P A P E R   S U B M I S S I O N

Submission is now closed.

Submission guidelines:

The online submission system is at https://www.easychair.org/conferences/?conf=paisi2016
All papers must be submitted through the system.

Long papers (20 pages), and short papers (10 pages), following the Springer LNCS paper templates in English, may be submitted electronically via the site above. Submission file formats are PDF or Microsoft Word.

All accepted PAISI 2016 papers will be published in Springer's Lecture Notes in Computer Science (LNCS) series, which is indexed by EI Compendex, ISI Proceedings, and Scopus. All past PAISI proceedings (2006 to 2015) were published in the Springer LNCS series.

Microsoft Word/LaTeX templates for the required Springer LNCS format can be found here.

Submissions may include systems, methodology, testbed, modeling, evaluation, and policy papers. Research should be relevant to both informatics and national/international security. Topics include but are not limited to:

I. Information Sharing and Big Data Analytics 
  • Intelligence-related knowledge discovery 
  • Big data analytics and mining  
  • Criminal data mining and network analysis
  • Criminal/intelligence information sharing and visualization
  • Web-based intelligence monitoring and analysis
  • Spatio-temporal data analysis/GIS for crime analysis and security informatics
  • Cyber-crime detection and analysis
  • Authorship analysis and identification
  • Privacy and civil liberties issues
  • Text processing and mining

II. Infrastructure Protection and Emergency Responses

  • Public health and bioterrorism information infrastructure
  • Transportation and communication infrastructure protection
  • Cyber-infrastructure design and protection
  • Intrusion detection 
  • Border/transportation safety
  • Emergency response and management
  • Disaster prevention, detection, and management
  • Communication and decision support for search and rescue
  • Infrastructure for big data analytics

III. Cybercrime and Terrorism Informatics and Analytics 

  • Cyber-crime and social impacts
  • Terrorism related analytical methodologies and software tools
  • Terrorism knowledge portals and databases
  • Social network analysis (radicalization, recruitment, conducting operations), visualization, and simulation
  • Forecasting terrorism
  • Countering terrorism
  • Measuring the impact of terrorism on society
  • Computer forensics

IV. Enterprise Risk Management, IS Security, and Social Media Analytics 

  • Information systems security policies
  • Behavior issues in information systems security
  • Fraud detection and deception detection
  • Viruses and malware
  • Corporate ongoing concerns and risks
  • Accounting and IT auditing
  • Corporate governance and monitoring
  • Board activism and influence
  • Corporate sentiment surveillance
  • Market influence analytics and media intelligence
  • Consumer-generated media and social media analytics


Auckland, New Zealand | April 19, 2016
© 2004-2016 University of Hong Kong, University of Arizona