May 12, 2008



here is an inherent tension between the need to gather intelligence necessary to protect the security of persons and nations, and the privacy rights of persons and organizations. The Center for Interdisciplinary Studies in Information Privacy and Security was established to explore this interplay. The second international workshop and conference on these topics will be held on May 12 in New Brunswick, New Jersey. The conference is sponsored by the ISIPS, and by the Center for Dynamic Data Analysis (DyDAn).

Following our 2007 conference model, the conference will feature parallel tracks on technical issues and social, ethical and legal issues related to privacy and security. Proposals for papers, panels or posters are welcome from practitioners in the field of security, academic researchers in fields of security and privacy, and others interested in investigating this area. New to this year's workshop will be an exploration of the interaction between privacy rights and the gathering of data for commercial purposes or to facilitate the growth of online communities such as U2 and Facebook.

Principal themes:

*To what extent can we protect privacy while still maintaining homeland security?
*What are the conflicts? What are the solutions?
*What is the role of commercial entities?
*What are the impacts of voluntary disclosure of personal information?

As distinct from organizations focused on increasing the security AND privacy of electronic information, this conference is focused on the trade-off implied in : "Those who would give up Essential Liberty to purchase a little Temporary Safety, deserve neither" (attributed to Benjamin Franklin, letter from the Pennsylvania Assembly, 1755).

For example, we seek papers that discuss the (homeland) security value of different data mining efforts and the risk to individuals of those same efforts. Or, papers that address the difficulty of translating the obvious difference between the security of a letter, and that of a postcard, into the digital world.

The conference proceedings will be published in the prestigious series Lecture Notes in Computer Science (LNCS) published by Springer.

Springer Logo LNCS Logo

This upcoming International Conference on Interdisciplinary Studies in Information Privacy and Security 2008 (ISIPS 2008) will be held on May 12, 2008, in New Brunswick, New Jersey, at the Hyatt Regency Hotel.

I. General Topics include:
-Privacy-protecting data mining
-Anonymous sharing of information
-Electronic whistle blowing
-Voluntary disclosure of personal information for commercial purposes
-Protection of the privacy of users of online document management systems
-Systems for analyzing encrypted data
-Methods for detecting and tracking terrorist activity
-Filtering and categorization of message streams
-Adaptive systems that detect significant changes in data streams
-Social aspects of information sharing behavior
-National and international legal standards for privacy protection
-Roles and responsibilities of information utilities in security and privacy

II. Mining of data for terror threats
-Identifying unusual patterns of action
-Coping with changing threats
-Identifying social networks of agents or actors
-Real-time tracking and detection of threats for rapid response
-Intrusion, detection and protection
-Deception and intent detection in people streaming past a point
-Web-based intelligence monitoring and analysis
-Agents and collaborative systems for intelligence sharing
-Processing, sharing, and analysis
-Social network analysis (radicalization, recruitment, operations), visualization and simulation

III. Privacy protection and disclosure
-Personal patterns of information disclosure
-Practical effectiveness of data anonymization techniques
-Information disclosure for commercial advantage (shopper ID)
-Position tracking and monitoring
-Position aware collaboration via mobile phones

IV. The tension between security and the privacy of information
-University responsibilities with regard to student risks and threats
-Government responsibility to protect privacy of citizens
-Analysis of government efforts to monitor communication
-Terrorism forecasting and root-cause analysis
-Measuring terrorism's impact on society
-Information sharing policy and governance