-------- Original Message --------
Subject: [AISWorld] Journal of Information Systems
Education (JISE) Vol 22 Issue 4
Date: Wed, 28 Mar 2012 17:24:45 +0000
From: Kruck, S - kruckse <kruckse(a)jmu.edu>
To: 'aisworld(a)lists.aisnet.org' <aisworld(a)lists.aisnet.org>
IS Professors and IS Education Professionals around the world:
The Journal of Information Systems Education (JISE) is
pleased to announce that Volume 22, Number 4 has been
published. JISE is the leading academic journal dedicated to
IS education and is the official publication of the
Education Special Interest Group (EDSIG) of AITP (the
Association of Information Technology Professionals). The
index and abstracts for each paper for this issue and
abstracts for all papers in Vol. 22(4) can be found at
http://jise.org/Volume22/22-4/Contents-22-4.html.
Contents of Vol. 22(4) include:
Teaching Case- The Challenge of Implementing an ERP System
<http://jise.org/Volume22/22-4/Pdf/Vol22-4pg291.pdf>
in a Small and Medium Enterprise- A Teaching Case of ERP
Project Management
<http://jise.org/Volume22/22-4/Pdf/Vol22-4pg291.pdf>
Hongjiang Xu, Patrick J. Rondeau, and Sakthi Mahenthiran
(pp 291-296)
Teaching Case-Procyon LLC: From Music Recommendations to
Preference Mapping
<http://jise.org/Volume22/22-4/Pdf/Vol22-4pg297.pdf>
Susan J. Chinn
(pp 297-306)
Communication Challenges in Requirements Definition: A
Classroom Simulation
<http://jise.org/Volume22/22-4/Pdf/Vol22-4pg307.pdf>
Neil C. Ramiller and Erica L. Wagner
(pp 307-318)
The Determinants of the Post-Adoption Satisfaction of
<http://jise.org/Volume22/22-4/Pdf/Vol22-4pg319pdf.pdf>
Educatorswith an E-Learning System
<http://jise.org/Volume22/22-4/Pdf/Vol22-4pg319pdf.pdf>
A.K.M. Najmul Islam
(pp 319-332)
The Systems Analysis and Design Course: An Educators'
<http://jise.org/Volume22/22-4/Pdf/Vol22-4pg333.pdf>
Assessment of the Importance and Coverage of Topics
<http://jise.org/Volume22/22-4/Pdf/Vol22-4pg333.pdf>
Brandi N. Guidry, David P. Stevens, and Michael W. Totaro
(pp 333-348)
IS 2010 and ABET Accreditation: An Analysis of ABET-
<http://jise.org/Volume22/22-4/Pdf/Vol22-4pg349.pdf>
Accredited Information Systems Programs
<http://jise.org/Volume22/22-4/Pdf/Vol22-4pg349.pdf>
Bruce Saulnier and Bruce White
(pp 349-356)
An Approach to Meeting AACSB Assurance of Learning
<http://jise.org/Volume22/22-4/Pdf/Vol22-4pg357.pdf>
Standards in an IS Core Course
<http://jise.org/Volume22/22-4/Pdf/Vol22-4pg357.pdf>
Alan N. Attaway, Satish Chandra, Brian L. Dos Santos, Matt
E. Thatcher, and Andrew L. Wright
(pp 357-368)
Experiencing the Elicitation of User Requirements and
Recording <http://jise.org/Volume22/22-4/Pdf/Vol22-4pg369.pdf>
them in Use Case Diagrams through Role-Play
<http://jise.org/Volume22/22-4/Pdf/Vol22-4pg369.pdf>
<http://jise.org/Volume22/22-3/Pdf/1199124%20-%2010%20pgs.pdf>Gay
Costain and Brad McKenna
(pp 369-382)
Call for Papers
<http://jise.org/CFP-GlobalSecInfoAssurance.pdf> - Global
Information Security and Assurance in IS Education
***********************************************************************
About the Journal of Information Systems Education (JISE):
SAMPLE COPIES: If you have not received a free sample and
would like to receive one, please send an e-mail message
with your name and full mailing address to editor(a)jise.org
<mailto:editor@jise.org>.
CALL FOR MANUSCRIPTS: JISE invites contributions from IS
educators and scholars involving IS education. We accept
manuscripts in the following areas: IS education research,
teaching tips, innovative classroom practices, curriculum
issues, teaching cases, classroom minicases, current topics
in IS education, IS education trends and new ideas and other
IS education-related topics. Submissions should be sent
electronically to editor(a)jise.org <mailto:editor@jise.org>.
REVIEW PROCESS: Each article submitted to JISE is blind
reviewed by members of the Editorial Board and/or other
reviewers. Authors are informed of the results of the review
by the Editor. The final decision for the publishing of any
manuscript is made by the Editor.
JISE is indexed by ABI/Inform, EBSCO Business Source
Complete & Education Research Complete, Gale Group, Inc.,
ProQuest, H.W. Wilson, Educational Research Abstracts (ERA),
Education Resources Information Center (ERIC),
WilsonWeb/Wilson OmniFile, Cabell's Directory of Publishing
Opportunities, and Ulrich's Periodicals Directory.
The JISE web site is located at http://jise.org
S.E. Kruck, Ph.D., CPA, CCP
KruckSE(a)JMU.edu <mailto:KruckSE@JMU.edu>
Professor, Computer Information Systems Department-
http://cob.jmu.edu/kruckse
Editor-in-Chief, Journal of Information Systems Education -
http://jise.org <http://jise.org/> (editor(a)jise.org
<mailto:editor@jise.org> or jise(a)jmu.edu)
LinkedIn: Journal of Information Systems Education
Twitter: J_Info_Sys_Educ
Facebook: JISE
Board of Directors, EdSIG (AITP) - http://www.aitp-edsig.org
<http://www.aitp-edsig.org/>
President, Friends of Valley Charities -
http://tinyurl.com/FriendsofValleyCharities
James Madison University
800 Main Street
College of Business - MSC0202
Harrisonburg, VA 22807
-------- Original-Nachricht --------
Betreff: [AISWorld] CFP WOSIS 2012. Deadline extended: 10 April
Datum: Wed, 28 Mar 2012 20:07:19 +0200
Von: DAVID GARCIA ROSADO <David.GRosado(a)uclm.es>
An: <aisworld(a)lists.aisnet.org>
[Apologies if you receive multiple copies of this announcement.
Please pass it on to your colleagues and students who might be
interested in contributing]
**
*The best papers will have the chance to publish extended and revised
versions in a special issue of Computer Standards and Interfaces in the
ISI Journal Citation Reports with Impact factor of 0.825.*
**** CALL FOR PAPERS ****
The Ninth International Workshop on Security In Information Systems
WOSIS-2012
28 June -- 1 July, 2012 - Wroclaw, Poland
http://www.iceis.org/wosis.aspx
To be held in conjunction with the 14th International Conference on
Enterprise Information Systems (ICEIS 2012) http://www.iceis.org/
*********Important Dates*********
Regular Paper Submission: *10 April, 2012 (extended)*
Authors Notification: 27 April, 2012
Camera Ready Submission Deadline: 10 May, 2012
*******************************
_Co-chairs:_
Dr. David G. Rosado
University of Castilla-La Mancha, Spain
David.GRosado(a)uclm.es <mailto:David.GRosado@uclm.es>
Dr. Luis Enrique Sánchez
Sicaman-NT, Departament of R+D, Spain
lesanchez(a)sicaman-nt.com
Dr. Carlos Blanco
University of Cantabria, Spain
blancobc(a)unican.es
Dr. Jan Jürjens
Technical University of Dortmund, Germany
jan.jurjens(a)cs.tu-dortmund.de <mailto:jan.jurjens@cs.tu-dortmund.de>
_Workshop Background and Goals_
Information Systems Security is one of the most pressing challenges
facing all kinds of organizations today. Although many companies have
discovered how critical information is to the success of their business
or operations, very few have managed to be effective in maintaining
their information secure, avoiding unauthorized access, preventing
intrusions, stopping secret information disclosure, etc.
There are various definitions of security, but all of them basically
agree on the same components. Security in information systems considers
the protection of information and of the systems that manage it, against
a wide range of threats in order to ensure business continuity, minimize
risks and maximize the return on investment and business opportunities.
Security is, therefore, currently a widespread and growing concern that
covers all areas of society: business, domestic, financial, government,
and so on. In fact, the so-called information society is increasingly
dependent on a wide range of software systems whose mission is critical,
such as air traffic control systems, financial systems, or public health
systems. The potential losses that are faced by businesses and
organizations that rely on all these systems, both hardware and
software, therefore signify that it is crucial for information systems
to be properly secured from the outset.
With the increasing dependence that the information society has on
Information and Communication Technology (ICT), the need to protect
information is increasingly important for companies. The demand for
products, systems and services with which to manage and maintain
information is therefore increasing, and the realization of superficial
security controls is not sufficient. It is necessary to apply a rigorous
approach to the assessing and improvement of the security of products
and processes that take place in the context of ICT. This has led to the
emergence of Information Security Management Systems (ISMS), which are
of great importance to the stability of companies' information systems.
In this new edition of WOSIS, the traditional information systems
security topics will remain but we want explicitly focus the workshop on
one of the most important issues and currently considered as it is
security in Cloud computing. Although there are many benefits to
adopting cloud computing, there are also some significant barriers to
adoption as is security followed by issues regarding compliance, privacy
and legal matters. Security is the main obstacle for many organizations
in their move to the cloud, related to risk areas such as external data
storage, dependency on the "public" internet, multi-tenancy and
integration with internal security. The objective of this new edition is
to contribute to the study and analysis of solutions and approaches
which help to achieve and facilitate the level of security needed for
such distributed environments and that its adoption is not any problem
for the society, administration and enterprise.
_Topics of interest include, but are not limited to:_
_Topic for Cloud Computing_
* Security Engineering for Cloud-Based Systems
* Security Requirements Engineering for Cloud-Based Systems
* Risks and threats in Cloud
* Privacy and Data protection in Cloud
* Cloud Legal Issues
* Trust and policy management in Clouds
* Issues and recent approaches in portability, interoperability and
migration
* Secure migration processes to cloud computing
* Security in migration models
* Systems adapted to the cloud
* Storage security
* Cloud Infrastructure Security
* Security Governance in the Cloud
* Risk management and assessment and third-party risk management
* Identity & Access Management in the Cloud
* Security and Virtualization__
* Security in SaaS, PaaS and IaaS
* Security in Cloud applications
* Cloud security models
* MDA and MDS applied to cloud computing
* Case studies
_Rest of topics_
* Security in Software development Life Cycle
* Information Security Management System
* Security Management and Assessment
* Analysis and management of risks
* Security Implementation, Secure programming and Security Deployment
* Case studies and experiences of secure software
* Security culture
* IT Governance
* IT Service Continuity
* Language-based Security
* Open Security Standards and Security Certification
* Common practice, legal and regulatory issues
* Security for SOA, Web Services, Grid computing
* Security for Databases and Data Warehouses
* Metadata and Security
* Secure Data Management
* Workflow and Business Process Security
* Security Metrics and Measurement
* Security Ontologies
* Security in Software Product Lines
* Distributed and Network Security
* Security & Trust Models
* Authentication, Authorization and Access Control
* Anonymity and Privacy
* Security for Mobile Computing, sensors networks, multimedia systems
* Security for Electronic Commerce, Electronic Business and e-Services
(e-voting, e-banking, e-governement, e-health)
* Security in Social Networks
* Security for embedded systems, smart cards and RFID
* Security Issues in Ubiquitous/Pervasive Computing
* Intellectual Property Protection
* Digital Rights Management (DRM). Mobile DRM
* Personal Data Protection for Information Systems and Digital
Identity management
* Access Control and Rights Expression Languages
* Semantic Web Technologies applied to Security
* Security Engineering
* Disaster Recovery and Failure Prevention
* Incident Response and Prevention
* Intrusion Detection and Fraud Detection
* Biometric Security
* Cryptology: Cryptography and Cryptanalysis
* Information hiding: Steganography & Steganalysis
* Digital Forensics
* Cyber terrorism
_Paper Submission_
Prospective authors are invited to submit papers for oral presentation
in any of the topics listed above. Submitted papers must present
original, non-published work of high quality. Only papers in English
will be accepted, and the length of the paper should not exceed 10 pages
for full papers and 8 pages for short papers (figures and appendices
included).
Instructions for preparing the manuscript (in Word and Latex formats)
are available at the conference Paper Templates web page. Please also
check the web page with the Submission Guidelines. Papers should be
submitted electronically via the web-based submission system at:
http://www.insticc.org/Primoris
_Publications_
All accepted papers will be published in the workshop proceedings book,
under an ISBN reference, and in CD-ROM support. Additionally, the best
papers will have the chance to publish extended and revised versions in
Journal of Computer Standards and Interfaces in the ISI Journal Citation
Reports.
_Workshop Program Committee _
Alfonso Rodriguez. University of Bio-Bio. Chile
Ambrosio Toval. University of Murcia. Spain
Andreas Bauer, National ICT Australia. Australia
Antonio Maña. University of Malaga. Spain
Brajendra Panda. University of Arkansas. USA
Csilla Farkas. University of South Carolina. USA
Daniel Mellado. University of Castilla-La Mancha. Spain
Debasis Giri. Haldia Institute of Technology. India
Duminda Wijesekera. University George Mason. USA
Eduardo Fernández-Medina. University of Castilla-La Mancha. Spain
Eduardo B. Fernández. Florida Atlantic University. USA
Ernesto Damiani. Università degli Studi di Milano. Italy
Günther Pernul. University of Regensburg. Germany
Hugo Jonker. University of Luxembourg. Luxembourg
Indrakshi Ray. Colorado State University. USA
Jaejoon Lee. Lancaster University. UK
Jaime Delgado. Universitat Politècnica de Catalunya. Spain
Kevin Butler. University of Oregon. USA
Luigi Lo Iacono, European University of Applied Sciences. Germany
María Carmen Fernández. Universidad de Málaga. Spain
Mario Piattini. University of Castilla-La Mancha. Spain
Mihai Christodorescu. University of Wisconsin. USA <http://www.wisc.edu/>
Raimundas Matulevicius, University of Tartu. Estonia
Rajkumar Buyya, Univ. of Melbourne. Australia
Sabrina De Capitani di Vimercati. Università degli Studi di Milano. Italy
Shareful Islam. University of East London. UK
Shinsaku Kiyomoto. KDDI R & D Laboratories Inc. Japan
Siani Pearson. Hewlett-Packard Laboratories. Bristol, UK.
Spyros Kokolakis. Athens University of Economics and Business. Greece
Stamatis Karnouskos. SAP AG. Germany
Steven Furnell. University of Plymouth. UK
Toshihiro Yamauchi. Okayama University
<http://www.okayama-u.ac.jp/index_e.html>. Japan
-------- Original-Nachricht --------
Betreff: [WI] Cfp Clouds for Enterprises 2012, Shanghai, Sept 10-14,
2012 - Extended Deadline
Datum: Wed, 28 Mar 2012 10:15:36 +0200
Von: Torsten Eymann <Torsten.Eymann(a)uni-bayreuth.de>
Antwort an: Torsten Eymann <Torsten.Eymann(a)uni-bayreuth.de>
An: wi(a)aifb.uni-karlsruhe.de <wi(a)aifb.uni-karlsruhe.de>
[Apologies if you receive this more than once]
Extended Call for Papers: The 2nd International Workshop on Clouds for Enterprises (C4E) 2012
http://nicta.com.au/people/tosicv/c4e2012/
held at the 16h IEEE International EDOC Conference (EDOC 2012) "The Enterprise Computing Conference"
(http://www.edocconference.org), Beijing, China, 10-14 September 2012
Important dates:
Paper submission: Sunday, 15 April 2012 (extended!)
Notification of acceptance: Monday, 28 May 2012
Camera-ready version: Friday, 15 June 2012
-----------------
Mit besten Grüssen,
Ihr Torsten Eymann
Prof. Dr. Torsten Eymann
Lehrstuhl für Wirtschaftsinformatik (BWL VII)
Universität Bayreuth
Universitätsstrasse 30, 95440 Bayreuth
Tel. 0921/55-7660, Fax -7662
--
Mailing-Liste: wi(a)aifb.uni-karlsruhe.de
Administrator: wi-admin(a)aifb.uni-karlsruhe.de
Konfiguration: https://www.lists.uni-karlsruhe.de/sympa/info/wi
-------- Original-Nachricht --------
Betreff: [WI] CfP 7th IEEE International Workshop on Engineering
Semantic Agent Systems (ESAS) as part of COMPSAC 2012 Deadline 30.03.2012]
Datum: Wed, 28 Mar 2012 12:10:39 +0200
Von: unlandr(a)cs.uni-due.de
Antwort an: unlandr(a)cs.uni-due.de
An: rainer.unland(a)icb.uni-due.de
ESAS 2012: The 7th IEEE International Workshop on Engineering Semantic
Agent Systems
Held in conjunction with the 36th COMPSAC, the IEEE Signature Conference
on Computers, Software, and Applications.
COMPSAC 2012 will be held in Izmir (Turkey) on July 16-20, 2012
Important Dates
March 30th: Paper Submission Deadline
April 20th: Notification Deadline
May 2nd: Camera ready
Goals for the Workshop
ESAS 2012 has two complementary objectives:
i. To inquire into the theory and practice of engineering semantic
multi-agent systems, especially methods, means, and best cases.
ii. To explore into unifying software engineering methodologies employed
in implementing semantic MAS applications across domains.
Workshop Theme
Applying Semantic Technologies in Research and Development of
Ontology-Enabled Multi-Agent Systems. Semantic Web technology topics are
welcome.
Semantic web technologies render dynamic, heterogeneous, distributed,
shared content equally accessible to human reader and software agents.
Distributed agents functioning autonomously can utilize semantic Web
content to gather and aggregate knowledge, reason and infer new results
towards achieving their goals and generating new knowledge. Such knowledge
in turn may be disseminated and used to achieve the shared goal of the
agents system. Here the vision is to achieve a synergy with multi-agent
systems (MAS) technologies whereby both semantics and agents will be
equally in the center stage.
ESAS workshop series aims at garnering the synergy of both technologies by
taking up both the semantic web and the agent aspects of the common
research issue. Topics of interest span a wide spectrum in both theory and
practice of autonomous semantic agents, context-aware intelligent agents,
agents as semantic web services, software agents, mobile agents, agent
architectures, multi-agent systems, agent communities, cooperation and
goal seeking through sharing policy and ontology, safety& security in
systems, other QoS issues, and so on.
Mobile agent and MAS technologies are crucial in realizing multi-party
dynamic application systems. Semantic Web technologies augment MAS by
enabling agents with functioning based on the semantics of their mission
and of the world around them. Agents, implemented as Web services in
developing distributed control and processing applications, entail
interesting consequences such as situation awareness, semantic composition
of services, context sensitive long-lasting transactions, effecting
service policies and quality levels, etc. Complex applications could
become realizable with novel features such as factory floor automation for
flexible production, collaborative discovery of uncharted geography (for
example, cooperative labyrinth discovery), traffic management and info
dissemination with facilitation of emergency services, financial markets
forecasting with optimization of portfolio gain, etc.
We envisage a strong undercurrent of intelligent software agents, mobile
agents, and MAS running through this workshop; side by side with the use
of semantic technologies, there are several foci of interest:
? Software Agents, Mobile Agents, and MAS: issues relating to
architecture, implementation, coordination, service levels, security of
pervasive semantic or otherwise agents.
? Agent, MAS and Semantic Web Technologies: concomitant utilization of
specific technologies in agent, MAS, and semantic Web implementations;
semantic agent communities& applications; case studies of best-practice
MAS applications; projects in the making;
? Ontologies for Agents and MAS: agent cooperation and coordination
ontology; ontology of workflow in MAS; ontologies for distributed
applications and integration; sharing and semantic interoperability;
discovery and operations on ontologies; trust& security issues;
? Platforms for semantic agent and MAS implementation: languages,
frameworks, tools, integrated development environments and software
engineering practices supporting semantic or otherwise software agent&
MAS architectures, coordination, trust& security mechanisms, description,
discovery and composition of agent-based services.
? Other subjects of relevance in semantic technologies, semantic software
agents, mobile agents, agent-based and multi-agent systems.
In unison with the main conference, the main theme of ESAS 2012 will be
'Applying semantic Web technologies in developing software agents, mobile
agents and multi-agent systems towards achieving trustworthy software
systems'.
In relation to trustworthiness, topics of interest include the following
among others:
? software development,
? software systems,
? systems and agent technology,
? systems and reasoning,
? systems and semantic technology,
? database systems,
? embedded systems,
? game and entertainment systems,
? healthcare information systems,
? Internet access and use for children,
? education,
? entertainment, and so on.
Likely Participants
Researchers and practitioners of software agents, mobile agents, MAS and
semantic web technologies are expected to propose papers and to attend the
workshop. Those with interests in any aspect of semantic agents and
agent-based systems are welcome. Researchers working on realization of
multi-agent systems through semantic web technology and ontology-based
agent applications, including distributed control, security,
interoperability, service levels, and quality issues in such systems, are
especially encouraged to propose papers. Enterprises and research centers
developing languages, integrated development environments, tools, and
middleware that can be employed in engineering the above are encouraged to
propose technical papers, demo and tutorial presentations.
Prominent researchers of the field will be called upon to deliver invited
talk and submit invited papers or position statements.
Post-Workshop Activity
The authors of selected papers may be invited to submit an extended
version of their papers for possible publication in a special issue of a
relevant journal and/or an edited book. Details will be revealed pending
conclusion of negotiations.
A special issue of the best papers of ESAS 2006 has been published with
Multiagent and Grid Systems - An International Journal, IOS Press, ISSN
1574-1702; Volume 4, Number 3, 2008, pp: 293-346.
The authors of the papers accepted at ESAS 2007 and 2008 were invited to
submit extended versions of their papers for publication in the Special
Issue on Engineering Semantic Agent Systems of Expert Systems: The Journal
of Knowledge Engineering by Wiley-Blackwell Publishing. This special issue
has now appeared in Vol 28, Issue 5, 410-487.
The authors of ESAS 2009/10 were invited to submit an extended and revised
version of their papers for publication in an edited volume titled
Semantic Agent Systems: Foundations and Applications by Springer-Verlag;
the book has been published
(http://www.springer.com/engineering/mathematical/book/978-3-642-18307-2).
Expected Achievements
We expect to create a lively discussion and exchange medium for experts
from the two fronts: agent-based systems and ontology-based systems. Equal
representation of both by papers is being aimed at.
Importance
Semantic web technologies render dynamic, heterogeneous, distributed,
shared content equally accessible to human reader and software agents.
Here the vision is to achieve a synergy with multi-agent systems (MAS)
technologies whereby agents will be in the center stage. Other workshops
have so far missed to garner the synergy of these technologies by taking
up either the semantic web aspect or the agent aspect of the shared
research issue.
Format
ESAS 2012 will consist of refereed papers, invited papers or position
statements by prominent researchers of the field and a wrap-up panel of
all authors.
Submission
Papers must be submitted electronically via the ESAS 2012 Submission Page
(http://myreview.cs.iastate.edu/ESAS2012/). Please follow the IEEE
Computer Society Press Proceedings Author Guidelines to prepare your
papershttp://www.computer.org/portal/web/cscps/submission. All papers will
be carefully reviewed by at least three reviewers. Papers can be submitted
as regular papers (six pages), and the acceptance will depend on reviewer
feedback. Accepted papers will be published in the workshop proceedings of
the IEEE Computer Software and Applications Conference (COMPSAC 2012) by
the IEEE CS Press. At least one of the authors of each accepted paper must
register as a full participant of the workshop in order to have the paper
published in the proceedings. Each accepted paper must be presented in
person by one of its authors.
Workshop Organizers
Duygu CELIK
Department of Computer Engineering
Istanbul Aydin University
Istanbul, Turkey
E-mail: duygucelik at aydin.edu.tr
Rainer UNLAND
University of Duisburg-Essen, Germany
Email: Rainer.Unland at icb.uni-due.de
Rolf SCHWITTER
Department of Computing
Macquarie University
Sydney, NSW 2109, Australia
Email: rolfs at comp.mq.edu.au
Behnam RAHNAMA
Department of Computer Engineering
European University of Lefke
Gemikonagi, North Cyprus
E-mail: behnam at brahnama.com
Mehmet A. ORGUN
Department of Computing
Macquarie University
Sydney, NSW 2109, Australia
Email: mehmet.orgun at mq.edu.au
Atilla ELCI (honorary)
Computer& Educational Technology Dept.
Suleyman Demirel University, Isparta, Turkey
Email: atilla.elci at gmail.comUpdates at
http://compsac.cs.iastate.edu/workshop_details.php?id=49&y=
--
Mailing-Liste: wi(a)aifb.uni-karlsruhe.de
Administrator: wi-admin(a)aifb.uni-karlsruhe.de
Konfiguration: https://www.lists.uni-karlsruhe.de/sympa/info/wi
-------- Original Message --------
Subject: [AISWorld] Call for Participation: Third
International Conference on Software Business
Date: Mon, 26 Mar 2012 13:56:09 -0400
From: Jaap Kabbedijk <J.Kabbedijk(a)uu.nl>
To: aisworld(a)lists.aisnet.org
Call for Participation
Third International Conference on Software Business
June 18-20, 2012, MIT, Cambridge, Massachusetts
http://www.icsob.org
Theme: Innovation and Entrepreneurship in the Software Business
---------------------------------------------------------------
Advancements in the software industry have had a substantial
impact not only on productivity and on GDP growth globally,
but also on our daily work and life. Software business
refers to commercial activities in the software industry,
aimed at generating income from the delivery of software
products and software services. Although the software
business shares common features with other international
knowledge-intensive businesses, it carries many inherent
features making it a challenging domain for research. In
particular, software companies have to depend on one another
to deliver a unique value proposition to their customers.
New developments like Apps that run on pre-existing
platforms have emerged as a major force and are creating
what is being labeled as the App Economy. We received a
great number of paper submissions for the conference and
glad to announce this call for participation. We expect to
present to complete program shortly on www.icsob.org
<http://www.icsob.org>.
Workshops:
----------
During ICSOB2012, besides the main conference, two workshops
will be organized.
Fourth International Workshop on Software Ecosystems
----------------------------------------------------
After three successful workshops IWSECO continues its world
tour to Boston, MA, in 2012. Due to its more business
oriented nature, this year we seek submissions specifically
geared towards governance and coordination mechanisms for
software ecosystems.
Â
Software vendors no longer function as independent units,
where all customers are end-users, where there are no
suppliers, and where all software is built in-house.
Instead, software vendors have become networked, i.e.,
software vendors are depending on (communities of) service
and software component suppliers, value-added-resellers, and
pro-active customers who build and share customizations.
Software vendors now have to consider their strategic role
in the software ecosystem to survive. With their role in the
software ecosystem in mind, software vendors can become more
successful by opening up their business, devising new
business models, forging long-lasting relationships with
partnership networks, and overcoming technical and social
challenges that are part of these innovations. The focus of
the first workshop was the definition of the research field.
The second workshopâ??s focus was the â??idealâ??
architecture of a software platform. Â The third workshop on
software ecosystems focuses on the management of software
ecosystems, i.e., how a software vendor can manage its
network of partners, developers, service deliverers, and
other third parties that play a role in the software ecosystem.
Â
Typically, software vendors have several instruments
available to them for managing their ecosystem, such as the
creation of partnership models or the introduction of
component and service certification. The effects of these
decisions on the software ecosystem have not yet been made
measurable, which can be considered one of the main
challenges of the field of software ecosystems. We welcome
submissions that specifically address this topic.
Â
A software ecosystem is a set of actors functioning as a
unit and interacting with a shared market for software and
services, together with the relationships among them. These
relationships are frequently underpinned by a common
technological platform or market and operate through the
exchange of information, resources and artifacts. Several
challenges lie in the research area of software ecosystems.
To begin with, insightful and scalable modeling techniques
for software ecosystems currently do not exist. Furthermore,
methods are required that enable software vendors to
transform their legacy architectures to accommodate
reusability of internal common artifacts and external
components and services. Finally, methods are required that
support software vendors in choosing survival strategies in
software ecosystems.
Â
The Workshop on Software Ecosystems aims to further increase
the body of knowledge in this specific area of software
reuse and software engineering by providing a forum to
exchange ideas and discuss state-of-the-art results. It will
build and shape the community of leading practitioners and
research experts. Given the relevance of software
ecosystems, and the rather unexplored scientific and
industry contribution in this field, the workshop will
deliver a state-of-the-practice overview of the available
knowledge on software ecosystems, as well as an overview of
challenges for further research.
Tutorial on Project Management
-------------------------------
Managing project value through-out the software development
life cycle: A practical approachÂ
The objective of this tutorial is to describe how value can
be used as a measurement of performance in product
development, enabling decision makers to prioritize projects
and tasks that are of most value to customers and the
organization in relation to the effort spent. The tutorial
is based on practical experience and current research. It
will give directions of using value as a means to measure
and increase performance.
Â
Benefits from taking this tutorial
The tutorial will give insight into the main principles,
state of the art and practice, potentials and challenges, as
well as research and industrial directions of using value as
a means to measure and increase performance in product
development organizations.Â
Â
Who should participate?
The intended audience for this tutorial is technology and
development managers, project managers for product
development projects, and product managers as well as
researchers in the area. The tutorial is set on an
intermediate level; it is expected that the participants
have an understanding of software product development and
software engineering in general.
Â
About the presenters
Dr. Stefan Cedergren is an associate senior lecturer at
Mälardalen University, Sweden, where he is a member of the
Software Engineering Laboratory. His research interests
include how performance can be measured and managed in
software product development.
Â
Dr. Stig Larsson has more than 25 years of experience of
software product development in various positions in
industry, including software developer, project manager and
managing R&D organizations with more than 250 persons in a
distributed environment.
Registration and prices:
------------------------
Registration can be done through www.icsob.org
<http://www.icsob.org>. Prices for registering are as follows:
* Full ticket - $500
* Early bird - $350 (untill April 30th)
* Student fee - $250
Al tickets include the workshop/tutorial, welcome reception,
conference dinner, lunches and all conference days.
Important Dates:
----------------
Early bird deadline: April 30, 2012
Conference: June 18-20, 2012Â
Conference Officers:
--------------------
General Chair
Michael Cusumano, Massachusetts Institute of Technology
Program Chairs
Bala Iyer, Babson College
N. Venkatraman, Boston UniversityÂ
Steering Committee
Kalle Lyytinen, Case Western Reserve University
Sjaak Brinkkemper, Utrecht University
Pekka Abrahamsson,University of Helsinki
Slinger Jansen, Utrecht University
Pasi Tyrväinen, University of Jyväskylä
Björn Regnell, Lund University
Inge van de Weerd, Utrecht University
Website Management
Jaap Kabbedijk, Utrecht University
Program Committee:
------------------
Aybuke Aurum, University of New South Wales, Australia
Carliss Baldwin, Harvard Business School, USA
Jan Bosch, Intuit, USA
Peter Buxmann, Technische Universität Darmstadt, Germany
David Callele, University of Saskatchewan, Canada
Joao Falcao e Cunha, University of Porto, Portugal
Ernesto Damiani, University of Milan, Italy
Chris Dellarocas, Boston University, USA
Christof Ebert, Vector Consulting, Germany
Marko van Eekelen, Radboud University Nijmegen, The Netherlands
Samuel Fricker, Blekinge Institute of Technology, Sweden
Leah Goldin, Shenkar College of Engineering and Design, Israel
Volker Gruhn, Ruhr Institute for Software Technology, Germany
Thomas Hess, LMU München, Germany
Patrick Heymans, University of Namur, Belgium
Martin Höst, Lund University, Sweden
Marco Iansiti, Harvard Business School, USA
Slinger Jansen, Utrecht University, The Netherlands
Lena Johansson, Sony Ericsson, Sweden
Epaminondas Kapetanios, University of Westminster, United
Kingdom
Marjo Kauppinen, Aalto University, Finland
Chris F. Kemerer, University of Pittsburgh, USA
Benn Konsynski, Emory University, USA
Olli Kuivalainen, Lappeenranta University of Technology, Finland
Patricia Lago, VU University Amsterdam, The Netherlands
Casper Lassenius, Helsinki University of Technology, Finland
Nazim Madhavji, University of Western Ontario, Canada
Rod McNaughton, University of Waterloo, Canada
Sten Minör, Software Innovation and Engineering Institute,
Sweden
Oscar Pastor, Techn. University of Valencia, Spain
Jan Pawlowski, University of Jyväskylä, Finland
Karl-Michael Popp, SAP, Germany
T. Ravichandran, Rensselaer Polytechnic Institute, USA
Camile Salinesi, University of Paris, France
Melissa Schilling, New York University, USA
Rick Selby, Northrop Grumman Corporation, USA
Kari Smolander, Lappeenranta University of Technology, Finland
Dan Stan, University of Cluj-Napoca, Romania
Pasi Tyrväinen, University of Jyväskylä, Finland
Tony Wasserman, Carnegie Mellon University, USA
Claudia Werner, Federal University Rio, Brasil
Claes Wohlin, Blekinge Institute of Technology, Sweden
Stan Wrycza, University of Gdansk, Poland
Updated information and further details are available at
http://www.icsob.org Please, send emails with further
questions to info(a)icsob.org <mailto:info@icsob.org>.
Jaap Kabbedijk, MSc. <http://www.jkabbedijk.nl>
PhD. Candidate Multi-tenant Software Engineering
Utrecht University
-------- Original Message --------
Subject: [AISWorld] CFP WOSIS 2012 (special issue of
Computer Standards and Interfaces). Last days
Date: Tue, 27 Mar 2012 09:50:46 +0200
From: DAVID GARCIA ROSADO <David.GRosado(a)uclm.es>
To: <aisworld(a)lists.aisnet.org>
[Apologies if you receive multiple copies of this
announcement. Please pass it on to your colleagues and
students who might be interested in contributing]
**
*The best papers will have the chance to publish extended
and revised versions in a special issue of Computer
Standards and Interfaces in the ISI Journal Citation Reports
with Impact factor of 0.825.*
**** CALL FOR PAPERS ****
The Ninth International Workshop on Security In Information
Systems WOSIS-2012
28 June -- 1 July, 2012 - Wroclaw, Poland
http://www.iceis.org/wosis.aspxhttps://www.facebook.com/WOSIS
To be held in conjunction with the 14th International
Conference on Enterprise Information Systems (ICEIS 2012)
http://www.iceis.org/
*********Important Dates*********
Regular Paper Submission: *30 **March, 2012(LAST DAYS)*
Authors Notification: 20 April, 2012
Camera Ready Submission Deadline: 4 May, 2012
*******************************
_Co-chairs:_
Dr. David G. Rosado
University of Castilla-La Mancha, Spain
David.GRosado(a)uclm.es <mailto:David.GRosado@uclm.es>
Dr. Luis Enrique Sánchez
Sicaman-NT, Departament of R+D, Spain
lesanchez(a)sicaman-nt.com
Dr. Carlos Blanco
University of Cantabria, Spain
blancobc(a)unican.es
Dr. Jan Jürjens
Technical University of Dortmund, Germany
jan.jurjens(a)cs.tu-dortmund.de
<mailto:jan.jurjens@cs.tu-dortmund.de>
_Workshop Background and Goals_
Information Systems Security is one of the most pressing
challenges facing all kinds of organizations today. Although
many companies have discovered how critical information is
to the success of their business or operations, very few
have managed to be effective in maintaining their
information secure, avoiding unauthorized access, preventing
intrusions, stopping secret information disclosure, etc.
There are various definitions of security, but all of them
basically agree on the same components. Security in
information systems considers the protection of information
and of the systems that manage it, against a wide range of
threats in order to ensure business continuity, minimize
risks and maximize the return on investment and business
opportunities.
Security is, therefore, currently a widespread and growing
concern that covers all areas of society: business,
domestic, financial, government, and so on. In fact, the
so-called information society is increasingly dependent on a
wide range of software systems whose mission is critical,
such as air traffic control systems, financial systems, or
public health systems. The potential losses that are faced
by businesses and organizations that rely on all these
systems, both hardware and software, therefore signify that
it is crucial for information systems to be properly secured
from the outset.
With the increasing dependence that the information society
has on Information and Communication Technology (ICT), the
need to protect information is increasingly important for
companies. The demand for products, systems and services
with which to manage and maintain information is therefore
increasing, and the realization of superficial security
controls is not sufficient. It is necessary to apply a
rigorous approach to the assessing and improvement of the
security of products and processes that take place in the
context of ICT. This has led to the emergence of Information
Security Management Systems (ISMS), which are of great
importance to the stability of companies' information systems.
In this new edition of WOSIS, the traditional information
systems security topics will remain but we want explicitly
focus the workshop on one of the most important issues and
currently considered as it is security in Cloud computing.
Although there are many benefits to adopting cloud
computing, there are also some significant barriers to
adoption as is security followed by issues regarding
compliance, privacy and legal matters. Security is the main
obstacle for many organizations in their move to the cloud,
related to risk areas such as external data storage,
dependency on the "public" internet, multi-tenancy and
integration with internal security. The objective of
this new edition is to contribute to the study and analysis
of solutions and approaches which help to achieve
and facilitate the level of security needed for such
distributed environments and that its adoption is not any
problem for the society, administration and enterprise.
_Topics of interest include, but are not limited to:_
_Topic for Cloud Computing_
* Security Engineering for Cloud-Based Systems
* Security Requirements Engineering for Cloud-Based Systems
* Risks and threats in Cloud
* Privacy and Data protection in Cloud
* Cloud Legal Issues
* Trust and policy management in Clouds
* Issues and recent approaches in portability,
interoperability and migration
* Secure migration processes to cloud computing
* Security in migration models
* Systems adapted to the cloud
* Storage security
* Cloud Infrastructure Security
* Security Governance in the Cloud
* Risk management and assessment and third-party risk
management
* Identity & Access Management in the Cloud
* Security and Virtualization__
* Security in SaaS, PaaS and IaaS
* Security in Cloud applications
* Cloud security models
* MDA and MDS applied to cloud computing
* Case studies
_Rest of topics_
* Security in Software development Life Cycle
* Information Security Management System
* Security Management and Assessment
* Analysis and management of risks
* Security Implementation, Secure programming and Security
Deployment
* Case studies and experiences of secure software
* Security culture
* IT Governance
* IT Service Continuity
* Language-based Security
* Open Security Standards and Security Certification
* Common practice, legal and regulatory issues
* Security for SOA, Web Services, Grid computing
* Security for Databases and Data Warehouses
* Metadata and Security
* Secure Data Management
* Workflow and Business Process Security
* Security Metrics and Measurement
* Security Ontologies
* Security in Software Product Lines
* Distributed and Network Security
* Security & Trust Models
* Authentication, Authorization and Access Control
* Anonymity and Privacy
* Security for Mobile Computing, sensors networks,
multimedia systems
* Security for Electronic Commerce, Electronic Business
and e-Services (e-voting, e-banking, e-governement,
e-health)
* Security in Social Networks
* Security for embedded systems, smart cards and RFID
* Security Issues in Ubiquitous/Pervasive Computing
* Intellectual Property Protection
* Digital Rights Management (DRM). Mobile DRM
* Personal Data Protection for Information Systems and
Digital Identity management
* Access Control and Rights Expression Languages
* Semantic Web Technologies applied to Security
* Security Engineering
* Disaster Recovery and Failure Prevention
* Incident Response and Prevention
* Intrusion Detection and Fraud Detection
* Biometric Security
* Cryptology: Cryptography and Cryptanalysis
* Information hiding: Steganography & Steganalysis
* Digital Forensics
* Cyber terrorism
_Paper Submission_
Prospective authors are invited to submit papers for oral
presentation in any of the topics listed above. Submitted
papers must present original, non-published work of high
quality. Only papers in English will be accepted, and the
length of the paper should not exceed 10 pages for full
papers and 8 pages for short papers (figures and appendices
included).
Instructions for preparing the manuscript (in Word and Latex
formats) are available at the conference Paper Templates web
page. Please also check the web page with the Submission
Guidelines. Papers should be submitted electronically via
the web-based submission system at:
http://www.insticc.org/Primoris
_Publications_
All accepted papers will be published in the workshop
proceedings book, under an ISBN reference, and in CD-ROM
support. Additionally, the best papers will have the chance
to publish extended and revised versions in Journal of
Computer Standards and Interfaces in the ISI Journal
Citation Reports.
_Workshop Program Committee _
Alfonso Rodriguez. University of Bio-Bio. Chile
Ambrosio Toval. University of Murcia. Spain
Andreas Bauer, National ICT Australia. Australia
Antonio Maña. University of Malaga. Spain
Brajendra Panda. University of Arkansas. USA
Csilla Farkas. University of South Carolina. USA
Daniel Mellado. University of Castilla-La Mancha. Spain
Debasis Giri. Haldia Institute of Technology. India
Duminda Wijesekera. University George Mason. USA
Eduardo Fernández-Medina. University of Castilla-La Mancha.
Spain
Eduardo B. Fernández. Florida Atlantic University. USA
Ernesto Damiani. Università degli Studi di Milano. Italy
Günther Pernul. University of Regensburg. Germany
Hugo Jonker. University of Luxembourg. Luxembourg
Indrakshi Ray. Colorado State University. USA
Jaejoon Lee. Lancaster University. UK
Jaime Delgado. Universitat Politècnica de Catalunya. Spain
Kevin Butler. University of Oregon. USA
Luigi Lo Iacono, European University of Applied Sciences.
Germany
María Carmen Fernández. Universidad de Málaga. Spain
Mario Piattini. University of Castilla-La Mancha. Spain
Mihai Christodorescu. University of Wisconsin. USA
<http://www.wisc.edu/>
Raimundas Matulevicius, University of Tartu. Estonia
Rajkumar Buyya, Univ. of Melbourne. Australia
Sabrina De Capitani di Vimercati. Università degli Studi di
Milano. Italy
Shareful Islam. University of East London. UK
Shinsaku Kiyomoto. KDDI R & D Laboratories Inc. Japan
Siani Pearson. Hewlett-Packard Laboratories. Bristol, UK.
Spyros Kokolakis. Athens University of Economics and
Business. Greece
Stamatis Karnouskos. SAP AG. Germany
Steven Furnell. University of Plymouth. UK
Toshihiro Yamauchi. Okayama University
<http://www.okayama-u.ac.jp/index_e.html>. Japan
-------- Original Message --------
Subject: [WI] IAT 2012 - Call for Papers
Date: 27 Mar 2012 16:39:19 +0900
From: wic-office(a)wi-consortium.org
Reply-To: wic-office(a)wi-consortium.org
To: wi(a)aifb.uni-karlsruhe.de
[Apologies if you receive this more than once]
####################################################################
CALL FOR PAPERS
The 2012 IEEE/WIC/ACM International Conference
on Intelligent Agent Technology(IAT 2012)
December 4-7, 2012, Macau SAR, China
Conference Website: http://www.fst.umac.mo/wic2012
Important Dates:
Workshop proposal submission: April 10, 2012
Electronic submission of full papers: June 1, 2012
Tutorial proposal submission: July 10, 2012
Workshop paper submission: July 25, 2012
Notification of paper acceptance: August 1, 2012
Camera-ready of accepted papers: August 31, 2012
Workshops: December 4, 2012
Conference: December 5-7, 2012
####################################################################
IAT 2012 provides a leading international forum to bring together
researchers and practitioners from diverse fields, such as computer
science, information technology, business, education, systems
engineering, and robotics, to (1) examine the design principles and
performance characteristics of various approaches in intelligent agent
technology, and (2) increase the cross-fertilization of ideas on the
development of autonomous agents and multi-agent systems among
different domains. By encouraging idea-sharing and discussions on the
underlying logical, cognitive, physical, and sociological foundations
as well as the enabling technologies of intelligent agents, IAT 2012
will foster the development of novel paradigms and advanced solutions
in agent and multi-agent based computing.
IAT 2012 will be jointly held with the 2012 IEEE/WIC/ACM International
Conference on Web Intelligence (WI 2012) and co-locate with AMT'12,
BI'12, and ISMIS'12 as a Congress, a Special Event of the Alan Turing
Year (Centenary of Alan Turing's birth). Furthermore, WI-IAT 2012 will
include workshops providing in-depth background on subjects that are
of broad interest to Web intelligence and Intelligent Agent Technology
communities. The workshop programs will focus on new research
challenges, initiatives and applications.
The topics and areas include, but not limited to:
1) Autonomy-Oriented Computing (AOC)
2) Agent and Multi-Agent Systems Modeling
3) Agent and Multi-Agent Systems Engineering
4) Autonomous Auctions and Negotiation
5) Autonomous Knowledge and Information Agents
6) Coordination
7) Distributed Problem Solving
8) Applications
High-quality papers in all IAT related areas are solicited. Paper
submissions should be limited to a maximum of 8 pages in the IEEE
2-column format. The same format will be used for final camera-ready
papers (see the Author Guidelines at
http://www.computer.org/portal/web/cscps/formatting).
All submitted papers will be reviewed by the Program Committee on the
basis of technical quality, relevance, significance, and clarity.
Note that IAT 2012 will accept ONLY on-line submissions in PDF
format. Accepted papers will be published in the conference
proceedings by the IEEE Computer Society Press that is indexed by EI.
*** Contact Information ***
Email: wi-iat2012(a)Comp.HKBU.Edu.HK
--
Mailing-Liste: wi(a)aifb.uni-karlsruhe.de
Administrator: wi-admin(a)aifb.uni-karlsruhe.de
Konfiguration: https://www.lists.uni-karlsruhe.de/sympa/info/wi
-------- Original Message --------
Subject: [AISWorld] CPF: The First International Workshop
on Software Mining
Date: Tue, 27 Mar 2012 19:46:46 +0800
From: helios helios <helioshelios2012(a)gmail.com>
To: aisworld(a)lists.aisnet.org
[Apologies if you receive this more than once]
===============================================================================
CALL FOR PAPERS
SoftwareMining-2012: The First International Workshop on
Software Mining
(Held in conjunction with KDD-2012 , Beijing, China, August
12-16, 2012)
http://lamda.nju.edu.cn/conf/softmine12/
(Submissions Due: 23:59 (PDT), May 14, 2012)
==============================================================================
Software systems have been playing important roles in
business, scientific research, and our everyday lives. It is
critical to improve both software productivity and
quality, which are major challenges to software engineering
researchers and practitioners. In recent years, software
mining has emerged as a promising means to
address these challenges. It has been successfully applied
to discover knowledge from software artifacts (e.g.,
specifications, source code, documentations, execution
logs, and bug reports) to improve software quality and
development process (e.g., to obtain the insights for the
causes leading to poor software quality, to help
software engineers locate and identify problems quickly, and
to help the managers optimize the resources for better
productivity). Software mining has attracted
much attention in both software engineering and data mining
communities.
The first International Workshop on Software Mining aims to
bridge research in the data mining community and software
engineering community by providing an
open and interactive forum for researchers who are
interested in software mining to discuss the methodologies
and technical foundations of software mining,
approaches and techniques for mining various types of
software-related data, applications of data mining to
facilitate specialized tasks in software engineering. The
participants of diverse background in either data mining or
software engineering can benefit from this workshop by
sharing their expertise, exchanging ideas and
discussing new research results.
Authors who are interested in software mining are invited to
submit their manuscripts related to all aspects of software
mining including software mining foundations,
mining specific software data, software mining in
specialized tasks, etc.
The best submission, according to the evaluations from the
PC members, would be granted the "SoftwareMining-2012: Best
Paper Award".
Topics
-------
The first International Workshop on Software Mining
(SoftwareMining-2012) calls for research papers reporting
original investigation results, real-world applications
and system development experience in all aspects of software
mining. The topics of the SoftwareMining-2012 submissions
may roughly fall into three major aspects,
including 1) Methodological and technical foundations of
software mining, 2) Approaches and techniques for mining
various types of software-related data, and 3)
Applications of data mining to facilitate specialized tasks
in software engineering. Topics of interest include but are
not limited to:
A. Software mining foundations
A1. Novel data mining methodologies / algorithms
for software analytics
A2. Software mining models and techniques
A3. Robust and Highly Scalable Algorithms for
Mining Large Scale Software System
A4. Understanding and visualizing software mining
results
A5. Privacy preserving software mining
B. Mining specific software data
B1. Mining software specifications
B2. Mining source code
B3. Mining execution traces and logs
B4. Mining change patterns and trends
B5. Mining bug and crash reports
B6. Mining natural language artifacts in software data
C. Software mining in specialized tasks
C1. Mining for software defect identification and
characterization
C2. Mining for software testing and debugging
C3. Mining for cost/effort estimation
C4. Mining for software development and reuse
C5. Mining for resource allocation
C6. Mining for process control
Paper Submission and Publication
---------------------------------
Each submission should be no more than 8 pages total in
length, consisting of title, authors' names, postal and
email addresses, an up to 200-words abstract, up to 5
keywords, and a body with all contents, figures, tables, and
references. The format should be keep the same as the KDD
main track format, which is the standard
double-column ACM Proceedings Style. Additional information
about formatting and style files is available online at:
http://www.acm.org/sigs/publications/proceedings-templates.
All manuscripts must be submitted electronically in a single
PDF file using the conference management
tool. Please make sure that any special fonts used are
included in the submitted documents. Detailed instructions
will be available soon on the SoftwareMining-2012
website (http://lamda.nju.edu.cn/conf/softmine12/).
For accepted papers, authors are required to prepare their
final submissions for the workshop proceedings according to
the reviewers' suggestions. All the accepted
papers will be included in the ACM Digital Library (and
EI-indexed as well).
Important Dates
----------------
* Paper Submission Deadline: 23:59 (PDT), May 14, 2012
* Author Notification: 23:59 (PDT), June
1, 2012
* Camera Ready Deadline: 23:59 (PDT), June 8, 2012
Organizing Committees
-----------------------
Co-Chairs:
* Ming Li, Nanjing University, China
* Hongyu Zhang, Tsinghua University, China
* David Lo, Singapore Management University, Singapore
Program Committee:
* Mithun Acharya, ABB Research, USA
* David M. Andrzejewski, Lawrence Livermore National
Laboratory, USA
* Hong Cheng, The Chinese University of Hong Kong, China
* Qiang Fu, Microsoft Research Asia, China
* Lingxiao Jiang, Singapore Management University,
Singapore
* Sunghun Kim, Hong Kong University of Science and
Technology, China
* Jian-Guang Lou, Microsoft Research Asia, China
* Leonardo Mariani, University of Milan Bicocca, Italy
* Tim Menzies, West Virginia University, USA
* Tien N. Nguyen, Iowa State University, USA
* Lin Tan, University of Waterloo, Canada
* Suresh Thummalapenta, IBM Research India, India
* Min-Ling Zhang, Southeast University, China
* Xiangyu Zhang, Purdue University, USA
* Zhengyu Zhang, Institute of Software of CAS, China
* Yuming Zhou, Nanjing University, China
* Thomas Zimmermann, Microsoft Research, USA
(We are waiting for more confirmations. Please check
the update on our website.)
Contact
-------
For further information, please visit the symposium website
at http://lamda.nju.edu.cn/conf/softmine12/. Any questions,
comments and suggestions should be
directed to softmine2012(a)gmail.com
<mailto:softmine2012@gmail.com>.
-------- Original Message --------
Subject: [AISWorld] CFP - EUD4Services 2012 Capri, 21st May
2012
Date: Tue, 27 Mar 2012 15:18:09 +0100
From: Nikolay Mehandjiev <mehandjiev(a)gmail.com>
To: <aisworld(a)lists.aisnet.org>
CC: 'Nikolay Mehandjiev' <mehandjiev(a)gmail.com>
CALL FOR CONTRIBUTIONS
EUD4Services 2012
3rd International Workshop on End User Development for Services - Grand
Challenges For Research
www.eud4services.org/Workshop2012/
to be held in Capri Island (Naples), Italy
on May 21, 2012
in conjunction with
AVI2012: Advanced Visual Interfaces
http://www.avi2012.it/index.htm
The Third International Workshop on End User Development for Services
focuses on the grand challenges in applying End User Development ideas and
principles to the area of service-oriented software design and construction.
This follows from two previous workshops which charted the territory of
existing tools and research systems, and created a community of researchers
and practitioners working in the area.
Service-oriented software promises to bring flexibility to organisational
support, allowing applications to be constructed "on demand" thus keeping
track with changing organisational needs. Constructing such software has so
far been the prerogative of software professionals, who are trained to
manage the complexity of software technology. Attempts to open up this
activity to non-programmers, such as "mashups" have been mostly driven by
details of the underlying technology such as event propagation and data
connections between services.
Researchers from the End User Development community have created theoretical
and practical results which can be useful for opening up service software
construction to non-programmers. However, the uptake of EUD within the SOA
paradigm is hampered by a set of emerging issues, including intrinsic
difficulties stemming from the complexity of technology and distributed
nature of computations.
We have established a community of academics and practitioners interested in
the application of EUD for service design from different perspective such as
software services, human-computer interaction, software engineering,
artificial intelligence, computer-supported cooperative work and innovation
management. We welcome new members to this community, and we would also like
to invite existing workshop participants to join us again.
ORGANISATION OF WORKSHOP
The workhop will aim to explore a set of challenges to opening up service
development to end users, and fuse the most pertinent ones with an analysis
framework developed through the previous workshops to create a roadmap of
this emerging area of research.
The morning will start with a keynote presentation by Professor Gerhard
Fischer as outlined in the next section.
A number of challenges will then be presented and discussed by their
contributors.
In the afternoon, we will introduce the EUD4Services analysis framework and
will work together on validating the framework and on using it to create a
roadmap of EUD4Services.
KEY NOTE PRESENTATION
Professor Gerhard Fischer from the University of Colorado at Boulder will
deliver a keynote presentation on domain-oriented design and meta-design in
the context of user-driven software development. Gerhard is well known for
his work in design environments and meta-design.
AUDIENCE
The workshop aims to sketch a research agenda on the topic of EUD in
service-based computing which is likely to be of interest to several streams
of research in software engineering, human-computer interaction, services
computing. The purpose of this interdisciplinary workshop is to bring
together researchers and practitioners who have faced the problem of making
the SOA paradigm available to end-users, might have some ideas on how to
facilitate it, and have experimented with these ideas. We expect to generate
a debate on the potential of SOA for non-technical developers in both
professional and personal lives.
SUBMISSION OF CONTRIBUTION
Please submit what you believe are the top three grand challenges in the
design and development of service-oriented software by non-programmers (in a
statement less than 500 words) using the online form available at:
www.eud4services.org/Workshop2012/files/2.htm
PROCEEDINGS
The papers and presentations will be available on the workshop website, as
well as a report of the main output from the workshop. At present we are
applying to hold a special issue of a journal (details to be confirmed once
we have formal acceptance of our proposal) on the topic of end user
development for services. It is hoped that the discussions on the workshop
will form an important input into this special issue, and will help
participants shape reports on their existing research into papers fitting
the theme of the issue.
IMPORTANT DATES
Submit your contribution no later than 10th April, 2012
Decision to Authors: 14th April, 2012
Early Registration Deadline: 16th April, 2012
3rd EUD4Services Workshop: 21th May, 2012
ORGANISERS
Antonella De Angeli, University of Trento, Italy
Nikolay Mehandjiev, University of Manchester, UK
SCIENTIFIC SECRETARIAT
Abdallah Namoun, University of Manchester, UK
CONTACTS
e-mail: eud4services(a)mbs.ac.uk
website: www.eud4services.org/Workshop2012/
-----
Dr Nikolay Mehandjiev, Professor of Enterprise Information Systems
Manchester Business School, The University of Manchester
MBS East, Room D28, Booth Street West, Manchester, M15 6PB, UK
e-mail: mehandjiev(a)acm.org, n.mehandjiev(a)manchester.ac.uk
URL : http://www.manchester.ac.uk/research/n.mehandjiev/
Phone : +44 161 306 3319 Fax : +44 870 288 7629
_______________________________________________
AISWorld mailing list
AISWorld(a)lists.aisnet.org
-------- Original Message --------
Subject: [AISWorld] CfP: Sustainable Knowledge Management
Track
Date: Wed, 28 Mar 2012 04:02:29 +0000
From: Suzanne Zyngier <S.Zyngier(a)latrobe.edu.au>
To: aisworld(a)lists.aisnet.org <aisworld(a)lists.aisnet.org>
21st International Conference on Information Systems
Development (ISD2012), Prato, Italy, August 29-31, 2012
*Call for Papers, track: Sustainable Knowledge Management *
*Chairs*
* Frada Burstein (Frada.Burstein(a)monash.edu
<mailto:Frada.Burstein@monash.edu>)
* Luba Torlina (luba.torlina(a)deakin.edu.au
<mailto:luba.torlina@deakin.edu.au>)
* Suzanne Zyngier (S.Zyngier(a)latrobe.edu.au
<mailto:S.Zyngier@latrobe.edu.au%3C>)
The field of knowledge management has reached a level of
maturity beyond the doubts of its relevance and contribution
to sustainability of organisational and global information
systems. Yet, sustainability of knowledge management
strategy implementation and knowledge management programs in
general has been recognised as an ongoing concern. This
track welcomes submissions of original research work and
practical reflections on issues related to the approaches
and factors which contribute to the longevity of knowledge
management initiatives at the individual, group,
organisational and societal levels.
*Topics*
* Design, development, and use of IS for KM
* Enablers and barriers for sustainable organisational KM
* Case studies of KM success and failures in various
organisational and societal contexts
* Management of knowledge workers and resources for
sustainable KM
* Impact of KM programs or applications on individual,
group, and organisational performance; on organisational
strategy; and/or on innovation
* Role of IT-based knowledge and/or decision making
resources for continuous benefits realisation from KM
* Constructive and destructive role of social technologies
for longevity of KM programs
* Theoretical research developments in sustainable KM and
KM for sustainability
* Cross-cultural issues affecting sustainability of KM
* Strategic issues in sustainable KM
* KM for sustainability
* KM governance issues
* KM frameworks, models techniques and approaches, which
demonstrate continuous benefits realisation.
******************************************************************************************************************************
Dr. Suzanne Zyngier PhD
Department of Management | Faculty of Business, Economics
and Law | Room 327 Donald Whitehead Building | La Trobe
University | VIC, 3086 Australia | +613 94795265 |
http://www.latrobe.edu.au/lawman/staff-profiles/view-profile?uname=szyngier
*Masters of Business Information Management & Systems*
http://www.latrobe.edu.au/coursefinder/local/2011/Master-of-Business-Inform…
CRICOS Provider 00115M
epas_logo <http://www.efmd.org/>__La Trobe University is one
of only forty-three business schools globally with EPAS
accreditation. *Find out more*
<http://www.latrobe.edu.au/news/articles/2011/article/mba-and-b.bus-achieve-…>
*/Please kindly consider your environment before printing
this e-mail/*
Warning to recipients:
This email and any attachments are confidential and subject
to copyright. If you are not the intended recipient any use,
disclosure or copying is unauthorised. If you have received
this email in error please advise us immediately by reply
email and delete all copies. It is your responsibility to
examine this email and any attachments for viruses. Any
personal information in this email must be handled in
accordance with the Information Privacy Act 2000 (Vic).