Link: http://www.igi-global.com/publish/call-for-papers/call-details/1771 | |||||||||||||||||
| |||||||||||||||||
Call For Papers | |||||||||||||||||
Editors
Maurice Dawson, University of Missouri-St. Louis, USA Call for Chapters: Proposals Submission Deadline: June 30, 2015 Full Chapters Due: August 30, 2015 Introduction: This handbook of research will explore multiple aspects of homeland security and countermeasures in today's society. This book provides insights on the current issues surrounding homeland security threats such as cyber terrorism, natural disasters, border control, civil liberties, unmanned systems and more. Additionally, countermeasures such as network security, law enforcement, intelligence, surveillance, reconnaissance, cyber security, and physical security will be explored. Researchers, practitioners, and professionals will benefit from this publication’s broad perspective. Objective: This book will aim to provide relevant theoretical frameworks and the latest empirical research findings in the area. It will be written for professionals and researchers who want to improve their understanding of the strategic role of trust at different levels of homeland security and associated countermeasures. Target Audience: The target audience of this book will be composed of professionals and researchers working in the field of homeland security, cyber security, and intelligence analysis, e.g. military studies, computer science, security engineering, disaster recovery, business continuity, and information technology. Moreover, the book will provide insights and support from practitioners and academia in order to highlight the most debateful aspects in the field. Recommended Topics: Recommended topics include, but are not limited to, the following: Military intelligence Cyber security Military defense Business continuity Disaster recover planning Unmanned systems Network security Physical security Economic security Immigration enforcement Law enforcement Terrorism Cyber terrorism Transportation security Human trafficking International engagement Border security Civil rights and civil liberties Disasters Technology transfer and commercialization Technology management Information security Submission Procedure: Researchers and practitioners are invited to submit on or before June 30, 2015, a chapter proposal of 1,000 to 2,000 words clearly explaining the mission and concerns of his or her proposed chapter. Authors will be notified by July 30, 2015 about the status of their proposals and sent chapter guidelines. Full chapters are expected to be submitted by August 30, 2015. All submitted chapters will be reviewed on a double-blind review basis. Contributors may also be requested to serve as reviewers for this project. Note: There are no submission or acceptance fees for manuscripts submitted to this book publication, Handbook of Research on Homeland Security Threats and Countermeasures. All manuscripts are accepted based on a double-blind peer review editorial process. Full chapters may be submitted to this book here: Submit a Chapter All proposals should be submitted through the E-Editorial DiscoveryTM online submission manager. Publisher: This book is scheduled to be published by IGI Global (formerly Idea Group Inc.), an international academic publisher of the “Information Science Reference” (formerly Idea Group Reference), “Medical Information Science Reference,” “Business Science Reference,” and “Engineering Science Reference” imprints. IGI Global specializes in publishing reference books, scholarly journals, and electronic databases featuring academic research on a variety of innovative topic areas including, but not limited to, education, social science, medicine and healthcare, business and management, information science and technology, engineering, public administration, library and information science, media and communication studies, and environmental science. For additional information regarding the publisher, please visit www.igi-global.com. This publication is anticipated to be released in 2016. Important Dates: For new submissions Proposal Submission Deadline: June 30, 2015 Chapter Proposal Approval: July 30, 2015 Full chapter Submission: August 30, 2015 Review Results to Authors: October 30, 2015 Revised Chapter Submission: November 30, 2015 Final Acceptance Notifications: December 15, 2015 For enhanced submissions: Enhanced chapter submission: June 30, 2015 Review Enhanced Material: June 30-July 30, 2015 Final Deadline for all Materials to IGI: January 30, 2016 Inquiries: Inquires can be forwarded to electronically (Word document): Dr. Maurice Dawson University of Missouri- St. Louis Department of Information Systems College of Business Administration 228 Express Scripts Hall One University Blvd St. Louis, MO 63121-4400 USA Phone: +1-314-516-6288 Email: dawsonmau@umsl.edu |
Blog focuses on Linux, open source software, cyber security, futuring, innovation, systems engineering, Africa, and other items related to technology.
Showing posts with label computing. Show all posts
Showing posts with label computing. Show all posts
Friday, April 3, 2015
Call for Book Chapters - HOMELAND SEC 2015 : Handbook of Research on Homeland Security Threats and Countermeasures
Tuesday, January 20, 2015
West African Symposium on Technology, Science, Sustainability, and Computing, 2015
TSSC 2015 : West African Symposium on Technology, Science, Sustainability, and Computing, 2015 | |||||||||||||||||
Link: http://tssc2015.yolasite.com/ | |||||||||||||||||
| |||||||||||||||||
Call For Papers | |||||||||||||||||
AIMS AND SCOPE
The West African Symposium on Technology, Science, Sustainability, and Computing, TSSC 2015, is devoted to reviewing current achievements and trends that have the ability to affect Africa and other developing nations. The main purpose of the international symposium is to discuss in a unique and collaborative setting a broad range of topics. The quality of presentations is very high and lively discussions take place during the different sessions between computer scientists, technologists, and drivers of sustainability, corroborating the multidisciplinary of the research activities around micro/nanotechnologies for sensors and devices. Past conference success is due to the help of many people, groups, and institutions. The symposium will include a few 40-minute general review talks to introduce the current problems, and 20-minute talks to discuss new experimental and theoretical results. A series of 15-minute talks discuss the ongoing student research from students in the West African region. There are also some general talks about the future directions of scientific research on cyber security, sustainable design, laws, policies, and computing. Additionally, there will be hands on workshops that everyone can participate in. For those that participate virtually there will be recorded sessions on Google Talk that will be archived online for all to view. TOPIC AREAS Potential topics include, but are not limited to: 1) New trends in computing, 2) information systems, and 3) other technological advances Systems design Innovations in science Open source software and hardware, and 4) Sustainability Educational trends in the fields of science and technology. For students they may submit on any technical subject matter area however high preference will be given to those in computing. The subject focus should be on science and technology in emerging nations. If you have questions concerning your topic area email us at dawsonmau@umsl.edu. SUBMISSION DATES Manuscript Due - March 20, 2015 First Round of Reviews - March 30, 2015 Publication Date - June, 2015 23-24 March 2015, Serrekunda, The Gambia at The University of The Gambia Faculty of Law Building 2-5 April 2015, VIRTUAL PUBLICATION OUTLETS Proceedings will be published and authors will be invited to submit to an IGI book as the author of a chapter. ASSOCIATED JOURNAL Best papers will be invited to submit an extended paper to the International Journal of Strategic Information Technology and Applications (IJSITA). The International Journal of Strategic Information Technology and Applications (IJSITA) provides state-of-the-art research on the optimization of performance in corporations, groups, associations, communities of practice, community organizations, governments, non-profits, nations, and societies that implement information systems. This journal covers analysis and avoidance of risk, detection and prevention of problems, acquisition and management of knowledge, preparation and response to emergencies, enhancement of decision making, facilitation of collaborative efforts, and incremental organizational wisdom. |
Labels:
2015,
africa,
computing,
conference,
gambia,
global,
phd,
science,
sustainability
Wednesday, August 13, 2014
Sunday, January 12, 2014
Call for Chapters: Handbook of Research on New Threats and Countermeasures in Digital Crime and Cyber Terrorism
Call for Chapters: Handbook of Research on New Threats and Countermeasures in Digital Crime and Cyber Terrorism
Editors
Dr. Marwan Omar, Nawroz University, Iraq
Call for Chapters
Introduction
Objective
Target Audience
Recommended Topics
- Network and Mobile Security
- Virtual Words for Terrorism Training Grounds
- Attacking Health Care Devices
- Automobiles Access Points
- Cyber Terrorism
- Cyber Crime
- Software Assurance
- Exploiting Code Vulnerabilities
- Future Predictions of Cyber Crime
- Department of Defense Information Assurance Controls
- Reverse Engineering
- Vulnerabilities in Mixed & Augmented Reality
- Vulnerabilities in Google Glass
- Systems of Systems Attacks
- Unmanned Systems Exploitations
- Certification and Accreditation
- Cryptosystems
We strongly welcome other topics suggestions, dealing with other negative uses of technology and science such as attacking national infrastructure, cloud computing security, offensive security practices, and other unknown exploits.
Submission Procedure
Publisher
Important Dates
2nd Proposal Submission Deadline: March 15, 2014
Last Call for Proposals: April 15, 2014
Full chapter Submission: June 15, 2014
Review Process: June 15, 2014 –July 30, 2014
Review Results to Authors: August 15, 2014
Revised Chapter Submission: September 15, 2014
Final Acceptance Notifications: September 30, 2014
Submission of Final Chapters: October 15, 2014
Final Deadline: November 30, 2014
Inquiries
Dr. Maurice Dawson
Department of Management and Marketing
College of Business and Public Affairs
Alabama A&M University
Tel.: +1-256-372-4801
Primary Email: maurice.e.dawson@gmail.com
Secondary Email: maurice.dawson@aamu.edu
Tuesday, December 28, 2010
2011 Publication "Applicability of Web 2.0 for Tactical Military Applications” Global Conference on Technology, Innovation, Media, & Education – Global TIME
I am proud to have received a solo publication for 2011 with the Association for the Advancement of Computing in Education (AACE). Below is a photo of my proceedings acceptance letter.
Wednesday, August 12, 2009
Birth of the Computer
Talks George Dyson at the birth of the computer at http://www.ted.com/talks/lang/eng/george_dyson_at_the_birth_of_the_computer.html
This discussion talks about the fundamentals of the origins of the modern computer from 17th century origins to present days notebooks. This is a truly informative discussion that displays the role of Princeton to include how original computer was utilized for bomb calculation to include showing that the first programmers were women.
So when we take a look at this particular discussion what are our thoughts pertaining to this matter as it has evolved and continuously evolving today?
This discussion talks about the fundamentals of the origins of the modern computer from 17th century origins to present days notebooks. This is a truly informative discussion that displays the role of Princeton to include how original computer was utilized for bomb calculation to include showing that the first programmers were women.
So when we take a look at this particular discussion what are our thoughts pertaining to this matter as it has evolved and continuously evolving today?
Subscribe to:
Posts (Atom)