-------- Original-Nachricht -------- Betreff: [isworld] CFP: Information Systems Frontiers Special Issue on Terrorism Informatics, Extended Deadline 9/30 Datum: Sat, 12 Sep 2009 13:47:35 -0400 Von: Yilu Zhou yzhou@gwu.edu Antwort an: Yilu Zhou yzhou@gwu.edu An: AISWORLD Information Systems World Network isworld@lyris.isworld.org
Call for Papers
Special Issue on Terrorism Informatics
Since September 11th, the multidisciplinary field of terrorism informatics has experienced tremendous growth, and research communities as well as local, state, and national governments are facing increasingly more complex and challenging issues. The challenges facing the intelligence and national security communities worldwide include accurately and efficiently monitoring, analyzing, predicting and preventing terrorist activities. The development and use of advanced information technologies, including methodologies, models and algorithms, infrastructure, systems, and tools for national/international and homeland security related applications have provided promising new directions for study.
Terrorism informatics has been defined as the application of advanced methodologies, information fusion and analysis techniques to acquire, integrate process, analyze, and manage the diversity of terrorism-related information for international and homeland security-related applications. It is a highly interdisciplinary and comprehensive field. The wide variety of methods used in terrorism informatics are derived from Computer Science, Informatics, Statistics, Mathematics, Linguistics, Social Sciences, and Public Policy, and these methods are involved in the collection of huge amounts of many types of multi-lingual information from varied and multiple sources. Information fusion and information technology analysis techniques, which include data mining, data integration, language translation technologies, and image and video processing, play central roles in the prevention, detection, and remediation of terrorism.
The purpose of this special issue is to bring together international researchers, engineers, policy makers, and practitioners working on terrorism informatics as well as related fields such as the organizational and social sciences. This special issue will outline the major challenges in supporting terrorism prevention, detection and response worldwide, as well as future perspectives on counterterrorism research in the information age.
Topics The special issue will cover the scope of research relevant to terrorism informatics, including but not limited to the following topics: � Terrorism knowledge portals and databases � Terrorist incident chronology databases � Terrorism social network analysis, visualization and simulation � Terrorism analytical tools and methodologies � Terrorism data mining and text mining � Terrorism root cause analysis � Bioterrorism � Cyber terrorism � Forecasting terrorism � Countering terrorism � Impact of terrorism on society � National and international security and webmetrics � Web-based intelligence terrorism monitoring and event detection
Important Dates � Submission deadline: September 30, 2009 � Notification of first round reviews: December 31, 2009 � Revised manuscripts due: March 31, 2009 � Final acceptance notification: June 30, 2010 � Submission of final paper: August 31, 2010 � Publication date: Fall 2010
Submission Manuscripts must be submitted electronically in Microsoft Word or LaTex format via http://www.editorialmanager.com/isfi/ no later than September 30, 2009 with the phrase - "submitted for consideration for the special issue of ISF on Terrorism Informatics." Paper submissions must use the layout and format guidelines in Information Systems Frontiers. Instructions for Contributors can be found at: http://www.som.buffalo.edu/isinterface/ ISFrontiers/.
To enable anonymous review, papers submitted should have a separate title page to include only the article title, author name(s), institute, and email addresses. The remainder will contain an abstract, 4-10 keywords, and the paper itself.
We will also invite authors of selected best papers to submit an extended version from the IEEE International Conference on Intelligence and Security Informatics (ISI) 2009 that the guest editors are organizing. The conference Website is at http://www.isiconference.org/2009/.
Guest Editors
Hsinchun Chen Department of Management Information Systems University of Arizona, U.S.A. Email: hchen@eller.arizona.edu
Yilu Zhou Department of Information Systems and Technology Management George Washington University, U.S.A. Email: yzhou@gwu.edu
Edna F. Reid Department of Library Science Clarion University, U.S.A. Email: ereid@clarion.edu
Catherine A. Larson Department of Management Information Systems University of Arizona, U.S.A. Email: cal@eller.arizona.edu
The AISWorld LISTSERV is a service of the Association for Information Systems (http://www.aisnet.org). To unsubscribe, redirect, or change subscription options please go to http://lyris.isworld.org/. You are subscribed to AISworld as: neumann@wu-wien.ac.at. Each Sender assumes responsibility that his or her message conforms to the AISWorld LISTSERV policy and conditions of use available at http://lyris.isworld.org/isworldlist.htm.