2nd International Conference on Information Systems and Technology (ICIST2011)
|Event Date/Time: May 16, 2011||End Date/Time: May 17, 2011|
|Registration Date: Apr 10, 2011|
|Early Registration Date: Mar 15, 2011|
|Paper Submission Date: Mar 15, 2011|
A near similar build-up is also happening within the domain of cryptography, albeit, with a slight difference. Crypto and Cipher tools and utilities until recently had obvious uses and needs by elites to hide and transmit information. However when the same techniques were applied to publish leaks, a language of violence and greed, hitherto unknown to the world's citizens suddenly became public. People in power who stand exposed are now feeling ashamed of their conduct and opinions aired. To the fore came techne with a brilliant counter-political move. The world is now aware that ethics needn't be self-imposed, it can be enforced !! A miniscule of most corrupt and powerful set of people who have stashed illgotten wealth find them on the brink of getting exposed, and so are banking institutions that conducted unethical managerial practices. Transparency hurts the cunning, when their misdeeds come out in the open. Corrupt entities find themselves threatened by technology, for, whatever had been invented for secrecy are now returning to haunt. Predators suddenly realise that they are being preyed upon, and that escape is no more possible !! Rules of life in the new millennium are changing. We need to continue scripting more of such rules to help realise a better digital world. The Second International Conference on Information Systems and Technology (ICIST 2011) aims at bringing forth researchers and scholars from academic and research establishments to present unpublished research, case studies, implementations or critical reviews for works which aim at re-creating a sensible world.