ICIW 2009
4th International Conference on Information Warfare and Security
Breakwater Lodge, Cape Town, South Africa
26-27 March 2009
This is the final call for papers for the 4th International Conference
on Information Warfare and Security, which is being held at the
Breakwater Lodge, Cape Town, South Africa, on the 26-27 March 2009.
http://academic-conferences.org/iciw/iciw2009/iciw09-call-papers.htm
Information warfare and computer security are at the forefront of modern
defence Cyber Strategies. Strong strands of research and interest are
developing in the area, including the understanding of threats and risks
to information systems, the development of a strong security culture, as
well as incident detection and post incident investigation in addition
to the offensive areas associated with information operations such as
perception management and strategic communications. The International
Conference on Information Warfare and Security (ICIW) offers an
opportunity for academics, practitioners and consultants from the US,
North America and elsewhere who are involved in the study, management,
development and implementation of systems and concepts related to
information warfare or are interested in ways to improve information
systems security, to come together and exchange ideas. This conference
is continuing to establish itself as a key event for individuals working
in the field from around the world.
Topics may include, but are not limited to, Adversarial Learning and
planning; Anonymous Routing; Anti-Forensics; Biometrics; Botnets;
Business Continuity Planning; Coordination Theory; Corporate Defence
Mechanisms; Cryptography; Cyber-Terrorism; Damage Assessment; Deception,
Reactive and Proactive; Denial of Service; Differential Power Analysis
(DPA) Attacks; Disaster Recovery; e-Intelligence/Counter-Intelligence;
Electro-magnetic pulse weapons; Ethical, Political and Social Issues
relating to Information Warfare; Geospatial Security; Hacking; Homeland
Security; Honeynet countermeasures; Information Assurance; Information
Operations; Information warfare and Security Education; Information
Warfare policy; Strategic Communications; Perception Management;
Information Warfare techniques; Information Warfare theory; Information,
computer and network security; Infra-Structure warfare; Critical
Infrastructure Protection; Intrusion Detection; Insider Threat; IS027001
ISM3 Security Management Maturity; Legal issues concerned with
information warfare and e-Crime; Malware; National security policy; OODA
Loop; Petri Nets; Perception management; Physical security;
Proliferation Security Initiative (PSI); Risk analysis and assessment;
Security Education; Security for small to medium enterprises; Security
Policy; Vulnerability Assessments.
You can see the full call for papers is available online at
http://academic-conferences.org/iciw/iciw2009/iciw09-call-papers.htm
and you can request a pdf copy for circulation or posting on
noticeboards from me.
Abstracts are required in the first instance and should be submitted by
4 September 2008 via the online form at
http://academic-conferences.org/iciw/iciw2009/iciw09-abstract-submission
.htm
Please feel free to forward this mail to colleagues and contacts who may
be interested.
Kindest regards
Sue Nugus
Conferences Director
[log in to unmask]
http://www.academic-conferences.org
+44 (0)118 972 4148
________________________________________________________________________
This e-mail has been scanned for all viruses by Star. The
service is powered by MessageLabs. For more information on a proactive
anti-virus service working around the clock, around the globe, visit:
http://www.star.net.uk
________________________________________________________________________
|