ECIW 2013 Home
   Call for Papers
   Submission Info
   Abstract Submission
   Proof Reading
   Committee
   Abstracts Selected
   Programme
   Registration
   Practical Information
   Proceedings 2012
   ECIW Past & Future
   Seminars
   Advertisers
   Exhibitors
   Publishers
   Sponsors
   About ACI
   Academic Bookshop
  ECIW 2013
  11-12 July 2013, Jyväskylä, Finland
 Home >> eciw >> ECIW 2013 >> ECIW 2013 call for papers
WWW ACI   At a glance Calendar RSS Feed Contact us

 

 

 

 

 

CALL FOR PAPERS, Case Studies, Work in Progress/Posters, PhD Research, Round Table Proposals, non-academic Contributions and Product Demonstrations for the 12th European Conference on Information Warfare and Security (ECIW)

 



Read the submission guidelines




Download the cfp
in .pdf format


 

 





Tell a friend







 


The 12th European Conference on Information Warfare and Security (ECIW) is an opportunity for academics, practitioners and consultants from Europe and elsewhere who are involved in the study, management, development and implementation of systems and concepts to combat information warfare or to improve information systems security to come together and exchange ideas. There are several strong strands of research and interest that are developing in the area including the understanding of threats and risks to information systems, the development of a strong security culture, as well as incident detection and post incident investigation. This conference is continuing to establish itself as a key event for individuals working in the field from around the world.  


Publication opportunity

Papers accepted for the conference will be published in the conference proceedings, subject to author registration and payment.


Selected papers that have been presented at the Conference will be considered for publication in a special issue of both the Journal of Information Warfare: http://www.jinfowar.com. and the International Journal of Cyber Warfare and Terrorism (IJCWT) published by Information Resources Management Association, USA.( DOI: 10.4018/IJCWT, ISSN: 1947-3435, EISSN: 1947-3443). Additionally, selected papers  from the conference will be considered for publication in the International Journal of Electronic Security and Digital Forensics published by Inderscience UK (ISSN:1751-1911X)


The conference committee is attracted by both theoretical and practical papers on many subjects, as well as by innovative ideas and experiences. We are also interested in case studies that demonstrate how i-Warfare and security strategies have been applied and the lessons learned. We welcome contributions on many topics, presenting a range of scholarly approaches. theoretical and empirical papers employing qualitative, quantitative and critical methods are eagerly awaited. Action research, case studies and work-in-progress/posters are welcomed approaches. PhD Research, proposals for roundtable discussions, non-academic contributions and product demonstrations based on the main themes are also invited. You can find full details in the submission types document (.pdf format).


In addition to the main conference topics, the advisory group invites submissions to the following mini tracks:

 

 

Submission details are given below. Topics for submissions may include, but are not limited to:

§         i-Warfare principles, theory and policy and techniques

§         Cyber conflict, Cyber-terrorism and Cyber-fraud

§         Physical security

§         National security policy

§         Information security governance and management

§         Information warfare and security education

§         Information Assurance and Information operations

§         Psychological warfare

§         Perception management

§         Legal issues concerned with information warfare and e-Crime

§         Ethical, political and social issues relating to information warfare

§         SMEs - Small-to-medium Size Enterprises Security issues

§         Critical national infrastructure protection

§         The Resilience and Susceptibility of "Service Oriented Architectures" (SOAs)

§         Hacking and cracking

§         Biometrics

§         e-Intelligence/counter-intelligence

§         Cryptography : classical  and malicious

§         Networked Centric War

§         Network anomaly detection models

§         Malware and anti-malware technologies

§         Non-traditional enemies

§          

§         Wireless Threats

§         Reflector attacks

§         Computers-as-weapons

§         Risk Management

§         Virtual Intrusion Detection

§         Collaborative decision making

§         Acute situational awareness

§         Firewalls

§         Phishing and spam

§         Digital forensics

§         Current Anti Virus Technologies

§         PSYOPS

§         Mobile Virus

§         RFID Virus

§         ISO 27001

§         Defence steganography and Unidirectional linguistic steganography

§         Traffic classification

§         Public Key Infrastructure

§         Machine Learning Risk

§         Mathematical-filtering

§         SecureMDA

§         Image-processing

 

Participants will be asked to vote for the best poster and a prize will be given for the poster receiving the highest number of votes. Additionally a prize will be awarded to the best PhD paper presented at the conference.


If you would be interested in preparing and chairing a mini track, please contact the Conference Director, Sue Nugus.

 

Mini track call for papers on Critical Infrastructure Protection   Click the .pdf icon to download the call for papers file

Mini track chair: Dr. Nasser Abouzakhar, University of Hertfordshire, UK


Nasser Abouzakhar


Tell a friend

 

The European Programme for Critical Infrastructure Protection (EPCIP) is concerned with the protection of critical infrastructure in the EU. The EPCIP has developed a procedure for identifying and designating European critical infrastructure which is implemented by the European Commission’s directive. This directive focuses on the transport and energy sectors. In the last couple of years, the security community have witnessed a significant increase in security threats and violations on various critical infrastructure systems including Telecom networks, Power generation systems, Financial and Healthcare services networks … etc.


The purpose of this Mini Track is to bring together researchers and practitioners interested in security issues related to critical infrastructure services. Recent advances in the fields of Infrastructure and Systems Security such as industrial control systems and embedded systems security, software security and intrusion detection and prevention are key factors in the growth of critical infrastructure services and operations.


This Mini Track hopes to attract academics and professionals and to stimulate interesting discussions about the latest development of solution models and techniques for Critical Infrastructure Security and Warfare.


Submission details are given below. Topics for this track may include but are not limited to in

·         Infrastructure and Software Security

·         Control Systems Security

·         Network and Web Services Security

·         Malware Analysis, Detection and Prevention

·         Digital Forensics

·         Cloud Security

 

Submissions can be made on-line directly on the Abstract submission page.

 

Mini track call for papers on Cyber Professionalism and Military Cyber Operations   Click the .pdf icon to download the call for papers file

Mini track chair: Dr Rain Ottis, University of Jyväskylä, Jyväskylä, Finland


Rain Ottis


Tell a friend

 

In a time of constrained resources, everyone is trying to do more with less. One area that merits serious study is the use of military cyber operations in support of, or instead of, conventional military operations. While by no means a cheap option, cyber operations offer asymmetric benefits if used sparingly and only against targets of strategic importance.


While not a part of the standard order of battle yet, many states are making serious efforts in developing their military cyber capability. In general, they all share the same problems: figuring out the composition and TTP’s of cyber units, finding the best possible people to staff them and integrating the cyber capabilities with the existing toolset of the commander.


Submission details are given below. Topics for this track may include but are not limited to:

  • military cyber operations
  • tactics, techniques and procedures for cyber operations
  • identifying, recruiting, training and retaining cyber operatives
  • cyber force structure – unit composition, specialization, location in the command chain, rank mix, etc.
  • role of active forces, reserve forces, as well as militias and other volunteer groups

 

Submissions can be made on-line directly on the Abstract submission page.

 

Mini track call for papers on Strategic Communication   Click the .pdf icon to download the call for papers file

Mini track chair: Dr Aki Huhtinen and Dr Jari Rantapelkonen, Finnish National Defence University, Finland


Aki Huhtinen


Jari Rantapelkonen

 

Both the way wars are fought and the operation of the military have changed over the last decades. Communication is one of the most important defining characters of conflict, and will become even more prevalent in the future. Strategic Communication is has become an accepted term in military forces lexicons. This mini track is interested in papers looking into strategic communication and its challenges during conflicts.

 

Submission details are given below. Topics for this track may include but are not limited to:

  • The changing face of communication during war
  • Challenges of the communication environment, and military responses
  • Narratives and war
  • Social Media as form of strategic communication

 

  • Theories and practices of strategic communication
  • Targeting with narratives, themes, and messages
  • Information strategies, KLE
  • Other related topics

 

Submissions can be made on-line directly on the Abstract submission page.

 

 

Submission details

Abstract details:

All submission types require an abstract in the first instance. The Abstract should be a minimum of 300 and no more than 500 words including keywords to be received by 20 December 2012. Please read the Abstract Guidelines section of the website before submitting.

Submission:

Submissions should be made via the online form. Please ensure that all required fields are completed. Abstracts must include the proposed title for the submission, the full names (first name and surname, not initials); postal addresses and email addresses of all authors and a telephone number for at least one contact author. Please indicate clearly if the contact author is not the lead author and select the appropriate submission track.

Full paper:

Only required for academic submissions once the abstract has been selected, no more than 5,000 words to be received by 7 February 2013. Papers should be submitted as .doc or .rtf file attachments by email to the Conference Manager, Charlotte Hall (charlotte@academic-conferences.org ).

 

Important information

The selection panel of the conference committee will consider all abstracts received by the submission deadline to ensure that the proposed paper is relevant to the Conference. The authors of abstracts, which describe a relevant paper, will receive a notification of abstract acceptance. All full papers will be double-blind reviewed by members of the conference committee to ensure an adequate standard, that the proposed subject of their abstract has been followed, that the paper is of a suitable length, the standard of English is adequate and the paper is appropriately referenced. Papers that are accepted will be published in the conference proceedings providing at least one author registers and presents the work at the Conference (see the registration section of the conference website for more information about registration). Due to the large number of papers expected for this conference, the committee only allows an author to present one paper. However, if multiple papers are accepted for publication and presentation, each paper requires a separate registration fee. Author registration and payment must be completed by 6 June 2013.

 

Conference proceedings Accreditations





The ECIW conference proceedings are:

  • indexed in the Thomson Reuters ISI Web of Science (WOS) Conference Proceedings Citation
  • listed in EBSCO database of Conference Proceedings
  • indexed by Google Books and Google Scholar

·          indexed by the Institution of Engineering and Technology in the UK.

 

Proceedings for previous ECIW conferences can be purchased from our bookshop by clicking on the Purchase proceedings button.

Important dates

Abstract submission deadline:

20 December 2012

  Extended until 11 January 2013

Notification of abstract acceptance:

27 December 2012

  Completed

Full paper due for review:

7 February 2013

  Completed

Notification of paper acceptance (subject to any requested changes)

18 April 2013

  Completed

Earlybird registration closes

2 May 2013

  Now closed

Final paper due (with any changes):

16 May 2013

  Completed

Author registration final date:

6 June 2013

  Completed

 

This page was last updated on the 11 June 2013

 

 

 

 

 

 

 

 

 

 

 

Academic Conferences and Publishing Internatinal Limited - 33 Wood Lane, Sonning Common, RG4 9SJ, England - Tel: +44 (0)1189 724148 - Fax: +44 (0)1189 724691
eMail: info@academic-conferences.org- Copyright 2012 Academic Conferences and Publishing International Limited - registered in England - No: 06233418 - VAT No: 141 0393 52