[Infovis] IEEE JISIC 2014 CFP

John Stasko john.stasko at cc.gatech.edu
Sat Mar 1 15:06:36 CET 2014

IEEE Joint Intelligence and Security Informatics Conference (JISIC) 2014
[Intelligence and Security Informatics and European Intelligence and 
Security Informatics Conference]

September 24-26, The Hague, The Netherlands



Since 2003 the IEEE International Conference on Intelligence and 
Security Informatics (ISI) is the leading international scientific 
conference on interdisciplinary research on information technology for 
intelligence, safety and security. In 2011, the European counterpart of 
the ISI started as European Intelligence and Security Informatics 
Conference (EISIC). For the first time both events meet in the IEEE 
Joint Intelligence and Security Informatics Conference (JISIC), enabling 
international researchers on the challenging field of intelligence and 
security informatics to share ideas on problems, solutions and new 

IEEE JISIC features six tracks that are chaired by leading researchers 
on the respective theme:

1. Forensic Intelligence (Jeroen Keppens - King's College London)
2. Decisioning and Interaction (John Stasko - Georgia Institute of 
3. Cyber and infrastructure security (V.S. Subrahmanian - University of 
4. Financial and fraud analysis (Niall Adams - Imperial College London)
5. Computational criminology (Thomas Holt - Michigan State University)
6. Border Control (Jakub Piskorski - FRONTEX)


We invite academic researchers in the field of Intelligence and Security 
Informatics and related areas as well as companies, industry 
consultants, analysts and practitioners in the fields involved to submit 
papers and proposals for tutorials. We are soliciting both research and 
practice and experience papers on the topics of the proposed tracks and 
related topics.
Research papers should either: (a) present results of substantial 
research/scientific work (long papers, 8 pages max), (b) report on an 
ongoing research activity/effort, ideas and new challenges (short 
papers, 4 pages max).
Experience papers (short papers) should describe experiences encountered 
in applying novel research results and methods in the context of the 
conference and/or report on innovative solutions with strong application 
potential that are not yet on the market, or are on the market, but 
require guidance regarding further steps in order to convert them into 
real-world solutions. Submissions should be written in technical style 
rather than sales styles.

We seek to extend IEEE JISIC 2014 experience by tutorials on selected 
topics given by renowned scientists and practitioners in their fields. 
We solicit proposals for half-day tutorials. Tutorials may be lectures, 
interactive workshops, hands-on training, or any combination of the 
above. Exploring diverse ways of interacting with the audience is 
welcome as are cross-disciplinary topics.


* Paper submission due: June 1, 2014
* Notification of acceptance: July 1, 2014
* Camera ready paper due: July 18, 2014
* Authors registration due: July 18, 2014
* Conference: September 24-26, 2014


1. Forensic Intelligence
A broad range of disparate techniques to tackle evidential reasoning and 
forensic investigation have emerged from a variety of fields, including 
argumentation, probabilistic, narrative and knowledge management based 
approaches to collect and assess evidence, and to manage and coordinate 
investigations.  This track aims to bring together academic researchers 
and practitioners with interests in evidential reasoning and forensic 
investigation from disparate fields such as statistics, artificial 
intelligence, decision sciences, forensic sciences and law, to present 
new developments in their respective areas and encourage 
cross-fertilisation between often disparate fields  of research and 

2. Decisioning and Interaction
The track will explore interactive technologies that assist in the 
decision-making processes of security-related domains.  This includes 
visualization and visual analytics systems, interactive decision-support 
and analytical reasoning systems, and other forms of multimedia 
information systems. A key component of this track is a 
human-in-the-loop interaction technology where computational analyses 
are complemented by human exploration and investigation.

3. Cyber and Infrastructure Security
The Security track focuses on computational models of intelligence, 
safety and security aspects of crime and terrorism in the context of 
critical infrastructure and cyberspace. Papers making both theoretical 
and practical aspects of these topics are welcome. Interdisciplinary and 
applied papers, where existing computational methods are applied or 
adapted to the solution of real-world problems in these domains are 
particularly encouraged.

4. Financial and Fraud Analysis
Financial fraud is a serious problem, damaging both international 
economies and personal lives. The areas in which financial fraud can 
occur are diverse, including retail finance, insurance, corporate 
banking and internet transactions. A broad range of tactics are employed 
by fraudsters to obtain illegal advantage. Moreover, the area of fraud 
is an arms-race, with fraudsters constantly changing tactics to 
circumvent protection systems. Thus, methodology that is capable of 
automatically adapting to such changes is of special interest. Many 
financial fraud applications have the character of “big data”, in which 
a very small signal must be extracted from very large and complex data. 
This track will gather novel research contributions in the area of 
financial fraud, with the intention of gaining insight from diverse 
methodologies and application areas.

5. Computational criminology
This track will provide examinations of offender behavior, victimology, 
and law enforcement practices utilizing statistical analysis techniques 
and unique data sources. This includes tests of various criminological 
theories, assessments of social network structures, and organizational 
practices of terror groups, cybercriminals, and gangs.  Evaluations of 
crime prevention strategies, intelligence led policing, and issues of 
public safety, privacy, and security will also be a focus of this track.

6. Border Control
This track solicits papers reporting research work relevant in the 
context of addressing practical operational challenges encountered by 
the border control community. Among others, topics of interest include: 
(a) authentication of documents, people and vehicles, (b) risk 
assessment of travelers, (c) modelling and optimization of the border 
control processing chain, (d) border surveillance, (e) platforms, 
protocols and techniques for secure exchange of information and 
communication, (f) text/data mining, information fusion and utilization 
of new sources of information for intelligence gathering and situational 
awareness, and (g) border control technology impact, acceptance and 

We are looking forward to see you in The Hague - City of Peace and Justice

The IEEE JISIC Organizing Team

More information about the Infovis mailing list