5th International Workshop on

Managing Insider Security Threats
(MIST 2013)

October 24-25, 2013

Pukyong National University, Busan, Korea


[Overview][Topic][CFP][Important Date][Submission Guideline][Organization]

 [Post Publication][Invited Talks][Program][Registration][Previous Workshops][Workshop Venue][Contact]


Innovative Information Science & Technology Research Group




(1) Author or Early Regsitration will be open until October 4, 2013.
(2) As a Keynote Speaker, Dr. Felix Wu (Professor, UC Davis, USA) is invited
(3) Post Publication News:

      - International Journal of Computer Mathematics (ISSN: 0020-7160, SCIE, IF = 0.542)
          A special Issue on "Innovative Security Technologies against Insider Threats and Data Leakage"

Journal of Ambient Intelligence and Humanized Computing (ISSN: 1868-5137, Scopus & EI indexed)





Duringthe past two decades, information security technology developments have been mainly concerned with intrusion detection to prevent  unauthorized attacks from outside the network.  This includes hacking, virus propagation, spyware and more. However, according to a recent Gartner Research Report, information leaks have drastically increased from insiders who are legally authorized to access corporate information.The unauthorized leak of critical or proprietary information can cause significant damage to corporate image and reputation, perhaps even weakening its competitiveness in the marketplace. On a larger scale, government and public sectors may suffer competitive loss to other nations due to an internal intelligence breach. While the leaking of critical information by insiders has a lower public profile than that of viruses and hacker attacks, the financial impact and loss can be just as devastating.The objective of this workshop is to showcase the most recent challenges and advances in security and cryptography technologies and management systems for preventing information breaches by insiders. The workshop promotes state-of-the-art research, surveys and case analyses of practical significance. Physical, managerial, and technical countermeasures will be covered in the context of an integrated security management system that protects critical cyber-infrastructure against unauthorized internal attack. We expect that this workshop will be a trigger for further research and technology improvements related to this important subject. 





- Theoretical foundations and algorithms for addressing insider threats

- Insider threat assessment and modeling

- Security and cryptography technologies to prevent, detect, and predict insider threats

- Cryptographic protocols against insider threats

- Validating the trustworthiness of staff

- Post-insider threat incident analysis

- Data breach modeling and mitigation techniques

- Registration, authentication and identification

- Certification and authorization

- Database security

- Device control system

- Digital forensic system

- Fraud detection

- Network access control system

- Intrusion detection

- Keyboard information security

- Information security governance

- Information security management systems

- Risk assessment and management

- Log collection and analysis

- Trust management

- IT compliance (audit)

- Continuous auditing

- Corporate ethics, accountability and integrity

- Decision-making modeling and process






- Submission Deadline: July 31, 2013  August 16, 2013 [Extended]

- Authors Notification: August 31, 2013 September 16, 2013 [Extended]

- Author Registration: September 30, 2013

- Final Manuscript: September 30, 2013






Authors are invited to submit original papers: they must not substantially duplicate work that any of the authors have published elsewhere or
have submitted in parallel to any other conferences that have proceedings.

The submission of contributions to MIST 2013 must occur through the workshop submission system:


The submission file is in PDF or PS file format produced via the Easychair Latex Class file (US letter size).

[available at http://jowua.yolasite.com/resources/easychair.zip]

Each paper should be at least 10 and at most 15 pages long based on the easychair style.

Submission of a paper implies that should the paper be accepted, at least one of the authors will register
and present the paper at the workshop.


All accepted papers will be published in the following journals:

- MIST 2013 Volume 1 will be published in JoWUA vol. 4, no. 4, 2013

Journal of Wireless Mobile Networks, Ubiquitous Computing and Dependable Applications (JoWUA)

- MIST 2013 Volume 2 will be published in JISIS vol. 3, no. 4, 2013

Journal of Internet Services and Information Security (JISIS)


* The above two volumes will be available at MIST 2013







Steering Committee

Dieter Gollmann (Hamburg University of Technology, Germany)

Kouichi Sakurai (Kyushu University, Japan)


General Co-Chairs

Kyung Hyun Rhee (Pukyung National University, Korea)
Ilsun You (Korea Bible University, Korea)


Program Co-Chairs

Kangbin Yim (Soonchunhyang University, Korea)


Pannel Session Chair

William R. Claycomb (Carnegie Mellon University, USA)


Program Committee Members

Ruo Ando (NICT, Japan)

Pandu Rangan Chandrasekaran (Indian Institute of Technology Madras, India)

Xiaofeng Chen (Xidian University, China)

Steven Furnell (Plymouth University, UK)
Adela Georgescu (University of Bucharest, Romania)

Yoshiaki Hori (Saga University, Japan)

Shinsaku Kiyomoto (KDDI R&D Laboratories Inc., Japan)

Fang-Yie Leu (Tunghai University, Taiwan)

Andrew P. Moore (Carnegie Mellon University, USA)

Kirill Morozov (Kyushu University, Japan)

Gunther Pernul (University of Regensburg, Germany)

Marcin Piekarczyk (Pedagogical University in Krakow, Poland)

Wolter Pieters  (Delft University of Technology, the Netherlands)

Christian W. Probst (Technical University of Denmark, Denmark)

Marek Ogiela (AGH University of Science and Technology, Poland)

Malek Ben Salem (Accenture Technology Labs, USA)

Dongwan Shin (New Mexico Tech., USA)

Masakazu Soshi (Hiroshima City University, Japan)

Willy Susilo (University of Wollongong, Australia)

Shambhu Upadhyaya (University at Buffalo, The State University of New York, USA)

Qin Xin (University of the Faroe Islands, Denmark)

Danfeng (Daphne) Yao (Virginia Tech., USA)

Meng Yu (Virginia Commonwealth University, USA)

Baokang Zhao (National University of Defense Technology, China)









Special Issue on Innovative Security Technologies against Insider Threats and Data Leakage
Journal: International Journal of Computer Mathematics  (ISSN: 0020-7160, SCIE, IF = 0.542)
Guest Editors:
- Ilsun You, Korea Bible University, Republic of Korea
- Marek R. Ogiela, AGH University of Science and Technology, Poland
- Isaac Woungang, Ryerson University, Canada

- Kangbin Yim, Soonchunhyang University, Asan-si, Republic of Korea


      Journal of Ambient Intelligence and Humanized Computing

Journal of Ambient Intelligence and Humanized Computing (ISSN: 1868-5137, Scopus & EI-indexed)
It will be highly published for this journal to be included in SCIE this year.




At least 50% papers presented at MIST 2013 will be invited to SCIE indexed Journals including the above special issue.
Regarding the rest papers, they will be invited to Scopus or EI indexed journals.





- MIST 2012 - November 8-9, 2012, Nishijin Plaza, Kyushu University, Fukuoka, Japan

- MIST 2011 - December 1-2, 2011, Fukuoka Institute of Technology, Fukuoka, Japan (with InCos 2011)

- MIST 2010 - June 15, 2010, Morioka, Iwate, Japan (with IFIPTM 2010)

- MIST 2009 - June 16, 2009, Purdue University, West Lafayette, USA (with IFIPTM 2009)








Title: Anomaly Detection and Social Interactions:A Social Informatics approach for Insider Threats

Social informatics is the study of information and communication tools under different cultural and community contexts and how people interact with each other using those tools in computer-mediated environments. It concerns the design, uses and consequences of information technologies that take into account their interaction with different social contexts. These new forms of communication enable our social interactions being digitally analyzed real-time at a large scale, which poses both new challenges/concerns and opportunities to the community of cyber security. One potential area of development under social informatics is anomaly detection on social behavioral models for online users. For instance, social exchange theories developed in cultural anthropology, neoclassical economics, communication and psychology can be applied to analyze how power relations shape interaction between individuals, and ways to achieve balance in these relations. Various forms of social capitals, derived from social networks, might be considered as quantitative measures regarding common set of expectations, shared values, and a sense of trust among people connected in these networks. In this talk, a model of social interactive networks will be presented and, more importantly, we will discuss how this new model can be potentially applied to the context of anomaly detection for insider threats.

Invited Speaker: Dr. Felix Wu (Professor, UC Davis, USA)







For more information, please contact the general chair, Ilsun You (ilsunu@gmail.com).








Innovative Information Science & Technology Research Group