-------- Forwarded Message --------
Subject: [AISWorld] IEEE COMPSAC 2019: Call for J1C2, Workshop, Fast
Abstract, Student Research Symposium Paper - Deadline: April 15, 2019
Date: Tue, 26 Feb 2019 00:23:52 +0000
From: Hossain Shahriar <hshahria(a)kennesaw.edu>
To: 'aisworld(a)lists.aisnet.org' <aisworld(a)lists.aisnet.org>
[Apologies if you receive multiple copies of this CFP]
*****CALL FOR PAPERS: J1C2, WORKSHOP, FAST ABSTRACT, STUDENT RESEARCH
SYMPOSIUM****
IEEE COMPSAC 2019
Hosted by Marquette University, Milwaukee, Wisconsin, USA
July 15-19, 2019
Data-Driven Intelligence for a Smarter World
CALL FOR PAPERS: J1C2, WORKSHOP, FAST ABSTRACT, STUDENT RESEARCH SYMPOSIUM
FOR FULL INFORMATION, PLEASE VISIT HTTPS://IEEECOMPSAC.COMPUTER.ORG/2019
COMPSAC is the IEEE Computer Society Signature Conference on Computers,
Software and Applications. It is a major international forum for academia,
industry, and government to discuss research results and advancements,
emerging challenges, and future trends in computer and software
technologies and applications. The theme of COMPSAC 2019 is Data-Driven
Intelligence for a Smarter World.
In the era of “big data” there is an unprecedented increase in the amount
of data collected in data warehouses. Extracting meaning and knowledge
from these data is crucial for governments and businesses to support their
strategic and tactical decision making. Furthermore, artificial
intelligence (AI) and machine learning (ML) makes it possible for
machines, processing large amounts of such data, to learn and execute
tasks never before accomplished. Advances in big data-related technologies
are increasing rapidly. For example, virtual assistants, smart cars, and
smart home devices in the emerging Internet of Things world, can, we
think, make our lives easier. But despite perceived benefits of these
technologies/methodologies, there are many challenges ahead. What will be
the social, cultural, and economic challenges arising from these
developments? What are the technical issue related, for example, to the
privacy and security of data used by AI/ML systems? How might humans
interact with, rely on, or even trust AI predictions or decisions
emanating from these technologies? How can we prevent such data-driven
intelligence from being used to make malicious decisions?
J1C2 PAPERS
submissions for J1C2 (Journal publication first, Conference presentation
following) are based only upon peer-reviewed final papers already accepted
for or published in an IEEE periodical after January, 2016. A submission
will consist of no more than 2-3 pages including 1) the title of the
paper, the names and affiliations of all authors, and the IEEE publication
in which the paper was published/accepted, 2) the date of
publication/acceptance with a link to the paper if already published, 3) a
copy of the final published or accepted paper and the final acceptance
letter from the periodical’s Editor-in-Chief, 4) a brief summary of the
key results and contributions of the published/accepted paper, and 5) up
to a 400-500 word description of new developments and/or future proposals
beyond those in the original paper, to be presented at the conference.
WORKSHOP PAPERS
COMPSAC 2019 offers 20+ workshops on topics related to computing,
software, and applications. For a full list of workshops, please visit
https://ieeecompsac.computer.org/2019/workshops/. Workshop papers are
limited to 6 pages. Paper templates are available on the website.
FAST ABSTRACTS
The Fast Abstract symposium seeks to bring together students, faculty and
researchers working in computer software, applications, and related
fields. FA papers should be a 2 page article presenting
(https://ieeecompsac.computer.org/2019/fast-abstract/), for example, new
ideas, work in progress, or opinions that address issues relevant to
computer software, applications and related fields.
STUDENT RESEARCH SYMPOSIUM
The Student Research Symposium provides a forum for both undergraduate and
graduate students to interact with other students, faculty mentors, and
industry practitioners. Submissions are a 4 page summary of their research
work, which is later presented as a poster at the symposium.
Authors are invited to submit original, unpublished research work, as well
as industrial practice reports. Simultaneous submission to other
publication venues is not permitted except as highlighted at the COMPSAC
2019 J1C2 & C1J2 page. All submissions must adhere to IEEE Publishing
Policies, and all will be vetted through the IEEE CrossCheck portal.
*****INFORMATION FOR AUTHORS*****
Authors are invited to submit original, unpublished research work, as well
as industrial practice reports. Simultaneous submission to other
publication venues is not permitted except as highlighted at the COMPSAC
2019 J1C2 & C1J2 webpage. In accordance with IEEE policy, submitted
manuscripts will be checked for plagiarism. Instances of alleged
misconduct will be handled according to the IEEE Publication Services and
Product Board Operations Manual.
Please note that in order to ensure the fairness of the review process,
COMPSAC follows the double-blind review procedure. Therefore we kindly ask
authors to remove their names, affiliations and contacts from the header
of their papers in the review version. Please also redact all references
to authors’ names, affiliations or prior works from the paper when
submitting papers for review. Once accepted, authors can then include
their names, affiliations and contacts in the camera-ready revision of the
paper, and put the references to their prior works back.
*****FORMATTING*****
Page limits are inclusive of tables, figures, appendices, and references.
Workshop Papers: 6 pages
Fast Abstracts: 2 pages
Student Research Symposium papers: 4 pages
Posters: 1 page
*****IMPORTANT DATES*****
April 15, 2019: Workshop papers due
May 1, 2019: Workshop papers notifications
May 17, 2019 – Camera ready submissions and advance author registration due
_______________________________________________
AISWorld mailing list
AISWorld(a)lists.aisnet.org
-------- Forwarded Message --------
Subject: [AISWorld] Call for Papers: AMCIS 2019: Mini-track: Problems
in Financial Information Technology (PFIT ’19)
Date: Mon, 25 Feb 2019 21:17:00 +0000
From: Templeton, Gary <GTempleton(a)business.msstate.edu>
To: aisworld(a)lists.aisnet.org <aisworld(a)lists.aisnet.org>
?
Track: Decision Sciences and Analytics (SIGDSA)
25th Americas Conference on Information Systems (AMCIS), Aug. 15-17, 2019
Cancun, Quintana Roo, MX
This mini-track solicits papers using methods to critically examine
issues hampering the emergence and understanding of financial
information technology (FIT) in research and practice. Authors are
encouraged to identify and investigate three specific problem areas in
finance that affect modern organizations: technology (“FinTech”),
analytics and messy data. What are the problems and solutions in these
areas? What can researchers do to move beyond the current state of
research and practice concerning these IS-relevant issues? In what ways
do specified problems impact important IS theories and streams, such as
the Productivity Paradox, IT Business Value, and Information Economics?
What are the pros and cons and comparative performance of any proposed
solutions? Such are the types of questions that may be explored in this
mini-track.
We are particularly interested in completed or emerging research
addressing the conference theme, New Frontiers in Digital Convergence.
Therefore, we hold at a premium papers advancing our understanding of
organizations engaged in digital convergence for value creation. In
particular, we are interested in information technology firms since they
engage in digital convergence out of competitive necessity.
We encourage thought provoking papers utilizing the wealth of archival
data (e.g., Compustat and CRPS) accessible by many in the IS research
community. We especially value thought provoking papers pushing known
boundaries of the three mentioned FIT themes (FinTech, analytics and
messy data) in order to improve IS practice. For these reasons, we are
interested in high quality papers that illuminates and addresses the
effects of the following issues (among others) on modern organizations:
FinTech
* Cryptocurrencies and blockchain technology
* Finance-Technology alignment
* Resistance to change
* Barriers to innovation
* Systems scalability
* FinTech Success
* Outsourcing FinTech
* Issues specific to FinTech Firms
* Compliance management
* FinTech application frontiers
Financial Analytics
* Workflows
* Queries
* Data storage
* Analytical efficiency and economics
* Analytical skills
* Data security and privacy
* User friendliness of big data
* Analytical procedures
Messy Financial Data
* non-normality
* missing data
* imputation
* inflated frequencies
* variables with low levels (i.e., binary)
* outliers
* negative denominators
* measurement bias
Mini-Track chairs
Gary Templeton, Mississippi State University gft4(a)msstate.edu
James Barth, Auburn University barthjr(a)auburn.edu
Brian Blank, Mississippi State University dblank(a)business.msstate.edu
Andrew Miller, Mississippi State University asm357(a)msstate.edu
Tom Miller, Mississippi State University twm75(a)msstate.edu
Submission Instructions:
https://amcis2019.aisconferences.org/submissions/call-for-papers/
Important Dates:
January 7, 2019: Manuscript submissions for AMCIS 2019 begin
March 1, 2019: AMCIS manuscript submissions closes for authors at
10:00am PST
March 7, 2019: All papers have assigned reviewers
April 24, 2019: Camera-ready papers are due
_______________________________________________
AISWorld mailing list
AISWorld(a)lists.aisnet.org
-------- Forwarded Message --------
Subject: [AISWorld] WISE 12 Call for Papers
Date: Mon, 25 Feb 2019 23:05:41 +0200
From: Lynette Drevin <Lynette.Drevin(a)nwu.ac.za>
CC: aisworld(a)lists.aisnet.org
Good day
You are invited to contribute to WISE 12 conference. Please share with
others that may be interested in this event. (Apologies for duplicate
e-mails).
Call for papers WISE 12 (2019)
The 12th World Conference on Information Security Education
25th to 27th June, 2019
Hosted by IFIP TC11 WG 11.8 (Information Security Education)
In conjunction with the 34th IFIP TC-11 SEC 2019 International
Conference on Information Security and Privacy Protection
Lisbon, Portugal
The IFIP Working Group 11.8 - Information Security Education will hold
the twelfth World Conference on Information Security Education (WISE 12)
in order to advance the state of computer security and information
assurance education throughout the world. To that end, we invite
practitioners, researchers, policy makers, and others from academia,
industry, and government to submit papers for presentation and topics
for working group discussions to WISE 12. We will organize the
conference around paper presentations and potential working group
topics. All presentations and discussions will be in English. WISE 12
will be held in conjunction with the 34th IFIP TC-11 SEC 2019
International Conference. See the IFIP WG11.8 web site
https://www.ifiptc11.org/wg118 for more information about WISE12 and the
34th IFIP SEC2019 website https://www.ifipsec.org/2019/ for more
information about IFIP SEC2019. The theme for WISE 12 is "Education in
Proactive Information Security". Important Dates
Full papers and working group abstracts: (February 25, 2019) Extension
March 11, 2019
Notification of acceptance: April 8, 2019
Camera-ready papers by authors: May 6, 2019
Conference: 25-27 June 2019 Paper submissions should follow the
guidelines for full paper submission using the template that can be
found at
https://www.springer.com/gp/computer-science/lncs/conference-proceedings-gu….
Papers are to be submitted through EasyChair at
https://easychair.org/my/conference.cgi?conf=wise120 . Acceptance of
papers will be based upon originality, contribution to the field, and
relevance to the conference. The conference proceedings will be
published under the IFIP Advances in Information and Communication
Technology Series by Springer (with ISBN and indexed in Scopus) and
distributed at the conference.
___________________________________________________________________________
Conference chair: Lynn Futcher, lynn.futcher(a)mandela.ac.za
Program chair: Lynette Drevin, lynette.drevin(a)nwu.ac.za
Publications chair: Marianthi Theocharidou,
Marianthi.THEOCHARIDOU(a)ec.europa.eu
Local/logistics chair: Natalia Miloslavskaya, NGMiloslavskaya(a)mephi.ru
Web chair: Erik Moore, eriklmoore(a)gmail.com
Conference Secretariat: Matt Bishop, mabishop(a)ucdavis.edu
_____________________________________________________________________________
Vrywaringsklousule / Disclaimer:
http://www.nwu.ac.za/it/gov-man/disclaimer.html
-------- Forwarded Message --------
Subject: [WI] CfP Track "Sustainable Mobility" at EnviroInfo2019
Date: Mon, 25 Feb 2019 20:25:40 +0100
From: Prof. Dr.-Ing. Benjamin Wagner vom Berg
<benjamin.wagnervomberg(a)hs-bremerhaven.de>
Reply-To: Prof. Dr.-Ing. Benjamin Wagner vom Berg
<benjamin.wagnervomberg(a)hs-bremerhaven.de>
To: 'Benjamin Wagner vom Berg' <bwagnervomberg(a)hs-bremerhaven.de>,
wi(a)lists.uni-karlsruhe.de, 'Enviroinfo Mailing'
<enviroinfo(a)leuphana.de>, ict4s-bounces(a)lists.ifi.uzh.ch,
ICT4S(a)lists.ifi.uzh.ch, stoffstrom-bounces(a)mailman.zfn.uni-bremen.de
*Apologies for Cross-Postings*
*Call for Papers for Special Track „Sustainable Mobility“*
*EnviroInfo 2019 – in cooperation with Informatik 2019 and KI 2019*
23th – 26th September 2019 at the University of Kassel, Germany
The EnviroInfo2019 will take place in Kassel
https://enviroinfo2019.org/
*Objectives of the track*
Sustainable mobility is one of the emerging topics of our time. On the
one hand mobility in the sense of moving persons and goods is one of the
central functions for a successful economy and a worth living society.
On the otherhand, transportation contributes the highest CO2 emissions
besides the energy sector and is connected to many other negative
effects in the ecological, economical and social dimension of
sustainability. However many recent activities in industry and research
as well as address sustainable mobility solutions that are
emission-free, socially responsible and economically long-lasting. ICT
solutions, in general, make mobility solutions more effective and can
help to reduce the negative effects of mobility.
**
*Topics of the track*
This track addresses especially ICT-based concepts and solutions for
more sustainable mobility in a wide-spread area of topics, e.g.:
-Transportation as a Service (TaaS) and Mobility as a Service (MaaS)
-Smart City and Urban mobility
-Mobility in rural regions
-Open, Smart and big data for traffic solutions
-Dynamic planning systems (tour, route, bundling) for more efficiency
-Smart travel planning and assistance
-Electric mobility including hydrogen-based power
-Sustainable transport and green logistics
-Sustainable labor conditions in logistics
-Car-Sharing, Ride-Sharing and Ride-Hailing Services
-Prosumer approaches in transportation (b2b and b2c)
-Autonomous Vehicles
-Use of Blockchain in transportation
-Disruption and business models in mobility and transportation
This track will give researchers a platform to present the actual
results of their work and to discuss it with the participants of the
conference.
**
*Organization*
Benjamin Wagner vom Berg, University OAS Bremerhaven,
benjamin.wagnervomberg(a)hs-bremerhaven.de
<mailto:benjamin.wagnervomberg@hs-bremerhaven.de>
Please contact the organizer in case you are not sure whether your
working topic is of interest for this workshop!
*Contributions*
_Full Research Papers_
26th April 2019 Submission deadline for Full Papers
24th May 2019 Notification of acceptance for Full Papers
14th June 2019 Submission of final versions for Full Papers
Accepted full papers will be published in the Springer book series
“Progress in IS”.
The Scope of Full Paper contributions is 10 – 15 pages
_Short Contributions / Work in Progress / Posters_
05th July 2019 Submission for Work in Progress / Short Contributions
26th July 2019 Notification of acceptance for Work in Progress / Short
Contributions and Poster
09th August 2019 Submission of final versions for Work in Progress /
Short Contributions and Poster
Accepted Work in Progress / Short Contributions and Posters will be
published as adjunct proceedings in the Shaker Umweltinformatik series.
The Scope for Work in Progress and Short Contributions is 4 – 8 pages.
Depending on your aims considering the publication of your work, we
invite you to send us your abstracts or full papers according to the
instructions and deadlines <https://enviroinfo2019.org/call-for-papers/>.
Kind regards
Benjamin Wagner vom Berg
------------
Prof. Dr.-Ing. Benjamin Wagner vom Berg
Professor for ICT in Transport and Logistics
University of Applied Science Bremerhaven
An der Karlstadt 8 - 27568 Bremerhaven - GERMANY
Building Z - Room 4020
Tel. + 49 471 4823 484
Mob. + 49 170 7642429
E-Mail: benjamin.wagnervomberg(a)hs-bremerhaven.de
<mailto:benjamin.wagnervomberg@hs-bremerhaven.de>
--
Mailing-Liste: wi(a)lists.kit.edu
Administrator: wi-request(a)lists.kit.edu
Konfiguration: https://www.lists.kit.edu/wws/info/wi
-------- Forwarded Message --------
Subject: [AISWorld] CfP: International Workshop on Very Large Internet
of Things @ VLDB 2019
Date: Mon, 25 Feb 2019 13:12:29 +0100
From: Sven Groppe <groppe(a)ifis.uni-luebeck.de>
To: aisworld(a)lists.aisnet.org
********************************************************************
CALL FOR PAPERS
International Workshop on Very Large Internet of Things (VLIoT 2019)
In conjunction with VLDB 2019
August 30, 2019, Los Angeles, USA
Submission: March 18, 2019
Web: http://www.ifis.uni-luebeck.de/~groppe/vliot
********************************************************************
** Aims of the Workshop **
An increasing number of real-world objects are becoming accessible and
manageable through the Internet. According to CISCO, the number of these
devices will reach 50 billion by 2020, forming a very large Internet of
Things (VLIoT). This massive number of "smart" objects will cooperate
with each other, have their own metadata, and may continuously produce
new data (in form of events, sensor data, or actuator states). Data
management will be a major challenge in the very large Internet of
Things. Hence, efficient IoT infrastructure and technologies must be
developed to handle masses of IoT data with high performance. This will
include: new techniques to filter and store relevant data; efficient
replication approaches for objects with constrained resources in order
to increase availability and durability; new protocols for voting about
decisions among objects; and smooth integration of heterogeneous objects.
The goal of this workshop is to bring together academic researchers and
industry practitioners working in the field of IoT and to allow them to
report and exchange their findings addressing these challenges. This
workshop also intends to discuss other closely-related technologies such
as Nanotechnology, Fog-, Edge-, and Dew-Computing for IoT. The ideas of
Fog, Edge and Dew Computing may indeed solve or attenuate the problems
of a very large Internet of Things (w.r.t. performance,
energy-efficiency, as well as security and privacy aspects).
** Types of Papers **
The workshop welcomes contributions describing original ideas, promising
new concepts, and practical experience. In particular, we solicit papers
of different types:
- Research Papers proposing new approaches, theories or techniques
related to Internet of Things, including new data structures,
algorithms, whole systems, and frameworks. They should make substantial
theoretical and empirical contributions to the research field.
- Experiments and Analysis Papers focusing on the experimental
evaluation of existing approaches including data structures and
algorithms for Internet of Things and bring new insights through the
analysis of these experiments. Results of experiments and analysis
papers can be, for example, showing benefits of well-known approaches in
new settings and environments, opening new research problems by
demonstrating unexpected behavior or phenomena, or comparing a set of
traditional approaches in an experimental survey.
- Application Papers reporting practical experiences on Internet of
Things applications. Application papers might describe specific
application domains in the IoT such as smart homes/offices/cities,
continuous health care, waste management, emergency response,
intelligent response, and Industry 4.0.
- Vision Papers identifying emerging or future research issues and
directions, and describing new research visions in the IoT area that may
have a great impact on our society.
** Topics of Interest **
We welcome papers on the following and other relevant topics:
- Semantic IoT
- Privacy-by-design and security-by-design in IoT
- System architectures for IoT, e.g.
- things-centric,
- data-centric,
- event-centric, and
- service-centric.
- IoT applications including:
- smart homes/offices/cities,
- waste management,
- health care,
- emergency response, and
- intelligent shopping.
- Nano Technology including:
- Nano Networks,
- Nano communication,
- Nano applications,
- Nano computing, and
- Internet of Nano Things.
- IoT programming toolkits and frameworks
- IoT prototypes and evaluation test-beds
- IoT data mining and analytics
- IoT management and interoperability
- Management of IoT streams
- Enabling technologies and standards for the IoT
- Spatial and temporal reasoning for IoT
- Sustainability of IoT platforms, e.g. business models for deployment
and maintenance
- Societal challenges and IoT, e.g. urban planning and decision making tools
- Ownership of data in IoT scenarios
- Fog, Edge and Dew Computing for IoT
- IoT benchmarks and performance measurement
- Indexing and search in IoT environments
- IoT transactions, concurrency control and recovery
- Hardware accelerators and energy savers for IoT applications and core
infrastructure
- IoT discovery of devices, services and data
** Workshop Chairs **
- Sven Groppe, University of Luebeck, Germany
- Markus Endler, PUC Rio, Brasil
** Program Committee **
- Lorena Etcheverry, Universidad de la Republica, Uruguay
- Mirian Halfeld Ferrari, Universite d' Orleans, France
- Hemant Purohit, George Mason University, USA
- Jonathan Fuerst, NEC Labs Europe, Heidelberg, Germany
- Abdessamad Imine, INRIA-LORIA Nancy Grand-Est, France
- Peiquan Jin, University of Science and Technology of China, China
- Verena Kantere, University of Ottawa
- Abdelmajid Khelil, Landshut University of Applied Sciences, Germany
- Jan Lindstroem, MariaDB Corporation, Finland
- Uden Lorna, Staffordshire University, UK
- Riccardo Martoglia, University di Modena and Reggio Emilia, Italy
- Luis Munoz, University of Cantabria, Spain
- Elaheh Pourabbas, National Research Council of Italy, Italy
- Francisco Jose da Silva e Silva, Federal University of Maranhão
(UFMA), Brazil
- Mu-Chun Su, National Central University, Taiwan
- Marco Vieira, University of Coimbra, Portugal
- Yingwei Wang, University of Prince Edward Island, Canada
** Important Dates **
Submission: March 18, 2019
Notification: May 31, 2019
Workshop: August 30, 2019
** Submission **
Authors are invited to submit original, unpublished research papers that
are not being considered for publication in any other forum.
Accepted papers will be published online in the Open Journal of Internet
of Things. OJIOT is an open access journal, and the proceedings will
hence be highly visible to all interested readers.
Manuscripts should be formatted using the templates of the Open Journal
of Internet of Things. Research papers as well as experiments and
analysis papers should have between 6 and 15 pages, application papers
between 6 and 12 pages and vision papers between 4 and 12 pages.
We describe manuscript preparation and submission procedure at
http://www.ifis.uni-luebeck.de/~groppe/vliot/submit
_______________________________________________
AISWorld mailing list
AISWorld(a)lists.aisnet.org
-------- Forwarded Message --------
Subject: [AISWorld] BISE Journal Issue 01/2019
Date: Wed, 20 Feb 2019 13:35:05 +0000
From: Kloker, Simon (IISM) <simon.kloker(a)kit.edu>
Dear colleagues
We are pleased to announce the table of contents for the Special Issue
1/2019 on Design Science Research and Digital Innovation of the journal
Business & Information Systems Engineering (BISE).
All articles are available on SpringerLink at
https://link.springer.com/journal/12599/61/1
__________________________________________
TOC BISE 1/2019
Editorial
*Editorial Note
Christof Weinhardt
https://link.springer.com/article/10.1007/s12599-019-00581-8
*Roles of Digital Innovation in Design Science Research
Alan Hevner, Jan vom Brocke, Alexander Maedche
https://link.springer.com/article/10.1007/s12599-018-0571-z
_______________________________________
Research Papers
*Service-Dominant Business Model Design for Digital Innovation in Smart
Mobility
Oktay Turetken, Paul Grefen, Rick Gilsing, O. Ege Adali
https://link.springer.com/article/10.1007/s12599-018-0565-x
*Scenario-Based Design Theorizing - The Case of a Digital Idea Screening
Cockpit
Raffaele Fabio Ciriello, Alexander Richter
https://link.springer.com/article/10.1007/s12599-018-0572-y
*Towards Digital Transformation in Fashion Retailing: A Design-Oriented IS
Research Study of Automated Checkout Systems
Matthias Hauser, Sebastian A. Günther, Christoph M. Flath, Frédéric Thiesse
https://link.springer.com/article/10.1007/s12599-018-0566-9
*Engineering of Augmented Reality-Based Information Systems - Design and
Implementation for Intralogistics Services
Lisa Berkemeier, Benedikt Zobel, Sebastian Werning, Ingmar Ickerott, Oliver
Thomas
https://link.springer.com/article/10.1007/s12599-019-00575-6
*Design Principles for Systematic Search Systems: A Holistic Synthesis of a
Rigorous Multi-cycle Design Science Research Journey
Benjamin Sturm, Ali Sunyaev
https://link.springer.com/article/10.1007/s12599-018-0569-6
_______________________________________
Catchword
*Enterprise Crowdfunding: Foundations, Applications, and Research Findings
Alexander Simons, Lena Franziska Kaiser, Jan vom Brocke
https://link.springer.com/article/10.1007/s12599-018-0568-7
_______________________________________
Interview
*The Impact of Digitalization on the IT Department
Nils Urbach, Frederik Ahlemann, Tilo Böhmann, Paul Drews, Walter Brenner,
Florian Schaudel, Reinhard Schütte
https://link.springer.com/article/10.1007/s12599-018-0570-0
========================================
Dr. Simon Kloker / Office Editor-in-Chief
Business & Information Systems Engineering (BISE)
========================================
-------- Forwarded Message --------
Subject: [AISWorld] Call for Book Chapters: "Advances in Security,
Privacy and Trust for Internet-of-Things (IoT) and Cyber-Physical
Systems (CPS) ", published by Taylor&Francis
Date: Sun, 24 Feb 2019 08:22:36 +0800
From: Kuan-Ching Li <kuancli(a)pu.edu.tw>
----------------------
Call for Book Chapters
----------------------
"Advances in Security, Privacy and Trust for Internet-of-Things (IoT)
and Cyber-Physical Systems (CPS) "
CRC Press, Taylor & Francis Group, USA
https://sites.google.com/site/advseciotcps/home
Important Dates
*** Proposal Submission: April 1, 2019***
* Proposal (Acceptance/Rejection): May 15, 2019 (no later than)
* Sample Chapter (Acceptance/Rejection): July 15, 2019
* Complete Chapter Submission (to editors): September 15, 2019
* Submission of Chapters (to publisher): September 25, 2019
* Publication Time: Q4/2019 (estimated)
Book Editors
Kuan-Ching Li, Providence University, Taiwan, kuancli(a)pu.edu.tw
Brij B. Gupta, National Institute of Technology Kurukshetra, Haryana,
India, gupta.brij(a)ieee.org
Dharma P. Agrawal, University of Cincinnati, Cincinnati, USA, dpa(a)cs.uc.edu
Internet of Things (IoT) and CPS (Cyber-Physical Systems) provide
mechanisms that are monitored and controlled by computing algorithms
that are tightly coupled among users and the Internet. That is, the
hardware and the software entities are intertwined and they typically
function on different time and location-based scales. Security,
privacy and trust in the Internet of Things (IoT) and CPS
(Cyber-Physical Systems) are different from conventional security.
Different security concerns revolve around the collection, aggregation
of data or transmission of data over the network. Analysis of
cyber-attack vectors and provision of appropriate mitigation
techniques are important research areas with respect to these systems.
Adoption of best practices and maintaining a balance between ease of
use and security are again crucial for the effective performance of
these systems.
This book will discuss, present techniques and methodologies as well
wide range of examples and illustrations to effectively show the
principles, algorithms, challenges, and applications of security,
privacy, and trust for IoT and CPS. It will be full of valuable
insights into security, privacy, and trust in IoT and CPS and will
cover most of the important security aspects and current trends that
are missed in other books. In addition, it will be an excellent
reference book to courses on security, privacy, and trust for IoT and
CPS. The material will prepare readers for exercising better
protection/defense in terms of understanding the motivation of
attackers and how to deal with as well to mitigate the situation in a
better manner.
Topics include, but are not limited to, the following:
- Fundamentals, Overviews, and Trends of Computer Networks and Cyber
Security
- Cyber risk, Cyber-crime, Cyber threat analysis, and modeling
- Cyber forensic tools, techniques, and analysis
- Security of cyber-physical cloud systems
- Cloud computing and services for cyber-physical systems
- Energy management for cyber-physical cloud systems.
- Real-time data analytics and data stream management for cyber-physical
systems
- Context-aware event processing for cyber-physical systems
- Security challenges in cyber-physical cloud systems
- Data virtualization and data-as-a-service in cyber-physical systems
- Cyber-physical cloud systems for smart city, smart energy grid
- Internet of Things and real-time cloud services
- Data-driven framework for cyber-physical systems
- Situational awareness in cyber-physical systems
- Adaptive attack mitigation for CPS
- Authentication and access control for CPS
- Availability, recovery, and auditing for CPS
- Data security and privacy for CPS
- Embedded systems security and privacy
- EV charging system security
- Intrusion detection for CPS
- Key management in CPS
- Legacy CPS system protection
- Lightweight crypto and security
- Security and privacy in industrial control systems
- Smart grid security
- Threat modeling for CPS
- Urban transportation system security
- Vulnerability analysis for CPS
- Wireless sensor network security and privacy
- IoT-powered botnets
- iBeacon security and privacy
- Forensics on IoT devices
- HCI and security and privacy in IoT
- Mobile service privacy for IoT devices
- Reverse engineering and automated analysis of IoT malware
- Security and privacy in IoT operating systems and middleware
- IoT payment applications
- Standardization efforts related to IoT
- Testbeds and case studies for IoT
- Traffic monitoring and intrusion detection for IoT
- Virtualization solutions to IoT security
- Security and privacy for IoT-based smart cities
- Ethics, legal, and social considerations in IoT security
- Biometric modalities involved in IoT security
- Cyber attacks detection and prevention systems for IoT networks
- Cloud computing-based security solutions for IoT data
- Security and privacy issues in heterogeneous IoT
- Cloud of Things security and privacy issues
- Intrusion detection for IoT
- Trust Management for IoT
- Deep learning models for the service-centric Internet of things
- Deep Learning architectures for optimizing time series computational
data in IoTs
- Energy Efficient Machine Learning and Data Analytics Techniques in
IoT for Industry
- Multimedia data management in IoT
- Dynamic processes in IoT
- Security protocols in service-centric IoT
- Information revelation and privacy in IoT
- Dependable and Reliable IoT Analytics
Proposal submission
A proposal for book chapter is needed from prospective authors before
the proposal *submission due date*, describing the objective, scope,
and structure of the proposed chapter (no more than 5 pages).
Acceptance of chapter proposals will be communicated to lead chapter
authors after a formal double-blind review process, to ensure
relevance, quality, and originality. The submission of chapter
proposals should be processed via Easychair system
(https://easychair.org/conferences/?conf=adv1sec).
Additional Information
Inquiries and chapter proposal submissions can be forwarded
electronically by email, to:
Brij Gupta (email: gupta.brij(a)ieee.org), Kuan-Ching Li (email:
kuancli(a)gm.pu.edu.tw) and Dharma P. Agrawal (email: dpa(a)cs.uc.edu)
_______________________________________________
AISWorld mailing list
AISWorld(a)lists.aisnet.org
-------- Forwarded Message --------
Subject: [AISWorld] Final Call for Paper: IEEE BigDataSecurity 2019
Date: Sun, 24 Feb 2019 14:56:21 +0100 (CET)
From: Han Qiu <han.qiu(a)telecom-paristech.fr>
To: INCLUSIVEGANDT(a)jiscmail.ac.uk, IAMLEARN(a)jiscmail.ac.uk,
announce(a)informatics-europe.org, HCITALY(a)CNUCE.CNR.IT,
mycadm(a)hotmail.com, seworld(a)sigsoft.org, dbworld(a)cs.wisc.edu,
announce(a)ipdps.org, announce(a)cs.ucy.ac.cy, aisworld(a)lists.aisnet.org,
csc(a)lists.purdue.edu, computational.science(a)lists.iccsa.org,
dmanet(a)zpr.uni-koeln.de, grin-eventi(a)grin-informatica.it,
hipeac-publicity(a)hipeac.net, hipeac-publicity(a)hipeac.ac.upc.edu,
hpc-announce(a)mcs.anl.gov, htcondor-users-owner(a)cs.wisc.edu,
irma-l(a)irma-international.org, IFIP_NM(a)LISTS.UTWENTE.NL,
listserv(a)listserv.acm.org, mostcomeng(a)mail.nsysu.edu.tw,
performance(a)merlot.usc.edu, podc-related(a)listserv.acm.org,
researchers(a)mailman.ufsc.br, storage-research-list(a)ece.cmu.edu,
sigmetrics-bb(a)merlot.usc.edu, spaa(a)listserv.acm.org, sbac-l(a)sbc.org.br,
siam-sc(a)siam.org, sdmas-owner(a)arcos.inf.uc3m.es,
semanticweb(a)yahoogroups.com, TCGCC(a)comsoc.org,
tcpp-announce(a)computer.org, tcpp-announce(a)lists.ece.unm.edu,
tcsc-bounces(a)cse.stfx.ca, tcdp-announce(a)computer.org,
tci-announce(a)computer.org, THEORYNT(a)listserv.nodak.edu, tcbd(a)comsoc.org,
um(a)di.unito.it, vsim-conf(a)sce.carleton.ca
CC: semanticweb(a)yahoogroups.com, commsoft(a)ieee.org,
appsem(a)lists.tcs.ifi.lmu.de, dbworld(a)cs.wisc.edu,
sage-announce(a)mailman.sage.org, easst-members(a)lists.le.ac.uk,
ailman(a)inf.ufsc.br, IAMLEARN(a)jiscmail.ac.uk, multiagent(a)yahoogroups.com,
announcements(a)ubicomp.org, Alio(a)dc.uba.ar, HCITALY(a)CNUCE.CNR.IT,
sma(a)loria.fr, seworld(a)sigsoft.org, CNOM(a)comsoc.org,
sbc-l-bounces(a)sbc.org.br
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
IEEE BigDataSecurity 2019
- The 5th IEEE International Conference on Big Data Security on Cloud -
May 27–29, 2019
Washington DC, USA
http://www.cloud-conf.net/datasec/2019/index.html
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
INTRODUCTION
With rapid development of digital devices and communication techniques,
we are in the big data era. Many aspects for both scientific research
and people’s daily life have been influenced by big data based
technology such as artificial intelligence, cloud computing, and
Internet of Things. Providing security and privacy for big data storage,
transmission, and processing have been attracting much attention in all
big data related areas. IEEE BigDataSecurity 2019 addresses this domain
and aims to gather recent academic achievements in this field.
Internet of Things is the second concentration of IEEE BigDataSecurity
2019. The emerging needs for transmission, storage, and processing data
in IoT environment with security and privacy guaranteed have attracted
attention from a number of different perspectives. The new methods
deployed in IoT environment have covered distinct dimensions, such as
edge/fog computing, energy consumptions, high performance, and
heterogeneous resources, cloud models, heterogeneous architecture,
tele-health, resource allocation, load balance, multimedia, and QoS, etc.
TOPIC
Topics of particular interest include, but are not limited to:
- Big data security issues and cyber crime - Novel big data model
- Big data security issues in IoT
- Big data privacy issues in IoT
- Big data security issues in cloud computing
- Big data privacy in cloud computing
- Big data storage, integration, service, mining
- Big data security applications
- Cyber hacking, next generation fire wall
- Cyber monitoring, incident response
- Database security, data center security
- Social engineering, insider threats, advance spear phishing
- Cyber threat intelligence
- Security and fault tolerance for embedded or ubiquitous systems
- Tele-health security in cloud computing
- Sensor network security in cloud computing
- Security policy and legal considerations
- Cloud and networking security
- Cloud computing and networking models
- Virtualization for big data on cloud
- MapReduce with cloud for big data processing
- Heterogeneous architecture for cloud computing
- Dynamic resource sharing algorithm for cloud computing
- Load balance for cloud computing
- Mobile cloud computing
- Mobile commerce security and privacy
- Green cloud computing
- Embedded networks and sensor network optimizations
- Cyber Security in emergent technologies
PAPER SUBMISSION
Prospective authors are invited to submit papers via Easychair
(https://easychair.org/conferences/?conf=ieeebigdatasecurity2). The
submissions should be formatted with the IEEE 8.5 x 11 inches two-column
format with 10-12 point font. Detailed formatting and submission
instructions are available at the conference website
(http://www.cloud-conf.net/datasec/2019/submission.html).
IMPORTANT DATES
Paper submission: February 28, 2019 (Firm)
Notification of acceptance: March 15, 2019
Final manuscript submission: April 5, 2019
For further information, please contact: han.qiu(a)telecom-paristech.fr.
_______________________________________________
AISWorld mailing list
AISWorld(a)lists.aisnet.org
-------- Forwarded Message --------
Subject: [AISWorld] Final Call for Paper: IEEE HPSC 2019
Date: Sun, 24 Feb 2019 16:09:22 +0100 (CET)
From: Han Qiu <han.qiu(a)telecom-paristech.fr>
To: INCLUSIVEGANDT(a)jiscmail.ac.uk, IAMLEARN(a)jiscmail.ac.uk,
announce(a)informatics-europe.org, HCITALY(a)CNUCE.CNR.IT,
mycadm(a)hotmail.com, seworld(a)sigsoft.org, dbworld(a)cs.wisc.edu,
announce(a)ipdps.org, announce(a)cs.ucy.ac.cy, aisworld(a)lists.aisnet.org,
csc(a)lists.purdue.edu, computational.science(a)lists.iccsa.org,
dmanet(a)zpr.uni-koeln.de, grin-eventi(a)grin-informatica.it,
hipeac-publicity(a)hipeac.net, hipeac-publicity(a)hipeac.ac.upc.edu,
hpc-announce(a)mcs.anl.gov, htcondor-users-owner(a)cs.wisc.edu,
irma-l(a)irma-international.org, IFIP_NM(a)LISTS.UTWENTE.NL,
listserv(a)listserv.acm.org, mostcomeng(a)mail.nsysu.edu.tw,
performance(a)merlot.usc.edu, podc-related(a)listserv.acm.org,
researchers(a)mailman.ufsc.br, storage-research-list(a)ece.cmu.edu,
sigmetrics-bb(a)merlot.usc.edu, spaa(a)listserv.acm.org, sbac-l(a)sbc.org.br,
siam-sc(a)siam.org, sdmas-owner(a)arcos.inf.uc3m.es,
semanticweb(a)yahoogroups.com, TCGCC(a)comsoc.org,
tcpp-announce(a)computer.org, tcpp-announce(a)lists.ece.unm.edu,
tcsc-bounces(a)cse.stfx.ca, tcdp-announce(a)computer.org,
tci-announce(a)computer.org, THEORYNT(a)listserv.nodak.edu, tcbd(a)comsoc.org,
um(a)di.unito.it, vsim-conf(a)sce.carleton.ca
CC: semanticweb(a)yahoogroups.com, commsoft(a)ieee.org,
appsem(a)lists.tcs.ifi.lmu.de, dbworld(a)cs.wisc.edu,
sage-announce(a)mailman.sage.org, easst-members(a)lists.le.ac.uk,
ailman(a)inf.ufsc.br, IAMLEARN(a)jiscmail.ac.uk, multiagent(a)yahoogroups.com,
announcements(a)ubicomp.org, Alio(a)dc.uba.ar, HCITALY(a)CNUCE.CNR.IT,
sma(a)loria.fr, seworld(a)sigsoft.org, CNOM(a)comsoc.org,
sbc-l-bounces(a)sbc.org.br
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
IEEE HPSC 2019
- The 5th IEEE International Conference on High Performance and Smart
Computing -
May 27–29, 2019
Washington DC, USA
http://www.cloud-conf.net/datasec/2019/hpsc/index.html
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
INTRODUCTION
High performance and smart computing (HPSC) is getting more and more
attention due to the rapid development of computing and communication
techniques. From national governments and industry players to consumer
level demand, interest in high performance and smart computing has
emerged from many different stakeholders. As a promising technology,
high performance computing is playing an important role not only in
traditional computer science domain but also in new branches such as
Internet of Things, unmanned vehicles, and topics in artificial
intelligent. Smart computing, as another significant aspect, provides
solutions for complicated computing problems.
The 5th IEEE International Conference on High Performance and Smart
Computing (IEEE HPSC 2019) is a research event cooperated with a number
of conferences, such as IEEE BigDataSecurity 2019 and IEEE IDS 2019.
This conference provides engineers and scientists in computing domain
with an academic forum in which the new research achievements, ideas,
and results are shared. The state-of-the-art smart computing
applications and experiences in cloud computing and smart computing will
be represented in this academic event. IEEE HPSC 2019 is the next
edition of a series of successful academic events, including HPSC 2015
(New York, USA), HPSC 2016 (New York, USA), HPSC 2017 (Beijing, China),
and HPSC 2018 (Omaha, USA).
TOPIC
Topics of particular interest include, but are not limited to:
- High performance smart computing
- High performance distributed computing
- Smart digital forensics
- Smart Big data security, Database security
- Smart social engineering, insider threats, advance spear phishing
- Cyber threat intelligence
- Security and fault tolerance for embedded or ubiquitous systems
- Smart cloud security
- Tele-health security
- Sensor network security
- Embedded networks and sensor network optimizations
- Cloud computing and networking models
- Heterogeneous architecture for cloud computing
- Dynamic resource sharing algorithm for cloud computing
- Load balance for cloud computing
- Cloud-based audio/video streaming techniques
- MapReduce
- Visualization
- Cloud-based real-time multimedia techniques
- Mobile cloud computing
- Green cloud computing
- Quality of Service (QoS) improvements techniques
- Case studies for various applications
- Cyber Security in emergent technologies, infrastructures and applications
PAPER SUBMISSION
Prospective authors are invited to submit papers via Easychair
(https://easychair.org/conferences/?conf=ieeehpsc2019). The submissions
should be formatted with the IEEE 8.5 x 11 inches two-column format with
10-12 point font. Detailed formatting and submission instructions are
available at the conference website
(http://www.cloud-conf.net/datasec/2019/hpsc/submission.html).
IMPORTANT DATES
Paper submission: February 28, 2019 (Firm)
Notification of acceptance: March 15, 2019
Final manuscript submission: April 5, 2019
For further information, please contact: han.qiu(a)telecom-paristech.fr.
_______________________________________________
AISWorld mailing list
AISWorld(a)lists.aisnet.org
-------- Forwarded Message --------
Subject: [AISWorld] Final Call for Paper: IEEE IDS 2019
Date: Sun, 24 Feb 2019 16:43:48 +0100 (CET)
From: Han Qiu <han.qiu(a)telecom-paristech.fr>
To: INCLUSIVEGANDT(a)jiscmail.ac.uk, IAMLEARN(a)jiscmail.ac.uk,
announce(a)informatics-europe.org, HCITALY(a)CNUCE.CNR.IT,
mycadm(a)hotmail.com, seworld(a)sigsoft.org, dbworld(a)cs.wisc.edu,
announce(a)ipdps.org, announce(a)cs.ucy.ac.cy, aisworld(a)lists.aisnet.org,
csc(a)lists.purdue.edu, computational.science(a)lists.iccsa.org,
dmanet(a)zpr.uni-koeln.de, grin-eventi(a)grin-informatica.it,
hipeac-publicity(a)hipeac.net, hipeac-publicity(a)hipeac.ac.upc.edu,
hpc-announce(a)mcs.anl.gov, htcondor-users-owner(a)cs.wisc.edu,
irma-l(a)irma-international.org, IFIP_NM(a)LISTS.UTWENTE.NL,
listserv(a)listserv.acm.org, mostcomeng(a)mail.nsysu.edu.tw,
performance(a)merlot.usc.edu, podc-related(a)listserv.acm.org,
researchers(a)mailman.ufsc.br, storage-research-list(a)ece.cmu.edu,
sigmetrics-bb(a)merlot.usc.edu, spaa(a)listserv.acm.org, sbac-l(a)sbc.org.br,
siam-sc(a)siam.org, sdmas-owner(a)arcos.inf.uc3m.es,
semanticweb(a)yahoogroups.com, TCGCC(a)comsoc.org,
tcpp-announce(a)computer.org, tcpp-announce(a)lists.ece.unm.edu,
tcsc-bounces(a)cse.stfx.ca, tcdp-announce(a)computer.org,
tci-announce(a)computer.org, THEORYNT(a)listserv.nodak.edu, tcbd(a)comsoc.org,
um(a)di.unito.it, vsim-conf(a)sce.carleton.ca
CC: semanticweb(a)yahoogroups.com, commsoft(a)ieee.org,
appsem(a)lists.tcs.ifi.lmu.de, dbworld(a)cs.wisc.edu,
sage-announce(a)mailman.sage.org, easst-members(a)lists.le.ac.uk,
ailman(a)inf.ufsc.br, IAMLEARN(a)jiscmail.ac.uk, multiagent(a)yahoogroups.com,
announcements(a)ubicomp.org, Alio(a)dc.uba.ar, HCITALY(a)CNUCE.CNR.IT,
sma(a)loria.fr, seworld(a)sigsoft.org, CNOM(a)comsoc.org,
sbc-l-bounces(a)sbc.org.br
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
IEEE IDS 2019
- The 4th IEEE International Conference on Intelligent Data and Security -
May 27–29, 2019
Washington DC, USA
http://www.cloud-conf.net/datasec/2019/IDS/index.html
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
INTRODUCTION
Intelligent data and security (IDS) is getting more and more attention
due to the rapid development of computing and communication techniques.
From national governments and industry players to consumer level
demand, interest in high performance and smart computing has emerged
from many different stakeholders. As a promising technology, high
performance computing is playing an important role not only in
traditional computer science domain but also in new branches such as
Internet of Things, unmanned vehicles, and topics in artificial
intelligent. Smart computing, as another significant aspect, provides
solutions for complicated computing problems.
TOPIC
Topics of particular interest include, but are not limited to:
- Security in new paradigms of intelligent data
- Cyber hacking, next generation fire wall of intelligent data
- Cyber monitoring and incident response in intelligent data
- Digital forensics in intelligent data
- Big data security, Database security
- Intelligent database and security
- Intelligent data mining in security, optimization, and cloud computing
- Social engineering, insider threats, advance spear phishing
- Cyber threat intelligence and implementations
- Security and fault tolerance for embedded or ubiquitous systems
- Cloud-based intelligent data and security issues
- Tele-health security in intelligent data
- Sensor network security and solutions
- Embedded networks and sensor network optimizations
- Cloud computing and networking models
- Heterogeneous architecture for cloud-based intelligent data
- Dynamic resource sharing algorithm for cloud-based intelligent data
- Load balance for cloud-based intelligent data
- Cloud-based audio/video streaming techniques
- MapReduce techniques in intelligent data
- Visualization and optimization in intelligent data
- Cloud-based real-time multimedia techniques in intelligent data
- Mobile cloud computing and advanced applications
- Green cloud computing model, implementation, and framework
- Quality of Service (QoS) improvements techniques
- Case studies for various applications
- Cyber Security in emergent technologies, infrastructures and applications
PAPER SUBMISSION
Prospective authors are invited to submit papers via Easychair
(https://easychair.org/conferences/?conf=ieeeids2019). The submissions
should be formatted with the IEEE 8.5 x 11 inches two-column format with
10-12 point font. Detailed formatting and submission instructions are
available at the conference website
(http://www.cloud-conf.net/datasec/2019/IDS/submission.html).
IMPORTANT DATES
Paper submission: February 28, 2019 (Firm)
Notification of acceptance: March 15, 2019
Final manuscript submission: April 5, 2019
For further information, please contact: han.qiu(a)telecom-paristech.fr.
_______________________________________________
AISWorld mailing list
AISWorld(a)lists.aisnet.org