-------- Original-Nachricht --------
Betreff: CALL FOR POSITION PAPERS: ICEIS 2015 - Int'l Conf. on
Enterprise Information Systems (Barcelona/Spain)
Datum: Thu, 04 Dec 2014 19:00:57 +0000 (UTC)
Von: ICEIS Secretariat <iceis.secretariat(a)insticc.org>
Antwort an: iceis.secretariat(a)insticc.org
An: gustaf.neumann(a)wu-wien.ac.at
Dear Gustaf Neumann,
Let me kindly inform you that the 17th International Conference on Enterprise Information Systems (ICEIS 2015 - http://www.iceis.org), to be held in Barcelona, Spain (April 27 - 30, 2015) is now welcoming the submission of position papers whose deadline is scheduled for next January 9.
A position paper presents an arguable opinion about an issue. The goal of a position paper is to convince the audience that your opinion is valid and worth listening to, without the need to present completed research work and/or validated results. It is, nevertheless, important to support your argument with evidence to ensure the validity of your claims. A position paper may be a short report and discussion of ideas, facts, situations, methods, procedures or results of scientific research (bibliographic, experimental, theoretical, or other) focused on one of the conference topics.
Please check further details about position papers submission at the conference website (http://www.iceis.org/GuidelinesTemplates.aspx).
The conference will be sponsored by the Institute for Systems and Technologies of Information, Control and Communication (INSTICC), held in cooperation with the IEICE Special Interest Group on Software Interprise Modelling (SWIM), Spanish Association of Artificial Intelligence (AEPIA), Association for the Advancement of Artificial Intelligence (AAAI), ACM Special Interest Group on Management Information Systems (ACM SIGMIS) and ACM Special Interest Group on Artificial Intelligence (ACM SIGAI) and in collaboration with the Informatics Research Center (IRC). INSTICC is Member of the Object Management Group (OMG) and Workflow Management Coalition (WfMC). Logistics Partner the Science and Technology Events (SCITEVENTS).
ICEIS is interested in promoting high quality research as it can be confirmed by last year acceptance rates, where from 313 submissions, 15% were presented as full papers.
Submitted papers will be subject to a double-blind review process. All accepted papers will be published in the conference proceedings, under an ISBN reference, on paper and on CD-ROM support.
The proceedings will be submitted for indexation by Thomson Reuters Conference Proceedings Citation Index (ISI), INSPEC, DBLP, EI (Elsevier Index) and Scopus.
All papers presented at the conference venue will be available at the SCITEPRESS Digital Library (http://www.scitepress.org/DigitalLibrary/). SCITEPRESS is a member of CrossRef (http://www.crossref.org/).
We also would like to highlight the possibility to submit to the following Workshop, whose deadline is scheduled for February 3, 2015:
- 12th International Workshop on Security in Information Systems (WOSIS) - http://www.iceis.org/WOSIS.aspx
A Doctoral Consortium on Enterprise Information Systems will take place in conjunction with ICEIS and aims to provide an opportunity for graduate students to explore their research interests in an interdisciplinary workshop, under the guidance of a panel of distinguished experts in the field (http://www.iceis.org/DoctoralConsortium.aspx).
Workshops, Special sessions, Tutorials as well as Demonstrations dedicated to other technical/scientific topics are also envisaged: companies interested in presenting their products/methodologies or researchers interested in holding a tutorial are invited to contact the conference secretariat. Workshop chairs and Special Session chairs will benefit from logistics support and other types of support, including secretariat and financial support, to facilitate the development of a valid idea.
The conference program features a number of Keynote Lectures to be delivered by distinguished world-class researchers, including those listed below.
Please check further details at the ICEIS conference website (http://www.iceis.org).
Should you have any question please don't hesitate contacting me.
ICEIS 2015 will be held in conjunction with ENASE 2015 (www.enase.org) and GISTAM 2015 (www.gistam.org) in Barcelona, Spain. Registration to ICEIS will enable free attendance to any sessions of the co-located conferences as a non-speaker.
Kind regards,
Vitor Pedrosa
ICEIS Secretariat
Av. D. Manuel I, 27A 2.Esq.
2910-595 Setubal, Portugal
Tel.: +351 265 520 184
Fax: +44 203 014 8813
Email: iceis.secretariat(a)insticc.org
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
CALL FOR PAPERS
17th International Conference on Enterprise Information Systems
ICEIS website: http://www.iceis.org
April 27 - 30, 2015
Barcelona, Spain
In Cooperation with: IEICE/SWIM, AEPIA, AAAI, ACM SIGMIS and ACM SIGAI
In Collaboration with: IRC
Sponsored by: INSTICC
INSTICC is Member of: OMG and WfMC
Logistics Partner: SCITEVENTS
IMPORTANT DATES:
Position Paper Submission: January 9, 2015
Authors Notification (position papers): February 16, 2015
Final Position Paper Submission and Registration: March 2, 2015
CONFERENCE CO-CHAIRS:
Olivier Camp, MODESTE/ESEO, France
Jose Cordeiro, Polytechnic Institute of Setubal / INSTICC, Portugal
PROGRAM CO-CHAIRS:
Slimane Hammoudi, ESEO, MODESTE, France
Leszek Maciaszek, Wroclaw University of Economics, Poland and Macquarie University, Sydney, Australia
Ernest Teniente, Polytechnic University of Catalonia, Spain
PROGRAM COMMITTEE:
Please check the program committee members at http://www.iceis.org/ProgramCommittee.aspx
KEYNOTE SPEAKERS:
George Giaglis, Athens University of Economics and Business, Greece
Witold Staniszkis, Rodan Development, Poland
Martin Mocker, MIT, USA and Reutlingen University, Germany
Francesco Bonchi, Yahoo Labs, Spain
WORKSHOP:
- 12th International Workshop on Security in Information Systems - WOSIS 2015
http://www.iceis.org/WOSIS.aspx
CONFERENCE AREAS:
Area 1: Databases and Information Systems Integration
- Coupling and Integrating Heterogeneous Data Sources
- Legacy Systems
- Organisational Issues on Systems Integration
- Mobile Databases
- Enterprise Resource Planning
- Middleware Integration
- Object-Oriented Database Systems
- Data Mining
- Data Warehouses and OLAP
- Performance Evaluation and Benchmarking
- Large Scale Databases
- Non-relational Databases
- Query Languages and Query Processing
- Distributed Database Systems
Area 2: Artificial Intelligence and Decision Support Systems
- Evolutionary Programming
- Group Decision Support Systems
- Industrial Applications of Artificial Intelligence
- Strategic Decision Support Systems
- Advanced Applications of Neural Network
- Applications of Expert Systems
- Advanced Applications of Fuzzy Logic
- Intelligent Agents
- Case-Based Reasoning Systems
- Multi-Agent Systems
- Scheduling and Planning
- Operational Research
- Problem Solving
- Game Theory Applications
- Intelligent Transportation System
- Natural Language Interfaces and Systems
Area 3: Information Systems Analysis and Specification
- Software Engineering
- Knowledge Management
- Modelling of Distributed Systems
- Ontology Engineering
- Security
- Simulation
- Requirements Analysis and Management
- Tools, Techniques and Methodologies for System Development
- Model Driven Architectures and Engineering
- Modelling Formalisms, Languages, and Notations (e.g. UML, ER variants)
- Organisational Learning
- Project Management
- Semiotics in Information Systems
- Software Metrics and Measurement
Area 4: Software Agents and Internet Computing
- Wireless and Mobile Computing
- E-Learning and E-Teaching
- Ubiquitous Computing
- Virtual Enterprises
- Interoperability
- Web Services
- Web 2.0 and Social Networking
- Internet Agents
- Collaborative Computing
- Electronic Commerce
- Internet Portals
- Profiling and Recommendation Systems
- Internet of Things
- Internet Systems Performance
- Semantic Web Technologies and Applications
Area 5: Human-Computer Interaction
- HCI on Enterprise Information Systems
- Human Factors
- Multimedia Systems
- Virtual Reality and Augmented Reality
- Geographical Information Systems
- Guidelines, Principles, Patterns and Standards
- Adaptive and Adaptable User Interfaces
- Interaction Techniques and Devices
- Interface Design
- Ergonomics
- Emotional and Affective Computing
- Haptic Interfaces
- Accessibility and Usability
- Collaborative and Social Interaction
- Multiple Sensory Devices
Area 6: Enterprise Architecture
- Enterprise Engineering
- Models and Frameworks
- Enterprise Knowledge Engineering and Management
- Business Modelling and Business Process Management
- Business-IT Allignment
- EA Adoption and Governance
- EA and Organizational Theory and System Development
- EA and Service Oriented Architecture (SOA)
- Methods, Processes and Patterns for EA Development
- Measurements, Metrics and Evaluation of EA Artefacts and Processes
- Architectures and Design Principles for Enterprise Repositories
- Maturity Models for EA Artefacts and Processes
- Evolution of EA
- Objective Control in EA
------------------------------------------------------------------------------------------
To unsubscribe please click here ( http://email.insticc.org/wf/unsubscribe?upn=9jORrjH8ndg6sPzuPt6yR0NcWpzNR2-… )
-------- Original-Nachricht --------
Betreff: [WI] Final Call for Paper - ACM SIGMIS Computers and People
Research 2015
Datum: Thu, 04 Dec 2014 10:48:32 +0100
Von: Andreas Eckhardt <eckhardt(a)wiwi.uni-frankfurt.de>
Antwort an: Andreas Eckhardt <eckhardt(a)wiwi.uni-frankfurt.de>
An: wi(a)lists.uni-karlsruhe.de
Full Call for Paper http://sigmis.org/ACM_SIGMIS_CPR_Call2015.pdf
<http://sigmis.org/ACM_SIGMIS_CPR_Call2015.pdf>
ACM SIGMIS Computers and People Research 2015
Cyber Security Workforce in the Global Context
Conference Location: Newport Beach, California USA
Conference Dates: June 4-6, 2015
*Important Dates*
Paper Submissions: _*December 19, 2014*_
Notification of Acceptance: February 20, 2015
Camera-ready Papers: March 29, 2015
Submissions website:https://easychair.org/conferences/?conf=acmsigmiscpr2015
*Conference Theme*
The theme of this conference is timely given the global demand for a
cybersecurity workforce of sufficient scope and capability to meet
ever-growing cybersecurity threats.
The 2013 (ISC) Global Information Security Workforce Study revealed that
even with double-digit growth in recent years, and significant
investments in the development of the cybersecurity workforce from
national governments and other stakeholders across the globe, the demand
for cybersecurity professionals still significantly outpaces the supply.
Security professionals are critical to the successful implementation of
strategic cybersecurity initiatives, technical cybersecurity products,
and security awareness programs. Accordingly, the vitality of the
cybersecurity workforce, and the vulnerability to our networked
infrastructure and data stores posed by a shortage of qualified
professionals, is an urgent priority facing the global economy. The
National Association of State Chief Information Officers (NASCIO) in the
United States ranked security as the number one strategic management
priority in 2014. This concern is shared by individuals, organizations,
and national state governments alike. The increasingly complex global
environment in which cybersecurity professionals must operate includes
rapid advancements in technology artifacts (e.g., mobile devices) and
evolving infrastructures (e.g., cloud computing, social media) that
support changes in user behavior.
As the (ISC) report indicates, these professionals must manage a dynamic
set of risks while defending networked assets from attack by hackers,
insider threats, and unknown adversaries. Often, managing risks means
balancing security and privacy concerns. The recent revelations by
Edward Snowden, an IT contractor working for the United States National
Security Agency, highlight this tension between security and privacy.
Important questions for "computers and people" researchers (CPR)
include: how are cybersecurity professionals managing this tension? are
they adequately prepared to do so? are future members of the
cybersecurity workforce being adequately prepared to take on the privacy
and security challenges of tomorrow? Answers to these questions are
being considered through efforts such as the 2013 United States National
Research Council investigation of professionalization in building the
cybersecurity workforce. It seeks to shed light on which
professionalization activities (e.g., certification, licensure, codes of
ethics, continuing education requirements) might positively impact our
ability to create a workforce capable of addressing the emerging threat.
We believe that the "CPR" research community can also provide answers.
In addition to the cyber security topics listed hereunder, authors are
invited to submit work on topics related to Computers and People
traditionally presented at ACM SIGMIS CPR.
*List of Relevant Topics*
ACM SIGMIS CPR 2015 welcomes research and practice submissions that
address issues congruent with the conference theme and traditional
topics related to Security, Privacy and Cyber Security workforce. These
topics include, but are not limited to:
* Cyber security professionals (attraction, retention and development);
* Recruitment and retention in IT and IT security related majors;
* Workplace security policies: compliance implications for managers
and employees;
* Managers' beliefs and attitudes toward information privacy and security;
* IT personnel perspectives on IT and information security and privacy;
* Financial factors and returns on investment in IT security personnel;
* Making a business case for organizational investment in IT security
personnel;
* Staffing models for IT security personnel;
* Role of IT personnel in organizational response to data security
breaches;
* Employee monitoring, surveillance and privacy;
* Information security technologies, operations, controls and human
behavioral controls;
* Implications of privacy, security and confidentiality laws and
regulations on IT professionals;
* The role of IT personnel in workplace monitoring and surveillance;
* Education and preparation programs for Cybersecurity IT professionals;
* Personnel implications of cyber warfare, cyber-crimes, and cyber
terrorism;
* Knowledge, skills, and abilities required to become an IT security
professional in the coming decade;
* Challenges of maintenance and securing of electronic records in the
workplace;
* IT security personnel work satisfaction and turnover in the workplace;
* The impact of social media and open culture on confidentiality,
privacy and security;
* Diversity in cyber security workforce;
* Professionalization of the cyber security workforce
*Proceedings*
Accepted papers will be published by ACM in the refereed conference
proceedings which will be distributed at the conference. Full papers
will be published in their entirety. Extended abstracts will be
published for panel discussions and research-in-progress papers. All
presented papers will be considered for the Magid Igbaria Outstanding
Conference Paper of the Year Award. The Magid Igbaria Outstanding
Conference Paper and other exemplar papers will be invited for
publication in the DATA BASE for Advances in Information Systems -- the
quarterly journal publication of ACM SIGMIS.
Proceedings of all previous CPR conferences are available in the ACM
Digital Library athttp://portal.acm.org/dl.cfm.
*
Student Research Competition*
Students' posters and demo submissions will be entered into the ACM
Student Research Competition. Qualified entrants must have current ACM
student membership, have graduate or undergraduate student status at the
time of submission, and be the only student working on the project.
While not mandatory, entrants are encouraged to submit a letter from
their advisor describing the specific contributions made by the student.
High School, Undergraduate and Graduate students will be treated in
separate divisions (students starting their first year of graduate
school at the time of the conference will be considered as undergraduates).
Doctoral Consortium
A special doctoral consortium will take place on the day prior to the
conference. This doctoral consortium is targeted at students who are at
an early stage of their dissertation proposal-writing, and who are
conducting research on a computer personnel research (CPR) topic. The
purpose of the consortium is two-fold:
1. Provide feedback and guidance to students on their proposal while at
a stage where feedback can be considered for future dissertation
work and
2. Provide mentoring and networking opportunities to students who wish
to pursue careers as CPR researchers.
Doctoral students must be nominated to the consortium by a faculty
sponsor. Students nominated for the consortium should submit a 10-page
research proposal (including all text, figures, and references) to be
reviewed by a panel of highly qualified senior faculty mentors. The 3-5
students selected to participate in the doctoral consortium will receive
two rounds of written feedback on their proposal. At the conference,
each student will have 40-60 minutes to present their research ideas and
receive feedback in-person from six-to-eight experienced CPR researchers.
Conference Committee
*
Conference Co-Chairs*
Diana Burley, The George Washington University, USA (dburley(a)gwu.edu)
Indira Guzman, Trident University International, USA
(indira.guzman(a)trident.edu)
*
Program Co-Chairs*
Daniel P. Manson, California State Polytechnic University, USA
(dmanson(a)csupomona.edu)
Leigh Ellen Potter, Griffith University, Australia
(L.Potter(a)griffith.edu.au)
*
Local Arrangements Chair*
Conrad Shayo, Cal State San Bernardino, USA (cshayo(a)csusb.edu)
*
Treasurer*
Susan Yager, Southern Illinois University Edwardsville, USA
(syager(a)siue.edu)
*
Publicity Co-Chairs*
/Americas Region:/
Joon Park, Syracuse University, USA (jspark(a)syr.edu)
Conrad Shayo, Cal State San Bernardino, USA (cshayo(a)csusb.edu)
/European Region:/
Andreas Eckhardt, Goethe University Frankfurt, Germany
(eckhardt(a)wiwi.uni-frankfurt.de)
/Austral-Asia-Pacific Region:/
Rajendra Bandi, Indian Institute of Management Bangalore, India
(rbandi(a)iimb.ernet.in)
*
Doctoral Consortium Co-Chairs**
*Lorne Olfman, Claremont Graduate University, USA (Lorne.Olfman(a)cgu.edu)
Damien Joseph, Nanyang Technological University, Singapore
(adjoseph(a)ntu.edu.sg)
-------- Original-Nachricht --------
Betreff: [AISWorld] 14th European Conference on Cyber Warfare and
Security ECCWS-2015 - Final Call for Submissions
Datum: Thu, 4 Dec 2014 12:55:20 +0000
Von: Sue Nugus <sue(a)academic-conferences.org>
An: AISWorld <aisworld(a)lists.aisnet.org>, "BP Management List (E-mail)"
<BUSINESS-PROCESS-MANAGEMENT(a)JISCMAIL.AC.UK>, "Business Info List
(E-mail)" <BUSINESS-INFORMATION-ALL(a)JISCMAIL.AC.UK>, "Business Research
(E-mail)" <BUSINESS-RESEARCH(a)JISCMAIL.AC.UK>, Council of Professors
conference listserv <cphc-conf(a)Jiscmail.ac.uk>, "E-Business (E-mail)"
<E-BUSINESS(a)JISCMAIL.AC.UK>, "eThesis (E-mail)" <eThesis(a)topica.com>,
"Ifipwg82 (E-mail)" <ifipwg82(a)listserv.syr.edu>, IT Evaluation
<ITEVA(a)list.rug.nl>, "Qualitative Research (E-mail)"
<QUALITATIVE-RESEARCH(a)JISCMAIL.AC.UK>, "UKAIS (E-mail)"
<UKAIS-NOTICES(a)JISCMAIL.AC.UK>
Hello
*This is a Final call for papers for the **14th European Conference on
Cyber Warfare and Security ECCWS-2015, being hosted by The University of
Hertfordshire, Hatfield, UK on the 2-3 July 2015.*
This call will *close*on *11^th of December 2014.*
The increase in Web services and online operations for various
industries and critical businesses has led to an increase in different
threats and malicious activities. The security community have witnessed
a significant increase in security threats, violations and spread of
different types of malware. Recently, there has been an international
collaboration to confront a major cybercrime operation behind the spread
of GameoverZeus botnet which affected many individuals and businesses
worldwide. Therefore, critical industries must keep their operational
environment secure and resilient against constantly evolving cyber
threats. This is to maintain the safety of workers, industrial assets as
well as the communities they serve. Recent advances in the fields of
cyber security and technology development are a key factor in the growth
of security services and operations. The ECCWS 2015 Conference aims to
bring together researchers, practitioners and industrials that are
interested in various cyber security aspects. This Conference is
expected to attract people from the cyber security community to
stimulate interesting discussions about the latest development and
technologies.
For more information please go to:
http://academic-conferences.org/eccws/eccws2015/eccws15-call-papers.htm
*Academic research, case studies and work-in-progress/posters are
welcomed approaches. PhD Research, proposals for roundtable discussions,
non-academic contributions and product demonstrations based on the main
themes are also invited.**Please feel free to circulate this message to
any colleagues or contacts you think may be interested.*
In addition to the main conference topics, the advisory group invites
submissions to the following mini tracks:
* Strategic Communication and Social Media co-chaired by Military
Professors Aki-Mauri Huhtinen and Jari Rantapelkonen, Finland.
* Targeting Decision-makers and Defending Systems -- competitive
advantage from human factors chaired by Dr Mils Hills, Northampton
Business School, University of Northampton, UK.
Papers accepted for the conference will be published in the conference
proceedings, subject to author registration and payment.
Papers that have been presented at the Conference will be considered for
publication in
A special issue of both the Journal of Information Warfare:
http://www.jinfowar.com
The International Journal of Cyber Warfare and Terrorism (IJCWT)
<http://www.igi-global.com/journal/international-journal-cyber-warfare-terro…>
published by Information Resources Management Association, USA.( DOI:
10.4018/IJCWT, ISSN: 1947-3435, EISSN: 1947-3443).
The International Journal of Electronic Security and Digital Forensics
<http://www.inderscience.com/info/inarticletoc.php?jcode=ijesdf&year=2007&vo…>
published by Inderscience UK (ISSN:1751-1911X)P
*/The Proceedings have an ISSN, ISBN and will be submitted for indexing
in the Thompson Web of Science and Scopus and they are listed in the
EBSCO database./*
Follow the conference on LinkedIn
<http://www.linkedin.com/groups/European-International-Conferences-on-CyberW…>
Facebook
<http://www.facebook.com/pages/ICCWS-and-ECCWS-Conferences-on-Cyber-Warfare-…>
and Twitter <https://twitter.com/CWS_Confs>
**
Available from our Bookshop <http://www.academic-bookshop.com/>
Kind regards
Sue Nugus
Conferences Director
http://www.academic-conferences.org <http://111.academic-conferences.org/>
sue(a)academic-conferences.org <mailto:sue@academic-conferences.org>
Tel: +44 (0) 118 972 4148
Follow me on Twitter <https://twitter.com/#%21/suenugus>
Connect with me on LinkedIn <http://uk.linkedin.com/pub/sue-nugus/7/616/1b4>
________________________________________________________________________
This e-mail has been scanned for all viruses by Claranet. The
service is powered by MessageLabs. For more information on a proactive
anti-virus service working around the clock, around the globe, visit:
http://www.claranet.co.uk
________________________________________________________________________
-------- Original-Nachricht --------
Betreff: [AISWorld] 25th IBIMA Conference; 7-8 May 2015, Amsterdam,
Netherlands.
Datum: Thu, 4 Dec 2014 08:03:58 -0500
Von: Dr. Khalid S. Soliman <ksoliman(a)ibima.org>
An: <aisworld(a)lists.aisnet.org>
25th IBIMA Conference (Celebration Edition)
The 25th IBIMA Conference - May 7-8, 2015 Amsterdam, Netherlands
IBIMA International conference proceedings are indexed by Thomson Reuters
(Web of Sciences) Since 2006, SCOPUS Since 2005, and Ranked by the
prestigious Australian Research Council (ARC) Since 2010
Website: http://www.ibima.org
Sincerely,
Khalid S. Soliman
25th IBIMA Conference Chair
--------------
Dr. Khalid S. Soliman
International Business Information Management Association, USA
http://www.ibima.orghttp://www.ksoliman.com
_______________________________________________
AISWorld mailing list
AISWorld(a)lists.aisnet.org
-------- Original-Nachricht --------
Betreff: CALL FOR POSITION PAPERS: ENASE 2015 - Int'l Conf. on
Evaluation of Novel Software Approaches to Software Engineering
(Barcelona/Spain)
Datum: Thu, 04 Dec 2014 15:17:09 +0000 (UTC)
Von: ENASE Secretariat <enase.secretariat(a)insticc.org>
Antwort an: enase.secretariat(a)insticc.org
An: neumann(a)wu-wien.ac.at
Dear G. Neumann,
Let me kindly inform you that the 10th International Conference on Evaluation of Novel Software Approaches to Software Engineering (ENASE 2015 - http://www.enase.org), to be held in Barcelona, Spain (April 29 - 30, 2015) is now welcoming the submission of position papers whose deadline is scheduled for next January 9.
A position paper presents an arguable opinion about an issue. The goal of a position paper is to convince the audience that your opinion is valid and worth listening to, without the need to present completed research work and/or validated results. It is, nevertheless, important to support your argument with evidence to ensure the validity of your claims. A position paper may be a short report and discussion of ideas, facts, situations, methods, procedures or results of scientific research (bibliographic, experimental, theoretical, or other) focused on one of the conference topics.
Please check further details about position papers submission at the conference website (http://www.enase.org/GuidelinesTemplates.aspx).
The conference will be sponsored by the Institute for Systems and Technologies of Information, Control and Communication (INSTICC), held in cooperation with the ACM Special Interest Group on Applied Computing (ACM SIGAPP), ACM Special Interest Group on Management Information Systems (ACM SIGMIS) and ACM Special Interest Group on Software Engineering (ACM SIGSOFT) and technically co-sponsored by the IEEE Technical Council on Software Engineering (IEEE CS - TCSE). INSTICC is Member of the Object Management Group (OMG) and Workflow Management Coalition (WfMC). The Logistics Partner will be the Science and Technology Events (SCITEVENTS).
Submitted papers will be subject to a double-blind review process. All accepted papers will be published in the conference proceedings, under an ISBN reference, on paper and on CD-ROM support.
The proceedings will be submitted for indexation by Thomson Reuters Conference Proceedings Citation Index (ISI), INSPEC, DBLP, EI (Elsevier Index) and Scopus.
All papers presented at the conference venue will be available at the SCITEPRESS Digital Library (http://www.scitepress.org/DigitalLibrary/). SCITEPRESS is a member of CrossRef (http://www.crossref.org/).
We also would like to highlight the possibility to submit to the following Workshop, whose deadline is scheduled for February 3, 2015:
- Model-Driven Innovations for Software Engineering (MDI4SE) - http://www.enase.org/MDI4SE.aspx
Workshops, Special sessions, Tutorials as well as Demonstrations dedicated to other technical/scientific topics are also envisaged: companies interested in presenting their products/methodologies or researchers interested in holding a tutorial are invited to contact the conference secretariat. Workshop chairs and Special Session chairs will benefit from logistics support and other types of support, including secretariat and financial support, to facilitate the development of a valid idea.
The conference program features a number of Keynote Lectures to be delivered by distinguished world-class researchers, including those listed below.
Please check further details at the ENASE conference website (http://www.enase.org).
Should you have any question please don't hesitate contacting me.
ENASE 2015 will be held in conjunction with ICEIS 2015 (http://www.iceis.orfg) and GISTAM 2015 (http://www.gistam.org) in Barcelona, Spain. Registration to ENASE will enable free attendance to any sessions of ICEIS and GISTAM conferences as a non-speaker.
Kind regards,
Helder Coelhas
ENASE Secretariat
Av. D. Manuel I, 27A 2.Esq.
2910-595 Setubal, Portugal
Tel.: + 351 265 520 185
Fax: +44 203 014 8813
Email: enase.secretariat(a)insticc.org
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
CALL FOR PAPERS
10th International Conference on Evaluation of Novel Software Approaches to Software Engineering
ENASE website: http://www.enase.org
April 29 - 30, 2015
Barcelona, Spain
In Cooperation with: ACM SIGAPP, ACM SIGMIS and ACM SIGSOFT
Sponsored by: INSTICC
INSTICC is Member of: OMG and WfMC
Technically Co-sponsored by: IEEE CS - TCSE
Logistics Partner: SCITEVENTS
IMPORTANT DATES:
Position Paper Submission: January 9, 2015
Authors Notification (position papers): February 16, 2015
Final Position Paper Submission and Registration: March 2, 2015
CONFERENCE CHAIR:
Joaquim Filipe, Polytechnic Institute of Setubal / INSTICC, Portugal
PROGRAM CHAIR:
Leszek Maciaszek, Wroclaw University of Economics, Poland and Macquarie University, Sydney, Australia
PROGRAM COMMITTEE:
Please check the program committee members at http://www.enase.org/ProgramCommittee.aspx
KEYNOTE SPEAKERS:
George Giaglis, Athens University of Economics and Business, Greece
Witold Staniszkis, Rodan Development, Poland
Martin Mocker, MIT, USA and Reutlingen University, Germany
WORKSHOP:
- Model-Driven Innovations for Software Engineering - MDI4SE 2015
http://www.enase.org/MDI4SE.aspx
CONFERENCE AREAS:
Area 1: Service Science and Business Information Systems
- Value Chains and Co-Creation in Service Systems
- Service-Oriented Architectures (SOA)
- Semantic Web Services
- Delivery, Deployment and Maintenance of Service Systems
- Service Level Agreements (SLAs) and Quality of Service (QoS)
- Cost of Services (CoS) and Service Revenue Models
- Service-centric Business Models
- Enterprise Integration Strategies and Patterns
- Business Process Management and Engineering
- Business Process Mining
- e-Business Technologies and Interoperability
- Knowledge Management and Engineering
- Document and Workflow Management
- Collaborative Requirements and Processes
- Business Impacts and Business Models of Cloud Computing
- Governance, Risk and Compliance Management
- Software Ecosystems
Area 2: Software Engineering
- Software and Systems Development Methodologies
- Software Process Improvement
- User-centered Software Engineering
- Service-oriented Software Engineering
- Software Product Line Engineering
- Responsive Web Design (RWD)
- Big Data and Software Engineering
- Architectural Design and Frameworks
- Software Quality Management
- Software Change and Configuration Management
- System Complexity
- Design Thinking
- Requirements Engineering
- Application Integration Technologies
- Geographically Distributed Software Engineering
- Formal Methods
- Model-driven Engineering
- Agile, Aspect-oriented and Agent-oriented Software Engineering
- Meta Programming Systems and Meta Modeling
Area 3: Mobile Software and Systems
- Mobile Platforms
- Mobile Human-Computer Interfaces
- Mobile Applications and Services for Consumers
- Social Web Applications
- Innovative Mobile Applications for Enterprises
- Internet of Things and Wearable Computing
- Context-aware Technologies
- Configuration and Multi-tenancy in Mobile Systems
- Data Management for Service-Oriented Mobile Applications
- Mobile Security, Authorization and Privacy
- Mobile Cloud Computing
- Quality in Use and User Experience Evaluation
- Multidevice Testing and Verification
- Mobile Marketing and Payment
- Mobile Healthcare Support
- Mobile Ambient Assisted Living
- m-Learning
- Mobile Game Development
------------------------------------------------------------------------------------------
To unsubscribe please click here ( http://email.insticc.org/wf/unsubscribe?upn=5IZaTkpcLrohQwjbPbpX-2BRruarY2B… )
-------- Original-Nachricht --------
Betreff: [AISWorld] Third International Conference on E-Technologies
and Business on the Web (EBW2015) in Paris, France
Datum: Thu, 04 Dec 2014 00:26:42 -0700
Von: liezelle(a)sdiwc.info
An: aisworld(a)lists.aisnet.org
CALL FOR PAPERS AND PARTICIPATION
Submission Dates : Open until January 17, 2015
The Third International Conference on E-Technologies and Business on the
Web
http://bit.do/ebw2015
Sponsored by the The Society of Digital Information and Wireless
Communications, the chair of Digital Business and the Research Lab of
ESG Management School, The Third International Conference on
e-Technologies and Business on the Web (EBW2015) will be held at the ESG
MS, Paris, France on March 26-28, 2015. This year, the conference
focuses on interdisciplinary conference on digital business and consumer
behavior.
EBW2015 provides opportunities for the delegates to share the knowledge,
ideas, innovations and problem solving techniques that focuses on
Interdisciplinary conference on digital business and consumer behavior.
The conference welcomes papers on the following (but not limited to)
research topics:
Digital Data Mining
Digital Economy
Digital Enterprises
Digital Innovation Management
Digital Libraries
Digital Management Products
Digital Economics, and Digital Content
Distributed and Parallel Applications
E-Business
E-Business Applications and Software
E-Commerce Strategy Implementation
E-Commerce in Developing Countries
E-Communities
E-Learning
For more details and updates please visit the conference website at
http://bit.do/ebw2015.
_______________________________________________
AISWorld mailing list
AISWorld(a)lists.aisnet.org
-------- Original-Nachricht --------
Betreff: [computational.science] CfP: ANT 2015 - 6th International
Conference on Ambient Systems, Networks and Technologies
Datum: Wed, 3 Dec 2014 14:07:46 +0000
Von: Nils Masuch <Nils.Masuch(a)dai-labor.de>
An: Computational Science Mailing List
<computational.science(a)lists.iccsa.org>
-------------- Call for Papers ----------------------
The 6th International Conference on Ambient Systems, Networks and Technologies (ANT-2015)
in Conjunction with
The 5th International Conference on Sustainable Energy Information Technology (SEIT-15)
London, United Kingdom
June 2-5, 2015
Conference Website: http://cs-conferences.acadiau.ca/ant-15/
****************************************************************************
Important Dates
===========
- Paper Submission: January 10, 2015
- Students Symposium: March 1, 2015
- Acceptance Notification: March 1, 2015
- Camera-Ready Submission: April 1, 2015
All ANT-2015 accepted papers will be published by Elsevier Science in the open-access Procedia Computer Science series on-line. Procedia Computer Sciences is hosted on www.Elsevier.com<http://www.Elsevier.com> and on Elsevier content platform ScienceDirect (www.sciencedirect.com<http://www.sciencedirect.com>), and will be freely available worldwide. All papers in Procedia will be indexed by Scopus (www.scopus.com<http://www.scopus.com>) and by Thomson Reuters' Conference Proceeding Citation Index http://thomsonreuters.com/conference-proceedings-citation-index/. The papers will contain linked references, XML versions and citable DOI numbers. You will be able to provide a hyperlink to all delegates and direct your conference website visitors to your proceedings. All accepted papers will also be indexed in DBLP (http://dblp.uni-trier.de/).
Conference Tracks
==============
- Agent Systems, Intelligent Computing and Applications
- Automatic Networks and Communications
- Big Data and Analytics
- Cloud Computing
- Emerging Networking, Tracking and Sensing Technologies
- Internet of Things
- Mobile Networks, Protocols and Applications
- Modeling and Simulation in Transportation Sciences
- Multimedia and Social Computing
- Multimodal Interfaces
- Service Oriented Computing for Systems & Applications
- Smart Environments and Applications
- Systems Security and Privacy
- Systems Software Engineering
- Vehicular Networks and Applications
- General Track
COMMITTEES
=========
General Chairs
Atta Baddi, University of Reading, UK
Hossam Hassanein, Queen's University, Canada
Albert Zomaya, The University of Sydney, Australia
Program Chairs
Simon Poyser, Velocity RTD, UK
Ansar-Ul-Haque Yasar, IMOB Ð Hasselt University, Belgium
Advisory Committee
Reda Alhajj, University of Calgary, Canada
Abdelfettah Belghith, University of Manouba, Tunisia
Sajal K. Das, The University of Texas at Arlington, USA
Erol Gelenbe, Imperial College, UK
Ali Ghorbani, University of New Brunswick, Canada
Vincenzo Loia, University of Salerno, Italy
Ralf Steinmetz, Technische Universitaet Darmstadt, Germany
Timothy K. Shih, Tamkang University, Taiwan
Katia Sycara, Carnegie Mellon University, USA
Peter Thomas, Manifesto Research, Australia
Workshops Chair
Zahoor Khan, Dalhouise University, Canada
Program Vice Chairs
Nik Bessis, University of Derby, UK
Kechar Bouabdellah, Oran University, Algeria
Lars Braubach, Hamburg University, Germany
Xianghui Cao, Illinois Institute of Technology, USA
Kevin Curran, University of Ulster, UK
Vincenzo De Florio, University of Antwerp, Belgium
Amine Dhraief, Manouba University, Tunisia
Roberto Di Pietro, Roma Tre University of Rome, Italy
Davy Janssens, IMOB - Hasselt University, Belgium
Wilfried Lemahieu, KU Leuven, Belgium
Saroja Kanchi, Kettering University, USA
Lyes Khoukhi, University of Troy, France
Marco Lützenberger, DAI-Labor - TU Berlin, Germany
Haroon Malik, University of Waterloo, Canada
Dimiter Mulishev, iMinds - DistriNet - KU Leuven, Belgium
Manuele Kirsch Pinheiro, University of Paris 1, France
Michael Shen, University of Adelaide, Australia
Donghoon Shin, Arizona State University, USA
Monique Snoeck, KU Leuven, Belgium
Reiner Wichert, Fraunhofer-Institut for Computer Graphics IGD, Germany
International Journals Chair
Al-Sakib Khan Pathan, International Islamic University Malaysia, Malaysia
Publicity Chairs
Peng Hu, CMC Microsystems, Canada
Nadeem Javaid, COMSATS Institute of Information Technology, Pakistan
Nils Masuch, DAI-Labor - TU Berlin, Germany
Samir Ouchani, University of Luxembourg, Luxembourg
International Liaison Chairs
Soumaya Cherkaoui, Sherbrooke University, Canada
Paul Davidsson, Malmo University, Sweden
Nicolas Gaud, UTBM, France
Dino Pedreschi, University of Pisa, Italy
David Taniar, Monash University, Australia
Technical Program Committee
http://cs-conferences.acadiau.ca/ant-15/#programCommittees
Steering Committee Chair
Elhadi Shakshuki, Acadia University, Canada
-------- Original-Nachricht --------
Betreff: [AISWorld] CFP: 2015 IEEE ISI (IEEE International Conference
on Intelligence and Security Informatics)
Datum: Wed, 3 Dec 2014 09:34:45 -0500
Von: zhoul(a)umbc.edu
An: aisworld(a)lists.aisnet.org
CALL FOR PAPERS
IEEE International Conference on Intelligence and Security Informatics (ISI)
(http://ieee-isi.org/2015/call-for-papers/)
Over the past 12 years, the IEEE International ISI Conference has evolved
from its traditional orientation of intelligence and security domain
towards a more integrated alignment of multiple domains, including
technology, humans, organization, and security. The scientific community
has increasingly recognized the need to address intelligence and security
threats by understanding the interrelationships between these different
components, and by integrating recent advances from different domains. The
theme of this conference is Securing the World through an Alignment of
Technology, Intelligence, Humans and Organizations
We invite academic researchers in the field of Intelligence and Security
Informatics and related areas as well as law enforcement and intelligence
experts, and industry consultants and practitioners in the fields to
submit papers and workshop proposals. In conjunction with ISI 2015,
several workshops will be held on May 26.
CONFERENCE FOCUSED AREAS
? Data Science and Analytics in Security Informatics
? Security Infrastructure and Tools
? Human Behavior in the Security Applications
? Organizational, National, and International Issues in Counter-terrorism
or Security Protection
IMPORTANT DATES
? Deadline for paper submission: January 15, 2015
? Deadline for workshop proposals: January 18, 2015
? Notification of acceptance: March 15, 2015
? Camera Ready Copies: March 29, 2015
? Conference Dates: May 26-29, 2015
WORKSHOPS and TUTORIALS
In conjunction with ISI 2015, several workshops will be held on May 26,
2015. Special-topic workshops in any areas of Intelligence and Security
Informatics research and practice are welcome. Such events will be an
integral part of the ISI-2015 conference program. Proposals in PDF or
Microsoft Word not exceeding three pages should be emailed to the
conference organizing committee at zhangd(a)umbc.edu by January 18, 2015 and
contain the following information.
? Title of tutorial or workshop
? Preferred duration (half day vs. full day)
? Brief biographical sketches of proposed instructor(s)/organizer(s)
? Objectives to be achieved
? Scope of topics to be covered
? Target audience and the list of potential presenters/contributors
PUBLICATIONS
The accepted papers from ISI 2015 and its affiliated workshops will be
published by the IEEE Press in formal Proceedings. IEEE ISI Proceedings
are EI-indexed. Authors who wish to present a poster and/or demo may
submit a one-page extended abstract, which, if selected, will appear in
proceedings. The selected IEEE ISI 2015 best papers will be invited for
contribution to the Springer Security Informatics journal.
_______________________________________________
AISWorld mailing list
AISWorld(a)lists.aisnet.org
-------- Original-Nachricht --------
Betreff: [AISWorld] CFP: General Theories of Software Engineering
Datum: Tue, 2 Dec 2014 11:39:55 +1300
Von: Paul Ralph <paulralph(a)gmail.com>
An: aisworld(a)lists.aisnet.org
The 4th ICSE Workshop on General Theories of Software Engineering (GTSE
2015)
http://semat.org/?page_id=1364
Monday, May 18, 2015, Florence, ItalyÂ
In conjunction with the International Conference on Software Engineering
(ICSE 2015)
(http://2015.icse-conferences.org/)
Key Dates
Paper submission deadline: Â January 23, 2015Â
Paper acceptance notification: Â February 18, 2015
Camera-ready accepted paper deadline: Â February 27, 2015Â
Workshop: Â May 18, 2015
Workshop Overview
Most academic disciplines emphasize the importance of their core,
central or general theories. Examples of general theories include Big
Bang Theory, Maxwellâ??s equations, The Theory of the Cell, The Theory
of Evolution, Supply and Demand, Structuration Theory, The General
Theory of Crime, Pure Theory of Law and The Theory of Marriage. Software
engineering meanwhile, has not produced widely-accepted general
theories. Lack of theory undermines the perceived scientific legitimacy
of the field, curtails education and impedes development of a cumulative
body of knowledge. GTSE consequently supports attempts to propose,
synthesize, clarify and test core, central and general theories in the
software engineering domain. GTSE especially promotes attempts to answer
fundamental questions, integrate ideas from diverse sources and propose
revolutionary, contrarian and generally ambitious new theories.Â
Topics of interest include (but are not limited to):
New theories in software engineering
Groundbreaking extensions to existing theories
Groundbreaking synthesis of existing theories
Novel applications of theories from reference disciplines (e.g.
sociology) to software engineering
Grounded theory, ethnography and qualitative approaches to theory building
Systematic literature review and thematic synthesis, leading to new theory
Empirical evaluation of general theories
Software engineering process theories
Research methodologies for general theory evaluation
Addressing core questions for a general theory:
How can a general theory of software engineering be of practical use?
What core phenomena should it explain?
What questions should it address?
What should its main concepts be?
How are they related?
How should it be expressed?
How can it be tested?
How can it gain acceptance throughout both the academic community and
industry?
Contrarian perspectives on software engineering theory
Possible Contributions include (but are not limited to):
Theory proposals with conceptual evaluations
Theory building empirical field studies including grounded theory, case
studies and ethnography
Theory building, explorative lab studies, experiments and simulations
Empirical evaluations of general, central or core theories (any research
approach welcome)
Systematic literature reviews and thematic analyses
Conceptual contributions related to research methodology
Position papers on general theory topics
Submissions
We welcome full papers (up to 12 pages) and short papers (up to 4 pages)
to allow submissions of not only developed research but also early ideas
and position papers. The papers must follow ICSE technical papers
formatting guidelines:
http://2015.icse-conferences.org/submission-guidelines and they should
be submitted to the workshop's EasyChair site:
https://easychair.org/conferences/?conf=gtse2015. All papers will be
published in the ACM and IEEE Digital Libraries.
Organizing Committee
Paul Ralph, University of Auckland, New Zealand
Ivar Jacobson, Ivar Jacobson International, Switzerland
Gregor Engels, University of Paderborn, Germany
Michael Goedicke, paluno, University of Duisburg-Essen, Germany
Contact information
To contact the organizers, please email: gtse2015(a)easychair.org
<mailto:gtse2015@easychair.org>