征稿已开启

查看我的稿件

注册已开启

查看我的门票

已截止
活动简介

CITSM 2016 is the fourth annual conference in the general area of cyber and IT services management. It provides a forum for presenting and discussing the latest innovations, results and developments in cyber networks, pervasive systems, cloud environments, enterprise and IT related to service management. The conference provides a forum for ICT professionals engaged in research and development to share ideas, interact with others, present their latest works, and strengthen the collaboration among academics, researcher and professionals. It is a single track, highly- selective conference attended by foremost experts in this area from academia, industry and government. Last conference (CITSM 2014) proceeding has been published on IEEExplore and Indexed by Scopus). This year, all accepted papers that presented in this conference will be submitted to IEEExporer and selected papers are published at one of the following 4 international journals (Scopus indexed) :IJWIS, JMM, IJPCC and IJMCMC with some revisions.

征稿信息

征稿范围

Original and unpublished papers are invited in the following research areas, but not restricted to:

  • Advanced Persistent Threats/ Next Generation/Advanced Evasive Techniques (e.g., monitoring, incident response, forensics, data breach response plan – after the breach) Information Protection Technologies /DRM/DLP (e.g., infrastructure, policies, data management/classification) Operational Technology/PCS/ICS/SCADA Security (e.g., emerging threats, vulnerabilities, vendor solutions, Stuxnet implications)
  • Application Security (e.g., database security)
  • Big Data
  • Business Intelligence and Knowledge Management
  • Business Process Reengineering & Management
  • Cloud Computing (e.g., policy/risk management, identity management, mature cloud security programs, corporate use of social sites, data management/classification, partner application gateways/collaborative work areas, emerging technology trends).
  • CRM & Decision Support Systems
  • Cyber Threat Intelligence & Information Sharing (e.g., managing physical and cyber information sharing within O&G sector, government involvement, vendor/3rd party involvement)
  • Data Analytic
  • Data and Web mining
  • Database Systems
  • Distributed & Parallel Systems
  • E-Business
  • E-Governance
  • Emerging Cyber Threats in the O&G Sector (e.g., cyber terrorism, hactivism, next generation firewalls, etc.)
  • Energy Managamet & Smart Grid
  • Enterprise Computing
  • Financial Engineering
  • Green Computing
  • Health Information Management & Technology
  • Human Resources Information Systems
  • ICT and Islam
  • ICT Development
  • Incident Response Management Endpoint Security (e.g., White listing, etc.)
  • Innovation and Technological Entrepreneurship
  • IT Strategies
  • Legislative/Regulatory Proposals (e.g., cybersecurity & privacy)
  • Mobility/Mobile Device Management & Alternative Models (e.g., consumerization supporting non-company devices, policies, data management/classification, emerging technology trends)
  • Networked and Web based Systems
  • Other Possible Topics (e.g., enterprise search, managing privileged accounts, securing the mobile executive, law enforcement – who to call).
  • Risk Management (e.g., GAC–SIEM, IT audits, security metrics)
  • Service Management
  • Social Engineering (e.g., staff training, insider threats, advance spear phishing)
  • Social Networks
  • Software as a Service
  • Supply Chain Information systems
  • Technology Management
  • ICT For Rural Area
留言
验证码 看不清楚,更换一张
全部留言
重要日期
  • 会议日期

    04月26日

    2016

    04月28日

    2016

  • 04月28日 2016

    注册截止日期

移动端
在手机上打开
小程序
打开微信小程序
客服
扫码或点此咨询