Last Update: 01-FEB-2008

Speakers & Panels
Program & Schedule
Poster Sessions

Call For Papers
Paper Submission
Important Dates
Conference Location

Hosts and Sponsors
Program Committee
Contact Information
Call for Papers
   Annals of Information
   Special Volume in
   Security Informatics
Event Sponsorship

  Paper Submission/Areas of Interest

To submit your paper to the conference online submission system, click HERE ( ).
Submissions are due by January 31, 2008 and paper review begins shortly thereafter.

Submissions on all research areas relating to intelligence and security informatics are welcome and may encompass practice, system, methodology, evaluation, technology, testbed, policy, and position papers.

Topics of interest include but are not limited to: Information Sharing and Data/Text Mining, Infrastructure Protection and Emergency Responses, and Terrorism Informatics (for additional information about topics, please see the Call for Papers).

Submission requirements:
  • Long (6,000 words /6 pages max.) and short (3,000 words /3 pages max.) papers (in English) (using the IEEE two-column format) must be submitted online in Microsoft Word or PDF format by Thursday, January 31, 2008.
  • Authors wishing to present a poster and/or demo may submit a 2-page abstract, which, if selected, will appear in the Proceedings (2-page max.).
  • Required Microsoft Word/LaTeX templates (IEEE two-column format) are available at:
    The sample template file may be found at:
    (Microsoft Word) or
  • Notification of acceptance will be sent by email on March 14, 2008. The accepted papers should be revised according to the referees' comments and submitted in camera-ready version by March 28, 2008 together with all the source files and the signed copyright form. The final version should be prepared following strictly IEEE Conference Proceedings requirements.
  • At least one author of each accepted paper is required to register with the conference and present the paper.
  • ISI 2008 is running a blind review process. In preparing your manuscript, do not include any information which could reveal your identity, or that of your co-authors. The title section of your manuscript should not contain any author names, email addresses, or affiliation status. If you do include any author names on the title page, your submission will be automatically rejected. In the body of your submission, you should eliminate all direct references to your own previous work. That is, avoid phrases such as "this contribution generalizes our results for XYZ". Also, please do not disproportionately cite your own previous work. In other words, make your submission as anonymous as possible. We need your cooperation in our effort to maintain a fair, blind reviewing process - and to consider all submissions equally.
  • Selected authors may also be invited to submit an extended version of their work to one or more journals that will publish special issues on Intelligence and Security Informatics.
  • Selected full and short papers may be considered for publication in Springer Lecture Notes in Computer Science series.
  • Workshop submissions must follow the requirements posted for the relevant Workshop. Please refer to the Workshop page for links to each Workshop site.






Taipei, Taiwan | June 17-20, 2008 Central Police University