Call for Papers: Interdisciplinary Studies in Information Privacy and Security Workshop-Conference 2008 to be held on May 12, 2008 at the Hyatt in New Brunswick, New Jersey. URL: http://www.scils.rutgers.edu/ci/isips/WebPage%20ISIPS%20Practice/index.html *Call for Papers* There is an inherent tension between the need to gather intelligence necessary to protect the security of persons and nations, and the privacy rights of persons and organizations. The Center for Interdisciplinary Studies in Information Privacy and Security was established to explore this interplay. The second international workshop and conference on these topics will be held on May 12 in New Brunswick, New Jersey. The conference is sponsored by the ISIPS, and by the Center for Dynamic Data Analysis (DyDAn). Following our 2007 conference model, the conference will feature parallel tracks on technical issues and social, ethical and legal issues related to privacy and security. Proposals for papers, panels or posters are welcome from practitioners in the field of security, academic researchers in fields of security and privacy, and others interested in investigating this area. New to this year's workshop will be an exploration of the interaction between privacy rights and the gathering of data for commercial purposes or to facilitate the growth of online communities such as U2 and Facebook. Principal themes: *To what extent can we protect privacy while still maintaining homeland security? *What are the conflicts? What are the solutions? *What is the role of commercial entities? *What are the impacts of voluntary disclosure of personal information? As distinct from organizations focused on increasing the security AND privacy of electronic information, this conference is focused on the trade-off implied in: "Those who would give up Essential Liberty to purchase a little Temporary Safety deserve neither" (attributed to Benjamin Franklin, letter from the Pennsylvania Assembly, 1755). For example, we seek papers that discuss the (homeland) security value of different data mining efforts and the risk to individuals of those same efforts. Or, papers that address the difficulty of translating the obvious difference between the security of a letter, and that of a postcard, into the digital world. The conference proceedings will be published in the prestigious series Lecture Notes in Computer Science (LNCS) published by Springer, http://www.springer.com/computer?SGWID=0-146-0-0-0 Submissions may address practice, theory, system, methodology, evaluation, technology, testbed or policy. Well-reasoned position papers will also be considered. Research papers must be relevant to the management of information for purposes of protecting the general security of citizens OR to the issues involved in protecting information that persons or corporations may wish to hold private (or, of course, the interface between these issues). Practice papers should reflect real experience or real needs. Topics include but are not limited to areas noted below. Extended Abstracts of no more than 5 pages (6,000 words in English) may be submitted by Monday, March 17th, 2008 at: http://www.softconf.com/start/ISIPS2008/ I. General Paper Topics include: Privacy protecting data-mining Anonymous sharing of information Electronic whistle blowing Voluntary disclosure of personal information for commercial purposes Protection of the privacy of users of online document management systems Systems for analyzing encrypted data Methods for detecting and tracking terrorist activity Filtering and categorization of message streams Adaptive systems that detect significant changes in data streams Social aspects of information sharing behavior National and international legal standards for privacy protection Roles and responsibilities of information utilities in security and privacy II. Mining of data for terror threats -Identifying unusual patterns of action -Coping with changing threats -Identifying social networks of agents or actors -Real-time tracking and detection of threats for rapid response -Intrusion, detection and protection -Deception and intent detection in people streaming past a point -Web-based intelligence monitoring and analysis -Agents and collaborative systems for intelligence sharing -Processing, sharing, and analysis -Social network analysis (radicalization, recruitment, operations), visualization and simulation III. Privacy protection and disclosure -Personal patterns of information disclosure -Practical effectiveness of data anonymization techniques -Information disclosure for commercial advantage (shopper ID) -Position tracking and monitoring -Position aware collaboration via mobile phones IV. The tension between security and the privacy of information -University responsibilities with regard to student risks and threats -Government responsibility to protect privacy of citizens -Analysis of government efforts to monitor communication -Terrorism forecasting and root-cause analysis -Measuring terrorism's impact on society -Information sharing policy and governance Program Committee: Yaakov Amidror, Lander Institute, Israel Yigal Arens, USC/ISI Antonio Badia, University of Louisville Arthur Becker, ITIC *Terry Benzel, University of Southern California Michael Blair, RDEC Endre Boros, RUTCOR, Rutgers University Yigal Carmon, MEMRI *Fred Cate, Indiana University School of Law Gordon Cormack, University of Waterloo George Cybenko, Dartmouth University *Chien-Lung Chang Hsinchun Chen, University of Arizona *Whitfield Diffie, Sun Microsystems *Marc Donner, Google Dennis Egan, Telcordia Yuval Elovici, Deutsche Telekom Laboratories at Ben-Gurion University, Israel *David Farber, Carnegie Mellon Uwe Glaesser, Simon Fraser University, Canada Mark Goldberg, RPI Vladimir Golubev, Computer Crime Research Center, Ukraine *Marc Goodman, INTERPOL David Grossman, IIT Jim Horning, SPARTA Inc. Leslie Kennedy, Rutgers School of Criminal Justice Joseph Kielman, DHS Moshe Koppel, Bar-Ilan University, Israel Ivan Koychev, Bulgarian Academy of Sciences Don Kraft, Louisiana State University Carl Landwehr, University of Maryland Mark Levene, Birkbeck University of London Janusz Luks, Grupa GROM, Poland Richard Mammone, ECE, Rutgers University Naftaly Minsky, Rutgers University *Rafail Ostrovsky, UCLA Gerhard Paass, Fraunhofer Institute, Germany Warren Powell, Princeton University Fred Roberts, DIMACS, Rutgers University *Marc Rotenberg, EPIC Antonio Sanfilippo, Pacific Northwest National Laboratory *Fred Schneider, Cornell University Bracha Shapira, Information Systems Engineering, Ben-Gurion University, Israel Andrew Silke, University of East London Joshua Sinai, The Analysis Corp. David Skillicorn, Queen's University, Canada Eugene Spafford, Purdue University Gary Strong, Johns Hopkins Rebecca Wright, Rutgers, DIMACS. *Stefan Wrobel, Fraunhofer Institute, Germany Daniel Zeng, University of Arizona *Invited but not confirmed