Keynote Speakers and Relators: Amanda Rivera (University of Puerto Rico), Ghang Hua (Microsoft Research), Jonathan Miller (University of Virginia), Richard Zamora (Symantec), and F. V. Cipolla-Ficarra.
:: |
Cloud Computing and Emerging Services Applications in Internet of Things |
:: |
Cyber Criminals' Strategies from Universities |
:: |
Cyber Security Camouflage and Deception Technologies: Cyber Defenses for Affective Computing, Opinion Mining and Sentiment Analysis |
:: |
Efficient Evaluation of the Human Context-Aware Security |
:: |
Impact of Big Data on Bussiness and its Evolution in Information and Knowledge Society |
:: |
Surveying Microsoft Security Essentials |
:: |
Tourism Mobile Apps: Experiments with Adaptive Combined Design |
Books and Handbooks Presentation: A diachronic relationship between education, software engineering, human factors new technologies and social networking.
Official Language: English. Additional Languages: Italian, Spanish and French.
[ July 12 ]
:: Registration 8:45 – 9:15
:: Welcome
:: Tourism and Cultural Heritage –New York City
:: See N.B.
::: Coffee break: ::: 10:45 – 11:00
:: See N.B.
::: 13:15 - 14:15 Lunch :::
::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
Keynote Speakers, Relator, Workshop, Papers and Demos :: 14:30 – 18:30
::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
:: See N.B.
:::::::::::::::::::::::::::::::::::::::::::::::::::::
Papers, Demos and Posters
::::::::::::::::::::::::.::::::::::::::::::::::::::::
:: See N.B.
::: Coffee break ::: 16:15 – 16:30
:: See N.B.
Excursion # 1: Cultural heritage in New York City (museums) and welcome cocktail.
[ July 13 ]
:: Registration ::: 8:45 – 9:00
:: Remarks 9:00 – 9:15
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
Keynote Speakers, Papers, Workshops Session :: 9:15 - 13:00
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
:: See N.B.
::: Coffee break: ::: 10:45 – 11:00
:: See N.B.
::: 13:15 - 14:15 Lunch :::
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
Papers, Demos, Posters and Demostration Session :: 14:15 – 18:15
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
:: See N.B.
::: Coffee break ::: 16:15 – 16:30
:: See N.B.
Excursion # 2: Cultural and natural heritage in NYC (museums) and Central Park.
[ July 14 ]
:: Remarks 9:00 – 9:10
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
Keynotes Speakers and Papers :: 9:10 – 12:30
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
:: See N.B.
::: Coffee break: ::: 10:30 – 10:45
:: See N.B.
::: 12:30 - 13:30 Lunch :::
:: See N.B.
:: Closing Remarks
Excursion # 3: Cultural and natural heritage in NYC (Ellis Island and Statue of Liberty) and dinner.
Keynote speakers, keynote relators, papers, short papers, demos, posters and research-in-progress accepted (alphabetical order): Argentina, Australia, Canada, China, Cuba, Curaçao, Denmark, Finland, India, Italy, Malta, Norway, Portugal, Puerto Rico, Romania, Singapore, South Korea, Slovakia, the Netherlands, Spain, Sweden, Switzerland, Turkey, UK and USA.
:: NYC01 :: |
A Case Study on Information Architecture and Design Methods :: Paper |
:: NYC02 :: |
A Secure Shield for Networking using Biometrics Parameters :: * Best Poster * |
:: NYC03 :: |
Are Universities an Exponential Factory of Cyberterrorists? :: Paper |
:: NYC04 :: |
Blockchain in Indian Healthcare: A Novel Model for Cooperation? :: Paper |
:: NYC05 :: |
Business Security: Cryptosystem Based on Iris :: Paper * Best Research * |
:: NYC06 :: |
Cloud Computing and Emerging Services Applications in Internet of Things :: Keynote Speaker |
:: NYC07 :: |
Cyber Criminals' Strategies from Universities :: Keynote Speaker |
:: NYC08 :: |
Cyber Security Camouflage and Deception Technologies: Cyber Defenses for Affective Computing, Opinion Mining and Sentiment Analysis :: Keynote Speaker |
:: NYC09 :: |
Deep Learning Techniques for Networking Anomaly Registration :: Short Paper |
:: NYC10 :: |
Domotics Framework for the Internet of Things :: Paper |
:: NYC11 :: |
Efficient Evaluation of the Human Context-Aware Security :: Keynote Speaker |
:: NYC12 :: |
Evaluation of Social Media: Towards a Service Oriented Detection of Malicious Participants :: Demo |
:: NYC13 :: |
How Italian Computer Scientists Collaborate with Legal Immunity of Cyber Attacks and International Dissemination of the ‘G factor’ from European Universities: Analyzing the Actions of a Cyberbullying in Springer Nature :: Paper |
:: NYC14 :: |
Impact of Big Data on Bussiness and Its Evolution in Information and Knowledge Society :: Keynote Speaker |
:: NYC15 :: |
Microsoft Cloud Computing for Learning and Research :: Paper |
:: NYC16 :: |
Mobile Phone Bigdata: Analysis of Customers' Behaviour and Needs in a Small Chain of Supermarkets in Puerto Rico :: * Best Paper * |
:: NYC17 :: |
Naiveté of the Italian Taxpayers in the Promotion of Legal Immunity for Cyber Attacks through their Academics and University Officials :: Paper |
:: NYC18 :: |
Photographs in Online Press and Social Web (POPSW): A Methodology for the Early Detection of Potential Cyber Attack Professionals and Psychopathic Influencers in the University Student Stage :: Paper |
:: NYC19 :: |
Rethinking Service-Oriented Computing, Cloud and New Technologies :: * Best Short Paper * |
:: NYC20 :: |
Scandinavian Mobile Phone: Design and Interface Metaphors Has Boosted the Phenomenon of Commercial Globalization and Emigration Flows in Europe :: Poster |
:: NYC21 :: |
Spaniards and Italians Working and Investigating Freely for the High Officials of German Private Companies: A Case Study in the Springer Nature and Computer Science Publishing Context :: Paper |
:: NYC22 :: |
State-of-the-art of Business Intelligence :: Paper * Special Mention: Research-in-Progress * |
:: NYC23 :: |
Surveying Microsoft Security Essentials :: Keynote Speaker |
:: NYC24 :: |
The Lack of Internet Memory Since Its Democratization in 1995: Examples of the Damages Caused in the Workplace :: Paper |
:: NYC25 :: |
The Semiotics of Fashion to Detect the Destroyers of Science: Towards an Identikit from Valencia to Belarus :: Paper |
:: NYC26 :: |
Tourism Mobile Apps: Experiments with Adaptive Combined Design :: Keynote Speaker |
:: NYC27 :: |
Trivial Studies of Semantic Web and Publishing Conference Proceedings to Hide the Cyberterrorism in Europe, America and Asia: The Case of Springer Nature in Computer Science Section :: Paper |
:: NYC28 :: |
User Identity Verification in Cloud: Increasing Outsourcing Services and Improving Customer Satisfaction :: Paper |
|
|
|
Software & Hardware Companies - Didactic Demos Sessions #1 : Antivirus |
|
Moderators: Amanda Rivera and Richard Zamora |
|
|
:: NYC29 :: |
Anti-Adware, Anti-Malware and Anti-Spyware: A Comparison of the Assessment of Quality |
:: NYC30 :: |
Free Antivirus Systems |
:: NYC31 :: |
Security Apps for Small Businesses * Best Demo * |
:: NYC32 :: |
Type of Viruses: Evolution |
|
|
|
Parallel Session #1: International Relations, University Concessions, and Cyberattacks (Papers, Short Papers, and Research-in-Progress) |
|
Moderators: Moderators: Amanda Rivera, Ruth Wilson and F. V. C. Ficarra |
|
|
:: NYC33 :: |
A Detailed Explanation of the Italian Teaching Mechanisms for the Generation of Cyber Terrorists and Cyber Attacks Within the European Union Through Agreements Between Universities: Examining the Consequences of the Agreement Between the Universities of Minsk and Trento in 2010 |
:: NYC34 :: |
Tactics of Cyber Terrorist Potentials to Interact with the Highest Academic Authorities in their Students’ Period: Establishing Real Ties and Their Impact Over Time in the Local Educational System |
:: NYC35 :: |
The Ignorance of the Humanists Experts and Computer Science Technicians in the Signing of University International Agreements: Studying the Negative Repercussions Between Northern Italy and the Eastern European Countries |
|
|
|
Parallel Session #2: Education, Informatics, and Pseudo Ethics (Papers and Research-in-Progress) |
|
Moderators: Amanda Rivera, Ruth Wilson and F. V. C. Ficarra |
|
|
:: NYC36 :: |
Ethical Codes and the Inverse Relationship in Italian Computer Science and Human-Computer Interaction: A Greater Number of Articles and Less Ethical Behaviour |
:: NYC37 :: |
How the 'Impact Factor' is Falsified in Scientific Publications: Consequences of Wild Mercantilism in the Science |
:: NYC38 :: |
Is Paraguay the "Ground Zero" of the Destruction of Sciences in South America through the Activation of Cyberterrorists in Europe? Investigating the First Criminal Interrelations from Catholic University of Asunción Towards the Computer Science Departments in Universities of Milan and Trento |
:: NYC39 :: |
Promoting the Lack of Experience and Training in Computer Science Teaching with Religion: The Fifty Years of Illicit Activities at the University of Bergamo |
:: NYC40 :: |
The Nonexistent University Educational Rigor of Doctorate and Post-doctorate Degrees in University of Trento: The Main Reasons for Not Trusting Human-Computer Interaction Studies |
:: NYC41 :: |
Why the Informatics Departments of European Universities Redirect Their Cyber Attacks Through American Universities? Revealing a Hexagonal Study Between Universities from Brazil, Chile, Colombia, France, Portugal and Spain |
|
|
:: NYC42 :: |
Books and Handbooks Presentation - IGI Global: Links between computer science, educacion, and behaviour |
|
Moderators: Amanda Rivera and Ruth Wilson |
N.B.The program with table time it will be distributed to attendees at conference rooms. |