IIT Cybersecurity and Forensics essay Cybersecurity & Forensics Conference & Expo Call for Papers – FORENSECURE 2019 ForenSecure: Cybersecurity & Forensics

IIT Cybersecurity and Forensics essay Cybersecurity & Forensics Conference & Expo Call for Papers – FORENSECURE 2019 ForenSecure: Cybersecurity & Forensics Conference &
All the paper during residency can be also formatted and presenting during this
conference. The student fee is only $50. Take a look at the call for papers below.
Call for Papers – FORENSECURE 2019
ForenSecure: Cybersecurity & Forensics
Conference & Expo
April 11-12, 2019 Chicago (Wheaton
Suburb) – United States of America
Submission link: https://easychair.org/conferences/?conf=forensecure2019
Download the template for
papers: https://drive.google.com/file/d/1gdSx3FVSMQHizFEfKeKGWOyOTOAr4wEw/view?usp=sharing
Abstract registration deadline: March 22, 2019
Submission deadline: March 22, 2019
We invite your participation as a sponsor/exhibitor, speaker, or attendee of ForenSecure’19:
IT Forensics and Security Conference and Expo at Illinois Institute of Technology. This is an
industry-focused technical conference (not an academic conference) with multiple tracks. It
attracts 200+ professionals for an intensive one- and a half-day schedule that includes
discussion and debate over forensics, security, data/information governance, cyber crime
and security, cyber security legislation and legal issues, ethical hacking, eDiscovery, cloud
forensics, steganography, policy and compliance, privacy, wireless security, cloud
computing, identity theft, and more.
A dynamic and growing number of organizations have contributed to the success of this
conference, including: AccessData, Argonne National Laboratory, Authentify, Cisco, The
Chicago Police Department, CompTIA, Computer Associates, the FBI, Fermilab, Fortinet,
Guidance Software, IBM, IEEE, KPMG, Microsoft, Motorola, Sungard, UniForum, X-Ways
Forensics and many others. Speakers and participants continue to represent local, regional,
national, and international organizations and universities.
Submissions should be posted electronically in MS Word or PDF at EasyChair.org no later than March 22, 2019.
The areas of interest include (but are not limited to):
• Accounting Information Systems
• Adoption and Diffusion of IS/T
• Big Data Analytics
• Business Intelligence
• Business Process Management
• Bring Your Own Device (BYOD) and its Implications
• Cloud Computing and Services
• Computing and Ethics
• Cyber Security
• Database Management Technologies
• Decision Support Technologies
• Design Science
• Distance Learning Technologies
• e-Collaboration in Organizations
• Economic Value of IS/T
• Electronic Business Technologies and Management
• Energy Informatics
• Enterprise Resource Planning
• Global IT Management
• Green Computing and Sustainability
• Health Care Informatics
• Human Computer Interaction
• Information Security Management
• Information Warfare
• IT and Small Businesses
• IT Business Value
• Information Systems and Sustainability (Green IS)
• IS and Grand Societal Challenges (Inequality, Climate Change, Cyber Security, etc.)
• Information Technology Education
• Information Technology Standards
• Intelligent Information Systems
• IT Evaluation Methods and Management
• IT Management in Healthcare
• IT Teaching Cases
• Knowledge Management
• Medical Information Technology
• Mobile Computing & Commerce
• Multimedia Information Management
• Object Oriented Technology
• Online and Blended Teaching and Learning
• Open Source Technologies and Systems
• Project Management
• Software Engineering
• Software Process Improvement
• Strategic IT Management
• Telecommunications and Networking Technologies
• Virtualization Technologies and Management
• Virtual Organizations and Society
You may submit a full length (not to exceed six single-spaced pages with approximately
2,500 words, including all figures, tables, appendices, and references), original, and
previously unpublished manuscript. The research may be conceptual, empirical or applied.
Accepted papers will be published in the conference proceedings in their entirety.
You may submit research-in-progress proposals (abstracts) or a summary of tentative
results of the study to date in a 1500-2000 paper with a maximum of 2 figures/tables.
Individuals interested in conducting a panel, workshop, or tutorial dealing with technological,
managerial, professional, teaching, societal, national or international issues of information
technology management are invited to submit a 500-1000 word proposal covering the
objectives, issues to be covered, and the names/addresses of any other panel, workshop,
or tutorial members. The method of presentation is at the submitter’s discretion. However,
the submitter has the responsibility for providing his/her own participants (such as panel
members). All accepted proposals will appear in the conference proceedings. (Note: All
panel, workshop, and tutorial members must register for the conference.)
Submission link: https://easychair.org/conferences/?conf=forensecure2019
Selected papers will be invited for expedited submission into the International Journal
of Hyperconnectivity and the Internet of Things (IJHIoT) which is indexed in Google Scholar,
ACM Digital Library, and Cabell’s Directories.
Additional journals will be listed soon.
General Chair
Maurice Dawson – Illinois Institute of Technology, US
Program Chairs
Matthias Gotlieb – Technical University of Munich, GE
Publication Chairs
Darrell Burrell – Florida Institute of Technology, US
Scott Pfeiffer – Illinois Institute of Technology, US
View the CFP at https://appliedtech.iit.edu/forensecure/call-for-papers
First author’s last name (use et al. if more than one authors)
Short Title up to 8 words
ForenSecure: Cybersecurity and Forensics Conference
Chicago, Illinois
Proceedings Format Template
First author’s name
e-mail address
Second author’s name
e-mail address
Third author’s name
e-mail address
First author’s name
e-mail address
Third author’s name
e-mail address
Second author’s name
e-mail address
Fourth author’s name
e-mail address
In this document we describe the formatting requirements for the Proceedings of the MWAIS Conference. Please review this
document carefully. You can use this document as a template and copy/paste your paper content here (this might be the best
or easiest way). Please be sure to adhere to the formatting requirements as this will be your camera-ready version, and a PDF
format will be generated directly from your submitted final Word version. Please note several limitations on length: (1) your
abstract should be no more than 150 words, as the abstract will also be used for the conference program, (2) your entire paper
should be approximately 2,500 words, including all materials and sections such as figures, tables, and references. If you are
submitting a research-in-progress paper or summary of tentative results of the study to date, your entire paper should be
approximately 1,500-2000 words with a maximum of 2 figures/tables for inclusion in the conference proceedings. This paper
length is intended to encourage authors to publish full-length papers in journals or other outlets at a later date.
Keywords (Required)
Guides, instructions, length, conference publications.
The accepted papers and the panel statements of the conference are published in the Proceedings. We wish to give the
proceedings a consistent, high-quality appearance. We therefore ask that authors follow some basic guidelines. In essence,
you should format your paper exactly like this document. The easiest way to use this template is to download it from the
conference webpage and replace the content with your own material. The template file contains specially formatted styles
(e.g., Normal, Heading, Bullet, Table Text, References, Title, Author, Affiliation) that will reduce
the work in formatting your final submission.
On each page, your material (not including the header and footer) should fit within a rectangle of 18 x 23.5 cm (7 x 9.25 in.),
centered on a US letter page, beginning 1.9 cm (.75 in.) from the top of the page. Please adhere to the US letter size only
(hopefully Word or other word processors can help you with it). If you cannot do so, please contact the Program Review
Chair for assistance. All final publications will be formatted and displayed in US letter size. Right margins should be
Proceedings of the ForenSecure: Cybersecurity and Forensics Conference, Chicago, Illinois April 12th, 2019
First author’s last name (use et al. if more than one authors)
Short Title up to 8 words
justified, not ragged. Beware, especially when using this template on a Macintosh, Word may change these dimensions in
unexpected ways.
Prepare your submissions on a word processor or typesetter. Please note that page layout may change slightly depending
upon the printer you have specified.
Title and Authors
Your paper’s title should be in Ariel 18-point bold. Authors’ names should be in Times New Roman 12-point bold, and
affiliations in Times New Roman 12-point
To position names and addresses, use a table with invisible borders, as in this document. Alternatively, if only one address is
needed, use a centered tab stop to center all names and the address text; for two addresses, use two centered tab stops, and so
on. If the single row cannot hold all authors’ information (for example, a paper has 4 or more authors), you can have another
row under the first row.
Abstract and Keywords
Every submission should begin with an abstract of no more than 150 words, followed by a set of keywords. The abstract
should be a concise statement of the problem, approach, and conclusions of the work described. It should clearly state the
paper’s contribution to the field.
Normal or Body Text
Please use a 10-point Times New Roman font or, if it is unavailable, another proportional font with serifs, as close as possible
in appearance to Times New Roman 10-point. On a Macintosh, use the font named Times and not Times New Roman. Please
use sans-serif or non-proportional fonts only for special purposes, such as headings or source code text.
Figure 1. MWAIS
References and Citations
Please use the reference format that you see illustrated at the end of this paper. If you use EndNote, be aware that different
versions of the software change the styles, creating some inconsistencies. You may modify the styles to produce the
references as shown here. In version 6 one of the closest styles is the MIS Quarterly Style. But it still must be modified to be
consistent with this template.
In the text, cite by authors’ last names followed by the year of publication – list all authors’ last names for the first time, then
use “et al.” for subsequent citations if there are more than two authors. If multiple articles are cited at the same time, order
them alphabetically by the first author’s last name and separate the citations by semicolons. If the same author(s) has/have
more than one article being cited, use chronicle order and separate the year of publication of the articles by commas. For
example: (Agarwal and Karahanna, 2000; Ajzen, 1988, 1991; Zhang, Benbasat, Carey, Davis, Galletta and Strong, 2002).
Later in the paper, you may cite some of them again, along with others, as follows: (Agarwal and Karahanna, 2000; Ghani,
Supnick and Rooney, 1991; Shneiderman, 1998; Tractinsky, 1997; Zhang et al., 2002). See examples on the references
corresponding to these citations at the end of this document. Within this template file, use the References style for the text
of your citations.
Proceedings of the ForenSecure: Cybersecurity and Forensics Conference, Chicago, Illinois April 12th, 2019
First author’s last name (use et al. if more than one authors)
Short Title up to 8 words
Your references should comprise only published materials accessible to the public. Proprietary information may not be cited.
The heading of a section should be in Ariel 9-point bold, all in capitals (Heading 1 Style in this template file. Sections
should not be numbered.
Headings of subsections should be in Ariel 9-point bold with initial letters capitalized (Heading 2). (Note: for sub-sections
and sub-subsections, a word like ‘the’ or ‘of’ is not capitalized unless it is the first word of the heading.)
Headings for sub-subsections should be in Ariel 9-point italic with initial letters capitalized (Heading 3). Please do not go
any further into another layer/level.
Place figures and tables close to the relevant text (or where they are referenced in the text).
Captions should be Times New Roman 9-point bold (Caption Style in this template file). They should be numbered (e.g.,
“Table 1” or “Figure 2”), centered and placed beneath the figure or table. Please note that the words “Figure” and “Table”
should be spelled out (e.g., “Figure” rather than “Fig.”) wherever they occur.
The proceedings will be made available online, thus color figures are possible. However, you are advised to refrain from
using colors to deliver important information in your figures – not everyone has access to color printers.
Inserting Images
Occasionally MS Word generates larger-than-necessary PDF files when images inserted into the document are manipulated
in MS Word. To minimize this problem, use an image editing tool to resize the image at the appropriate printing resolution
(usually 300 dpi), and then insert the image into Word using Insert | Picture | From File…
As indicated in Figure 1, using tables to hold places can work very well in Word. If you want to copy a figure from another
application (such as PowerPoint) and then paste to the place where you want your figure to be, make sure that (1) the figure
stays in the position, and (2) it does not take up too much space. You can ensure the former by double clicking the figure,
then go to “Layout” tab, and select “In line with text.” To ensure the latter, use “Paste Special,” then select “Picture.” You
can resize the figure to your desired size once it is pasted.
Table Style
Inserting a table in the text can work well. See Table 1 below. The text of tables will format better if you use the special
Table Text style (in this template file). If you do not use this style, then you may want to adjust the vertical spacing of the
text in the tables. (In Word, use Format | Paragraph… and then the Line and Page Breaks tab. Generally, text in each field of
a table will look better if it has equal amounts of spacing above and below it, as in Table 1.)
With regard to spelling and punctuation, you may use any dialect of English (e.g., British, Canadian, US, etc.) provided this
is done consistently. Hyphenation is optional. To ensure suitability for an international audience, please pay attention to the
• Write in a straightforward style.
• Try to avoid long or complex sentence structures.
• Briefly define or explain all technical terms that may be unfamiliar to readers.
• Explain all acronyms the first time they are used in your text – e.g., “Digital Library (DL)”.
• Explain local references (e.g., not everyone knows all city names in a particular country).
Proceedings of the ForenSecure: Cybersecurity and Forensics Conference, Chicago, Illinois April 12th, 2019
First author’s last name (use et al. if more than one authors)
Short Title up to 8 words
• Be careful with the use of gender-specific pronouns (he, she) and other gendered words (chairman, manpower, manmonths). Use inclusive language that is gender-neutral (e.g., she or he, they, s/he, chair, staff, staff-hours, person-years).
Treatment 1
Treatment 2
Setting A
Setting B
Setting C
Table 1. A Very Nice Table
Please submit your final version with the pre-defined header and footer. Insert your name (only the first author’s last name,
and use “et al.” after that if the paper has more than one author) and a short title of your paper in the header. Leave the footer
It is important that you write for a general audience. It is also important that your work is presented in a professional fashion.
This guideline is intended to help you achieve that goal. By adhering to the guideline, you also help the conference organizers
tremendously in reducing our workload and ensuring impressive presentation of your conference paper. We thank you very
much for your cooperation and look forward to receiving your nice looking, camera-ready version!
We thank all authors, committee members, and volunteers for their hard work and contributions to the conference. The layout
of this format was adapted from a workshop document created by Ping Zhang, and later made available as the paper
submission template for AMCIS Conference. The content was adapted for the MWAIS proceedings template. The references
cited in this paper are included for illustrative purposes only.
Agarwal, R. and Karahanna, E. (2000) Time flies when you’re having fun: Cognitive absorption and beliefs about
information technology usage, MIS Quarterly, 24, 4, 665-694.
Ajzen, I. (1988) Attitudes, personality, and behavior, The Dorsey Press, Chicago.
Ajzen, I. (1991) The theory of planned behavior, Organizational Behavior & Human Decision Processes, 50, 2, 179211.
Ghani, J. A., Supnick, R. and Rooney, P. (1991) The experience of flow in computer-mediated and in face-to-face
groups, in Janice DeGross, Izak Benbasat, Gerardine DeSanctis and Cynthia Mathis Beath (Eds.) Proceedings of the
Twelfth International Conference on Information Systems, December 16-18, New York, NY, USA, University of
Minnesota, 229 – 237.
Tractinsky, N. (1997) Aesthetics and apparent usability: Empirically assessing cultural and methodological issues, in
Steve Pemberton (Ed.) Proceedings of the SIGCHI conference on Human factors in computing systems (CHI 97), March
22 – 27, Atlanta, GA, USA, ACM Press, 115-122.
Proceedings of the ForenSecure: Cybersecurity and Forensics Conference, Chicago, Illinois April 12th, 2019

Purchase answer to see full

"Order a similar paper and get 100% plagiarism free, professional written paper now!"

Order Now