The 10th International Conference “Horizons for Information Architecture, Security and Cloud Intelligent Technology (HIASCIT 2025): Programming, Software Quality, Online Communities, Cyber Behaviour and Business” is a premier scientific meeting for discussing the latest advances in the emerging areas of computer sciences and technologies for Internet, intranet, extranet, cloud computing, programing, safety and security, human and social factors, business, software quality, intelligence artificial, robotics, etc.
Many conferences are focused on specific aspects of computer science, telecommunications, virtual reality, mixed reality, architecture visualization, gamification, interactive technology for children, embodied interaction, conversational agents, artificial intelligence in education, etc., and bring together leading experts in an only one particular field or sometimes on a specific technology. At such large conferences students are often marginalized or relegated to poster sessions, for example, with 5 – 10 minutes for the presentation. Our conferences, workshops, symposiums, and so on, are not a "mega big" (thousands) scale and aim to promote dialogue between established professors and graduate students working on new directions. Besides, we are working under the modality "zero" Gardunia Factor.
Hence topics from the whole range of software engineering, information architecture, digital security, hardware protection mechanisms, interactive design, communicability, expanded reality, user security training, and so forth are welcomed. Last year’s symposiums, workshops, conferences, etc., organized by ALAIPO and AInCI, for instance, included papers, demos, posters, work-in-progress, etc., on the topics (see below the alphabetical order). An extensive listing connotes and reflects the requirement and also skill necessary to find intersection zones of the disciplines among the different domains, fields, and specialties; which at the same time potentially boosts and merges the formerly different scientific views.
In other words, the current international conference is aimed at all the professionals, experts, students, professors, researchers, businessmen, etc. hailing from the formal sciences, natural and the factual sciences. This is another of the reasons why, when we refer currently to the architecture of information, it is claimed that it is “an art and a science” to find the best possible solutions to the problems posed, from the programming of efficient and intelligent applications down to the management of the online communities.
In this sense, cloud computing can increase the business in each one of the environments of the human being, going from intelligent mobile phone, federated database system, business intelligence, and so on., to theory and applications of cryptology, intrusion detection, heuristic methods and techniques for stopping attacks in social networking, just to mention a few examples. In short, we focus on the following main and secondary subjects, which do not exclude others of great current or future interest, alphabetically listed in the following way:
:: Information Architecture
- Cloud Computing for Service Oriented Architectures
- Cloud Computing Infrastructure
- Cloud Computing Models, Techniques and Architecture
- Information Architecture Design for Cloud Computing and Security
- Library Systems and Database Development for Information Architecture
- Usability Engineering and Communicability for Information Architecture
:: Security
- Administration Security Policy
- Data Privacy and Security
- Human Factors: Methods for the Elimination of Gardunia
- Security Certification: Standardization and Guidelines
- Security in Grid
- Security Policies and User Behaviour
- Semantic Computing and Security
:: Cloud Intelligent
- Cloud Computing for Big Data
- Cloud Computing for Internet of Things
- Cloud Development Tools and Applications
- Federated Database System and Cloud Computing
- Mobile Cloud for Industrial Production and Business
- Strategies for Cloud Assessment
:: Technology
- Advanced Multi-modal Interfaces for Security
- Authentication Mechanisms and Systems
- Cyber Security Automation
- Firewall Systems and Management
- ICT, Servers and Networking: Hardware and Software Configuration
- Multimedia Mobile Phone for Business Intelligence
- Network Security Issues and Protocols
- Voice, Face and Signature Recognition Systems for Security
:: Programming
- Cloud Programming Models and Paradigms
- Database: Design, Security and Authorization
- Interactive Design with AI for International Users Security and Privacy Information
- Special Algorithms for Optimization Security, Cloud Computing Information and AI
- Theory and Applications of of Cryptology
- Vulnerability Analysis
:: Software Quality
- Attack Information: Analysis for Detection and Prevention
- Heuristic Evaluation for Cyber Attacks with AI
- Human and Social Factors in Software Engineering for Security and Confidential Information
- Interactive Design for International Users Security and Privacy Information
- Natural Interfaces, Communicability and Strong Security for Interactive Systems
- Open Software and Commercial Software for Anti-virus
- Techniques and Methodologies for Virtual Defense
:: Online Communities
- Access to Online Information: Rights and Obligations
- Consequences of the Cyber Destruction and International Legislation
- Digital Contents and Copyright Protection Techniques
- Ethics and Aesthetics of the Interactive Contents Online and Off-line
- Evaluation of the Impact of Security Efficiency on User Satisfaction
- Freedom of Thought and Expression: Hacking Democracy
- Information Society and International Legislation for New Technologies
:: Cyber Behaviour
- Illegal Algorithms for the Censorship and Reputation Destruction
- Cyber Destructors and Parochialism from Education / Religion / Political / Legal Areas
- Intellectual Property and Copyright
- Methods and Techniques for Stopping Attacks in Social Networking
- Psychiatry Studies for Cyber Destructors
- Quality Attributes and Metrics for the Evaluation of the Cyber Destructors
- Social Psychology and Human Behaviour in Safety, Security and Privacy
:: Business
- Business and Security Risk Models
- Business Intelligence and Business Analytics
- Business Quality Models for Universities, Enterprises and Industries
- Communicability for Business Intelligence
- Mobile Cloud for Industrial Production and Business
- Security, Trust and Privacy in Commerce Online
All contributions –papers, workshops, demos, posters, research-in-progress and doctoral consortium, should be of high quality, originality, clarity, and significance. Besides, all submitted papers will be reviewed by a double-blind (at least three reviewers), non-blind, and participative peer review. These three kinds of review will support the selection process of those that will be accepted for their presentation at the international conference. Authors of accepted contributions who registered in the conference can have access to the evaluations and possible feedback provided by the reviewers who recommended the acceptance of their research works, so they can accordingly improve the final version of their contributions.
|