparity in ICT Diffusion between Asia-Pacific and the Islamic Middle
Eastern Countries?
Farid Shirazi, Ryerson University, Canada
Roya Gholami, Aston Business School, UK
Dolores Higón, University of Valencia, Spain
This study investigates the impact of FDI and trade openness on ICT
diffusion in the Asia-Pacific and Middle East regions from 1996-2005.
The results indicate that while dissimilarities exist between the
economies included in this study in terms of their level of
socio-economic and political development, education and the growth of
GDP have had a positive impact on ICT diffusion in both regions.
However, while FDI has generally had a positive and significant impact
on ICT diffusion in Asia-Pacific economies, its impact on Middle Eastern
economies has been detrimental. The results of this study also show that
trade-openness has had, in general, a positive and significant impact on
ICT diffusion.
To obtain a copy of the entire article, click on the link below.
http://igi-global.com/Bookstore/Article.aspx?TitleId=43739
PAPER FOUR
Critical Factors of ERP Adoption for Small- and Medium- Sized
Enterprises: An Empirical Study
She-I Chang, National Chung Cheng University, Taiwan
Shin-Yuan Hung, National Chung Cheng University, Taiwan
David Yen, Miami University, USA
Pei-Ju Lee, National Chung Cheng University, Taiwan
Small and Medium-sized Enterprises (SMEs) play a vital and pervasive
role in the current development of Taiwans economy. Recently, the
application of Enterprise Resource Planning (ERP) systems have enabled
large enterprises to have direct contact with their clients via
e-commerce technology, which has led to even fiercer competition among
the SMEs. This study develops and tests a theoretical model including
critical factors which influence ERP adoption in Taiwans SMEs.
Specifically, four dimensions, including CEO characteristics, innovative
technology characteristics, organizational characteristics, and
environmental characteristics, are empirically examined. The results of
a mail survey indicate that the CEOs attitude towards information
technology (IT) adoption, the CEOs IT knowledge, the employees IT
skills, business size, competitive pressure, cost, complexity, and
compatibility are all important determinants in ERP adoption for SMEs.
The authors results are compared with research on IT adoption in SMEs
based in Singapore and the United States, while implications of the
results are also discussed.
To obtain a copy of the entire article, click on the link below.
http://igi-global.com/Bookstore/Article.aspx?TitleId=43740
*****************************************************
For full copies of the above articles, check for this issue of the
Journal of Global Information Management (JGIM) in your institution's
library. This journal is also included in the IGI Global aggregated
"InfoSci-Journals" database: www.infosci-journals.com (
http://www.infosci-journals.com/ ).
*****************************************************
CALL FOR PAPERS
Mission of JGIM:
Prospective authors are invited to submit manuscripts for possible
publication in the Journal of Global Information Management (JGIM).
The journal publishes original material concerned with all aspects of
the development, use and management of information technology (IT) in a
global context. The mission of JGIM is to be the primary forum for
researchers and practitioners to disseminatethe evolving knowledge on
global IT. Original contributions concerning any aspect of global
information management from both scholars and practitioners are
welcome.
Submission Categories and Themes:
The journal accepts submissions in the following categories:
a. Research Article - Contributions to this section are full papers
reporting completed research
b. Research Note - Research frameworks, exploratory studies and
methodological papers
c. Research Review - Reviews are carefully crafted articles that
conceptualize research areas, synthesize prior research as well as help
identify and develop future research directions
Authors are encouraged to develop articles that are consistent with the
following themes:
a. Cross-National Studies. These need not be cross-culture per se.These
studies lead to an understanding of IT as it leaves one nation and is
built/bought/used in another.
b. Cross-Cultural Studies. These need not be cross-nation. Cultures
could be across regions that share a similar culture. They can also be
within nations(subcultures, ethnicities...etc).
c. Single nation studies from under-represented nations. The idea here
is to look at existing literature from the better represented nations
and compare it to the findings in the under-represented nation. Authors
are also encouraged to weave the country context (ie. culture, firm
strategies, government policies, laws ...etc) in the development of the
research problem and in explaining the results.
d. Studies of the development, implementation, management and use of IT
in multinational, transnational, inter-national and global
organizations.
Interested authors should consult the journal's manuscript submission
guidelines at www.igi-global.com/jgim
All inquiries and submissions should be sent to:
Editor-in-Chief: Professor Felix B. Tan at jgim(a)aut.ac.nz
_______________________________________________
AISWorld mailing list
AISWorld(a)lists.aisnet.org
-------- Original-Nachricht --------
Betreff: [WI] Call for Papers - DDDM2010
Datum: Mon, 12 Jul 2010 11:13:44 +1000
Von: xinhua zhu <xhzhu(a)it.uts.edu.au>
An: wolff(a)cs.jhu.edu, wi(a)aifb.uni-karlsruhe.de, webir(a)egroups.com,
vki-list(a)dfki.uni-sb.de, vki-list(a)dfki.de, vesilind(a)bucknell.edu,
uai(a)cs.orst.edu, vavtalk(a)csd.abdn.ac.uk, vavtalk(a)pigeon.csd.abdn.ac.uk
*Call for Papers - DDDM2010
The 2010 International Workshop on Domain Driven Data Mining
Sydney, Australia, December 14-17, 2010
In conjunction with the 2010 IEEE International Conference on Data
Mining (ICDM 2010)
URL: http://datamining.it.uts.edu.au/dddm/dddm10/
<http://datamining.it.uts.edu.au/dddm/dddm10/>*
The Workshop on Domain Driven Data Mining (DDDM) series aims to provide
a premier forum for sharing findings, knowledge, insight, experience and
lessons in tackling potential challenges in discovering actionable
knowledge from complex domain problems, promoting interaction and
filling the gap between academia and business, and driving a paradigm
shift from data-centered hidden pattern mining to domain-driven
actionable knowledge delivery in varying data mining domains toward
supporting smart decision and businesses.
Following the success of DDDM2009 joint with ICDM2009 in the US,
DDDM2008 joint with ICDM2008 in the Italy, and DDDM2007 with SIGKDD,
DDDM2010 welcomes theoretical and applied disseminations that make efforts:
o to design next-generation data mining methodology for actionable
knowledge discovery and delivery, toward handling critical issues for
KDD to effectively and efficiently contribute to real-world smart
businesses and smart decision and to benefit critical domain problems in
theory and practice;
o to devise domain-driven data mining techniques to bridge the gap
between a converted problem and its actual business problem, between
academic objectives and business goals, between technical significance
and business interest, and between identified patterns and business
expected deliverables, toward strengthening business intelligence in
complex enterprise applications;
o to present the applications of domain-driven data mining and
demonstrate how KDD can be effectively deployed to solve complex
practical problems; and
o to identify challenges and future directions for data mining research
and development in the dialogue between academia and industry.
Topics of interest
This workshop solicits original theoretical and practical research on
the following topics.
(1) Methodologies and infrastructure
o Domain-driven data mining methodology and project management
o Domain-driven data mining framework, system support and infrastructure
(2) Ubiquitous intelligence
o Involvement and integration of human intelligence, domain
intelligence, network intelligence, organizational intelligence and
social intelligence in data mining
o Explicit, implicit, syntactic and semantic intelligence in data
o Qualitative and quantitative domain intelligence
o In-depth patterns and knowledge
o Human social intelligence and animat/agent-based social intelligence
in data mining
o Explicit/direct or implicit/indirect involvement of human intelligence
o Belief, intention, expectation, sentiment, opinion, inspiration,
brainstorm, retrospection, reasoning inputs in data mining
o Modeling human intelligence, user preference, dynamic supervision and
human-mining interaction
o Involving expert group, embodied cognition, collective intelligence
and Consensus construction in data mining
o Human-centered mining and human-mining interaction
o Formalization of domain knowledge, background and prior information,
meta knowledge, empirical knowledge in data mining
o Constraint, organizational, social and environmental factors in data
mining
o Involving networked constituent information in data mining
o Utilizing networking facilities for data mining
o Ontology and knowledge engineering and management
o Intelligence meta-synthesis in data mining
o Domain driven data mining algorithms
o Social data mining software
(3) Deliverable and evaluation
o Presentation and delivery of data mining deliverables
o Domain driven data mining evaluation system
o Trust, reputation, cost, benefit, risk, privacy, utility and other
issues in data mining
o Post-mining, transfer mining, from mined patterns/knowledge to
operable business rules.
o Knowledge actionability, and integrating technical and business
interestingness
o Reliability, dependability, workability, actionability and usability
of data mining
o Computational performance and actionability enhancement
o Handling inconsistencies between mined and existing domain knowledge
(4) Enterprise applications
o Dynamic mining, evolutionary mining, real-time stream mining, and
domain adaptation
o Activity, impact, event, process and workflow mining
o Enterprise-oriented, spatio-temporal, multiple source mining
o Domain specific data mining, etc.
Important Dates
July 23, 2010 Due date for full workshop papers
September 20, 2010 Notification of paper acceptance to authors
October 11, 2010 Camera-ready of accepted papers
December 14, 2010 Workshop date
Submission
All papers should be submitted through the ICDM2010 submission system
here (http://wi-lab.com/cyberchair/icdm10/scripts/submit.php). Paper
submissions should be limited to a maximum of 10 pages in the IEEE
2-column format, the same as the camera-ready format (see the IEEE
Computer Society Press Proceedings Author Guidelines). All papers will
be reviewed by the Program Committee
on the basis of technical quality, relevance to domain driven data
mining, originality, significance and clarity.
All papers accepted for the workshop will be included in the ICDM'10
Workshop Proceedings published by the IEEE Computer Society Press.
For more information
Please refer to the DDDM2010 website:
http://datamining.it.uts.edu.au/dddm/dddm10/
<http://datamining.it.uts.edu.au/dddm/dddm10/>
-------- Original-Nachricht --------
Betreff: [AISWorld] CFP: JITTA Special Issue: Boundary-Spanning through
Business Process Management (BPM)
Datum: Mon, 12 Jul 2010 13:25:44 +1000
Von: Jan Recker <j.recker(a)qut.edu.au>
An: aisworld(a)lists.aisnet.org <aisworld(a)lists.aisnet.org>
*Important Dates***
Deadline for submissions May 1, 2011
Initial Review Round Completed July 31, 2011
Revisions Due (where applicable) October 1, 2011
Final Acceptance Decisions December, 31 2011
Special Issue Published March, 1 2012
* *
* *
*Objective and Aspirations*
The purpose of this special issue is to draw the attention of the
Information Systems community to the emerging significant role of
Business Process Management as a boundary-spanning and identity-defining
discipline of IS research, bringing together management philosophies and
process-aware information technology. Our objective is to provide a
discussion forum for researchers who are interested in providing
examples for the contemporary state of the art in BPM research, spanning
design-oriented approaches as well as traditional empirical research
approaches. A particular aim of this special issue is to push the
discussion in contemporary BPM research beyond information technology
and methods to also embrace aspects of strategic alignment, governance,
people and culture.
*Description***
Business Process Management has become one of the most widely discussed
approaches for information professionals. The potential of BPM
particularly lies in the integration of advanced information technology
with organizational and managerial methods to foster and leverage
business innovation, operational excellence and intra- and
inter-organizational collaboration.
Business Process Management as an Information Systems discipline is
characterized by a myriad of approaches towards the analysis, modeling,
implementation, execution and management of information systems with an
explicit process focus, ranging from those supported by groupware and
project management products to those supported by workflow management
systems and, more recently, business process management systems.
However, Business Process Management also embraces further, widely
undefined themes pertaining to the engineering and management of systems
and organizations, particularly with respect to the areas of
organizational culture, process-aware information systems, strategic
alignment, and governance structures.
The wide application areas and the impact of Business Process Management
present an exciting opportunity for IS researchers to contribute to our
knowledge in this area, be it through the design of innovative
process-oriented artifacts or through theorizing about the application,
appropriation and usage consequences of BPM artifacts in organizational
practice.
We invite rigorous and relevant contributions from a wide variety of
research methods. Interpretive and positivistic research approaches as
well as Design Science Research are welcomed, and theory building is
encouraged regardless of the chosen research methodology. Topics of
interest pertaining to Business Process Management may include but are
not limited to the following:
- Strategic alignment of BPM (e.g., value-based process management)
- BPM Governance (e.g., BPM center of competence)
- Methods for BPM (e.g., Six Sigma, procedure models, methodologies,
process modeling)
- Process-aware Information Systems (e.g., workflow management and
eBusiness standards)
- Engagement and Education of Process Practitioners(e.g., educational
programs, curriculum design)
- Cultural Impacts of/on BPM (e.g., in global roll-out projects)
- Adoption and Diffusion of BPM and Process standards
- Open-source Systems for BPM
- BPM and Service-Orientation
- Business Process Intelligence
- Business Process Forensics and Performance Management
- New enabling technologies for BPM (e.g., cloud computing, Mobile
technologies)
- End user and community enablement of BPM
*About JITTA***
JITTA aims to publish articles with short publication cycle times,
attract a portfolio of very exciting and high quality research
contributions, and maintain highest quality standards. The journal
welcomes research papers (research agenda papers, interpretive or
exploratory papers, speculative research, state-of-research reviews, or
full research papers), research essays, and application papers
(normative papers or case studies). Please go to the Aims & Scope page
<http://aisel.aisnet.org/jitta/aimsandscope.html> for a detailed
description of all encouraged submission types.
New Manuscripts should be submitted using the Submit Article link
<http://aisel.aisnet.org/cgi/submit.cgi?context=jitta>. Please select
the appropriate special issue as article type. Revisions need to be
submitted by logging into the JITTA Review System
<http://aisel.aisnet.org/jitta/review_system.html>.
Instructions for Authors are on the Policies page
<http://aisel.aisnet.org/jitta/policies.html>.
*Special Issue Editors***
* *
Jan Recker
Queensland University of Technology
j.recker(a)qut.edu.au <mailto:j.recker@qut.edu.au>
Jan vom Brocke
The University of Liechtenstein
Jan.vom.Brocke(a)hochschule.li <mailto:Jan.vom.Brocke@hochschule.li>
Jan Mendling
Humboldt-University Berlin
jan.mendling(a)wiwi.hu-berlin.de <mailto:jan.mendling@wiwi.hu-berlin.de>
Alexander Dreiling
SAP Research
alexander.dreiling(a)sap.com <mailto:alexander.dreiling@sap.com>
*Contact Email*: j.recker(a)qut.edu.au <mailto:j.recker@qut.edu.au>
-------- Original-Nachricht --------
Betreff: [AISWorld] CFP: 2nd Int. Workshop Service Oriented Computing
in Logistics (SOC-LOG, at ICSOC 2010)
Datum: Mon, 12 Jul 2010 09:25:47 +0200
Von: joerg.leukel(a)uni-hohenheim.de
An: aisworld(a)lists.aisnet.org
==================================================================
Call for Papers: 2nd International Workshop on
Service Oriented Computing in Logistics (SOC-LOG 2010)
In conjunction with the 8th International Conference
on Service Oriented Computing (ICSOC 2010)
December 7-10, San Francisco, CA, USA
Workshop website: http://soclog10.wifa.uni-leipzig.de
<http://soclog10.wifa.uni-leipzig.de/>
===================================================================
Workshop Theme
==============
Logistics is of paramount importance for many industries: It plans
and realizes the flow of goods from sources to destinations by
means of transformations in space, time, and quantity. Coordinating
logistics activities faces organizational and technical boundaries
of the participating firms as well as must resolve conflicting
goals and strategies of such firms. Information plays a crucial
role in logistics, in particular in today’s business environment,
which is changing significantly due to, e.g., globalization of
supply chains, stronger customer orientation and individualization,
all increasing the need for more adaptive logistics systems. IT is
the key enabler for managing these challenges, supporting supply
chain collaboration, and managing increasing economic dynamics.
Advanced IT support allows supply chains to advance their
efficiency significantly, to better fulfill customer needs, and
handle the growing organizational complexity and the associated
supply chain risks.
While existing logistics IT systems provide solid support for
static, self-contained logistics systems, research on managing the
logistics in supply chains that are dynamically changing, is still
less advanced. Service-oriented Computing (SOC) is a promising
paradigm, which automates inter-organizational processes by
loosely coupled software-based services. The focus of this workshop
is the study and exploration of SOC’s potential to solve
coordination problems in logistics systems and supply chains.
Key research questions are:
(1) How to represent logistics systems in service-based computing
systems by employing and adopting constructs, models, and methods
of the SOC technology stack,
(2) how to describe software-based logistics services with service
description languages,
(3) how to coordinate software-based logistics services, by
employing and adopting approaches for service discovery and service
composition,
(4) how to negotiate and agree about the delivery of software-based
logistics services with approaches for SLA representation, SLA
management, and SLA negotiation, and
(5) how to control the delivery and how to measure the efficiency
and effectiveness of software-based logistics services?
With the set of design principles, architectural models and concepts
and last but not least with its existing and growing set of
standards, SOC promotes adaptiveness of logistics systems and supply
chains, a flexible and re-configurable provisioning along multiple
supply chains, and their efficiency.
The purpose of the workshop is to present and discuss recent
significant developments at the intersection of service-oriented
computing and logistics systems/supply chain management, and to
promote cross-fertilization and exchange of ideas and techniques
between these fields. The relation to ICSOC 2010 is that, on one
hand, the conference addresses the core concepts such as interacting
business processes, service composition, service operations, and
quality of services, and on the other hand, would receive feedback,
experiences, and requirements from a highly relevant application
domain to validate and advance its current approaches.
Topics
======
In particular, we are inviting papers on the following topics:
1) Logistics services representation
- Servicetization of logistics systems
- Logistics service models
- Reference models for logistics services
- Semantic models for logistics services
- Repositories and dictionaries for logistics services
2) Logistics services description
- Syntactical description of logistics services
- Semantic description of logistics services
- Logistics ontologies / ontologies for logistics services
- QoS attributes of logistics services
3) Coordination of logistics services
- Discovery of logistics services
- Composition of logistics services
- Orchestration and choreography of logistics services
- Market-based coordination of logistics services, i.e., auctions,
exchanges
4) SLA Management of logistics services
- Domain-specific SLA models
- Semantic annotation of SLAs for logistics services
- SLA negotiation protocols for logistics services
- Pricing of logistics services
- Integrating logistics services into SLA management infrastructures
5) Delivery of logistics services
- Logistics service runtime management and monitoring
- Verification of logistics services
- Simulation and optimization of logistics services
- Transactional safeguarding of logistics services
- Service-oriented architectures for the setup and enactment of
logistics services
Paper Submission and Publication
================================
Authors are invited to submit original, previously unpublished research
papers, as
- Full papers (up to 15 pages including all references and figures) or
- Position papers (up to 5 pages including all references and figures)
on the listed or related topics.
Please, submit papers (in PDF format) via our electronic submission
system which is
available at http://www.easychair.org/conferences/?conf=soclog10.
All workshop papers will be included in the joint workshop proceedings
of ICSOC 2010.
These proceedings will be published in Springer’s LNCS Services Science
Subline.
This subline is an integrated part of the LNCS.
Thus, papers should be written in English and must be prepared in the
Springer LNCS
style (see http://www.springer.de/comp/lncs/authors.html for more
information).
All submissions will be peer-reviewed by members of the international
program committee.
Paper acceptance will be based on originality, significance, technical
soundness, and
clarity of presentation. For short position papers, clarity of
exposition and the degree
of innovation will be sufficient, while for full papers, a clear
technical contribution
is expected.
At least one author of an accepted paper must attend the workshop and
present the work.
Attendance of the workshop requires registration to the main ICSOC 2010
conference.
Key Dates
=========
14 September 2010: Submissions due
30 September 2010: Notification of acceptance
07 December 2010: Workshop (1 day)
10 January 2011: Camera-ready Submission
Program Chairs
==============
Joerg Leukel, University of Hohenheim, Germany
André Ludwig, University of Leipzig, Germany
Alex Norta, University of Helsinki, Finland
Program Committee
=================
Witold Abramowicz, Poznan University of Economics, Poland
Samuil Angelov, Eindhoven University of Technology, Netherlands
Marcelo Cataldo, Carnegie Mellon University, USA
Rik Eshuis, Eindhoven University of Technology, Netherlands
Diogo Ferreira, Technical University of Lisbon, Portugal
Paul Grefen, Eindhoven University of Technology, Netherlands
Maria-Eugenia Iacob, Netherlands, University of Twente
Axel Korthaus, Queensland University of Technology, Australia
Marek Kowalkiewicz, SAP Research, Australia
Carlos Müller, Universidad de Sevilla, Spain
Manuel Resinas, Universidad de Sevilla, Spain
Toni Ruokolainen, University of Helsinki, Finland
Jun Shen, University of Wollongong, Australia
Ingo Weber, University of New South Wales, Australia
Supported by
============
- D-GRID Project InterLogGrid (http://www.interloggrid.org
<http://www.interloggrid.org/>)
- FMER Project Logistics Service Bus (http://www.lsb-plattform.de
<http://www.lsb-plattform.de/>)
Contact
=======
Joerg Leukel
Department of Information Systems 2
University of Hohenheim
Stuttgart, Germany
Phone: +49 711 459-23968
E-Mail: joerg.leukel(a)uni-hohenheim.de
URI: http://www.joerg-leukel.net <http://www.joerg-leukel.net/>
André Ludwig
Information Systems Institute
University of Leipzig
Leipzig, Germany
Phone: +49 341 9733732
E-Mail: ludwig(a)wifa.uni-leipzig.de
URI: http://www.andre-ludwig.info <http://www.andre-ludwig.info/>
Alex Norta
Department of Computer Science
University of Helsinki
Helsinki, Finland
Phone: +358 44 0303720
E-Mail: alexander.norta(a)cs.helsinki.fi
URI: http://www.cs.helsinki.fi/u/anorta/