8th European Conference on Information Warfare and Security (ECIW 2009)
Venue: Military Academy
|Event Date/Time: Jul 06, 2009||End Date/Time: Jul 07, 2009|
The conference committee welcomes both academic and practitioner papers on a wide range of topics and a wide range of scholarly approaches including theoretical and empirical papers employing qualitative, quantitative and critical methods. Action research, case studies and research-in-progress are welcomed approaches. Research in progress, case studies, poster submissions, proposals for roundtable discussions, practitioner contributions, and product demonstrations based on the main themes are also invited.
Download this page
in .pdf format
Submission details are given below. Topics for submissions may include, but are not limited to:
Principles of i-Warfare
Counter-terrorism security policies, procedures and legislation
Information warfare policy
SMEs - Small-to-medium Size Enterprises Security model
Critical national infrastructure protection
Information warfare theory
Security implications of â€œvirtualised machines and services
e-Health systems as part of a national critical infrastructure
Information warfare techniques
The Resilience and Susceptibility of "Service Oriented Architectures" (SOAs)
Information security governance and management
Information warfare and security education
Networked Centric War
Art of war
Particle swarm data mining
Virtual Intrusion Detection
Electro-magnetic pulse weapons
Collaborative decision making
National security policy
Acute situational awareness
Phishing and spam
Current Anti Virus Technologies
Network anomaly detection models
PSYOP - PSYOPS
Corporate defence mechanisms
Security for small to medium enterprises
Information, computer and network security
Military Culture Topography
Security of the virtual worlds
SIMAD what can/should be done to protect against this threat?
Unidirectional linguistic steganography
Compromise path analysis
Gaussian empirical rule
IT auditing and compliance
Information Security Architecture
Data and service integration
Random numbers approximation sequence
Artificial immune recognition system security infrastructure
Legal issues concerned with information warfare and e-Crime
Public Key Infrastructure
Network Address Translator
Ethical, political and social issues relating to information warfare
Machine Learning Risk
Association of Religions with Warfare
Context free grammers
In addition to the main conference, submissions are welcomed to 3 mini tracks: Messy Wars or What? Co-Chaired by Aki Huttinen and Jari Rantapelkonen, Finnish Defence Force, Finland, Network Enabled Operations and Cyber Defense.
Papers should address the conference topics listed above and can describe a wide range of research including empirical or theoretical studies. In addition, philosophical papers presenting an argument and papers presenting a process that has been developed and is now ready for wider use are welcome. In all cases concepts and underlying principles should be emphasized, with enough background information to orient any reader who is not a specialist in the particular subject area original. The work should not have been published elsewhere and should not be intended to be published elsewhere during the review period.
Research in Progress
Researchers may submit current projects whilst they are still in progress. To be eligible, it is necessary for a paper to be produced to a publishable academic standard and papers will be subject to the same criteria and processes as research papers. However the final results of the research may not have been fully completed and interpreted.
Case Study Submissions
Case study submissions should be written to publishable standards. Case studies will be subject to the same criteria and the processes as research papers.
Posters provide an opportunity for researchers to present their work in an informal setting in which there is more time for discussion and questions than is sometimes available in a full paper session. This track is an ideal forum for the presentation of work in progress. Poster submissions are welcomed in any of the areas identified in the call for papers.
Poster submission requirements
An abstract describing the work being presented on the poster should be submitted in accordance with the submission details below. Be sure to select Poster as the submission type.
Poster abstracts will be blind reviewed by a member of the programme committee. Reviewers will be asked to consider the appropriateness of the work for poster presentation.
On acceptance instructions on poster dimensions etc will be supplied.
Poster abstracts and images of the final poster will be published in the CD version of the Conference Proceedings.
At least one person must register for the conference to present the poster.
Posters will be displayed close to the refreshment area so that all who attend will have an opportunity to see them. There will be a timetabled period when Poster Owners should staff their poster so that participants can come and discuss the research.
Round Table Proposals
The Programme Committee invites topical subjects to be proposed for discussion.
An abstract proposing a topic and stating why it is felt this would be an interesting contribution to the conference should be submitted in accordance with the submission details below. Be sure to select Round Table Proposal as the submission type.
Proposals will be considered by the programme committee.
If a proposal is selected the convenor will be asked to nominate knowledge informants in the field who will be prepared to participate. Round Table Discussions can be either 30 minutes or 1 hour in duration. The convenor must register for the conference.
Other participants can attend the Round Table without conference registration, but if they wish to attend any other part of the conference registration will be required.
The conference committee welcomes contributions from individuals and organisations working in the field. These contributions can take the form of a presentation or a demonstration.
An abstract describing the work to be presented should be submitted in accordance with the submission details below. Be sure to select Practitioner Contribution as the submission type.
Practitioner abstracts will be reviewed by the programme committee. Reviewers will be asked to consider the appropriateness of the work for presentation at the conference.
Authors of selected presentations will have their abstract included in the booklet of abstracts given to participants at the conference.
At least one person must register for the conference to give the presentation.
Submit a proposal of 200-300 words describing an e-Learning product you wish to demonstrate and the audience it serves. Proposals should be sent as email attachments to Sue Nugus ( firstname.lastname@example.org ) not later than 2 February 2009. Demonstrations themselves are expected to be approximately 15 minutes in length.