ACM SIGCHI General Interest Announcements (Mailing List)


Options: Use Forum View

Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
"Larson, Catherine A - (catheril)" <[log in to unmask]>
Reply To:
Larson, Catherine A - (catheril)
Tue, 1 Mar 2016 16:56:21 +0000
text/plain (66 lines)

September 28-29, 2016
Tucson, Arizona, USA


  * Deadline for paper and poster submission: May 16, 2016
  * Notification of acceptance: July 1, 2016
  * Camera ready copies: July 10, 2016
  * Conference: September 27-30, 2016

The Women in Cybersecurity Workshop, to be held in conjunction with the 2016 IEEE Intelligence and Security Informatics Conference (ISI 2016) is  intended to promote information exchange among women working, teaching, and studying in cybersecurity. 


The Workshop invites students, academic researchers, industry consultants, practitioners in the field, law enforcement and intelligence experts, engineers, and anyone else working in the broad field of cybersecurity to submit a paper or poster to the workshop.   The Workshop has a special interest in encouraging first-time authors to participate.  Accepted papers and posters from the workhop will be included in the formal ISI conference proceedings published by the IEEE Press. IEEE ISI Proceedings are EI-indexed. Having your paper accepted at an IEEE conference is a great way to promote your work and learn from others. 


The day-long program on September 28 and poster session on September 29 will allow participants to interact with women who have followed varied IT career paths and to learn about educational and other opportunities specifically in cybersecurity.  A special keynote speaker and a panel session on “a day in the life” of cybersecurity experts will round out the day. Throughout the program, participants will have the opportunity to network with professionals and peers; participate in scientific, technical, and educational information exchange; and appreciate the important roles woman play in all aspects of cybersecurity.


The intent of the sessions is on sharing lessons learned and on promoting fellowship within the field. While the main conference theme is cybersecurity and big data, authors may submit papers on any topic relevant to cybersecurity, whether research, technical solutions, policies, or educational endeavors and programs.  Authors may submit long papers (up to 6 pages), short papers (up to 3 pages), or posters (1-page abstracts) for presentation.  Authors of accepted long and short papers will present their work during the workshop session on September 28th and also present their work through a poster at the all-conference poster session on September 29th. Authors of accepted posters (submitted as 1-page abstracts) will attend the workshop session and present their posters at the all-conference poster session.


Submissions are due by May 16, 2016. Papers and abstracts must be submitted in the IEEE two-column camera-ready style, and may be produced in either Microsoft Word or LaTeX format, but are uploaded as PDFs. For information on formatting, consult the page on publication information on the IEEE website at Papers will be submitted through the EasyChair submission and review system; the submission link will be available soon. Three types of  paper submissions on cybersecurity-related topics may be submitted: long papers (maximum 6 pages), short papers (maximum 3 pages), and posters (1 page abstract).


All submissions are reviewed through a peer-review process. Program committee members are matched to paper and poster submissions based on expertise and interest. Authors will have a limited opportunity to respond to reviews. The program committee’s final recommendations take author feedback into account and may update reviews accordingly. Final copy is due by July 10, 2016.

Author Registration	All papers and posters must have at least one author registered and presenting at the conference.  Authors must register by July 10, 2016, to ensure that their papers and/or posters will be published in the conference proceedings and can be presented at the conference. Authors not registering by that day may be dropped from the program and their papers/posters dropped from the conference proceedings. All registered authors receive a free copy of the conference proceedings.


The IEEE ISI International Conference is recognized for its all-conference poster session. Authors of accepted papers will present their paper during the workshop session, and will also present a poster at the poster session so all conference attendees have the opportunity to learn from the work. Authors of posters will attend the workshop session, and present at the poster session only.  Recognitions will be awarded for the best papers and posters, and best student papers and posters (student must be listed as first author and have responsibility for over 50% of the work, writing, and presentation).


Student participants presenting papers and posters may apply to have selected conference related-expenses covered. Check the conference website for information and details (coming soon). Scholarship-for-Service (SFS) students are particularly encouraged to attend and present. SFS students should work with their local institution to determine if SFS professional development funds can be used to cover travel expenses.


- Ambareen Siraj: Dr. Siraj is Associate Professor in Computer Science at Tennessee Tech University in Cookeville, TN. She is the founder of the annual “Women in Cybersecurity” conference sponsored by the National Science Foundation. Dr. Siraj teaches computer security, and programming and software engineering courses. Her research interests include network security, security in smart grid, and security education. 

- Bhavani Thuraisingham:  Dr. Thuraisingham is Louis A. Beecherl, Jr. Distinguished Professor in the Department of Computer Science at the University of Texas at Dallas. Her research has included innovations in secure cloud data management and big data analytics tools, and developing solutions to semantic web-based policy management for information sharing among organizations, among other areas.  She teaches in data and applications security, digital forensics, trustworthy web services, secure cloud computing, and in other areas of information and computer security.  

- Gondy Leroy:  Dr. Gondy Leroy is Associate Professor at the University of Arizona.  Her areas of expertise include natural language processing and text mining and text analytics, medical and biomedical informatics, and human computer interaction.  She has received numerous grants and awards for research in text mining and text analytics, as well as for developing and supporting educational initiatives to improve diversity in IT.  

For more information, see the conference website at, or contact Cathy Larson, workshop and conference coordinator, at [log in to unmask]

    For news of CHI books, courses & software, join CHI-RESOURCES
     mailto: [log in to unmask]

    To unsubscribe from CHI-ANNOUNCEMENTS send an email to
     mailto:[log in to unmask]

    For further details of CHI lists see