Intelligence and Security Informatics (ISI) is concerned with the study of the development and use of advanced information technologies and systems for national, international, and societal security-related applications. ISI is an interdisciplinary research field involving academic researchers in information technologies, computer science, public policy, bioinformatics, medical informatics, and social and behavior studies as well as local, state, and federal law enforcement and intelligence experts, and information technology industry consultants and practitioners to support counterterrorism and homeland security missions of anticipation, interdiction, prevention, preparedness and response to terrorist acts.
Topics of Interest:
I. Information Sharing and Data/Text/Web Mining
Intelligence-related knowledge discovery
Criminal data mining and network analysis
Criminal/intelligence information sharing and visualization
Web-based intelligence monitoring and analysis
Spatial-temporal data analysis/GIS for crime analysis and security informatics
Deception and intent detection
Cyber-crime detection and analysis
Authorship analysis and identification
Applications of digital library technologies in intelligence data processing, preservation, sharing, and analysis
Agents and collaborative systems for intelligence sharing
HCI and user interfaces of relevance to intelligence and security
Information sharing policy and governance
II. Infrastructure Protection and Emergency Responses
Public/animal health and bioterrorism information infrastructure
Transportation and communication infrastructure protection
Cyber-infrastructure design and protection
Intrusion detection
Border/transportation safety
Emergency response and management
Disaster prevention, detection, and management
Communication and decision support for search and rescue
Assisting citizens’ responses to terrorism and catastrophic events
III. Terrorism Informatics
Terrorism related analytical methodologies and software tools
Terrorism knowledge portals and databases
Terrorist incident chronology databases
Terrorism root cause analysis
Social network analysis (radicalization, recruitment, conducting operations), visualization, and simulation
Forecasting terrorism
Countering terrorism
Measuring the impact of terrorism on society
Measuring the effectiveness of counter-terrorism campaigns
IV. Enterprise Risk Management and Information Systems Security
Information security management standards
Information systems security policies
Behavior issues in information systems security
Fraud detection
Cyber crime and social impacts
Corporate going concerns and risks
Accounting and IT auditing
Corporate governance and monitoring
Board activism and influence
Corporate sentiment surveillance
Market influence analytics and media intelligence
Consumer-generated media and social media analytics
11月18日
2017
会议日期
注册截止日期
2015年11月14日 美国
2015年IEEE ICDM情报与信息安全研讨会
留言