Información de la conferencia
i-Society 2024: International Conference on Information Society
Por favor Iniciar para ver el sitio web del congreso

Día de Entrega:
2024-01-20
Fecha de Notificación:
2024-01-31
Fecha de Conferencia:
2024-08-26
Ubicación:
Cambridge, UK
Años:
17
Vistas: 21453   Seguidores: 3   Asistentes: 3

Solicitud de Artículos
The topics in i-Society 2024 include but are not confined to the following areas:

Artificial Intelligence

Architecture State Modelling
Compealing Code
Data Science
Mainstream Applications
Self-correcting Systems
Trustworthy Software

Cloud Computing

Architectural cloud models
Programming cloud models
Provisioning/pricing cloud models
Data storage and computation in cloud computing
Resource and large-scale job scheduling in cloud computing
Case studies of green cloud computing
Cloud Security

Data

Big Data
Data Acquisition
Data Analysis
Data Collection
Data Compression
Data Curation
Data in Business
Data in Economics
Data in Finance
Data in Healthcare
Data in Medicine
Data in Natural Sciences
Data Integrity
Data Processing
Data Privacy
Data Protection
Data Maintenance
Data Management Systems
Experimental Data
Privacy, Trust and AI
Research Data

Digital Society

Cybersecurity and Digital Conflicts
Digital Sovereignty
e-Citizenship
e-Democracy
e-Governance
e-Commerce
The Environmental Impact of Digital Technologies

FinTec

Back, Middle and Front Office Technologies
Fraud Prevention and Compliance Solutions
Insurance Technology Solutions
IT Solutions for Financial Institutions
Lending Solutions For Banks
Management Solutions For Financial Institutions
Mobile Technologies
Next Generation Technologies

Graphics and Multimedia

Communications
Computer Aided Design and Animation
Computer Graphics
Image/Video Synthesis
Multimedia Computing
Processing and Analysis
Storage and Applications
Virtual and Augmented Reality

Information Visualization

Content Development
Applications and Case Studies
Design Theories and Methodologies
Evaluation and Usability Studies
Interactive Data Exploration
Knowledge Discovery and Visual Data Mining
Multidimensional and Multivariate Analysis
Perception and cognitive factors
Requirement Engineering and Task Analysis
Standards and visualization languages
Visual Analytics

New Enabling Technologies

Computational Linguistics
e-Manufacturing
Internet of Things (IoT)
Internet Technologies
Mobile Applications
Multimedia Applications
Protocols and Standards
Ubiquitous Computing
Virtual Reality
Wireless Applications
Geographic Information Systems
Web Services and Performance

Resource Virtualisation

Future Virtualisation
Innovative HCI and Touch-Screen Models
Mobile Commerce, Handheld Commerce and e-Markets on Cloud
Monitoring and Auditing in Cloud
Scalable and Elastic Cloud Services
Social Computing and Impacts on the Cloud
Storage Virtualisation
Teleworking, Tele-conferences and Virtual Meeting
Virtualisation Technologies and Enablers (Network Virtualisation, Software-defined Networking)

Semantic Web

Big Data and Metadata
Semantic Web Design
Semantic Technologies

STEM

Science
Technology
Engineering
Mathematics

Applications of Chaotic Computing

Chaos-Based Data Security

Covid-19

Covid-19 and Digital Communication
Covid-19 and Digital Contact Tracing
Covid-19 and Digital Inequality
Covid-19 and Health Surveillance
Covid-19 and Mental Health
Covid-19 and Online Disinformation
Covid-19 and Online Trust
Covid-19 and Social Media
Covid-19 and Traveling

Data Science

Advanced Computing
Algorithms and Systems
Anomaly Detection
Artificial Neural Network
Clustering
Cyberscience
Data Engineering
Dimensionality Reduction
Domain Expertise
Hacker Mindset
Machine Learning
Math
Reinforcement Learning
Scientific Methods
Statistics
Structured Prediction
Visualisation

Digital Health

Digital Care Programs
Healthcare in Digital World
Health Information Technology
Living and Society
Mobile Health (mHealth)
Personalised Medicine
Telehealth
Telemedicine

e-Society

Computer-Mediated Communication
Distance Education
e-Art
e-Business
e-Health
e-Inclusion
e-Learning
e-Science
Globalisation and Developmental IT
Global Trends
Intellectual Property Rights
Social and Organisational Aspects
Social Inclusion
Social Infonomics
Social Software

Gaming

Academic Courses for Game Design and Development
Architectures and Frameworks for Computer Games
Audio, Video and Text in Digital Games
Computer Game Engineering
Cultural and Media Studies on Computer Games
Foundations of Computer Game Design and Development
Game-based Training and Simulation
Games and Intellectual Property Rights
Gaming – Hardware and Accessories
Game Design and Development
Game Security
Game Theories
Laws, Regulations, Certifications and Policies for Gaming
Management Aspects of Computer Game Development
Multi-user Games
New Computer Games and Case Studies

Green Computing

Advanced IT energy-aware technologies
Big Data
Green Computing, Geo-energy, E-Cycling
Electronic Waste
Energy Efficient Ethernet
IT Energy Management
Power-aware Networking and Software
Power-efficient Architectures and Chip Designs
Smart Grids Applications
Technology as Green Enablers (Grid, Cloud, Data Centers, Virtualization)

Informatics

Business Informatics
Collaborative and Social Computing
Digital Humanities
Health Informatics
Human-Computer Interaction
Industrial Informatics
Interaction and Interface Design
Machine Learning in Industry
Media Arts and Sciences
Medical and Clinical Informatics
Mobile Computing
Social Informatics
Social Psychology and Recommender Systems
Ubiquitous Computing
Visualization

RFID

Chipless RFID Technology
Near Field Communications (NFC)
Next-generation RFID Applications
RFID Applications
RFID for Industry 4.0
RFID for Smart Cities
RFID Manufacturing ProcessesRFID-enabled Localization Systems
RFID Sensors
RFID Software, Middleware, and Protocols

Smart City

e-Mobility and Smart Transport
Smart City Infrastructure
Smart Data for Business Intelligence
Smart Sensors

Sustainability

Allied Research
Cutting-edge Technologies
Sustainable Environment
Sustainable Living
Sustainable Society
Sustainable Technologies
Technology and Innovation
Trends in Learning

Bockchain

Architectural cloud models
Applications of Blockchain
Attacks and Threats on Blockchain
Blockchain Advances in 6G Network
Blockchain-based Business Model
Blockchain and Distributed Ledger Technology Implementation
Blockchain and Cryptography
Blockchain and Digital Currency
Blockchain and Secure Critical Infrastructure
Blockchain in Finance
Blockchain in Management
Blockchain in Metaverse
Bitcoin and Ethereum
Data Governance in Blockchain
Emerging Technologies and Developments of Blockchain
Blockchain Theory
Blockchain for Eata Exchange
Cross Chain Techniques
NFT (Non-Fungible Token)
New Architecture, Framework, or Nodels of Blockchain
Security and privacy in blockchain
Smart Contract Methods

Cybersecurity

Artificial Intelligence
Cloud Security
Cyber Security in Education
Cyber Terrorism
Data Protection
Encryption
Fake News
Hackivism
Incident Response
Insider Threat
Internet of Things
Machine Learning
Mobile Security
Network Security
Phishing
Security of Big Data
Social Engineering
Threat Intelligence
Women in Security

Digital Science

Data Science
Digital Systems Management
Digital Systems Software Development
Digital Systems Telecommunication Networks
Digital Systems Training Technology
Enterprise Architecture

Educational Technology

Animation and 3D Systems
Blended Learning
Blogs
Collaborative Virtual Environments (CVEs)
Computer-Mediated Communication (CMC) Tools
Computer Software on Education
Distance Learning
Future of Technology in Education
Educational Multimedia and Hypermedia
Educational Software
Educational Software Experiences
E-Learning for Environmental Sustainability
E-Learning Projects and Experiences
E-Learning Standards
E-Tutoring
E-Moderating
Impact of Web Technologies
Intelligent Tutoring Systems (ITS)
Learning Management Systems (LMS)
Managed Learning Environments (MLEs)
Mobile Learning
Mobile and Tablet Technologies
Online Assessment
Online/Virtual Laboratories
Open Online Courses
Technology in Education and Teaching
Social Networking
Videos for Learning
Virtual Learning Environments (VLEs)
Virtual Conferences and Workshops
Virtual Reality
Virtual Universities
Web 2.0
Web Classroom Applications

GIS

Implementation
Issue Analysis
Location Optimisation
Mapping Patterns
Statistical Analysis
Visual Presentation
Compealing Code
Data Science
Mainstream Applications
Self-correcting Systems
Trustworthy Software

Information Systems and Management

Big Data
Data Management Systems
GIS
Information Storage Systems
Information Theory
Pattern Discovery
Remote Sensing Applications
Visualization of Data Analysis

Internet of Things

AI and Machine Learning for the IoT
Distributed Ledger Technologies for IoT
Energy Efficiency and Sustainability in IoT
Human Interaction with IoT
IoT Architectures
Interoperability in IoT
New IoT Communication Technologies
Novel Applications of IoT
Real-world Deployments and Testbeds
Security and Privacy in IoT
Societal Impacts and Ethical Implications of the IoT
Web of Things including Hypermedia Agents for the IoT

Intelligent Data Management

Content Development
Data Mining
e-Intelligence
e-Publishing and Digital Libraries
Information Search and Retrieval
Intelligent Agents
Intelligent Organisations
Intelligent Systems
Knowledge Management
Knowledge networks

Security

Biometrics
Cloud Security
Cryptography
Cyber Law
Cyber Security
e-Privacy
e-Risk
e-Trust
Forensics
Information Assurance
Internet Security
Intrusion Detection
Mobile Security
Payment Systems
Secure Protocols
Secure Transactions

Social Media

Advances in Social Media
App Store
Branding and E-Marketing
Convergence
Digital Platforms
Disinformation
Facebook
Free Speech
Google
Hashtags
Hate Speech
Instagram
Message Credibility
Organisational Knowledge Management
Privacy Literacy
Realtime Communications and Instant Messaging
Security in Social Media
Social Media Big Data Analysis
Social Media News
Social Media and Advertising
Social Media Technologies
Social Network Analysis
Trolling
Trust and Privacy in Social Media
Twitter
YouTube
WhatsApp

Wearable Technologies

Wearable Visual Markers
Wrist-worn Sensors
Integrated Textile Sensors
Piezo-electric Sensors
Collar-sensed Motion Gestures
Touch Sensitive Fabrics
Forearm Smart Watches
Magnetic Field Sensing
Inertial Sensing
Commodity WiFi Devices
Última Actualización Por Dou Sun en 2024-01-07
Conferencias Relacionadas
CCFCOREQUALISAbreviaciónNombre CompletoEntregaNotificaciónConferencia
bb3ICISSInternational Conference on Information Systems Security2026-07-102026-09-102026-12-16
b1ICOINInternational Conference on Information Networking2025-10-242025-11-152026-01-14
cba2ISCInformation Security Conference2025-06-042025-07-292025-10-20
cb1FUSIONInternational Conference on Information Fusion2024-03-012024-05-012024-07-07
cICIS'''International Conference on Computer and Information Science2020-08-102020-08-272020-11-18
bb1ISITInternational Symposium on Information Theory2019-01-202019-03-312019-07-07
a*ICISInternational Conference on Information Systems2017-05-052017-08-072017-12-10
cISA'International Conference on Information Security and Assurance2016-01-302016-02-152016-03-24
cb1IHInformation Hiding Conference2012-02-052012-04-012012-05-15
bITWInformation Theory Workshop2013-07-122013-09-09
Revistas Relacionadas
CCFNombre CompletoFactor de ImpactoEditorISSN
aACM Transactions on Information Systems9.1ACM1046-8188
bInformation Sciences6.8Elsevier0020-0255
bInformation Systems3.4Elsevier0306-4379
International Journal of Information Security3.2Springer1615-5262
The Information Society3.0Taylor & Francis0197-2243
aIEEE Transactions on Information Theory2.9IEEE0018-9448
cEURASIP Journal on Information Security2.1Springer1687-417X
Information Polity1.8IOS Press1570-1255
Journal of Information Science1.7SAGE0165-5515
cIET Information Security1.300IET1751-8709