Comune di Sanremo :: Italy

Third International Conference on

Horizons for Information Architecture, Security and Cloud Intelligent Technology ( HIASCIT 2015 ):

Programming, Software Quality, Online Communities, Cyber Behaviour and Business

:: Sanremo – Italy ::

July 9 – 10, 2015

AInCI: International Association of Interactive Communication

ALAIPO: Latin Association of HCI

::. BBK .::
Birkbeck University of London

::. CTI .::
Center for Information Technology

::. FUN .::
Future University Hakodate

::. GATECH .::
Georgia Institute of Technology

Indian Institute of Management Rohtak

::. ITB .::
Institute of Technology Bandung

Kettering University

::. KNU .::
Kainan University

::. KULEUVEN .::
K. University of Leuven

London Metropolitan University

::. MDX .::
Middlesex University

::. METU .::
Middle East Technical University

::. MJU .::
Myongji University
South Korea

::. MSU .::
Moscow State University

::. NAPIER .::
Edinburgh Napier University

::. NNU .::
National United University

University of Nottingham

::. POLSL .::
Politechnika Slaska University

::. PURDUE .::
Purdue University

::. QUT .::
Queensland University of Technology

::. TSINGHUA .::
Tsinghua University

::. U-AIZU .::
University of Aizu

::. UB .::
"Vasile Alecsandri" University of Bacău

::. UBA .::
Universidad de Buenos Aires

::. UCC .::
University College Cork

::. UCR .::
Universidad de Costa Rica
Costa Rica

::. UCM .::
Universidad Complutense

::. UEF .::
University of Eastern Finland

::. UGR .::
Universidad de Granada

::. UHK .::
University of Hong Kong

::. UIOWA .::
University of Iowa

::. UM .::
University of Malta

::. UMD .::
University of Michigan-Dearborn

::. UNC .::
Universidad Nacional de Córdoba

::. UNIGE .::
Università degli Studi di Genova

::. UNILJ .::
University of Ljubljana

::. UNIMB .::
University of Maribor

::. UNIMIB .::
University of Milano–Bicocca

::. UNJU .::
Universidad Nacional de Jujuy

::. UNIVE .::
Università Ca' Foscari Venezia

::. UNSE .::
Universidad Nacional de Santiago del Estero

::. UofO .::
University of Ottawa

::. UOI .::
University of Ioannina

::. UPR .::
Universidad de Puerto Rico
Puerto Rico

::. US .::
Universidad de Sevilla

::. USC .::
University of Southern California

::. UTN .::
Universidad Tecnológica Nacional

::. UVa .::
Universidad de Valladolid

::. UWI .::
University of the West Indies

::. VMMI .::
Virtual Maastricht McLuhan Institute
the Netherlands

::. VUA .::
Vrije Universiteit Amsterdam
the Netherlands

::. WASEDA .::
Waseda University

::. WSU .::
Wayne State University






Cloud computing has opened new horizons in the group work, with the possibility of increasing the quality of the products and/or services, in very short timeframes and with lower costs. Besides, there is a reduction of the costs for the maintenance of servers and/or the updating of the versions of the operative services, special applications, etc., with which the local and international users work daily inside a private, public or mixed institution. The safety and privacy of the data which are in the cloud constitutes a key element in the reliability of the interchange of original ideas for the development of avant-garde projects.

The new virtual communities which will be born from these clouds will see the integration and confederation of the diverse models of networks that have existed: intranet, extranet, internet, etc., with the novel micro computing and multimedia mobile phone devices. Here are some of the main goals, which we intend to discuss in this Third International Conference on "Horizons for Information Architecture, Security and Cloud Intelligent Technology (HIASCIT 2015): Programming, Software Quality, Online Communities, Cyber Behaviour and Business".

This synergy of people and tasks will generate new jobs across the whole planet, thus bolstering the notion of the expansion of communicability among the potential users. However, it is necessary to establish balances and controls in the behavior patterns of certain users, who with mercantilist purposes try to get the utmost personal profit with the least effort. It is also necessary to analyze in a neutral way the advantages and disadvantages of the concentration of digital information. Therefore, the quality metrics stemming from software engineering and other disciplines of the social sciences may constitute a set of attributes and quantitative rules in the online and offline communication processes which must be respected by everybody.

Many conferences are focussed on specific aspects of computer science, telecommunications, multimedia, etc., and bring together leading experts in a particular field or sometimes on a specific technology. At such large conferences students are often marginalized or relegated to poster sessions. The conferences, workshops, symposiums, etc., are not a big scale and aim to promote dialogue between established professors and graduate students working on new directions. Hence topics from the whole range of human-computer interaction, multimedia, software, design, etc. are welcomed. Last year’s symposiums, workshops, conferences, etc., organized by ALAIPO and AInCI, for instance, included papers on the topics (see below the alphabetical order). An extensive listing connotes and reflects the requirement and also skill necessary to find intersection zones of the disciplines among the different domains, fields, and specialities; which at the same time potentially boosts and merges the formerly different scientific views.

In other words, the current international conference is aimed at all the professionals, experts, students, professors, researchers, businessmen, etc. hailing from the formal sciences and the factual sciences. This is another of the reasons why, when we refer currently to the architecture of information, it is claimed that it is “an art and a science” to find the best possible solutions to the problems posed, from the programming of efficient and intelligent applications down to the management of the online communities. In this sense, cloud computing can increase the business in each one of the environments of the human being, going from multimedia mobile phone, federated database system, business intelligence online, etc., to theory and applications of cryptology, intrusion detection, methods and techniques for stopping attacks in social networking, just to mention a few examples. In short, we focus on the following main and secondary subjects, which do not exclude others of great current or future interest, alphabetically listed in the following way:

:: Access Control and Privacy Protection
:: Access to Online Information: Rights and Obligations
:: Administration Security Policy
:: Advanced Multi-modal Interfaces for Security
:: Attack Information: Analysis for Detection and Prevention
:: Authentication Mechanisms and Systems
:: Business and Security Risk Models
:: Business Intelligence for Local and Global Users
:: Business Intelligence and Business Analytics
:: Business Ontology
:: Business Quality Models for Universities, Enterprises and Industries
:: Cloud Backup and Recovery
:: Cloud Compatibility and Interoperability
:: Cloud Development Tools and Applications
:: Cloud Programming Models and Paradigms
:: Cloud Quality Services and Costs
:: Communicability for Business Intelligence
:: Consequences of the Cyber Destruction and International Legislation
:: Cryptographic Protocols
:: Cyber Behaviour
:: Cyber Destructors and Parochialism
:: Cyber Security Automation
:: Data Management and Security for Outsourcing
:: Data Privacy and Security
:: Data Warehousing for Business Intelligence
:: Database: Design, Security and Authorization
:: Digital Cartography for the Localization of the Cyber Destructors
:: Digital Contents and Copyright Protection Techniques
:: Education and Cloud Computing
:: Ethics and Aesthetics of the Interactive Contents Online and Off-line
:: Evaluation of the Impact of Security Efficiency on User Satisfaction
:: Federated Database System and Cloud Computing
:: Firewall Systems and Management
:: Green and Original Cloud Applications
:: Hacking Democracy
:: Health Informatics, Health Technologies and Information Privacy
:: Heuristic Evaluation for Cyber Attacks
:: Human and Social Factors in Security and Confidential Information
:: Identity Theft Protection and Profession Cloning Detection
:: Information Architecture Design for Cloud Computing and Security
:: Information Society and International Legislation for New Technologies
:: Intellectual Property and Copyright
:: Intelligent Information Systems and Security Services
:: Interactive Design for International Users Security and Privacy Information
:: Interfaces Models and the Interaction with Security Systems
:: Intrusion Detection
:: Key Management and Authentication
:: Library Systems and Database Development for Information Architecture
:: Methods and Techniques for Stopping Attacks in Social Networking
:: Mobile Cloud for Industrial Production and Business
:: Mobile Security Systems and Technologies
:: Multimedia Mobile Data Vulnerable
:: Multimedia Mobile Phone for Business Intelligence
:: Natural Interfaces, Communicability and Strong Security for Interactive Systems
:: Network Security Engineering
:: Network Security Issues and Protocols
:: Networking for Business Intelligence
:: Networking Security Systems for Cloud Computing
:: New Media and Marketing for Cloud Computing
:: Ontology for Private and Confidential Information Management
:: Open Software and Commercial Software for Anti-virus
:: Persuasion and Manipulation of the Online Information for Business
:: Pervasive Systems and Ubiquitous Computing in the Cloud
:: Privacy and Integrity of the Information for Outsourcing
:: Privacy in Cloud Computing
:: Psychiatry for Cyber Destructors
:: Quality Attributes and Metrics for the Evaluation of the Cyber Destructors
:: Real-time Business Intelligence
:: Security Certification: Standardization and Guidelines
:: Security in Grid
:: Security Policies and User Behaviour
:: Security, Trust and Privacy in Commerce Online
:: Semantic Computing and Security
:: Social Psychology and Human Behaviour in Safety, Security and Privacy
:: Special Algorithms for Optimization Security and Cloud Computing Information
:: Standard and High Performance Cloud Computing
:: Strategies for Cloud Assessment
:: Techniques and Methodologies for Virtual Defense
:: Theory and Applications of Cryptology
:: Usability Engineering and Communicability for Information Architecture
:: Veracity, Credibility and Reputation Management
:: Voice, Face and Signature Recognition Systems for Security
:: Vulnerability Analysis
:: Web 2.0: Safety and Security
:: Web 3.0 and Business Intelligence
:: Wireless Data Communications and Privacy

All contributions –papers, workshops, demos and doctoral consortium, should be of high quality, originality, clarity, significance and impact. Besides, all submitted papers will be reviewed by a double-blind (at least three reviewers), non-blind, and participative peer review. These three kinds of review will support the selection process of those that will be accepted for their presentation at the international conference.  Authors of accepted papers who registered in the conference can have access to the evaluations and possible feedback provided by the reviewers who recommended the acceptance of their papers, so they can accordingly improve the final version of their papers.

Best regards, 

Francisco V. Cipolla Ficarra (Chair - coordinator)
Pamela Fulton and Doris Edison (International Secretariat)

ALAIPO: Asociación Latina Interacción Persona-Ordenador –Latin Association of HCI ( and AINCI: Asociación Internacional de la Comunicación Interactiva –International Association of Interactive Communication ( Address: Via Tabajani 1, S. 15 (7) - 24121 (Bergamo) Italy :: c/ Angel Baixeras, 5 - AP 1638 - 08080 (Barcelona), Spain. Email: ::

P.S. If you wish to be removed from this mailing list, please send an email to or with "remove" in the subject line. Thanks.     


2. The events have the following deadlines

Works Submissions: Closed
Papers Submissions: Closed
Authors Notification: Closed

Camera-ready, full papers: Closed


3. Program Committee:

- Francisco V. Cipolla Ficarra (chair - coordinator)

Demo Session, Poster Session, Workshop Session, and Doctoral Consortium:

Wen-Yuan Jen. National United University (Taiwan), Mohamed Hamada. University of Aizu (Japan), José Hamkalo. University of Buenos Aires (Argentina), Chih-Fang Huang. Kainan University (Taiwan), Lorenzo García Aretio. Universidad Nacional de Educación a Distancia (Spain), Vigneswara Ilavarasan: Indian Institute of Management Rohtak (India), and Miguel C. Ficarra: AInCI and ALAIPO

Honorary Committee:

- Gavriel Salvendy. Tsinghua University (China)
- Kaoru Sumi. Future University Hakodate (Japan)
- Kim H. Veltman. Virtual Maastricht McLuhan Institute (The Netherlands)
- Stafford Griffith. University of the West Indies (Jamaica)

Scientific Committee:

:: Adriana Olleta. Universidad Nacional de Jujuy (Argentina)
:: Alan Chamberlain. University of Nottingham (UK)
:: Alan Radley. University College London (UK)
:: Andrea Albarelli. Università Ca' Foscari (Italy)
:: Andrea Torsello. Università Ca' Foscari (Italy)
:: Andreas Kratky. University of Southern California (USA)
:: Anna Parodi. Università degli Studi di Genova (Italy)
:: Annamaria Poli. Università degli Studi di Milano Bicocca (Italy)
:: Arturo Colorado. Universidad Complutense (Spain)
:: Beatriz Sainz de Abajo. Universidad de Valladolid (Spain)
:: Bojan Novak. University of Maribor (Slovenia)
:: Carl Smith. London Metropolitan University (UK)
:: Chih-Fang Huang. Kainan University (Taiwan)
:: Claudia Rébola. Georgia Institute of Technology (USA)
:: Domen Verber. University of Maribor (Slovenia)
:: Elena Durán. Universidad Nacional de Santiago del Estero (Argentina)
:: Farshad Fotauhi. Wayne State University (USA)
:: Filippo Bergamasco. Università Ca' Foscari (Italy)
:: Florian Kammüller. Middlesex University London (UK)
:: Gavriel Salvendy. Tsinghua University (China)
:: Georges Győry. Birkbeck University of London (UK)
:: Georgios Styliaras. University of Ioannina (Greece)
:: Gerrit van der Veer. Vrije Universiteit Amsterdam (Netherlands)
:: Hugo Scolnik. Universidad de Buenos Aires (Argentina)
:: Inmaculada Gordillo. Universidad de Sevilla (Spain)
:: Inmaculada Vilches López. Universidad de Granada (Spain)
:: Isidro Moreno. Universidad Complutense (Spain)
:: Jean Vanderdonckt. University of Leuven (Belgium)
:: José Hamkalo. University of Buenos Aires (Argentina)
:: Juan Silva Salmerón. University of Ottawa (Canada)
:: Jurek Kirakowski. University College Cork (Ireland)
:: Kaoru Sumi. Future University Hakodate (Japan)
:: Karen Woodman. Queensland University of Technology (Australia)
:: Kim Veltman. Virtual Maastricht McLuhan Institute (The Netherlands)
:: Klementina Možina. University of Ljubljana (Slovenia)
:: Lastenia Bonilla. Universidad de Costa Rica (Costa Rica)
:: Lee Chih-Wei. Yuan Ze University (Taiwan)
:: Liliana Māţă. "Vasile Alecsandri" University of Bacău (Romania)
:: Ljubica Marjanoviè Umek. University of Ljubljana (Slovenia)
:: Lorenzo García Aretio. Universidad Nacional de Educación a Distancia (Spain)
:: Marek Wyleżoł. Politechnika Slaska (Poland)
:: Maximiliano Romero. Universidad Nacional de Córdoba (Argentina)
:: Maria del Mar Ramirez Alvarado. Universidad de Sevilla (Spain)
:: María Teresa Dalmasso. Universidad Nacional de Córdoba (Argentina)
:: Marilú Lebrón Vázquez. Universidad de Puerto Rico (Puerto Rico)
:: Miguel Cipolla Ficarra. Alaipo & Ainci (Italy & Spain)
:: Mohamed Hamada. University of Aizu (Japan)
:: Nilda Pérez Otero. Universidad Nacional de Jujuy (Argentina)
:: Onur Demirors. Middle East Technical University (Turkey)
:: Pablo Marrero Negrón. Universidad de Puerto Rico (Puerto Rico)
:: Peter Stanchev. Kettering University (USA)
:: Philip Bonanno. University of Malta (Malta)
:: Pivovarova Liudmila. Moscow State University (Russia)
:: Reiko Hishiyama. Waseda University (Japan)
:: Rodrigo Bonacin. DSSD - CTI, Ministério da Ciência e Tecnologia (Brazil)
:: Rosanna Costaguta. Universidad Nacional de Santiago del Estero (Argentina)
:: Ruly Darmawan. Institute of Technology Bandung (Indonesia)
:: Stafford Griffith. University of the West Indies (Jamaica)
:: Steve Anderson. University of Southern California (USA)
:: Tetsuo Tamai. University of Tokio (Japan)
:: Timothy Read. Universidad Nacional de Educación a Distancia (Spain)
:: Urška Fekonja Peklaj. University of Ljubljana (Slovenia)
:: Vasileios Paliktzoglou. University of Eastern Finland (Finland)
:: Vigneswara Ilavarasan. Indian Institute of Management Rohtak (India)
:: Virginia Guarinos Galán. Universidad de Sevilla (Spain)
:: Wen-Yuan Jen. National United University (Taiwan)
:: William Grosky. University of Michigan-Dearborn (USA)


3rd International Conference on Horizons for Information Architecture, Security and Cloud Intelligent Technology (HIASCIT 2015): Programming, Software Quality, Online Communities, Cyber Behaviour and Business :: Sanremo - Italy :: July 9 – 10, 2015

3rd International Conference on Horizons for Information Architecture, Security and Cloud Intelligent Technology (HIASCIT 2015): Programming, Software Quality, Online Communities, Cyber Behaviour and Business :: Sanremo - Italy :: July 9 – 10, 2015

IGI Global :: USA Nova Science Publishers :: USA CRC Press :: USA

Blue Herons Editions :: Canada, Argentina, Spain and Italy

MicrosoftMicrosoftHewlett PackardElectronic ArtsOcé


CADdyGedisa EditorialPTC



Serena Digital


Disney Research :: USA

Computer Graphics World :: USAComputer Graphics World :: USAMarcelo Penna Group :: Spain

Air Inuit :: Canada

Turismo :: Italy

Riviera dei Fiori :: Imperia - Liguria, Italy

Embassy of Argentina in Italy

Blue Herons Editions :: Canada, Argentina, Spain and Italy

HCI Lab :: 1997 - 2015


© 1997 - 2015 AINCI & HCI Lab