Intelligence and Security
Informatics (ISI) is
concerned with the study
of the development and
use of advanced information
technologies and systems
for national, international,
and societal security-related
applications. The annual
IEEE International Conference
series on ISI was started
in 2003. In 2006, the
Workshop on ISI (http://isi.se.cuhk.edu.hk/2006/)
was started in Singapore
in conjunction with
PAKDD, with most contributors
and participants from
the Pacific Asian region.
The 2nd PAISI (http://isi.se.cuhk.edu.hk/2007/)
was then held in Chengdu
in 2007 and the 3rd
PAISI (http://isi.se.cuhk.edu.hk)
was held in conjunction
with IEEE ISI in Taipei
in 2008. The past three
successful workshops
had drawn 60-120 participants
on average and the workshop
proceedings were published
by the Springer LNCS
series. We expect significant
interest from the PAKDD
participants.
These past ISI conferences
have brought together
academic researchers,
law enforcement and
intelligence experts,
information technology
consultant and practitioners
to discuss their research
and practice related
to various ISI topics
including:
I. Information Sharing
and Data/Text Mining
•
Intelligence-related
knowledge discovery
• Criminal data
mining and network
analysis
• Criminal/intelligence
information sharing
and visualization
• Web-based
intelligence monitoring
and analysis
• Spatio-temporal
data analysis/GIS
for crime analysis
and security informatics
• Deception
and intent detection
• Cyber-crime
detection and analysis
• Authorship
analysis and identification
• Applications
of digital library
technologies in intelligence
data processing, preservation,
sharing, and analysis
• Agents and
collaborative systems
for intelligence sharing
• HCI and user
interfaces of relevance
to intelligence and
security
• Information
sharing policy and
governance
II.
Infrastructure Protection
and Emergency Responses
•
Public/animal health
and bioterrorism information
infrastructure
• Transportation
and communication
infrastructure protection
• Cyber-infrastructure
design and protection
• Intrusion
detection
• Border/transportation
safety
• Emergency
response and management
• Disaster prevention,
detection, and management
• Communication
and decision support
for search and rescue
• Assisting
citizens’ responses
to terrorism and catastrophic
events
III.
Terrorism Informatics
•
Terrorism related
analytical methodologies
and software tools
• Terrorism
knowledge portals
and databases
• Terrorist
incident chronology
databases
• Terrorism
root cause analysis
• Social network
analysis (radicalization,
recruitment, conducting
operations), visualization,
and simulation
• Forecasting
terrorism
• Countering
terrorism
• Measuring
the impact of terrorism
on society
• Measuring
the effectiveness
of counter-terrorism
campaigns
In
this coming year, we
are broadening our scope
to include:
IV. Enterprise Risk
Management and Information
Systems Security
•
Information security
management standards
• Information
systems security policies
• Behavior issues
in information systems
security
• Fraud detection
• Cyber crime
and social impacts
• Corporate
going concerns and
risks
• Accounting
and IT auditing
• Corporate
governance and monitoring
• Board activism
and influence
• Corporate
sentiment surveillance
• Market influence
analytics and media
intelligence
• Consumer-generated
media and social media
analytics
PAISI
2009 will provide a
stimulating forum for
PAKDD participants who
focus on ISI research
to exchange ideas and
report research progress.
We believe it will also
attract the attendants
of previous PAISI to
be more actively involved
in the PAKDD 2009 program.
|