Call for Papers:

Interdisciplinary Studies in Information Privacy and Security
Workshop-Conference 2008 
to be held on May 12, 2008 at the Hyatt in New Brunswick, New Jersey.

URL:
http://www.scils.rutgers.edu/ci/isips/WebPage%20ISIPS%20Practice/index.html

*Call for Papers*

There is an inherent tension between the need to gather intelligence
necessary to protect the security of persons and nations, and the
privacy rights of persons and organizations. The Center for
Interdisciplinary Studies in Information Privacy and Security was
established to explore this interplay. The second international
workshop and conference on these topics will be held on May 12 in New
Brunswick, New Jersey. The conference is sponsored by the ISIPS, and
by the Center for Dynamic Data Analysis (DyDAn).

Following our 2007 conference model, the conference will feature
parallel tracks on technical issues and social, ethical and legal
issues related to privacy and security. Proposals for papers, panels
or posters are welcome from practitioners in the field of security,
academic researchers in fields of security and privacy, and others
interested in investigating this area.  New to this year's workshop
will be an exploration of the interaction between privacy rights and
the gathering of data for commercial purposes or to facilitate the
growth of online communities such as U2 and Facebook.

Principal themes:

*To what extent can we protect privacy while still maintaining homeland
  security?
*What are the conflicts? What are the solutions?
*What is the role of commercial entities?
*What are the impacts of voluntary disclosure of personal information?

As distinct from organizations focused on increasing the security AND
privacy of electronic information, this conference is focused on the
trade-off implied in: "Those who would give up Essential Liberty to
purchase a little Temporary Safety deserve neither" (attributed to
Benjamin Franklin, letter from the Pennsylvania Assembly, 1755).

For example, we seek papers that discuss the (homeland) security value
of different data mining efforts and the risk to individuals of those
same efforts. Or, papers that address the difficulty of translating
the obvious difference between the security of a letter, and that of a
postcard, into the digital world.

The conference proceedings will be published in the prestigious series
Lecture Notes in Computer Science (LNCS) published by Springer, 
http://www.springer.com/computer?SGWID=0-146-0-0-0

Submissions may address practice, theory, system, methodology,
evaluation, technology, testbed or policy. Well-reasoned position
papers will also be considered. Research papers must be relevant to
the management of information for purposes of protecting the general
security of citizens OR to the issues involved in protecting
information that persons or corporations may wish to hold private (or,
of course, the interface between these issues). Practice papers should
reflect real experience or real needs.  Topics include but are not
limited to areas noted below.

Extended Abstracts of no more than 5 pages (6,000 words in English)
may be submitted by Monday, March 17th, 2008 at:
http://www.softconf.com/start/ISIPS2008/

I. General Paper Topics include:

Privacy protecting data-mining
Anonymous sharing of information
Electronic whistle blowing
Voluntary disclosure of personal information for commercial purposes
Protection of the privacy of users of online document management
 systems
Systems for analyzing encrypted data Methods for detecting and
 tracking terrorist activity
Filtering and categorization of message streams Adaptive systems that
 detect significant changes in data streams 
Social aspects of information sharing behavior 
National and international legal standards for privacy protection 
Roles and responsibilities of information utilities in security and privacy

II. Mining of data for terror threats
-Identifying unusual patterns of action
-Coping with changing threats
-Identifying social networks of agents or actors -Real-time tracking and
 detection of threats for rapid response
-Intrusion, detection and protection
-Deception and intent detection in people streaming past a point 
-Web-based intelligence monitoring and analysis 
-Agents and collaborative systems for intelligence sharing
-Processing, sharing, and analysis 
-Social network analysis (radicalization, recruitment, operations),
 visualization and simulation

III. Privacy protection and disclosure
-Personal patterns of information disclosure 
-Practical effectiveness of data anonymization techniques 
-Information disclosure for commercial advantage (shopper ID) 
-Position tracking and monitoring 
-Position aware collaboration via mobile phones

IV. The tension between security and the privacy of information 
-University
responsibilities with regard to student risks and threats 
-Government responsibility to protect privacy of citizens 
-Analysis of government efforts to monitor communication 
-Terrorism forecasting and root-cause analysis 
-Measuring terrorism's impact on society 
-Information sharing policy and governance

Program Committee:
Yaakov Amidror, Lander Institute, Israel 
Yigal Arens, USC/ISI 
Antonio Badia, University of Louisville 
Arthur Becker, ITIC 
*Terry Benzel, University of Southern California 
Michael Blair, RDEC 
Endre Boros, RUTCOR, Rutgers University 
Yigal Carmon, MEMRI 
*Fred Cate, Indiana University School of Law 
Gordon Cormack, University of Waterloo 
George Cybenko, Dartmouth University 
*Chien-Lung Chang Hsinchun Chen, University of Arizona 
*Whitfield Diffie, Sun Microsystems 
*Marc Donner, Google
Dennis Egan, Telcordia
Yuval Elovici, Deutsche Telekom Laboratories at Ben-Gurion University, Israel 
*David Farber, Carnegie Mellon
Uwe Glaesser, Simon Fraser University, Canada
Mark Goldberg, RPI Vladimir Golubev, Computer Crime Research Center, Ukraine
*Marc Goodman, INTERPOL 
David Grossman, IIT 
Jim Horning, SPARTA Inc.
Leslie Kennedy, Rutgers School of Criminal Justice
Joseph Kielman, DHS 
Moshe Koppel, Bar-Ilan University, Israel 
Ivan Koychev, Bulgarian Academy of Sciences
Don Kraft, Louisiana State University 
Carl Landwehr, University of Maryland
Mark Levene, Birkbeck University of London 
Janusz Luks, Grupa GROM, Poland 
Richard Mammone, ECE, Rutgers University 
Naftaly Minsky, Rutgers University 
*Rafail Ostrovsky, UCLA
Gerhard Paass, Fraunhofer Institute, Germany 
Warren Powell, Princeton University
Fred Roberts, DIMACS, Rutgers University 
*Marc Rotenberg, EPIC 
Antonio Sanfilippo, Pacific Northwest National Laboratory 
*Fred Schneider, Cornell University
Bracha Shapira, Information Systems Engineering, Ben-Gurion University, Israel
Andrew Silke, University of East London 
Joshua Sinai, The Analysis Corp.
David Skillicorn, Queen's University, Canada 
Eugene Spafford, Purdue University 
Gary Strong, Johns Hopkins 
Rebecca Wright, Rutgers, DIMACS.
*Stefan Wrobel, Fraunhofer Institute, Germany 
Daniel Zeng, University of Arizona

*Invited but not confirmed