ICIW 2009
4th International Conference on Information Warfare and Security
Breakwater Lodge, Cape Town, South Africa
26-27 March 2009
Conference Chair: Johannes Vorster, Council for Scientific and
Industrial Research, Pretoria, South Africa
Programme Chair: Edwin Leigh Armistead, Edith Cowan University,
Australia
Keynote Speakers: TBD
Information warfare and security are at the forefront of modern
defence strategies. Strong strands of research and interest are
developing in the area, including the understanding of threats and
risks to information systems, the development of a strong security
culture, as well as incident detection and post incident
investigation. The International Conference on Information Warfare
and Security (ICIW) offers an opportunity for academics, practitioners
and consultants from the US, North America and elsewhere who are
involved in the study, management, development and implementation of
systems and concepts related to information warfare or are interested
in ways to improve information systems security, to come together and
exchange ideas. This conference is continuing to establish itself as a
key event for individuals working in the field from around the world.
The advisory group for the conference invites submissions of papers on
both the theory and practice of all aspects of Information Warfare and
Security. The conference in March 2009 is seeking qualitative,
experience-based and quantitative papers as well as case studies and
reports of work in progress from academics, information systems
practitioners, consultants and government departments.
Topics may include, but are not limited to:
Adversarial Learning and planning
Anonymous Routing
Anti-Forensics
Biometrics
Botnets
Business continuity planning
Coordination Theory
Corporate defence mechanisms
Cryptography
Cyber-terrorism
Damage Assessment
Deception, Reactive and Proactive
Denial of Service
Differential Power Analysis (DPA) Attacks
Disaster recovery
e-Intelligence/counter-intelligence
Electro-magnetic pulse weapons
Ethical, Political and Social Issues relating to Information Warfare
Geospatial Security
Hacking
Homeland Security
Honeynet countermeasures
Information Assurance
Information Operations
Information warfare and security education
Information warfare policy
Information warfare techniques
Information warfare theory
Information, computer and network security
Infra-structure warfare
Intrusion Detection
Insider Threat
IS027001 ISM3 Security Management Maturity
Legal issues concerned with information warfare and e-Crime
Malware
National security policy
OODA Loop
Petri Nets
Perception management
Physical security
Proliferation Security Initiative (PSI)
Risk analysis and assessment
Security Education
Security for small to medium enterprises
Security policy
Vulnerability assessments.
Publication Opportunity
Selected papers from the Conference will be considered for publication
in a special issue of the Journal of Information Warfare:
http://www.jinfowar.com
Purchase previous conference proceedings
The proceedings for this conference are listed on the Index to
Scientific and Technical Proceedings (ISTP/ISI Proceedings), the Index
to Social Sciences & Humanities Proceedings (ISSHP) and the Index to
Social Sciences & Humanities Proceedings (ISSHP/ISI Proceedings).
Submission details
Abstract details: The Abstract should be a minimum of 300 and no more
than 500 words including up to five keywords and keyphrases to be
received by 4 September 2008. Please read the abstract guidelines
Submission: Via the online submission form. Please ensure that you
complete all relevant sections of the form, including the conference
track the abstract is intended for, the proposed title for the paper,
the full names (first name and surname, not initials) and email
addresses of all authors and a postal address and telephone number for
at least one contact author. Please indicate clearly if the contact
author is not the lead author.
Full paper: Only required when the abstract has been selected and not
to be more than 5,000 words including abstract, keywords and
references (the Harvard referencing rules need to be
followed). Submission date will be no later than 23 October
2008. Papers should be submitted as .doc or .rtf file attachments by
email to the conference manager, Elaine Hayne.
Important information
* The selection panel of the conference committee will consider
all abstracts received by the submission deadline to ensure that the
proposed paper is relevant to the Conference.
* The authors of abstracts that describe a relevant paper will
receive a notification of abstract selection.
* All full papers will be double-blind reviewed by members of the
conference committee to ensure an adequate standard, that the proposed
subject of their abstract has been followed, that the paper is of a
suitable length, the standard of English is adequate and the paper is
appropriately referenced.
* For authors whose first language is not English we request that
you have your work proof read prior to submission by a native English
speaker (or at least a fluent English speaker). Papers can be rejected
due to a poor standard of English.
* Papers that are accepted will be published in the conference
proceedings providing at least one author registers and presents the
work at the Conference (see the registration section of the conference
website for more information about registration).
* Due to the large number of papers expected for this conference,
the committee only allows an author to present one paper. Therefore if
multiple papers are accepted for presentation different co-authors
need to present each paper. Author registrations must be completed by
19 February 2009.
Important Dates
Abstract submission deadline: 4 September 2008
Notification of abstract acceptance: 11 September 2008
Full paper due for review: 23 October 2008
Notification of paper acceptance(with any requested changes):
4 January 2009
Earlybird registration closes, 18 January 2009
Final paper due: 29 January 2009
Final author registration date, 19 February 2009