The 10th International Conference for Internet Technology and Secured Transactions (ICITST-2015)
December 14-16, 2015, London, UK
Free Post-Conference London Tour (Travel Information)
Notification and Preliminary Call for Papers
The ICITST is an international refereed conference dedicated to the advancement of theory and practical implementation of secured Internet transactions and to fostering discussions on information technology evolution. The ICITST aims to provide a highly professional and comparative academic research forum that promotes collaborative excellence between academia and industry.
The objectives of the ICITST are to bridge the knowledge gap between academia and industry, promote research esteem in secured Internet transactions and the importance of information technology evolution to secured transactions. The ICITST-2015 invites research papers that encompass conceptual analysis, design implementation and performance evaluation.
The topics in ICITST-2015 include but are not confined to the following areas:
Proposals from those who would like to facilitate a panel discussion are welcomed. The proposals may address any of the topics falling within the scope of the conference themes.
Panel Discussions provide an opportunity for public discussion amongst a selected group of panelists. Central to the success of a panel discussion is the choice of a good topic as the focus for discussion and panellists who bring differing perspectives and are confident in making clear arguments in a live situation. Panels should comprise of three to five scholars who present their arguments; a discussant offers critical comment on the arguments made and the discussion is opened up to the participating audience.
The proposal must include:
The ICITST-2015 will set aside space for those who wish to pursue discussion of a particular topic or issue. Interested individuals should submit a proposal not more than 400 words, on or before September 30, 2015. In addition, the proposal should indicate the duration of the panel discussion (preferred duration is 90 minutes).
All accepted Panel Discussion proposal will be published in the Conference Proceedings. If you are interested in organising Panel Discussion for the ICITST-2015, please email your proposal to the firstname.lastname@example.org. Submissions should be in MS Word format.
Virtual Presentation (Video Conferencing)
We understand that some presenters will not be able to make the trip to London to present their research paper, case study, work in progress and report, mainly due to financial and/or political restrictions on travel. The ICITST-2015 has therefore instituted a virtual presentation system to allow the authors of accepted papers the same publication opportunities as regular presenters. A research works submitted without the participant attending the Conference in person, but presented via video conferencing are refereed and published (if accepted) in the conference proceedings.
You can submit a research paper, case study, work in progress and report for virtual presentation under the open call for papers via email to email@example.com
All the accepted papers will appear in the proceedings and modified version of selected papers will be published in special issues peer reviewed journals.
Who should attend the ICITST?
Undergraduates, Graduates/Postgraduates, researchers and Professionals who are working or studing Internet Security, Cyber Security, Information Security, Smart Cities, Access Control, Biometric System, Computer Forencis, Information Technology, Computer Science Laboratory, Ubi/Cloud Computing, Cloud Security, Internet Application and Technology, Multimedia and Web Services.
Professionals and researchers responsible for security governance of information, IT security, researchers in organizations that deploy compliance of cybersecurity standards and guidelines.
Developers of cybersecurity standards and guidelines for a private and public sectors.
The information securty engineers, technicians, IT security professionals, IT management, automation and control project managers, IT security auditors, compliance officers, cybersecurity planners, critical infrastructure protection specialists; vendors and assessors of security solutions.
Can your organisation sponsor ICITST? If YES, contact us and your organisation's active logo will be display on this window...!