-------- Original Message --------
Subject: [computational.science] CFP: CRiSIS 2013 - 8th
International Conference on Risks and Security of Internet
and Systems
Date: Sat, 13 Apr 2013 22:24:10 +0200
From: Dr. Mauro Conti <conti(a)math.unipd.it>
Organization: "ICCSA"
To: Computational Science Mailing List
<computational.science(a)lists.iccsa.org>
October 23-25, 2013
La Rochelle, France
http://secinfo.msi.unilim.fr/crisis2013/
---------------------------------------------------
Call for Paper
The topics addressed by CRiSIS range from the analysis of risks, attacks
to networks and system survivability, as well as security models,
security mechanisms and privacy enhancing technologies. Prospective
authors are invited to submit research results as well as practical
experiment or deployment reports. Industrial papers about applications
and case studies, such as tele medicine, banking, e-government and
critical infrastructure, are also welcome. The list of topics includes
but is not limited to:
• Analysis and management of risk
• Attacks and defenses
• Attack data acquisition and network monitoring
• Cryptography, Biometrics, Watermarking
• Dependability and fault tolerance of Internet applications
• Distributed systems security
• Embedded system security
• Empirical methods for security and risk evaluation
• Hardware-based security and Physical security
• Intrusion detection and Prevention systems
• Organizational, ethical and legal issues
• Privacy protection and anonymization
• Risk-aware access and usage control
• Security and risk assessment
• Security and risks metrics
• Security and dependability of operating systems
• Security and safety of critical infrastructures
• Security and privacy of peer-to-peer system
• Security and privacy of wireless networks
• Security models and security policies
• Security of new generation networks, security of VoIP and multimedia
• Security of e-commerce, electronic voting and database systems
• Security of social networks
• Smartphone security and privacy
• Traceability, metrology and forensics
• Trust management
• Use of smart cards and personal devices for Internet applications
• Web and cloud security
Paper Submissions
Submitted papers must not substantially overlap with papers that have
been published or that are simultaneously submitted to a journal or a
conference with proceedings. Papers must be written in English and must
be submitted electronically in PDF format. Maximum paper length will be
8 printed pages for full papers or 4 pages for short papers, in IEEE
2-column style. Authors of accepted papers must guarantee that their
papers will be presented at the conference. All papers selected for
presentation at the conference will be published on-line by IEEE Xplore
http://ieeexplore.ieee.org.
Call for Tutorials
We solicit tutorials on state-of-the-art technologies relevant to the
conference themes. We are particularly interested in tutorials that
foster knowledge exchange among the different research communities
present at the conference. The intended length of each tutorial is 2 to
3 hours.
A tutorial proposal should include a brief summary and outline, specific
goals and objectives, the intended audience and the expected background
of the audience as well as a biographical sketch of the presenter(s).
The length of tutorial proposals should not exceed 5 pages.
Tutorial proposals should be submitted to the tutorial program chair:
Nora Cuppens-Boulahia by email :
Nora(dot)Cuppens(at)telecom-bretagne(dot)eu before June 3, 2013.
---------------------------------------------------
Organization
General Chair
Jean-Louis Lanet, University of Limoges, France
PC Chairs
Ravi Sandhu, University of Texas San Antonio, USA
Bruno Crispo, University of Trento – Italy
Tutorial Chair
Nora Cuppens-Boulahia, TELECOM Bretagne, France
Publications and Publicity Chair
Mauro Conti, University of Padua, Italy
Program Committee
Fabio Martinelli IIT-CNR
Stephen Neville University of Victoria
Michael Rusinowitch LORIA - INRIA Lorraine
Thierry Sans Carnegie Mellon University in Qatar
Igor Kotenko SPIIRAS
Luigi Mancini Universita di Roma La Sapienza
Giovanni Russello The University of Auckland
Kai Rannenberg Goethe University Frankfurt
Elisa Bertino Purdue University
Masahiro Mambo Kanazawa University
Sabrina De Capitani Di Vimercati Universita' degli Studi di Milano
Sandro Etalle T.U. Eindhoven & University of Twente
Jorge Cuellar Siemens AG
Alessandro Armando University of Genova
Sebastien Gambs IRISA/INRIA - Université de Rennes 1
Atul Prakash University of Michigan
Gabriele Oligeri University of Trento
Aldar C-F Chan Institute for Infocomm Research
Frédéric Cuppens TELECOM Bretagne
Roberto Di Pietro Università di Roma Tre, Italy
Nora Cuppens-Boulahia Telecom Bretagne
Javier Lopez University of Malaga
José M Fernandez Ecole Polytechnique de Montreal
Jean-Pierre Seifert Technical University of Berlin
Amit Vasudevan Cylab/Carnegie Mellon University
Refik Molva EURECOM
---------------------------------------------------
Important Dates
Submission deadline: 3rd of June
Notification to Authors: 1st of August
Camera Ready: 10 of August
Conference: October 23-25, 2013
-------- Original-Nachricht --------
Betreff: [AISWorld] Call for papers | Lisbon, October 23-25
Datum: Fri, 12 Apr 2013 21:14:27 +0100
Von: Maria Manuela Cruz Cunha <mcunha(a)ipca.pt>
Antwort an: mcunha(a)ipca.pt
Organisation: Instituto Politécnico do Cávado e do Ave
An: <irma-l(a)irma-international.org>, <aisworld(a)lists.aisnet.org>
Call for papers:
------ ProjMAN 2013
------ International Conference on Project MANagement
------www.icprojman.org
------ paper submission deadline: May 10
------ CENTERIS 2013
------ Conference on ENTERprise Information Systems
------ http://centeris.eiswatch.org
------ paper submission deadline: April 15
------ HCist 2013
------ International Conference on Health and Social Care
------ Information Systems and Technologies
------ http://hcist.eiswatch.org
------ paper submission deadline: May 15
be held in Lisbon, Portugal, October 23-25.
--
Maria Manuela Cruz Cunha
Polytechnic Institute of Cávado and Ave, Portugal
(vice-president)
International Journal of Web Portals (IJWP)
(editor-in-chief)
Information and Communication Technologies for the advanced enterprise: an international journal (ICT'ae)
(editor-in-chief)
_______________________________________________
AISWorld mailing list
AISWorld(a)lists.aisnet.org
-------- Original-Nachricht --------
Betreff: [AISWorld] Contents of Vol. 11, No. 1 of International Journal
of Distance Education Technologies (IJDET, an EI journal)
Datum: Sat, 13 Apr 2013 02:15:10 +0800
Von: Maiga Chang <maiga.igibook(a)gmail.com>
Antwort an: Maiga Chang <Maiga.IGIBook(a)gmail.com>
An: <AISWorld(a)lists.aisnet.org>
[Apologies if you receive multiple times, please circulate this to
your colleagues who might be interested, thank you so much.]
[This email includes the table of contents of Vol. 11, No. 1 of
International Journal of Distance Education Technologies
(IJDET, an EI journal) and the general call for papers of IJDET]
------- Annoucement of the publication of Vol. 11, No. 1 of IJDET (an EI journal)-----------
http://www.igi-global.com/journal/international-journal-distance-education-…
We are glad to announce the publication of Vol. 11, No. 1 of International Journal of Distance Education Technologies (IJDET, an EI
journal). In this issue, FIVE papers are included:
TSI-Enhanced Pedagogical Agents to Engage Learners in Virtual Worlds (pages 1-13)
Steve Leung, Sandeep Virwaney, Fuhua Lin, AJ Armstrong, and Adien Dubbelboer
Building pedagogical applications in virtual worlds is a multi-disciplinary endeavor that involves learning theories, application
development framework, and mediated communication theories. This paper presents a project that integrates game-based learning,
multi-agent system architecture (MAS), and the theory of Transformed Social Interaction (TSI), the project implements a group of
engaging, affectionate and effective pedagogical agents equipped with abilities of self-repsentation, emotional states reasoning and
situational awareness. A prototype of a virtual quiz show, QuizMASter, has been implemented to realize these abilities, and will be
used to test for the effectiveness of the approach.
http://www.igi-global.com/article/tsi-enhanced-pedagogical-agents-engage/76…
PACALL: Supporting Language Learning Using SenseCam (pages 14-30)
Bin Hou, Hiroaki Ogata, Toma Kunita, Mengmeng Li, and Noriko Uosaki
The authors' research defines a ubiquitous learning log (ULLO) as a digital record of what a learner has learned in the daily life
using ubiquitous technologies. In their previous works, the authors proposed a model named LORE (Log – Organize – Recall –
Evaluate) to describe the learning process of ULLO and developed a system named SCROLL to implement this model. This paper focuses
on Log among 4 factors in LORE and proposed a passive way to log ULLOs. They use SenseCam to capture a learner's learning
activities and propose a system named PACALL to support reflection of what s/he has seen. This system filters bad photos that taken
by SenseCam and helps learner find learning content. The author use this system in language learning and help learners learn the
foreign name of objects around.
http://www.igi-global.com/article/pacall-supporting-language-learning-using…
Research Trends with Cross Tabulation Search Engine (pages 31-44)
Chengjiu Yin, Sachio Hirokawa, Jane Yin-Kim Yau, Kiyota Hashimoto, Yoshiyuki Tabata, and Tetsuya Nakatoh
To help researchers in building a knowledge foundation of their research fields which could be a time-consuming process, the authors
have developed a Cross Tabulation Search Engine (CTSE). Its purpose is to assist researchers in 1) conducting research surveys, 2)
efficiently and effectively retrieving information (such as important researchers, research groups, keywords), and also 3) providing
analytical information relating to past and current research trends in a particular field. Their CTSE system employs data-processing
technologies and emphasizes the use of a "Learn by Searching" learning strategy to support students to analyze such research
trends. To show the effectiveness of CTSE, a pilot experiment has been conducted, where participants were assigned to do research
survey tasks and then answer a questionnaire regarding the effectiveness and usability of the system. The results showed that the
system has been helpful to students in conducting research surveys, and the research trend transitions that our system presented
were effective for producing research trend surveys. Moreover, the results showed that most students had favorable attitudes toward
the usage and usability of the system, and those students were satisfied in gaining more know ledge in a particular research field
in a short period.
http://www.igi-global.com/article/research-trends-cross-tabulation-search/7…
Design and Implementation of an Online Auxiliary System for Correcting Japanese Composition (pages 45-57)
Yuqin Liu, Guohai Jiang, Lanling Han, and Mingxing Lin
In language learning, error correction information given by teachers for student compositions is of great value in both teaching and
learning. However, in traditional paper-based error correction mode, error correction information is easily lost and cannot be fed
back to students systematically. The aim of this research is to provide maximum feedback related to systematic correction for
students and teachers so that there can be targeted learning and teaching. This paper describes a web-based auxiliary error
correcting system for Japanese writing that compares compositions before and after error correction and provides statistics related
to error type, error frequency, and error variation. The system was evaluated in the Dalian University of Technology and the
experiment proved that teachers and students benefit from this system.
http://www.igi-global.com/article/design-implementation-online-auxiliary-sy…
Technical Feasibility of a Mobile Context-Aware (Social) Learning Schedule Framework (pages 58-73)
Jane Y. K. Yau, and Mike Joy
The purpose of this paper is to show the technical feasibility of implementing their mobile context-aware learning schedule (mCALS)
framework as a software application on a mobile device using current technologies, prior to its actual implementation. This process
draws a set of compatible mobile and context-aware technologies at present and can be used as a reference point for implementing
generic mobile context-aware applications. The authors' mCALS framework retrieves the learner's location and available time
contexts via the built-in learning schedule (i.e., electronic organizer) on a mobile device. These contexts together with the
learner's learning styles and knowledge level (on a selected topic) are used as the basis for the software application to suggest
learning materials that are appropriate for the learner, at the time of usage. This retrieval approach eliminates the use of
context-aware technologies and the need to directly request the user to enter context information at the time of usage. The authors
develop a fully functional prototype of this framework for learners to plan their individual as well as social learning activities
amongst one another to make their individual learning processes collaborative and as a way to enhance individual and social learning
experiences.
http://www.igi-global.com/article/technical-feasibility-mobile-context-awar…
------- General Call for Papers for IJDET (an EI journal)-----------
The electronic version of this cfp can be seen at
http://maiga.athabascau.ca/editors/IJDET-Call_for_Papers-General.pdf
International Journal of Distance Education Technologies (IJDET)
(http://www.igi-global.com/journal/international-journal-distance-education-…)
The International Journal of Distance Education Technologies (IJDET) is
a forum for researchers and practitioners to disseminate practical solutions
to the automation of open and distance learning. Targeted to academic
researchers and engineers who work with distance learning programs and
software systems, as well as general users of distance education technologies
and methods, IJDET discusses computational methods, algorithms,
implemented prototype systems, and applications of open and distance learning.
All manuscripts submitted to the journal are peer-reviewed according to
the procedure consisting of initial review, peer review, and recommendation
Editor in Chief:
Dr. Fuhua Lin (fuhua.o.lin(a)gmail.com)
Executive Editor:
Dr. Maiga Chang (maiga.chang(a)gmail.com)
Indices:
Compendex (Elsevier EI), DBLP, EBSCOhost, ERIC, Google Scholar,
INSPEC, PsycINFOR, SCOPUS, and many others
Suggested topics:
IJDET is an EI journal and the scope of the journal includes, but is not limited to:
- Assessment
- Distance Learning for Culture and Arts
- Intelligent and Adaptive Learning
- Intelligent Agents and Multi-Agent Systems
- Mobile Learning
- Nurse Medical Healthcare
- Pedagogical Issues
- Social Learning
- Serious Games for Distance Education
- Science, Technology, Engineering, and Math (STEM) Education
- Technology Enhanced Learning
- Ubiquitous Learning
- Virtual Worlds for Distance Education
Manuscript guidelines:
All submissions have to follow IJDET manuscript guidelines at
http://www.igi-global.com/publish/resources/journal-organization-and-format…http://www.igi-global.com/journals/guidelines-for-submission.aspx
should be submitted online at http://www.ijdet.com/ after registering an account.
Special Issue proposals:
We also encourage potential research in any fields related to the journal
to form a high quality guest editorial team to submit special issue proposal
online, for any emerging, important, and hot topics. Please submit your
special issue proposal online as a manuscript and choose
"[Special Issue Proposal]" as its Section
The special issue proposal sample can be downloaded at
http://vip.is-very-good.org/editing/IJDET-Special_Issue_Proposal_Sample.doc
For queries, please contact Dr. Maiga Chang (maiga.chang(a)gmail.com)
------------------------------------
Sincerely,
Maiga Chang
maiga.chang(a)gmail.com
http://maiga.athabascau.ca
04, 12 '13 PM 12:05 in Edmonton
---------------------------------
Editor-in-Chief, Journal of Technology for Education and Learning
Executive Editor, International Journal of Distance Education Technologies (EI)
Associate Editor, International Journal of Online Pedagogy and Course Design
Learning Culture and Language through ICTs: Methods for Enhanced Instruction
http://www.igi-global.com/reference/details.asp?ID=33419
-----------
Co-Chair of ICCE sub-conference on Digital Game and Digital Toy
Enhanced Learning and Society (GTEL&S)
http://icce2013bali.org/
Co-Chair of GCCCE sub-conference on Joyful Learning and Society
http://www.gse.pku.edu.cn/gccce2013/gccceen.asp
-----------
Guest Editor, Research and Practice in Technology Enhanced Learning
Special Issue on Practical Applications of Mobile and Internet Educational Games
http://www.apsce.net/Download/RPTEL-2012-SI5_PracticalEducationalGames_CFP.…
Guest Editor, International Review of Research in Open and Distance Learning (SSCI)
Special Issue on Technology Enhanced Information Retrieval and Processing for Online Learning (Vol. 13, No. 5)
http://www.irrodl.org/index.php/irrodl/issue/view/54
Guest Associate Editor, IEEE Technology and Engineering Education
Special Issue on Cloud Computing Technology and Applications (Vol. 7, No. 2)
http://www.ewh.ieee.org/soc/e/sac/itee/index.php/meem/article/viewFile/252/…http://www.ewh.ieee.org/soc/e/sac/itee/index.php/meem/issue/view/30
---------
School of Computing and Information Systems (http://scis.athabascau.ca/)
Athabasca University
1200, 10011-109 Street
Edmonton, T5J-3S8
AB, Canada
---------------
Phone: +1-866-916-8646
Website: http://maiga.dnsalias.org and http://maiga.athabascau.ca
CV: http://scis.athabascau.ca/scis/staff/faculty.jsp?id=maigac
Leave me an Audio/Video message with JoinNet (required to install in Microsoft Windows OS first)
http://meeting.athabascau.ca/gotomeeting.php?u=5&c=visit
JoinNet software: http://www.homemeeting.com/en_US/download_joinnet.html
_______________________________________________
AISWorld mailing list
AISWorld(a)lists.aisnet.org
-------- Original-Nachricht --------
Betreff: [WI] Call for Contribution: ACM Recsys 2013, October 12-16,
Hong Kong, China
Datum: Thu, 11 Apr 2013 21:31:32 +0800
Von: Mi Zhang <mi_zhang(a)fudan.edu.cn>
An: <wi(a)aifb.uni-karlsruhe.de>, <ak-kd-list(a)aifb.uni-karlsruhe.de>,
<kdml(a)cs.uni-kassel.de>, <fg-db(a)informatik.uni-rostock.de>,
<fca-list(a)cs.uni-kassel.de>, <dl(a)dl.kr.org>, <kaw(a)science.uva.nl>,
<all-prolearn(a)agws.dit.upm.es>, <INDUCTIVE(a)LISTSERV.UNB.CA>,
<researchers(a)pascal-network.org>, <colt(a)cs.uiuc.edu>,
<kdnet-members(a)iais.fraunhofer.de>, <CHI-ANNOUNCEMENTS(a)acm.org>,
<SIGIR-ANNOUNCE-REQUEST(a)acm.org>, <ah(a)listserver.tue.nl>,
<IRList(a)lists.shef.ac.uk>, <um(a)di.unito.it>, <adaptive(a)topica.com>,
<BCS-HCI(a)JISCMAIL.AC.UK>, <CHI-ANNOUNCEMENTS(a)LISTSERV.ACM.ORG>,
<chisigmail(a)chisig.org>, <IR(a)JISCMAIL.AC.UK>, <editor1(a)kdnuggets.com>,
<Dbworld(a)cs.wisc.edu>, <members(a)sigsem.org>,
<MM-INTEREST(a)LISTSERV.ACM.ORG>, <chi-students(a)listserv.acm.org>
[Our apologies for cross posting]
CALL FOR PAPERS, WORKSHOP PROPOSALS, TUTORIAL PROPOSALS and DEMOS
ACM International Conference on Recommender Systems (RecSys) 2013
Oct 12-16, 2013, Hong Kong, China
http://recsys.acm.org/recsys13/
================================================================
We are pleased to invite you to participate in the premier annual event
on research and applications of recommendation technologies, the Seventh
ACM Conference on Recommender Systems (RecSys 2013). The conference will
be held on October 12-16, 2013, Hong Kong, China. Previous conferences
have been distinguished by a strong level of interaction between
researchers and practitioners in the sharing of ideas, problems and
solutions, and the 2013 conference will continue in this tradition. The
fully-refereed proceedings will be published by the ACM and, like past
RecSys proceedings, are expected to be widely read and cited.
All submissions and reviews will be handled electronically in PDF
format. RecSys 2013 submissions should be prepared according to the
standard ACM SIG proceedings format. For your convenience, we provide
paper templates in Microsoft Word and LaTeX on the conference website.
There are two paper submission categories:
Long paper submissions should report on substantial contributions of
lasting value. The maximum length is 8 pages in the standard ACM SIG
proceedings format. Each accepted long paper will be presented in a
plenary session as part of the main conference program. We expect the
review process to be highly selective: in 2012, the acceptance rate for
full papers was 20%.
Short paper submissions typically discuss exciting new work that is not
yet mature enough for a long paper. The maximum length is 4 pages in the
standard ACM SIG proceedings format. Each accepted short paper will be
presented in a poster session. The presentation may include a system
demonstration.
Note: Please note that rejected long paper submissions will not be
automatically considered as short papers.
We construe recommender systems broadly, including applications ranging
from e-commerce to social networking, platforms from web to mobile and
beyond, and a wide variety of technologies ranging from collaborative
filtering to case-based reasoning. Topics of interest for RecSys 2013
include (but are not limited to):
- Algorithm scalability
- Case studies of real-world implementations
- Computational advertising
- Conversational recommender systems
- Context-aware and multidimensional models
- Evaluation metrics and studies
- Explanations and evidence
- Group recommenders
- Impact studies
- Innovative/New applications
- Machine learning for recommendation
- Novel paradigms
- Personalization
- Preference elicitation
- Recommendation algorithms
- Social recommenders
- User interfaces
- Security, privacy, trust, and reputation
- Semantic web technologies for recommendation
- Theoretical foundations
- User modelling
- User studies
RecSys 2013 is pleased to invite demos, proposals for workshops and
tutorials to be held in conjunction with the conference.
The RecSys demo session provides an exciting way for researchers and
developers to present new recommender ideas, show off their work, and
get valuable feedback from the recommender systems community.
The goal of the workshops is to provide additional venues for presenting
research on topics of interest and an informal forum to discuss research
questions and challenges.
The goal of the tutorials is to provide the larger conference community
an opportunity to learn about recommender system concepts and techniques
and serve as a venue to share presenters' expertise with the global
community of recommender system researchers and practitioners.
We actively encourage both researchers and industry practitioners to
submit demos and proposals. We actively encourage both researchers and
industry practitioners to submit demos and proposals. The details for
demos, workshops and tutorials are available at
http://recsys.acm.org/recsys13/recsys-2013-call-for-contributions/.
===================================================
Important Dates
===================================================
Long/Short Papers:
- Paper Abstract Submission: May 6, 2013
- Paper Submission: May 13, 2013
- Paper Acceptance Notification: July 8, 2013
- Camera-Ready papers due: July 22, 2013
Workshop Proposals:
- Workshop proposals due: April 15, 2013
- Workshop Decisions announced: May 6, 2013
Tutorial Proposals:
- Tutorial proposals due: May 20, 2013
- Tutorial Acceptance Notification: June 24, 2013
- Camera-ready tutorial papers due: July 29, 2013
Demos:
- Demo Submission: May 27th, 2013
- Demo Acceptance Notifications: June 24th, 2013
- Camera-ready demos due: July 29, 2013
- Conference Dates: Oct 12-16, 2013
===================================================
Questions?
===================================================
More information at: http://recsys.acm.org/2013
LinkedIn group: Recsys 2013
Twitter: @ACMRecSys
Program Co-chairs (program2013(a)recsys.acm.org):
Pearl Pu, EPFL Lausanne
George Karypis, University of Minnesota
General Co-chairs (recsys2013(a)acm.org):
Qyang Yang, Huawei Noah Ark Research Lab & Hong Kong University of
Science and Technology
Irwin King, Chinese University of Hong Kong
Qing Li, City University of Hong Kong
Local Chairs (lichen(a)comp.hkbu.edu.hk):
Li Chen, Hong Kong Baptist University, China
Ted Chi Yin Chow <http://www.cs.cityu.edu.hk/%7Echiychow/>, City
University of Hong Kong, China
Publicity Chairs (mi_zhang(a)fudan.edu.cn):
Mi Zhang, Fudan University, China
Simon Dooms <http://www.wica.intec.ugent.be/simon-dooms>, Ghent
University, Belgium
-------- Original-Nachricht --------
Betreff: [AISWorld] A2A 2012 CFP: MOOCs, Flipping the Classroom, and
Transformation of Higher Education
Datum: Fri, 12 Apr 2013 12:58:41 +0000
Von: Brian Butler <bsbutler(a)umd.edu>
An: aisworld(a)lists.aisnet.org <aisworld(a)lists.aisnet.org>
MOOCs, Flipping the Classroom, and Transformation of Higher Education:
Building Bridges from the Academy (of Management) to the Academy
Online and August 10, 2013 (prior to the Academy of Management Annual Meeting)
Lake Buena Vista (Orlando), FL USA
Call for Participation
Recent innovations have generated considerable discussion about the transformation of higher education. Massively open online courses (MOOCs) run by entrepreneurial startups using social media to provide educational experiences for thousands of students. Open courseware repositories and learning platforms for “flipping the classroom”, moving exposition online and experiential, group activities into the classroom. Market and social pressures driving traditional educational institutions to simultaneously increase scale, reduce costs, and continually innovate. Seemingly constant change, presents unknown consequences for the work, practices, positions, and identity of faculty, staff, and students. Waves of technological, pedagogical, and institutional innovation are either fundamental transformations or distracting fads.
These forces affect us in many ways. As faculty, changes in higher education directly affect our work, professional identity, and personal well-being. As educators, new technologies and institutional arrangements create new opportunities and constraints for working with students. As leaders, changing competitive environments affect the viability and health of our institutions and the choices we make about regulatory structures, joint-ventures, personnel, and investments.
At the same time, researchers have studied exactly the kinds of issues we are observing in higher education, but in other settings. Disruptive technologies; implications and development of knowledge and information repositories; institutional and inter-organizational competitive dynamics; individual, group, organizational, and population learning; the strengths and limitations of virtual teams; the dual nature of structure and routines; tensions between immediate adaptation and long-term viability; and the nature of work practices in knowledge-intensive organizations. These are just a few areas in which we have conducted research relevant for understanding and managing the ongoing transformation of higher education.
Although there is an extensive body of relevant knowledge, collectively we rarely make critical connections back to the ongoing discussions about the nature and future of higher education. In spite of this, discussions about higher education transformations are often based on anecdotes, opinion, and isolated experience of commentators, activists, and pundits –leaving faculty, students, administrators, and policymakers even more confused about what they should expect and prepare for in the future.
A2A Workshop Objectives and Deliverables
The purpose of the Academy (of Management) to Academy Workshop (A2A) is to build connections between state-of-the-art management, organization studies, and information systems research and the policy, institutional, and professional discussions prompted by the ongoing transformation of higher education. By making these connections more explicit we seek to:
* Help participants better understand and explain the trends affecting their organizations
* Provide high-value entry points into the management research literature for leaders grappling with changes in higher education
* Identify directions for the study of knowledge organizations by highlighting issues that are not well addressed by existing theory or empirical work
To achieve these objectives, the A2A Workshop will focus on the development of a set of 1-2 page briefs that build strategic connections between issues in higher education and current management, organization, and information systems research. Each brief will consider a specific issue or trend (e.g. the implications of online education for faculty work-life balance; the strategic implications of MOOCs for state universities; etc.); identify 3-4 published studies that provide theoretical and empirical bases for understanding and addressing the issue; and provide a short statement of how that work can be used to understand, explain, and respond to the focal issue.
The completed briefs and a summary of directions for new research will be made publically available through the website of the Center of the Advanced Study of Communities and Information (CASCI) at the University of Maryland. Other publication outlets (conference paper, journals, etc.) will be pursued based on the interest workshop participants.
Applying for and Participating in the A2A Workshop
To apply for the A2A Workshop, prepare a short (1-2 page) position paper describing a specific issue in higher education, why it is important, and how management, organizational, and/or information systems scholarship is relevant for that issue. For full consideration please submit your position paper to the A2A co-coordinator by (Brian Butler) at bsbutler(a)umd.edu by May 10th, 2013.
All applicants will be invited to participate in the A2A blog. This blog/wiki will contain regular posts that highlight current issues in higher education and relevant management research.
Selected applicants will be invited to join a ½ day Professional Development Workshop (PDW) session on August 10th from 8am – 12pm (prior to the Academy of Management Annual Meeting). At this session we will work in groups to refine the focal issue statements, select the relevant theories/concepts/papers, collaboratively create initial drafts, and engage in comment and on-the-spot revision of the briefs.
While the specific issues considered will emerge from the submitted position papers and online discussions, possible topics include (but are not limited to):
* Change management and leadership in academic centers and departments
* Mentoring at a distance
* Intrapreneurship and autonomy in publically funded institutions
* Virtual teams and organizations for research
* Design of learning management systems to support learning analytics
* Differential competitive dynamics in heterogeneous/homogeneous organizational fields
* Disruptive technologies in public organizations
* Educational institutions as a site of knowledge work
* Practice theories of technology and innovation
* Organizational and community learning about MOOCs
* Team and individual performance and behavior in turbulent environments
* Learning analytics and continuous improvement
* Identity and innovation in small colleges
* Sociomateriality and educational institutions
* Dynamics of groups and communities in open learning environments
* Professional identity and “alternative” employment arrangements
* Bureaucracy, institutions, innovation and identity in state universities
For more information about the A2A Workshop please contact the A2A Workshop Coordinators, Brian Butler (bsbutler(a)umd.edu), June Ahn (juneahn(a)umd.edu), and Susan Winter (sjwinter(a)umd.edu) or check out the materials available at: http://casci.umd.edu/a2a2013/.
The Academy (of Management) to Academy Workshop is supported by the Center of the Advanced Study of Communities and Information (CASCI) at the University of Maryland iSchool.
_______________________________________________
AISWorld mailing list
AISWorld(a)lists.aisnet.org
-------- Original Message --------
Subject: [WI] IEEE BigData Congress 2013: Special Session
on BigData Quality, Security and Privacy
Date: Fri, 12 Apr 2013 11:01:18 +0200
From: Fulvio Frati <fulvio.frati(a)unimi.it>
To: wi(a)lists.uni-karlsruhe.de
[Apologies for multiple sendings]
****************************************************************************
IEEE BigData Congress 2013
Special Session on BigData Quality, Security and Privacy
Session Chair: Lionel Brunie (INSA-Lyon, France)
http://www.ieeebigdata.org/2013/
****************************************************************************
BigData research has unveiled the potential of huge data
stores for many business applications. For the research
community dealing with data protection and secure data
communication, however, Big Data equals big risk.
The security, privacy and quality implications for
collecting, storing and utilizing BigData are many-fold. In
BigData environments, the sheer volume of data being
collected and stored is often too large for organizations to
sift through it and determine the sensitive nature of a
particular data item.
As big data environments rapidly expand, the quantity and
size of opaque objects that need to be properly managed also
increases. For this reason, new techniques are needed to (i)
assess the quality, and (ii) transparently encrypt blocks
big data stored in the cloud or on premises. Such solutions
must work while maintaining the highest levels of data
availability and performance.
This session will foster an understanding of the open
issues, give visibility on ground-breaking work in progress
and reveal innovative techniques for managing emerging data
technologies.
The Special Session on BigData quality, security and
privacy, to be held in the framework of the IEEE BigData
Congress 2013 (http://www.ieeebigdata.org/2013/) encourages
submissions of last minute, work-in-progress papers on the
following topics:
- Enhanced Security Capabilities for BigData Systems
- Managing User Access in a BigData Environment
- Policy & Governance in a BigData Environment
- Migrating BigData to the Cloud
- Protecting Citizen & Business Privacy in the Era of BigData
- BigData and Security Analytics
- BigData and Assurance: Beyond PCI and HIPAA
- User Profiling in BigData Environments
- De-anonymization using BigData Analysis Tools
- Trust and Reputation Management in BigData Environments
- BigData and Differential Privacy
- Data Provenance in BigData Environments
Important Dates
- Full Paper Submission Due Date: April 27, 2013 Extended!
- Decision Notification (Electronic): May 4, 2013
- Camera-Ready Copy Due Date & Pre-registration Due: May 11,
2013
Paper Submission
Authors are invited to submit original, unpublished research
papers that are not being considered in another forum.
The Special Session will accept full papers (6 pages) and
position papers (4 pages). Papers are REQUIRED to be
formatted using the IEEE Proceedings template
(http://conferences.computer.org/scc/2013/IEEECS_CPS_8.5x11x2.zip
) in Word or Latex
(http://conferences.computer.org/scc/2013/IEEECS_CPS_LaTeX_Letter_2Col.zip).
The submitted papers can only be in the format of PDF or
WORD. At least one author of each accepted paper is required
to attend the conference and present the paper. Electronic
submission of manuscripts (in PDF or Word formats) is
required. Submissions should include paper title, abstract,
name of authors, their affiliations, and emails addresses.
Please use the BigData 2013 Research Track Paper Submission
System at
http://www.confhub.com/conf.php?id=271 to submit your
research papers to BigData 2013 Special Session. You can
select one or two of the research topics when you submit
your paper in the online submission system so it will be
reviewed by the right subject matter experts.
-------- Original Message --------
Subject: [AISWorld] 3rd CFP: Book: Demand-Driven Web
Services: Theory, Technologies and Applications
Date: Fri, 12 Apr 2013 12:38:11 +1000
From: Zhaohao Sun <zhaohao.sun(a)gmail.com>
To: aisworld(a)lists.aisnet.org
3RD CALL FOR BOOK CHAPTERS
Book: Demand-Driven Web Services: Theory, Technologies and
Applications
Edited by Zhaohao Sun and John Yearwood
To be published by IGI Global, USA
Website:
http://www.igi-global.com/publish/call-for-papers/call-details/927
Theme
Web services are playing a pivotal role both in business,
service computing and social networking services, and cloud
computing. This is also the case in the traditional FREG
(foods, resources, energy and goods) services, because almost
all traditional services are replaced fully or partially
by web services. Demand-driven web services (DDWS) as a
tri-paradigm, a computing paradigm, a service paradigm, and
a management paradigm, is becoming important for web services,
service computing, cloud computing, and social networking
computing. However, many fundamental issues in developing
DDWS remain open. For example, what is the demand theory of
web services? What is a demand-driven architecture of web
services? How should real world demands be classified? How
should web services be classified? How can an ontology of
web services be developed? This book will address these
issues by exploring the cutting-edge theory, technologies,
and methodologies of demand driven web services based on the
novel classification of demands and web services emphasizing
cloud services, mobile services, social networking services
and e-business services from a perspective of
computing, service and management. This book also provides
applications of the proposed theory, technologies and
methodologies to successful demand-driven web services in
the real world. The proposed approaches will facilitate research
and development of web services, e-business, service
computing, mobile computing, cloud computing, and social
computing.
Aims and Scope
This book aims at a broad audience of researchers and
practitioners, and provides the reader with an updated
understanding of demand-driven web services, cloud services,
mobile services, and social networking services by attracting
high quality manuscripts from academic researchers, policy
makers and practitioners in this area. Papers of all
theoretical and technological approaches and applications
are welcome.
Submissions that cross multiple disciplines such as service,
business, management, industry, information systems, and
intelligent systems to develop theory and provide
technologies and applications that could move theory and
practice
forward in demand-driven web services, cloud services,
mobile services, e-business services, and social networking
services are especially encouraged.
Topics
Topics of contributions include, but are not limited to, the
following
Part I. Theory of demand-driven web services
* Topics: fundamental concepts, models, architectures,
frameworks, schemes or
theories for planning, designing, building, operating or
evaluating, managing
demand-driven web services.
Part II. Technologies for demand-driven web services
* Topics: AI-based technologies as such: rule-based systems,
ontology-development
systems, machine learning techniques, multi-agent systems
techniques,
neural networks systems, fuzzy logic systems, cased-based
reasoning systems, genetic algorithms techniques, data
mining algorithms, intelligent agents, user intelligent
interfaces; and emergent AI-based technologies, Web
technologies,
service technologies, social networking technologies,
decision making technologies, DSS technologies are welcome
Part III. Applications for demand-driven web services
* Topics: case studies and applications in using
technologies and fundamental theory in Part I, II in the
representative service domains such as: e-business services,
mobile services, social networking services, cloud services,
financial services, legal services, healthcare services,
logistics services, educational services, e- FREG services,
and military services taking into account demands from
government, organization, enterprise, community, individual,
customer, and citizen.
Part IV. Trends and Challenges on demand-driven web services
* Topics: emergent AI-based technologies, technologies of
Big data, social networking services, integrations of these
technologies, and the implications, challenges for
demand-driven web services.
Part V. Emerging demands and emerging demand-driven
web services.
* Topics: Emerging demands, emerging technologies including
human computation and big data management, methodologies for
demand-driven web services.
Submission Procedure
Please submit a brief summary, consisting of about 150
words, of the proposed chapter clearly identifying the main
objectives of your contribution by May 8, 2013. Authors of
the accepted proposals will be notified and provided with
detailed guidelines. Full chapters are to be submitted by
June 30, 2013.
All submissions through emails should be electronically sent
to the book editors Dr Zhaohao Sun. email:
z.sun(a)ballarat.edu.au <mailto:z.sun@ballarat.edu.au>, and
Prof. John Yearwood at jly(a)ballarat.edu.au
<mailto:jly@ballarat.edu.au>
Submission Format and Evaluation
Every book chapter submission should consist of 8,000-12,000
words, and be structured into sections including Abstract,
Introduction, background (or related work), main sections,
future research directions, conclusion, references.
Every book chapter must be submitted in Microsoft® Word, and
be typewritten in English in APA style based on ?manage
source? function.
Every book chapter submission is original. Only ORIGINAL
articles will be accepted for publication by IGI-Global.
Upon acceptance of your article, you will be required to
sign a warranty that your article is original and has NOT been
submitted for publication or published elsewhere.
Each chapter will be evaluated by at least two academic
peers on related themes in a blind mode. Conditioned
chapters will have an additional opportunity for being
improved and evaluated. In the second evaluation, a definitive
editorial decision among: accepted or rejected will be
reported. All of the accepted chapters must be submitted
according to the Editorial publishing format rules timely.
Instructions for authors can be downloaded at:
http://www.igi-global.com/Files/AuthorEditor/guidelinessubmission.pdf
Important Dates
* May 8, 2013: Submission of Abstract of the proposed
chapter to the editors
* June 30, 2013: submission deadline of first version of
full chapters.
* August 15, 2013: notification deadline of editorial
results (definitively accepted chapter, conditioned chapter,
or definitively rejected chapter).
* Early 2014: the book is scheduled for release.
You can also visit
http://www.igi-global.com/publish/call-for-papers/call-details/927
for related information.
Dr. Zhaohao Sun, PhD, ACS (Snr), CP, MIEEE, MAIS
Editor of Demand-Driven Web Services: Theory, Technologies,
and Applications
Senior Lecturer in Information Systems
School of Science, Information Technology and Engineering (SITE)
University of Ballarat
University Drive Mt Helen, Po Box 663,
Ballarat VIC 3353, Australia
Email: z.sun(a)ballarat.edu.au <mailto:z.sun@ballarat.edu.au>
Web: http://uob-community.ballarat.edu.au/~zsun/index.html
<http://uob-community.ballarat.edu.au/%7Ezsun/index.html>
-------- Original-Nachricht --------
Betreff: 2nd CfP: ICSEA 2013 || October 27 - November 1, 2013 - Venice,
Italy
Datum: Thu, 11 Apr 2013 15:15:57 -0400
Von: ICSEA 2013 <invitation(a)iariaschedule.org>
An: gustaf.neumann(a)wu-wien.ac.at
2nd CfP: ICSEA 2013 || October 27 - November 1, 2013 - Venice, Italy
INVITATION:
=================
Please consider to contribute to and/or forward to the appropriate groups the following opportunity to submit and publish original scientific results to ICSEA 2013.
The submission deadline is May 28, 2013.
Authors of selected papers will be invited to submit extended article versions to one of the IARIA Journals: http://www.iariajournals.org
=================
============== ICSEA 2013 | Call for Papers ===============
CALL FOR PAPERS, TUTORIALS, PANELS
ICSEA 2013, The Eighth International Conference on Software Engineering Advances
October 27 - November 1, 2013 - Venice, Italy
General page: http://www.iaria.org/conferences2013/ICSEA13.html
Call for Papers: http://www.iaria.org/conferences2013/CfPICSEA13.html
- regular papers
- short papers (work in progress)
- posters
Submission page: http://www.iaria.org/conferences2013/SubmitICSEA13.html
Submission deadline: May 28, 2013
Sponsored by IARIA, www.iaria.org
Extended versions of selected papers will be published in IARIA Journals: http://www.iariajournals.org
Print proceedings will be available via Curran Associates, Inc.: http://www.proceedings.com/9769.html
Articles will be archived in the free access ThinkMind Digital Library: http://www.thinkmind.org
Please note the Poster and Work in Progress options.
The topics suggested by the conference can be discussed in term of concepts, state of the art, research, standards, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas.
All tracks are open to both research and industry contributions, in terms of Regular papers, Posters, Work in progress, Technical/marketing/business presentations, Demos, Tutorials, and Panels.
Before submission, please check and conform with the Editorial rules: http://www.iaria.org/editorialrules.html
ICSEA 2013 Topics (topics and submission details: see CfP on the site)
Advances in fundamentals for software development
Fundamentals in software development; Software architecture, patterns, frameworks; Software analysis and model checking; Software architectural scalability; Requirements engineering and design; Software design (methodologies, patterns, experiences, views, design by contract, design by responsibilities, etc.); Software modeling (OO, non-OO, MDA, SOA, patterns, UML, etc.); Software process and workflow; Software validation and verification; Software testing and testing tools; Software implementation; Software project management (risk analysis, dependencies, etc.)
Advanced mechanisms for software development
Software composition; Process composition and refactoring; Co-design and codeplay; Software dependencies; Plug&play software; Adaptive software; Context-sensitive software; Policy-driven software design; Software rejuvenation; Feature interaction detection and resolution; Embedded software; Parallel and distributed software
Advanced design tools for developing software
Formal specifications in software; Programming mechanisms (real-time, multi-threads, etc.); Programming techniques (feature-oriented, aspects-oriented, generative programming, agents-oriented, contextual-oriented, incremental, stratified, etc.); Requirement specification languages; Programming languages; Automation of software design and implementation; Software design with highly distributed resources (GRID); Web service based software; Scenario-based model synthesis; Merging partial behavioral models; Partial goal/requirement satisfaction
Advanced facilities for accessing software
Information modeling; GUI related software; Computer-aided software design; Hierarchical APIs; APIs roles in software development; Ontology support for Web Services; Rapid prototyping tools; Embedded software quality; Thread modeling; Flexible Objects; Use cases; Visual Modeling
Software performance
Software performance modeling; Software performance engineering (UML diagrams, Process algebra, Petri nets, etc.); Software performance requirements; Performance forecast for specific applications; Performance testing; Web-service based software performance; Performance of rule-based software; Methods for performance improvements; Software performance experience reports; Program failures experiences; Error ranking via correlation; Empirical evaluation of defects
Software security, privacy, safeness
Security requirements, design, and engineering; Software safety and security; Security, privacy and safeness in software; Software vulnerabilities; Assessing risks in software; Software for online banking and transactions; Software trace analysis; Software uncertainties; Dynamic detection of likely invariants; Human trust in interactive software; Memory safety; Safety software reuse; High confidence software; Trusted computing; Next generation secure computing
Advances in software testing
Formal approaches for test specifications; Advanced testing methodologies; Static and dynamic analysis; Strategies for testing nondeterministic systems; Testing software releases; Generating tests suites; Evolutionary testing of embedded systems; Algorithmic testing; Exhaustive testing; Black-box testing; Testing at the design level; Testing reactive software; Empirical evaluation
Specialized software advanced applications
Database related software; Software for disaster recovery applications; Software for mobile vehicles; Biomedical-related software; Biometrics related software; Mission critical software; Real-time software; E-health related software; Military software; Crisis-situation software; Software for Bluetooth and mobile phones; Multimedia software applications
Open source software
Open source software (OSS) methodologies; OSS development and debugging; Security in OSS; Performance of OSS; OSS roles and responsibilities; OSS incremental development; Division of labor and coordination mechanisms; Distribution of decision-making; Operational boundaries; Experience reports and lessons learned; Versioning management; Towards generalizing the OSS methodologies and practices; Open source licensing; Industrial movement towards open source
Agile software techniques
Agile software methodologies and practices (extreme programming, scrum, feature-driven, etc.); Agile modeling (serial in the large, iterative in the small); Agile model driven design; Agile methodologies for embedded software; Software metrics for agile projects; Lifecycle for agile software development; Agile user experience design; Agility via program automation; Testing into an agile environment; Agile project planning; Agile unified process
Software deployment and maintenance
Software in small and large organizations; Deploying and maintaining open source software; Software maintenance; Software assurance; Patching; Run-time vulnerability checking; Software rejuvenation; Software updates; Partial or temporary feature deprecation; Multi-point software deployment and configuration; On-line software updates
Software engineering techniques, metrics, and formalisms
Software reuse; Software quality metrics (complexity, empiric metrics, etc.); Software re-engineering (reverse engineering); Software composition; Software integration; Consistency checking; Real-time software development; Temporal specification; Model checking; Theorem provers; Modular reasoning; Petri Nets; Formalisms for behavior specification; Advanced techniques for autonomic components and systems
Business technology
Enterprise Content Managements (ECMs); Business Intelligence (BI); Enterprise Portals; Business Process Management (BPM); Corporate Performance Management (CPM); Enterprise Data Warehouse; Web Publishing; Cloud Computing; Virtualisation; Data Mining; Workflows; Business Rules Management (BRM); Data Capturing
Software economics, adoption, and education
Patenting software; Software licensing; Software economics; Software engineering education; Academic and industrial views on software adoption and education; Good-to-great in software adoption and improvement; Software knowledge management
Improving productivity in research on software engineering
Developing frameworks to support research; Methods and tools to improving the research environment; Supporting domain specific research needs; Teaching research skills in Computer Science; Experience reports on well developed research processes; Experience reports on empirical approaches to software engineering research; Approaches to supporting higher degree students in their research; Approaches to enlarge the research / teaching nexus to improve academics productivity; Approaches to integration between university research and industry research; Tools to support the research process
Committee: http://www.iaria.org/conferences2013/ComICSEA13.html
================================================
To stop receiving notices about ICSEA, please reply with "DROP ICSEA gustaf.neumann(a)wu-wien.ac.at" in the subject field.
To receive notices about specific topics only, please reply with "TOPIC CHANGE gustaf.neumann(a)wu-wien.ac.at" in the subject field, and the specific topics in the email body.
To stop receiving any notice, please reply with "UNSUBSCRIBE gustaf.neumann(a)wu-wien.ac.at" in the subject field.
-------- Original Message --------
Subject: [WI] CFP: 2nd Workshop on Security in Business
Processes
Date: Wed, 10 Apr 2013 00:32:49 +0200
From: Rafael Accorsi <rafael.accorsi(a)iig.uni-freiburg.de>
To: dbworld(a)cs.wisc.edu, wi(a)aifb.uni-karlsruhe.de,
safe-nl(a)science.ru.nl, aisworld(a)lists.aisnet.org,
fbsec(a)gi-fb-sicherheit.de, security(a)fosad.org,
dbsec(a)freelists.org, petrinet(a)informatik.uni-hamburg.de
CC: Rafael Accorsi <rafael.accorsi(a)iig.uni-freiburg.de>
================================================================
*CALL FOR PAPERS*
SBP'13: 2nd Workshop on Security in Business Processes
<http://www.inf.unibz.it/sbp13/>
<http://bit.ly/SBP-Flyer>
in conjunction with the
11th Int'l Conference on Business Process Management
August 26-30, Beijing, China
<http://bpm2013.tsinghua.edu.cn/>
================================================================
Following the successful events in 2012 (EMISA journal report at
<http://bit.ly/SBP-report>) and 2011, the 2nd Workshop on Security in
Business Processes (SBP'13) brings together researchers and
practitioners working in security management of business process in
process-aware information systems.
SBP'13 encourages innovative methods for business process security audit
and control along the entire business process life-cycle: from design
time verification to online operational support and post-mortem
analysis. Furthermore, it welcomes contributions beyond the strictly
technical character, e.g. on economic, legal and standardization issues.
*Keynotes*
Academic: Hejiao Huang (HIT Shenzhen Grad. School, China)
Industry: in arrangement
*TOPICS of INTEREST*
SBP13 addresses topics related to security/compliance audit and control
and business processes, including:
Alignment Information flow control
Authorization Log formats
Accountability Meta-models for analysis
Audit reduction Operational decision support
Business provenance Privacy-aware process discovery
Case studies Requirements elicitation
Conformance checking Requirements formalization
Compliance checking Risk analysis and measurement
Continuous audit Runtime verification/monitoring
Cost-benefit analysis Security testing
Data-aware process mining Trace clustering
Formal reasoning Usage control
Fraud detection Workflow forensics
Economics of audit Workflow simulation
Experience reports
*SUBMISSION INSTRUCTIONS*
Submitted manuscripts must be written in English and be no longer than
12 pages. They must be formatted using the LNCS format
<http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0>.
Submissions will be reviewed by at least three PC members based on their
originality, significance, technical soundness and clarity of
exposition. The workshop papers will be published by Springer as a
post-workshop proceedings volume in the series Lecture Notes in Business
Information Processing (LNBIP). The submission website is at
<https://www.easychair.org/conferences/?conf=sbpw13>
*IMPORTANT DATES*
Paper submission: May 25th, 2013
Paper notification: June 25th, 2013
Camera-ready version: July 23rd, 2013
Workshop: August 26th, 2013
*ORGANIZERS*
Wil van der Aalst, Eindhoven University of Technology, the Netherlands
Rafael Accorsi, University of Freiburg, Germany
Raimundas Matulevicius, University of Tartu, Estonia
*PROGRAM COMMITTEE*
Anne Baumgrass, HPI, Germany
Achim Brucker, SAP AG, Germany
Benoit Depaire, Hasselt University, Belgium
Jason Crampton, University of London, UK
Khaled Gaaloul, CRP Henri Tudor, Luxembourg
Aditya Ghose, University of Wollongong, Australia
Hejiao Huang, Shenzhen Graduate School, China
Michael Huth, Imperial College, UK
Fuyuki Ishikawa, National Institute of Informatics, Japan
Jan Jürjens, Technical University of Dortmund, Germany
Dimka Karastoyanova, University of Stuttgart, Germany
Günter Karjoth, IBM Research, China
Peter Karpati, Institute for Energy Technology, Norway
Seok-Won Lee, Ajou University, Korea
Lin Liu, Tsinghua University, China
Heiko Ludwig, IBM Almaden Research Center, USA
Nicolas Mayer, CRP Henri Tudor, Luxembourg
Per H. Meland, SINTEF, Norway
Marko Montali, Free University of Bozen-Bolzano, Italy
Haralambos Mouratidis, University of East London, UK
Andreas Opdahl, University of Bergen, Norway
Günther Pernul, University of Regensburg, Germany
Silvio Ranise, Fundazione Bruno Kessler, Italy
Stefanie Rinderle-Ma, University of Vienna, Austria
David G. Rosado, University of Castilla-La Mancha, Spain
Shazia Sadiq, University of Queensland, Australia
Guttorm Sindre, Norwegian University of Science and Technology, Norway
Mark Strembeck, Vienna University of Economics and Business, Austria
Jan M. van der Werf, Technical University of Eindhoven, the Netherlands
Nicola Zannone, Technical University of Eindhoven, the Netherlands
--
Dr. Rafael Accorsi
http://www.informatik.uni-freiburg.de/~accorsihttp://bpsec.telematik.uni-freiburg.de/
--
Mailing-Liste: wi(a)aifb.uni-karlsruhe.de
Administrator: wi-request(a)lists.uni-karlsruhe.de
Konfiguration: https://www.lists.uni-karlsruhe.de/sympa/info/wi
-------- Original Message --------
Subject: [AISWorld] CFP: 2nd Workshop on Security in
Business Processes
Date: Wed, 10 Apr 2013 00:32:49 +0200
From: Rafael Accorsi <rafael.accorsi(a)iig.uni-freiburg.de>
To: dbworld(a)cs.wisc.edu, wi(a)aifb.uni-karlsruhe.de,
safe-nl(a)science.ru.nl, aisworld(a)lists.aisnet.org,
fbsec(a)gi-fb-sicherheit.de, security(a)fosad.org,
dbsec(a)freelists.org, petrinet(a)informatik.uni-hamburg.de
CC: Rafael Accorsi <rafael.accorsi(a)iig.uni-freiburg.de>
================================================================
*CALL FOR PAPERS*
SBP'13: 2nd Workshop on Security in Business Processes
<http://www.inf.unibz.it/sbp13/>
<http://bit.ly/SBP-Flyer>
in conjunction with the
11th Int'l Conference on Business Process Management
August 26-30, Beijing, China
<http://bpm2013.tsinghua.edu.cn/>
================================================================
Following the successful events in 2012 (EMISA journal report at
<http://bit.ly/SBP-report>) and 2011, the 2nd Workshop on Security in
Business Processes (SBP'13) brings together researchers and
practitioners working in security management of business process in
process-aware information systems.
SBP'13 encourages innovative methods for business process security audit
and control along the entire business process life-cycle: from design
time verification to online operational support and post-mortem
analysis. Furthermore, it welcomes contributions beyond the strictly
technical character, e.g. on economic, legal and standardization issues.
*Keynotes*
Academic: Hejiao Huang (HIT Shenzhen Grad. School, China)
Industry: in arrangement
*TOPICS of INTEREST*
SBP13 addresses topics related to security/compliance audit and control
and business processes, including:
Alignment Information flow control
Authorization Log formats
Accountability Meta-models for analysis
Audit reduction Operational decision support
Business provenance Privacy-aware process discovery
Case studies Requirements elicitation
Conformance checking Requirements formalization
Compliance checking Risk analysis and measurement
Continuous audit Runtime verification/monitoring
Cost-benefit analysis Security testing
Data-aware process mining Trace clustering
Formal reasoning Usage control
Fraud detection Workflow forensics
Economics of audit Workflow simulation
Experience reports
*SUBMISSION INSTRUCTIONS*
Submitted manuscripts must be written in English and be no longer than
12 pages. They must be formatted using the LNCS format
<http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0>.
Submissions will be reviewed by at least three PC members based on their
originality, significance, technical soundness and clarity of
exposition. The workshop papers will be published by Springer as a
post-workshop proceedings volume in the series Lecture Notes in Business
Information Processing (LNBIP). The submission website is at
<https://www.easychair.org/conferences/?conf=sbpw13>
*IMPORTANT DATES*
Paper submission: May 25th, 2013
Paper notification: June 25th, 2013
Camera-ready version: July 23rd, 2013
Workshop: August 26th, 2013
*ORGANIZERS*
Wil van der Aalst, Eindhoven University of Technology, the Netherlands
Rafael Accorsi, University of Freiburg, Germany
Raimundas Matulevicius, University of Tartu, Estonia
*PROGRAM COMMITTEE*
Anne Baumgrass, HPI, Germany
Achim Brucker, SAP AG, Germany
Benoit Depaire, Hasselt University, Belgium
Jason Crampton, University of London, UK
Khaled Gaaloul, CRP Henri Tudor, Luxembourg
Aditya Ghose, University of Wollongong, Australia
Hejiao Huang, Shenzhen Graduate School, China
Michael Huth, Imperial College, UK
Fuyuki Ishikawa, National Institute of Informatics, Japan
Jan Jürjens, Technical University of Dortmund, Germany
Dimka Karastoyanova, University of Stuttgart, Germany
Günter Karjoth, IBM Research, China
Peter Karpati, Institute for Energy Technology, Norway
Seok-Won Lee, Ajou University, Korea
Lin Liu, Tsinghua University, China
Heiko Ludwig, IBM Almaden Research Center, USA
Nicolas Mayer, CRP Henri Tudor, Luxembourg
Per H. Meland, SINTEF, Norway
Marko Montali, Free University of Bozen-Bolzano, Italy
Haralambos Mouratidis, University of East London, UK
Andreas Opdahl, University of Bergen, Norway
Günther Pernul, University of Regensburg, Germany
Silvio Ranise, Fundazione Bruno Kessler, Italy
Stefanie Rinderle-Ma, University of Vienna, Austria
David G. Rosado, University of Castilla-La Mancha, Spain
Shazia Sadiq, University of Queensland, Australia
Guttorm Sindre, Norwegian University of Science and Technology, Norway
Mark Strembeck, Vienna University of Economics and Business, Austria
Jan M. van der Werf, Technical University of Eindhoven, the Netherlands
Nicola Zannone, Technical University of Eindhoven, the Netherlands
--
Dr. Rafael Accorsi
http://www.informatik.uni-freiburg.de/~accorsihttp://bpsec.telematik.uni-freiburg.de/
_______________________________________________
AISWorld mailing list
AISWorld(a)lists.aisnet.org