ICIW 2012 Home
   Call for Papers
   Submission Guide
   Abstract Submission
   Proof Reading
   Committee
   Abstracts Selected
   Programme
   Registration
   Practical Information
   Proceedings 2011
   ICIW Past & Future
   Seminars
   Advertisers
   Exhibitors
   Publishers
   Sponsors
   About ACI
   Academic Bookshop
ICIW 2012
22-23 March, Seattle, USA
Home >> ICIW >> ICIW 2012 >> iciw12 Call for Papers
WWW ACI   At a glance Calendar RSS Feed Contact us

 

 

 

CALL FOR PAPERS, Case Studies, Work in Progress/Posters, PhD Research, Round Table Proposals, non-academic Contributions and Product Demonstrations

 



Click here to download
a .PDF version of the main CFP

 

 

Read the
Submission Guidelines
















 

ICIW provides an opportunity for academics, practitioners and consultants from around the world who are involved in the study, management, development and implementation of systems and concepts to combat information warfare or to improve information systems security to come together and exchange ideas. There are several strong strands of research and interest that are developing in the area including the understanding of threats and risks to information systems, the development of a strong security culture, as well as incident detection and post incident investigation. This conference is continuing to establish itself as a key event for individuals working in the field from around the world.


Publication opportunity

Papers accepted for the conference will be published in the conference proceedings, subject to author registration and payment.


Selected papers from the Conference will be considered for publication in a special issue of the Journal of Information Warfare: http://www.jinfowar.com. Additionally, selected papers from the conference will be considered for publication in the International Journal of Electronic Security and Digital Forensics published by Inderscience UK (ISSN:1751-1911X).


The advisory group for the conference invites submissions of both academic and practitioner papers on a wide range of topics and a wide range of scholarly approaches including theoretical and empirical papers employing qualitative, quantitative and critical methods. Academic research papers, case studies and work-in-progress/posters are welcomed approaches. PhD Research, proposals for roundtable discussions, non-academic contributions and product demonstrations based on the main themes are also invited. You can find full details in the submission types document (.pdf format).


In addition to the main conference topics, the advisory group invite suggestions for mini tracks. If you would be interested in preparing and chairing a mini track, please contact the Conference Director, Sue Nugus.

 

 

Submission details are given below. Topics for submissions may include, but are not limited to:

 

  • Cyberwarfare practice and theory
  • The politics of cyberwarfare, including conceptual cyberarms agreements
  • Cyber-exploitation execution and detection
  • Information security practice
  • Information security management
  • Dual-use technologies
  • Cyber conflict - Neural linguistic techniques in cyberwarfare
  • Patriotic hackers as an extension of state power
  • Potential military uses of cyber attacks
  • Case studies of cyber attacks in modern conflicts
  • Theoretical cyber conflict scenarios
  • Cyber conflict frameworks
  • Human Factors
  • Cyber-terrorism
  • Principles of i-Warfare
  • Physical security
  • Counter-terrorism security policies, procedures and legislation
  • Information warfare policy
  • SMEs - Small-to-medium Size Enterprises Security model
  • Critical national infrastructure protection
  • Information warfare theory
  • Security implications of “virtualised machines and services
  • e-Health systems as part of a national critical infrastructure
  • Information warfare techniques
  • The Resilience and Susceptibility of "Service Oriented Architectures" (SOAs)
  • Information security governance and management
  • Information warfare and security education
  • Hacking
  • Biometrics
  • e-Intelligence/counter-intelligence
  • Information Assurance
  • Cryptography
  • Networked Centric War
  • Malware
  • Wireless Treats
  • Reflector attacks
  • UCE
  • Threat Agents – Insider threats
  • Art of war
  • Cyber-fraud
  • Particle swarm data mining
  • Computers-as-weapons
  • Risk Management
  • Virtual Intrusion Detection
  • Electro-magnetic pulse weapons
  • Collaborative decision making
  • National security policy
  • Information operations
  • Security policy
  • Acute situational awareness
  • Strategic leadership
  • Firewalls
  • Aircraft Environment
  • Influence campaigns
  • Phishing and spam
  • Digital forensics
  • Psychological warfare
  • Current Anti Virus Technologies
  • Network anomaly detection models
  • PSYOP - PSYOPS
  • Mobile Virus
  • Corporate defence mechanisms
  • Perception management
  • RFID Virus
  • Security for small to medium enterprises
  • Infra-structure warfare
  • SQL Infections
  • Information, computer and network security
  • Military Culture Topography
  • Data Loss
  • Security of the virtual worlds
  • Modern conflict
  • Data Integration
  • SIMAD what can/should be done to protect against this threat?
  • Military approaches
  • ISO 27001
  • Unidirectional linguistic steganography
  • Compromise path analysis
  • Gaussian empirical rule
  • IT auditing and compliance
  • Defence steganography
  • Natural computing
  • Information Security Architecture
  • Data and service integration
  • Random numbers approximation sequence
  • Artificial immune recognition system security infrastructure
  • Legal issues concerned with information warfare and e-Crime
  • Traffic classification
  • Public Key Infrastructure
  • Non-traditional enemies
  • Subliminal Channel
  • Network Address Translator
  • Ethical, political and social issues relating to information warfare
  • Machine Learning Risk
  • Mathematical-filtering
  • Association of Religions with Warfare
  • Context free grammers
  • SecureMDA
  • Image-processing

 

In addition to the main themes, submissions are invited to 4 mini tracks: Information Assurance, chaired by Dr Natarajan Vijayarangan, Tata Consultancy Services, India; The Legal Context/Dimension for IW chaired by Prof Daniel J. Ryan, National Defense University, Washington, DC, USA; Critical Infrastructure Protection chaired by Juan Lopez Jr., Center for Cyberspace Research at the Air Force Institute of Technology (AFIT), Dayton, Ohio, USA, and Asymmetric Warfare in Cyberspace – Prospects and Potentials co-Chaired by Dan Shoemaker, Center for Cybersecurity and Intelligence Studies (CCSIS), at the University of Detroit Mercy, Detroit, Michigan, USA and Ronald C. Dodge, Information and Educational Technology at the United States Military Academy (USMA), West Point, New York, USA.

 

Mini Track Call for Papers on Information Assurance   Click icon to download a .pdf

Track Chair: Dr Natarajan Vijayarangan, Tata Consultancy Services, India



Natarajan Vijayarangan

 

 

Information Assurance (IA) is a practice of managing risks related to the usage of systems, memory, data processing, data storage, data transmission, information authorization and accounting. This topic helps to safeguard networks of Army, Marine crops, Navy, Defense Information systems and Federal aviation sectors. The cutting-edge technology of IA provides a great support on computing infrastructure, real time intelligence, surveillance, and reconnaissance information to  military units.


Suggested topics include, but are not limited to:

§                   Attack Sensing and Warning

§                   Attribute-based access control

§                   Audit reduction tools

§                   Access authority and blacklisting

§                   Computer Network Defense and Exploitation

§                  Information Assurance Architecture, Infrastructure and Products.

 

Mini Track Call for Papers on The Legal Context/Dimension for IW   Click icon to download a .pdf

Track Chair: Prof Daniel J. Ryan, National Defense University, Washington, DC, USA



Dan Ryan

 

 

This track will explore the legal framework within which information warfare and related activities must take place. Applicable and evolving international law, both treaties and customary law, will be applied to information operations in peacetime, crises and war. Civil law, criminal law and military law controls on and responses to incidents involving information operations will be considered.


Suggested topics include, but are not limited to:

§                   The legal framework for defensive cybersecurity activities.

§                   The legal framework for cyber espionage activities.

§                   Legal framework/authorities for offensive information operations,      including covert actions and IW

§                   Cybercrime or IW? Legal aspects of incident response.

§                   International Humanitarian Law and IW.

§                   The Laws of Armed Conflict and IW.

 

Mini Track Call for Papers on Critical Infrastructure Protection   Click icon to download a .pdf

Track Chair: Juan Lopez Jr., Center for Cyberspace Research at the Air Force Institute of Technology (AFIT), Dayton, Ohio, USA



Juan Lopez

 

 

Since September 11, 2001 there has been a significant and noticeable global trend in political and administrative initiatives in an attempt to secure the critical infrastructure - physical and virtual alike. Much progress has been made but there still exists room for security solutions (Administrative and Technical) that can accommodate the unique operating characteristics of Critical Infrastructure such as (1) high demand of real-time communications constraint, (2) low-latency communications, (3) resiliency, and (4) Interdependency. This mini-track will explore the theoretical and applied research work in the academic, industrial, and military research communities related to Critical Infrastructure Protection.


Suggested topics include, but are not limited to:

§                   Infrastructure vulnerabilities, threats and risks

§                   Cyber Resilience of control systems

§                   Security challenges, solutions and implementation issues

§                   Infrastructure sector interdependencies and security implications

§                   Risk analysis and risk assessment methodologies

§                   Modeling and simulation of critical infrastructures

§                   Legal, economic, and policy issues in critical infrastructure protection

§                   Secure information sharing

§                   Infrastructure protection case studies

§                   SCADA security, assurance and survivability

§                   Engineering Mission Assurance and Resilience strategies

 

Mini Track Call for Papers on Asymmetric Warfare in Cyberspace – Prospects and Potentials   Click icon to download a .pdf

Track Co-Chairs: Dan Shoemaker, Center for Cybersecurity and Intelligence Studies (CCSIS), at the University of Detroit Mercy, Michigan, USA

Ronald C. Dodge, Information and Educational Technology at the United States Military Academy (USMA), West Point, USA


Dan Shoemaker


Ron Dodge

 

 

This track examines the prospects and potentials for asymmetric warfare in cyberspace. The primary question being addressed here is the likelihood and capabilities of adversaries - that do not fit the traditional nation state model – to wage organized unconventional warfare in cyberspace. Although the United States is the primary area of concern the discussion of the likelihood and possibility of insurgencies in any realm is encouraged.


Suggested topics include, but are not limited to:

§                   Logical approaches to waging insurgent warfare in cyberspace

§                   Likelihood and capabilities of various Jihadist groups

§                   Potential role of organized crime as contractors for insurgent operations

§                   Likelihood and capabilities of home grown insurgencies (is there another Oklahoma City in our Future)

§                   Technology requirements to start an insurgency  

 

 

 

 

 

 

Participants will be asked to vote for the best poster and a prize will be given for the poster receiving the highest number of votes. Additionally a prize will be awarded to the best PhD paper presented at the conference.

 

 

Submission details

Abstract details:

All submission types require an abstract in the first instance. The Abstract should be a minimum of 300 and no more than 500 words including keywords to be received by 12 September 2011  (Extended until 26 September 2011) Please read the Abstract Guidelines section of the website before submitting.

Submission:

Online via the submission form. Please ensure that you complete all relevant sections of the form, including the conference track the abstract is intended for, the proposed title for the paper, the full names (first name and surname, not initials) and email addresses of all authors and a postal address and telephone number for at least one  contact author. Please indicate clearly if the contact author is not the lead author.

Full paper:

Only required when the abstract has been selected and not to be more than 5,000 words including abstract, keywords and references (the Harvard referencing rules need to be followed). Submission date will be no later than 20 October 2011. Authors are advised that this is a final date. Earlier submission of the full paper helps us to manage the review process in a timely manner. Papers should be submitted as .doc or .rtf file attachments by email to Charlotte Hall with the paper submission checklist and copyright form.

Due to the large number of papers expected for this conference, the committee prefers that an author presents only one paper. However, if multiple papers are accepted for publication and presentation, each paper requires a separate registration fee. Author registration and payment must be completed by 16 February 2012 and there are special discounts available for earlybird registration and group bookings, including a special reduced rate for supervisors and students attending together

 

Important information

§            The selection panel of the conference committee will consider all abstracts received by the submission deadline to ensure that the proposed paper is relevant to the Conference.

§            The authors of abstracts that describe a relevant paper will receive a notification of abstract selection.

§            All full papers will be double-blind reviewed by members of the conference committee to ensure an adequate standard, that the proposed subject of their abstract has been followed, that the paper is of a suitable length, the standard of English is adequate and the paper is appropriately referenced.

§            For authors whose first language is not English we request that you have your work proof read prior to submission by a native English speaker (or at least a fluent English speaker). Papers can be rejected due to a poor standard of English. We do offer proof-reading services.

§            Papers that are accepted will be published in the conference proceedings providing at least one author registers and presents the work at the Conference (see the registration section of the conference website for more information about registration). Author registration must be completed by 16 February 2012.

§           Due to the large number of papers expected for this conference, the committee only allows an author to present one paper. However, if multiple papers are accepted for publication and presentation, each paper requires a separate registration fee.

 

 

 

Proceedings for previous ICIW conferences can be purchased from our bookshop by clicking on the Purchase proceedings button.

 

 

 

Important Dates

Abstract submission deadline:

12 September 2011

  Now Closed

 

Notification of abstract acceptance:

16 September 2011

  Completed

 

Full paper due for review:

20 October 2011

  Completed

 

Notification of paper acceptance(with any requested changes):

29 December 2011

  Completed

 

Earlybird registration closes

12 January 2012

  Now closed

 

Final paper due:

26 January 2012

  Completed

 

Final author registration date

16 February 2012

  Completed

 

 

 

 

 

 

Last updated 29 February 2012

 

 

 

 

 

 

 

Academic Conferences Limited - Curtis Farm, Kidmore End, Nr Reading, RG4 9AY, England - Tel: +44 (0)1189 724148 - Fax: +44 (0)1189 724691
eMail: info@academic-conferences.org- Copyright 2003-2011 Academic Conferences Limited - registered in England - No: 4719488 - VAT No: 812 5386 38
Terms & Conditions                                             Privacy Policy