Topics: Areas of Interest
 

Submissions may include systems, methodology, testbed, modeling, evaluation, policy, and position papers. Research should be relevant to informatics, organization, and/or public policy in applications of counter-terrorism or protection of local/ national/ international security in the physical world and/or cyberspace. Topics include but are not limited to:

1. Information Sharing and Data/Text Mining

  • Intelligence-related knowledge discovery
  • Computer or cyber crime investigations and digital forensics
  • Criminal investigative criteria and standard of procedure on Computer crime
  • Criminal data mining and network analysis
  • Forecasting crime and the impact of crime
  • Criminal/ intelligence information sharing and visualization
  • Crime pattern recognition and modeling tools
  • Web-based intelligence monitoring and analysis
  • Spatial-temporal data analysis/GIS for crime analysis and security informatics
  • Deception and intent detection
  • Cyber-crime detection and analysis
  • Authorship analysis and identification
  • Applications of digital library technologies in intelligence data processing, preservation, sharing, and analysis
  • Agents and collaborative systems for intelligence sharing
  • HCI and user interfaces of relevance to intelligence and security
  • Information sharing policy and governance
  • Privacy, security, and civil liberties issues
  • Intelligence-computerized community security and surveillance system

2. Infrastructure Protection and Emergency Responses

  • Cyber-Physical-Social system security and incident management
  • Cyber-infrastructure design and protection
  • Intrusion detection
  • Bio-terrorism tracking, alerting, and analysis
  • Bio-terrorism information infrastructure
  • Transportation and communication infrastructure protection
  • Border/transportation safety
  • Law Enforcement decision support systems
  • Emergency response and management
  • Disaster prevention, detection, and management
  • Communication and decision support for search and rescue
  • Assisting citizens' responses to terrorism and catastrophic events
  • Computer forensics and crime lead discovery
  • Anti-fraud information technology

3. Terrorism Informatics

  • Terrorism related analytical methodologies and software tools
  • Terrorism knowledge portals and databases
  • Terrorist incident chronology databases
  • Terrorism root cause analysis
  • Social network analysis (radicalization, recruitment, conducting operations),
  • visualization, and simulation
  • Forecasting terrorism
  • Countering terrorism
  • Measuring the impact of terrorism on society
  • Measuring the effectiveness of counter-terrorism campaigns
  • Crime intelligence and cyberspace crime investigation
  • Immigration and security

4. Enterprise Risk Management and Information Systems Security

  • Information security management standards
  • Information systems security policies
  • Behavior issues in information systems security
  • Fraud detection
  • Cyber crime and social impacts
  • Corporate going concerns and risks
  • Accounting and IT auditing
  • Corporate governance and monitoring
  • Board activism and influence
  • Corporate sentiment surveillance
  • Market influence analytics and media intelligence
  • Consumer-generated media and social media analytics