Showing posts with label computing. Show all posts
Showing posts with label computing. Show all posts

Friday, April 3, 2015

Call for Book Chapters - HOMELAND SEC 2015 : Handbook of Research on Homeland Security Threats and Countermeasures


Link: http://www.igi-global.com/publish/call-for-papers/call-details/1771
 
WhenJun 30, 2015 - Nov 30, 2015
WhereN/A
Abstract Registration DueJun 30, 2015
Submission DeadlineAug 3, 2015
Notification DueOct 30, 2015
Final Version DueNov 30, 2015
Categories    homeland security   cyber security   security   threats
 

Call For Papers

Editors
Maurice Dawson, University of Missouri-St. Louis, USA

Call for Chapters:
Proposals Submission Deadline: June 30, 2015
Full Chapters Due: August 30, 2015

Introduction:
This handbook of research will explore multiple aspects of homeland security and countermeasures in today's society. This book provides insights on the current issues surrounding homeland security threats such as cyber terrorism, natural disasters, border control, civil liberties, unmanned systems and more. Additionally, countermeasures such as network security, law enforcement, intelligence, surveillance, reconnaissance, cyber security, and physical security will be explored. Researchers, practitioners, and professionals will benefit from this publication’s broad perspective.

Objective:
This book will aim to provide relevant theoretical frameworks and the latest empirical research findings in the area. It will be written for professionals and researchers who want to improve their understanding of the strategic role of trust at different levels of homeland security and associated countermeasures.

Target Audience:
The target audience of this book will be composed of professionals and researchers working in the field of homeland security, cyber security, and intelligence analysis, e.g. military studies, computer science, security engineering, disaster recovery, business continuity, and information technology. Moreover, the book will provide insights and support from practitioners and academia in order to highlight the most debateful aspects in the field.

Recommended Topics:
Recommended topics include, but are not limited to, the following:
Military intelligence
Cyber security
Military defense
Business continuity
Disaster recover planning
Unmanned systems
Network security
Physical security
Economic security
Immigration enforcement
Law enforcement
Terrorism
Cyber terrorism
Transportation security
Human trafficking
International engagement
Border security
Civil rights and civil liberties
Disasters
Technology transfer and commercialization
Technology management
Information security


Submission Procedure:
Researchers and practitioners are invited to submit on or before June 30, 2015, a chapter proposal of 1,000 to 2,000 words clearly explaining the mission and concerns of his or her proposed chapter. Authors will be notified by July 30, 2015 about the status of their proposals and sent chapter guidelines. Full chapters are expected to be submitted by August 30, 2015. All submitted chapters will be reviewed on a double-blind review basis. Contributors may also be requested to serve as reviewers for this project.

Note: There are no submission or acceptance fees for manuscripts submitted to this book publication, Handbook of Research on Homeland Security Threats and Countermeasures. All manuscripts are accepted based on a double-blind peer review editorial process.

Full chapters may be submitted to this book here: Submit a Chapter

All proposals should be submitted through the E-Editorial DiscoveryTM online submission manager.


Publisher:
This book is scheduled to be published by IGI Global (formerly Idea Group Inc.), an international academic publisher of the “Information Science Reference” (formerly Idea Group Reference), “Medical Information Science Reference,” “Business Science Reference,” and “Engineering Science Reference” imprints. IGI Global specializes in publishing reference books, scholarly journals, and electronic databases featuring academic research on a variety of innovative topic areas including, but not limited to, education, social science, medicine and healthcare, business and management, information science and technology, engineering, public administration, library and information science, media and communication studies, and environmental science. For additional information regarding the publisher, please visit www.igi-global.com. This publication is anticipated to be released in 2016.


Important Dates:
For new submissions
Proposal Submission Deadline: June 30, 2015
Chapter Proposal Approval: July 30, 2015
Full chapter Submission: August 30, 2015
Review Results to Authors: October 30, 2015
Revised Chapter Submission: November 30, 2015
Final Acceptance Notifications: December 15, 2015

For enhanced submissions:
Enhanced chapter submission: June 30, 2015
Review Enhanced Material: June 30-July 30, 2015
Final Deadline for all Materials to IGI: January 30, 2016


Inquiries:
Inquires can be forwarded to electronically (Word document):
Dr. Maurice Dawson
University of Missouri- St. Louis
Department of Information Systems
College of Business Administration
228 Express Scripts Hall
One University Blvd
St. Louis, MO 63121-4400 USA
Phone: +1-314-516-6288
Email: dawsonmau@umsl.edu

Tuesday, January 20, 2015

West African Symposium on Technology, Science, Sustainability, and Computing, 2015

TSSC 2015 : West African Symposium on Technology, Science, Sustainability, and Computing, 2015

FacebookTwitterLinkedInGoogle

Link: http://tssc2015.yolasite.com/
 
WhenMar 23, 2015 - Mar 24, 2015
WhereSerrekunda, The Gambia
Abstract Registration DueMar 13, 2015
Submission DeadlineMar 20, 2015
Notification DueMar 30, 2015
Final Version DueApr 30, 2015
Categories    computer   information systems   technology   science
 

Call For Papers

AIMS AND SCOPE

The West African Symposium on Technology, Science, Sustainability, and Computing, TSSC 2015, is devoted to reviewing current achievements and trends that have the ability to affect Africa and other developing nations. The main purpose of the international symposium is to discuss in a unique and collaborative setting a broad range of topics.

The quality of presentations is very high and lively discussions take place during the different sessions between computer scientists, technologists, and drivers of sustainability, corroborating the multidisciplinary of the research activities around micro/nanotechnologies for sensors and devices. Past conference success is due to the help of many people, groups, and institutions.

The symposium will include a few 40-minute general review talks to introduce the current problems, and 20-minute talks to discuss new experimental and theoretical results. A series of 15-minute talks discuss the ongoing student research from students in the West African region. There are also some general talks about the future directions of scientific research on cyber security, sustainable design, laws, policies, and computing. Additionally, there will be hands on workshops that everyone can participate in.

For those that participate virtually there will be recorded sessions on Google Talk that will be archived online for all to view.


TOPIC AREAS

Potential topics include, but are not limited to: 1) New trends in computing, 2) information systems, and 3) other technological advances Systems design Innovations in science Open source software and hardware, and 4) Sustainability Educational trends in the fields of science and technology. For students they may submit on any technical subject matter area however high preference will be given to those in computing. The subject focus should be on science and technology in emerging nations. If you have questions concerning your topic area email us at dawsonmau@umsl.edu.

SUBMISSION DATES
Manuscript Due - March 20, 2015
First Round of Reviews - March 30, 2015
Publication Date - June, 2015

23-24 March 2015, Serrekunda, The Gambia at The University of The Gambia Faculty of Law Building
2-5 April 2015, VIRTUAL

PUBLICATION OUTLETS

Proceedings will be published and authors will be invited to submit to an IGI book as the author of a chapter.

ASSOCIATED JOURNAL

Best papers will be invited to submit an extended paper to the International Journal of Strategic Information Technology and Applications (IJSITA). The International Journal of Strategic Information Technology and Applications (IJSITA) provides state-of-the-art research on the optimization of performance in corporations, groups, associations, communities of practice, community organizations, governments, non-profits, nations, and societies that implement information systems. This journal covers analysis and avoidance of risk, detection and prevention of problems, acquisition and management of knowledge, preparation and response to emergencies, enhancement of decision making, facilitation of collaborative efforts, and incremental organizational wisdom.

Sunday, January 12, 2014

Call for Chapters: Handbook of Research on New Threats and Countermeasures in Digital Crime and Cyber Terrorism

Call for Chapters: Handbook of Research on New Threats and Countermeasures in Digital Crime and Cyber Terrorism

Editors

Dr. Maurice Dawson, Alabama A&M University, USA
Dr. Marwan Omar, Nawroz University, Iraq

Call for Chapters

Proposals Submission Deadline: February 15, 2014Full Chapters Due: June 15, 2014Submission Date: October 15, 2014

Introduction

This handbook of research will explore multiple aspects of cyber terrorism and cyber crime in today's society. This book provides insights on the negatives uses of technology with comprehensive review of the associated vulnerabilities and mitigations. Researchers, practitioners, and professionals will benefits from this publication’s broad perspective.

Objective

This proposed publication takes an entirely different route in describing digital crime and cyber terrorism. This publication has the potential to aid organizations everywhere to effectively defend their systems.

Target Audience

The handbook of research is expected to get a large amount of attention in the cyber security realm. This will cover all emerging negative uses of technologies which will allow individuals to gain insight so they can better defend these new attacks. This can be used by training organization, intelligence community, and others responsible for network defense.

Recommended Topics

  • Network and Mobile Security
  • Virtual Words for Terrorism Training Grounds
  • Attacking Health Care Devices
  • Automobiles Access Points
  • Cyber Terrorism
  • Cyber Crime
  • Software Assurance
  • Exploiting Code Vulnerabilities
  • Future Predictions of Cyber Crime
  • Department of Defense Information Assurance Controls
  • Reverse Engineering
  • Vulnerabilities in Mixed & Augmented Reality
  • Vulnerabilities in Google Glass
  • Systems of Systems Attacks
  • Unmanned Systems Exploitations
  • Certification and Accreditation
  • Cryptosystems

We strongly welcome other topics suggestions, dealing with other negative uses of technology and science such as attacking national infrastructure, cloud computing security, offensive security practices, and other unknown exploits.

Submission Procedure

Researchers are invited to submit on or before February 15, 2014, a 2-3 page chapter proposal clearly explaining the mission and concerns of his or her proposed chapter. Authors of accepted proposals will be notified March 31, 2014 about the status of their proposals and sent chapter guidelines. Authors of accepted proposals will be sent guidelines to prepare the full chapter (7,000 – 11,000 words length). Full chapters are expected to be submitted by June 15, 2014. All submitted chapter will be reviewed on a double-blind review basis. Contributors may also be requested to serve as a reviewer for this project.

Publisher

This handbook of research is scheduled to be published by IGI Global (formerly Idea Group Inc.), publisher of the “Information Science Reference” (formerly Idea Group Reference), “Medical Information Science Reference”, “Business Science Reference”, and “Engineering Science Reference” imprints. For additional information regarding the publisher, please visit www.igi-global.com.. This publication is anticipated to be released early 2015.

Important Dates

1st Proposal Submission Deadline: February 15, 2014
2nd Proposal Submission Deadline: March 15, 2014
Last Call for Proposals: April 15, 2014
Full chapter Submission: June 15, 2014
Review Process: June 15, 2014 –July 30, 2014
Review Results to Authors: August 15, 2014
Revised Chapter Submission: September 15, 2014
Final Acceptance Notifications: September 30, 2014
Submission of Final Chapters: October 15, 2014
Final Deadline: November 30, 2014

Inquiries

Inquires can be forwarded to electronically (Word document):
Dr. Maurice Dawson
Department of Management and Marketing
College of Business and Public Affairs
Alabama A&M University
Tel.: +1-256-372-4801
Primary Email: maurice.e.dawson@gmail.com
Secondary Email: maurice.dawson@aamu.edu


Tuesday, December 28, 2010

2011 Publication "Applicability of Web 2.0 for Tactical Military Applications” Global Conference on Technology, Innovation, Media, & Education – Global TIME

I am proud to have received a solo publication for 2011 with the Association for the Advancement of Computing in Education (AACE).  Below is a photo of my proceedings acceptance letter.

Wednesday, August 12, 2009

Birth of the Computer

Talks George Dyson at the birth of the computer at http://www.ted.com/talks/lang/eng/george_dyson_at_the_birth_of_the_computer.html

This discussion talks about the fundamentals of the origins of the modern computer from 17th century origins to present days notebooks. This is a truly informative discussion that displays the role of Princeton to include how original computer was utilized for bomb calculation to include showing that the first programmers were women.

So when we take a look at this particular discussion what are our thoughts pertaining to this matter as it has evolved and continuously evolving today?