CALL FOR PAPERS SPECIAL ISSUE OF JOURNAL OF DATABASE MANAGEMENT (JDM) ON DATABASE TECHNOLOGY FOR ENHANCING NATIONAL SECURITY
The US focus on homeland security since the 9-11 terrorist attacks has increased the public�s awareness of national security. National security has not only become a top priority in law-enforcement and homeland defense agencies, but also attracted a lot of interest from researchers and practitioners in various information technology disciplines. Database technology is one of the key information technologies that ha direct bearing on national security endeavors. Database technology consists of software and methodologies for modeling and storing large volumes of data of arbitrary types and structures and responding to search and update queries against the data. In order to help detect potential threats to national security and enable prompt action, many crucial database technology components are required. These need to address issues such as: 1) how to identify the right data sources, extract key information, and integrate heterogonous data? 2) how to associate and aggregate bits of information from multiple data sources to construct potential terrorist operation daisy-chains? 3) how to discover patterns indicative of terrorist activities, and track the emerging development of terrorist events? 4) how to make available the right information to the right analysts at the right time to support time-critical and informed decision-making? 5) how to automatically assure information quality, especially in the presence of incomplete or dirty data? and 6) how to manage data security to prevent potential unauthorized disclosure of information? The objective of the special issue is to bring together 6-7 high-quality research and visionary papers on a broad spectrum of key subjects related to database technology for national security applications into a single compendium. Submissions describing research breakthroughs, definitive results of empirical studies, promising commercial products, and visions for near-term research and development are strongly encouraged. Topics of interest to this special issue include, but are not limited to, the following: * Data mining in discovering patterns indicative of terrorists� activities * Text mining in detecting and tracking terrorists� events * Information chaining in correlating and aggregating information from multiple sources * Federated database * Fuzzy query * Imprecise database * Data quality and data cleansing * Heterogeneous database integration * Multimedia data storage, indexing and retrieval * QoS delivery * Intrusion detection * Biometric security * Deception detection * Terrorist network analysis * Semantic content management * Visualization in revealing patterns of terrorist activities * Collaborative intelligence * Agent-based intelligent monitoring * Ontology in information sharing * Workflow in supporting the detection and investigation of terrorist activities * Security management Important Dates: Deadline for manuscripts: August 1, 2003 Preliminary notice to authors: November 1, 2003 Revision Due: January 10, 2004 Final Manuscript Due: March 10, 2004 Submission Instructions Only electronic submissions will be accepted. Please submit the final manuscript as an e-mail attachment to the Dr. Lina Zhou. Clearly specify on the subject of the email that the submission is meant for the special issue. The submission must be in Word or PDF format. Final manuscripts have to be submitted in MS Word format for typesetting by the publisher. Manuscript must be typewritten in English and double-spaced throughout. Research papers should not exceed 6,000 words. The cover page should contain the paper title, and the name, affiliation, address, phone number, fax number, and email address of each author, and indicate the contacting author. All submissions will be peer reviewed. For more information about the journal and formatting instructions, please see the following website: http://www.idea-group.com/jdm.html. Please contact the Dr. Lina Zhou if you have any questions. Guest Editor: Dr. Lina Zhou University of Maryland, Baltimore County 1000 Hilltop Circle Baltimore, MD 21250 U.S.A. [EMAIL PROTECTED] Dr. Won Kim Cyber Database Solutions [EMAIL PROTECTED] Dr. Kim will serve as an Advisor for this special issue.
