- Welcome
- Call for Papers
- Conference Committee
- Conference Themes
- Accepted Papers
- Special Topics Sessions
- Recherche en Français
- Important Dates
- Registration
- Conference Venue
Welcome
The 5th IBIMA conference on the Internet and information technology in modern organizations 13-15 December 2005 will address a range of important themes with respect to Information Technology and its impact on organizations.
The conference will include numerous paper and workshop presentations by academics and researchers from around the globe.
Conference participants are welcome to submit presentation full papers, extended abstracts, paper drafts, or invited session proposals. Please refer to call for papers.
Call for Papers
Interested academics and practitioners are invited to submit:
- Research papers: complete papers (5000 words max.) with complete references section.
- Short papers: this could be research in progress, abstracts, ideas you would like to explore with audiance at the conference, or draft of papers for possible co-authorship: (max. 5 pages or 1000 words)
All papers will be directed to the appropriate theme and/or track. All accepted papers will be published in the conference proceedings.
Papers will be evaluated for originality, significance, clarity, and contribution. Complete papers will be exposed to full blind peer review. Short papers will be reviewed by the editor. Each paper will be exposed to a full blind peer review. Summary of review feedback will be sent back to the author(s) in most cases. All review comments and suggestions should be addressed in the final submission. Submitted Papers must not have been previously published or currently submitted for publication elsewhere.
Conference proceedings will be published as an e-book on a CD (ISBN : 0-9753393-4-6)
Conference Committees
Conference Chair
Khalid S. Soliman, Hofstra University, USA
Local Chair
Sherif Kamel, American University in Cairo, Egypt
Wessam Salah, Cairo, Egypt
Advisory Committee
John F. Affisco, Hofstra University, USA
Mel Damodaran, University of Houston-Victoria, USA
Reggie Davidrajuh, Stavanger University College, Norway
Zahir Irani, Brunel University, UK
Markus Mau, University of Giessen, Germany
Nicole Mau, University of Giessen, Germany
Krassie Petrova, Auckland University of Technology, New Zealand
Marcus Rothenberger, University of Nevada-Las Vegas, USA
Najib Saylani, Hofstra University, USA
Mark Srite, University of Wisconsin – Milwaukee, USA
Program Committee
Anastase Adonis, Objective Networks, France Excellent Constructive review
Vasilis Aggelis, Piraeus Bank, Greece
Mahmoud Arayssi, American University in Beirut, Lebanon Excellent Constructive review
Muhammad Fareed Arif, University of Central Punjab, Pakistan
Nabil Arman, Palestine Polytechnic University, Palestine
Muhammad Hasmi Abu Hassan Asaari, Universiti Sains Malaysia, Malaysia
Saïd Assar, I.N.T Evry, France
Riem M. Hamdi Abdel Azim, German University in Cairo, Egypt
Imad Baalbaki, American University in Beirut, Lebanon Excellent Constructive review
Ali Al-Badi, Sultan Qaboos University, Oman
Abdul Hafeez-Baig, University of Southern Queensland, Australia
Subhajit Basu, Queen's University Belfast, Ireland
Jean-Paul Van Belle, University of cape Town, South Africa Excellent Constructive review
Rob Bernard, Higher Colleges of Technology, UAE
John Byrne, RMIT Business, Australia
Silvia Elaluf-Calderwood, London School of Economics, UK
Enrique V. Carrera, University San Francisco of Quito, Ecuador
Rommert J. Casimir, Tilburg University, The Netherlands Excellent Constructive review
Jan Mendonca Correa, Professor at University Of Brasilia, Brazil
Lourdes Canos Daros, Universidad Politecnica de Valencia, Spain
Soumaya Ben Dhaou, Paris IX Dauphine University, France Excellent Constructive review
Patrick Doran, Zayed University, UAE
Jean-Louis Ermine, Institut National des Télécommunications, France
Susana de Juana Espinosa, Universidad de Alicante, Spain
Uchenna Eze, Nanyang Technological University, Singapore
Xiuzhen Feng, University of Twente, Netherland
Eulalio G. Campelo Filho, University Karlsruhe, Germany
José Luis Fuertes, Universidad Politécnica de Madrid, Spain
Norjihan Abdul Ghani, University of Malaya, Malaysia
Song Han, Curtin University of Technology, Australia
Ramzi A. Haraty, Lebanese American University, Lebanon
Suraya Hamid, University of Malaya, Malaysia
Markus Helfert, Dublin City University, Ireland
Pilar Herrero, Universidad Politécnica de Madrid, Spain
Mohammed Al-Jadeed, University of Edinburgh, UK
Lobna Jeribi, ENSI University, Tunisia
Anand Jeyaraj, University of Missouri - St.Louis, USA
Kevin Johnston, University of Cape Town, South Africa
Nazean Jomhari, University of Malaya, Malaysia
Noorliza Karia, Universiti Sains Malaysia, Malaysia
Mohammad Ayub Khan, Tec de Monterrey, Mexico
Rami Khasawneh, Lewis University, USA
Matthew Nicolas Kreeger, University of St. Andrews,UK
Supakorn Kungpisdan, Monash University, Australia
Zaigham Mahmood, University of Derby, UK
Saeed Al-Maliki, University of East Anglia, UK
Vicky Manthou, University of Macedonia, Greece
Merdad Mohasses, Sharjah Women’s Colleges, UAE
Patrick Loh, Knowledgeworks Consultants, Singapore
Keri Logan, Massey University, New Zealand
Somaya Ali, Qatar University, Qatar
Thi Bac Nguyen, Monash University, Australia
Shastri L Nimmagadda, Wafra Joint Operations Company, Kuwait
Thomas Nowey, University of Regensburg, Germany Excellent Constructive review
Urban Nulden, Goteborg University, Sweden Excellent Constructive review
Kok-Leong Ong, Deakin University, Australia
Roslina Othman, International Islamic University Malaysia, Malaysia
Siew Hock Ow, University of Malaya, Malaysia
Roberto Paiano, Università degli Studi di Lecce, Italy
Victor Pankratius, University of Karlsruhe, Germany Excellent Constructive review
Alan R. Peslak, Penn State University & Nova Southeastern University , USA
Ghassan Al-Qaimari, University of Wollongong in Dubai, UAE
Hugo Rehesaar, University of New South Wales, Australia
Md. Mahbubur Rahim, Monash University, Australia Excellent Constructive review
Sri Devi Ravana, University of Malaya, Malaysia
Peter Rittgen, University College of Borås, Sweden Excellent Constructive review
Tomislav Rozman, University of Maribor, Slovenia
Mohammed Samaka, Qatar University, Qatar
Hasan Al-Saedy, Skyline College, UAE
Samiaji Sarosa, Atma Jaya Yogyakarta University, Indonesia
Jawahitha Sarabdeen, Multimedia University, Malaysia
Francesca Sgobbi, Università degli Studi di Brescia, Italy Excellent Constructive review
Maha Shakir, Zayed University, UAE
K. Srikumar, Infosys Technologies Ltd, India
Ali Al-Solbi, University of East Anglia, UK
Daniel Sommer, Universität Karlsruhe, Germany
Javier Soriano, Universidad Politécnica de Madrid, Spain
Minwir Al-Shammari, Bahrain Univesity, Bahrain
Lampros Stergioulas, Brunel University, UK
Amine Nehari Talet, King Fahd University of Petroleum & Minerals, KSA
Sabah N. Abdul_wahab AL-Tamimi, American College of Dubai, UAE
Pawan Kumar Taneja, Punjab College Of Technical Education, India
Fadi Thabtah, University of Bradford, UK
Leonardo José Cortez Villamizar, Universidad Central de Venzuela, Venzuela
William Yeoh, University of South Australia, Australia
Zijiang Yang, York University, Canada
S. Venkateswarlu, KL College of Engineering, India
Stuart Warden, Cape Peninsula University of Technology, South Africa
Edgar R. Weippl, Vienna University of Technology, Austria
Dick Whiddett, Massey University, New Zealand
Viacheslav Wolfengagen, Institute "JurInfoR-MSU", Russia
Masoud Karami Zarandi, Tehran University,Iran
Roman Povalej, Universität Karlsruhe, Germany
Silvana Quaglini, University of Pavia, Italy
Jorge Valdés Conca, Universidad de Alicante, Spain
Shushma Patel, London South Bank University, UK
Islam A. M. El-Maddah, Ain Shams University, Egypt
Soraya Kouadri Mostefaoui, Oxford Brookes University, UK
Joo Y. Park, Yonsei University, Seoul, Korea Excellent Constructive review
Ozlem Bak, University of Greenwich Business School, UK Excellent Constructive review
Virginie Sans, l'université de Cergy-Pontoise, France
K. P. Lam, University of Keele, UK
Zokir Nazarov, Cardiff University, UK
Ikram Amous, Universite de Sfax, Tunisia
Krassie Petrova, Auckland University of Technology, New Zealand
Hasan A. Abbas, Kuwait University, Kuwait
Sue Foster, Monash University, Australia Excellent Constructive review
Fahim Akhter, Zayed University, UAE
Paulus Insap Santosa, Republic Polytechnic, Singapore
Khamis Omar, Princess Sumaya University for Technology, Jordan
Tahir Naeem, COMSATS Institute of Information Technology, Pakistan
Kathy J. Liszka, University of Akron, USA
Nixon Muganda, University of Cape Town, South Africa
Marite Kirikova, Rīgas Tehniskā universitāte, Latvia
Samir Garbaya, Robotics Laboratory of Versailles, France
Dr Lawrence Green, University of Manchester, UK
Khalid Khawaja, American University in Dubai, UAE
Dr. Gregor Zellner, Universität Regensburg, Germany
Katja Harej, University of Maribor, Slovenia Excellent Constructive review
Saad Harous, College of Arts & Sciences, UAE
Mohamed Salah Hamdi, University of Qatar, Qatar
Mohamad Fauzan Noordin, International Islamic University Malaysia, Malaysia
Nihat Kasap, Sabanci University, Turkey
Yahya H Alzoubi, Philadelphia University, Jordan
Reggie Davidrajuh, University of Stavanger, Norway
Vili Podgorelec, University of Maribor, Slovenia
Anthony Rhodes, Zayed University, UAE
Shu Zhou, The University of New Mexico, USA
Fotis Liarokapis, City University, UK
Noor Raihan Ab Hamid, Multimedia University, Malaysia
Jaiprakash T. Lallchandani, D. D. University, India
Marjan Druzovec, University of Maribor, Slovenia
Gianmarco Radice, University of Glasgow, UK
Euripidis N. Loukis, University of the Aegean, Greece Excellent Constructive review
Lejla Vrazalic, University of Wollongong in Dubai, UAE
Ahmad Kayed, Applied Science University, Jordan
John Debenham, University of Technology-Sydney, Australia
Emad Bataineh, Zayed University, UAE
Yousef Shahwan, United Arab Emirates University, UAE Excellent Constructive review
Richard Chbeir, Université de Bourgogne, France
Robert H Barbour, Unitec, New Zealand
Halim M. Khelala, University of Wollongong in Dubai, UAE
Chew Esyin, University Malaya, Malaysia
Tran Khanh Dang, HoChiMinh City University of Technology, Vietnam
Greg Skulmoski, Zayed University, UAE
Albert H S Scott, Vocational Training Council, Hong Kong
Markos Kyritsis, Brunel University, UK Excellent Constructive review
Amin Yousef Noaman, King Abdulaziz University, KSA
Salaheldin Ismail Salaheldin, Qatar University, Qatar
Sonali S. Morar, Brunel University, UK Excellent Constructive review
Jae-Suk Yun, Korea Information Security Agency, Korea
Ahmad Khasawneh, University of Newcastle, Australia
Hossein S. Zadeh, RMIT, Australia
Mulhim Al-Doori, American University in Dubai, UAE
George Giannatos, Monash University, Australia
Gordana Jovanovic Dolecek, Institute INAOE, Mexico
Haitham Hmoud Alshibly, The University of Newcastle, Australia
Ahmed Guessoum, Univ. of Sharjah, UAE Excellent Constructive review
Ammar Ahmed, CSIRO Manufacturing and Infrastructure Technology, Australia
Rinette Roets, University of Fort Hare, South Africa
Shamshul Bahri, University of Malaya, Malaysia
Abdollah Aghaie, K N Toosi University of Technology, Iran
Fayez Ahmad Albadri, MGSM Macquarie Graduate School of Management, Australia
Teuta Cata, Northern Kentucky University, USA
Ari M. Wahlstedt, University of Jyväskylä, Finland
Jorge Molea, Universidad Central de Venezuela, Venezuela
Hong Lin, University of Houston-Downtown, USA
Roman Povalej, Universität Karlsruhe, Germany
Dave Henderson, Virginia Polytechnic Institute & State University, USA Excellent Constructive review
Bala Srinivasan, Monash University, Australia
Khalid Benbachir, Canada
Jaime Ramírez, Universidad Politécnica de Madrid, Spain
Knolmayer Gerhard, Universität Bern, Switzerland
karim Bourouni, Ecole Nationale d'Ingénieurs de Tunis, Tunisia
Ahmed El-Ragal, Arab Academy for Science and Technology, Egypt
Hanene Trichili, Ecole Nationale Supérieure des Télécommunications de Bretagne, France
Omar El-Gayar, Dakota State University, USA
Doha Abelkhaleq, ESKADENIA, Jordan
Tyng-Yeu Liang, National Kaohsiung University of Applied Sciences, Taiwan
Sylwester Kozak, National Bank of Poland, Poland
Stefan Eicker, Universität Duisburg-Essen, Germany
Najib Saylani, Hofstra University, USA
Pankaj Kamthan, Concordia University, Canada
Adel Al-Alawi, University of Bahrain, Bahrian
Markus Bick, ESCP-EAP European School of Management, Germany
Asad I. Khan, Monash University, Australia
Susan Koruth, CGI-Australia, Australia
Mirja Pulkkinen, University of Jyväskylä, Finland
Ra'ed Moh'd Masa'deh, Nottingham University, UK Excellent Constructive review
Ahmed Subaih, University of Sheffield, UK
Berta Batista, Instituto Politécnico do Porto, Portugal
Hajo Reijers, Eindhoven Unversity of Technology, Netherlands
Christine Verdier, Université Lumière Lyon 2, France
Akram Al-Rawi, Zayed University, UAE
Massimo De Santo, Università di Salerno, Italy
João Rocha, Instituto Politécnico do Porto, Portugal
Honglei Li Violah, The Chinese University of Hong Kong, Hong Kong
Alexei Tretiakov, Massey University, New Zealand
Nicolas Larrieu, KAIST University, Korea
Tania Pavlou, City University London, UK
Iryna Skrypnyk, University of Jyvaskyla, Finland
Azzedine Lansari, Zayed University, UAE
Jacek Plodzien, Polish Academy of Sciences, Poland Excellent Constructive review
Ari P. Hirvonen, TietoEnator, Finland
Djamel Khadraoui, CRP Henri Tudor, Luxembourg
Chiou-Pirng (Ping) Wang, Albany State University, USA
Laurel Evelyn Dyson, University of Technology-Sydney, Australia
Rui (Ray) Chen, State University of New York at Buffalo, USA Excellent Constructive review
Abdelaziz Khadraoui, University of Geneva, Switzerland
M.F. Lau, Swinburne University of Technology, Australia
David A. Bray, Emory University, USA
Snene Mehdi, University of Geneva, Switzerland
Roland Kaschek, Massey University, New Zealand Excellent Constructive review
Khalil A. Abuosba, The Arab Academy for Banking and Financial Sciences, Jordan
Vanessa Chang, Curtin University of Technology, Australia
Damir Kalpic, University of Zagreb, Croatia
Dhayalan Velauthapillai, University College of Bergen, Norway
Mahbubur Rahman Syed, Minnesota State University, USA
Kevin K. W. HO, The Hong Kong University of Science and Technology, Hong Kong
Deb Sledgianowski, Hofstra University, USA Excellent Constructive review
Az-Eddine Bennani, Reims Management School, France Excellent Constructive review
Settapong Malisuwan, Chulachomklao Royal Military Academy, Thailand
Gerald C. Gonsalves, College of Charleston, USA Excellent Constructive review
Henry B. Wolfe, University of Otago, New Zealand
Sam Lubbe, University of KwaZulu-Natal, Durban, South Africa
Nabil Mzoughi, ISG of Sousse, Tunisia
José Diego De la Cruz, L'Ecole Polytechnique Fédérale de Lausanne, Switzerland Excellent Constructive review
Upasana G Singh, University of KwaZulu-Natal, South Africa
Judith Pavón Mendoza, Universidade de São Paulo, Brazil
Wojciech R., The Poznan University of Economics, Poland
Naveed Ahmed Khan, COMSATS Institute of Information Technology, Pakistan
Yahya Slimani, University of Tunis El Manar, Tunisia
Vass Karpathiou, RMIT University, Australia
Isabelle Comyn-Wattiau, ESSEC, France
Xin Lucie Li, The University of North Carolina at Pembroke, USA
Anastase Adonis, Objective Networks, France Excellent Constructive review
Damminda Alahakoon, Monash University, Australia
Regina Connolly, Dublin City University, Ireland Excellent Constructive review
Scott Rathbone, CGI, Australia
Shushma Patel, London South Bank University, UK
Alcina Prata, Instituto Politécnico de Setúbal, Portugal
Emmanuel Matthew, University of Wollongong, Australia
Ann Johansson, University of Trollhättan/Uddevalla, Sweden
Loay Sehwail, Oklahoma State University, USA
Inas E. Ezz, Sadat Academy for Mgt Sc., Egypt and Brunel University, UK Excellent Constructive review
Indrawati Nataatmadja, University of Technology-Sydney, Australia
Sagarmay Deb, University of Ballarat, Australia
Ela Klecun, London School of Economics, UK
Wenshin Chen, Prairie View A&M University, USA
Siavash Jandeh-Razmi, Electronic Data Systems (EDS/NZ), New Zealand
Conference Themes
Possible conference topics of interest
E-Business and Internet Computing May include issues in
|
E-government Applications
|
M-Commerce Applications May include issues in
|
Software Engineering and Technologies May include issues in
|
Decision Support Systems and Artificial Intelligence May include issues in
|
Information Systems May include issues in
|
Organizational Transformation May include issues in
|
Enterprise Systems Integration and ERP May include issues in
|
List of Accepted Papers
Research Papers
- A Feature Extraction Method for Automatic Web Page Classification System
- Modeling of Updating Moving Object Database Using Timed Petri Net Model
- Effective Real Time Hybrid Threat Management Using Vulnerability Correlation
- Toward a Reconceptualization of Organizational Culture in IS research
- The Impact of CRM on Customer Loyalty, Retention and Firm Profitability: Modelling with Structural Equations in the Case of the Pharmaceutical Industry
- Vers une Approche d’Architecture d’un Système Hypermédia Adaptatif
- A Web-based Automated Dental Identification System (webADIS)
- Digital Versus Traditional Press. An Analysis of Readers’ Motivations
- A Preliminary Research Model of Thai Mobile Market Structure
- An Information Retrieval using Weighted Index Terms in Natural Language Document Collections
- The Commitment Generation Process in the G2C Online Relationships
- Vers un Modèle Intégré de Gestion des Communautés Virtuelles Professionnelles
- Impediments of e-Business – A Dubai Experience
- Stages of Growth Theory Revisited: Senior Management on Information Systems and Technology
- An Intelligent Agent-Based Digital Currency Scheme
- Banking Technology Balanced Scorecard: A Model for Evaluating Banking Technology Effectiveness
- A Conceptual Framework for Quality Management in Information Systems
- Congestion Control for a Better Performance of Computer Networks
- Local-communities Insertion Network Platform: Design and Specifications
- Comparing the Performance of Artificial Immune System and Self-Organizing Map Approaches to Anomaly Detection
- Modifications to Bandwidth Allocation Algorithms to Satisfy Remote Access Services Requirements
- Saving Cost of Ownership for RTA C4I Systems by Utilizing Commercial Satellite Systems
- Developing an ICT Strategic Plan for an African Utility Corporation
- M3C: Une Méthodologie de Cartographie des Connaissances Critiques dans l’Entreprise
- Bases de Données: Fiabilité et Pérennité
- Web Usability: An Evaluation of the Governments’ Websites in Sabah, Malaysia
- On-line Handwritten Character Recognition: An Overview
- Simulation Study of a Distributed Control Scheme in Flexible Manufacturing Systems
- Prosody Generation in Concatenation Malay Language Speech Synthesizer (CMSS)
- Trust in Mobile Context Aware Systems
- Rule Pruning in Associative Classification Mining
- Cultural Issues on Global Websites and Aspect-oriented Requirements Engineering
- A Location-Determination System for Enabling m-Commerce Applications
- A Framework for QoS-aware m-Commerce
- An Innovative Model for Providing Digital Connectivity to Rural Areas
- A Maturity Model Framework for Assessing Organizational Processes in Enterprise Integration of Innovative Technology
- The Current State of e-Commerce in Jordan: Applicability and Future Prospects. “An Empirical Study”
- Is Business Process Management an Incarnation of Business Process Reengineering?
- A Test Cases Generation Technique Using Genetic Algorithms
- Documentary Database Synthetic Views for a Conceptual Information Retrieval System
- Le Droit d’Auteur dans la Société d’Information
- Detection of Vowels from a Recorded Phrase based on Positive and Negative Portions of Oscillogram with Suitable Rectification Level
- The ERP Systems Benefits for the Strategic Decisions Support in the Case of Tunisian Service
- A Database Querying Tool for Naïve Users
- Calidad de Datos – De la Teoria a la Práctica
- Modelling Smart Label-Supported Production Processes
- Towards Dynamic Control of Users Privacy
- IS Integration in Corporate M&A: Applicability of Related Theory and Future Advancements of the Research Field
- Managing Enterprise Systems Integration in Corporate Mergers and Acquisitions – A Tentative Framework and the Case of TIH
- Exploring Factors Affecting the Adoption of Mobile Internet in Jordan: Empirical Study
- Intelligent Secure Management of Electric Power Organizations: Data Collection Using Mobile Agents
- Leveraging Radio Frequency Identification (RFID) Technology for Halal Tracking Tag
- Metaphors in Co-Design
- A Case Study: Enhancing Enterprise System Competitive Advantage
- ERP Systems and ROI Analysis
- Statistical Solution for Risk Management in the Implementation of IMIS
- Increasing Efficiency in Service Oriented Architecture
- The Effect of Information Sharing on Empowerment in Indonesia
- e-Services in Government: Why we Need Strategies for Capacity Building and Capacity Utilization?
- Automatic Text Classification using Naïve Bayesian Algorithm on Arabic Language
- Capacity of the WCDMA-FDD Mobile Internet in High-Mobility Environment
- The Potential Positive Impact of e-Government Projects The Flemish Environmental Legislation Navigator: Conclusions of An Inquiry about the Use and the Benefit of an On-line Legal Environmental Expert System
- Selection Information Sources based on the Trust of Similar Sources
- Management of Critical Success Factors for Offshore Software Development Projects – A German Perspective
- E-Readiness in Developing Countries: A Conceptual e-Readiness Framework for Small Tourism Enterprises
- Conceptualised Models of Detailed Knowledge Structures for Different Business Operations
- Development of Knowledge Management System: A Preliminary Study on Property Management Companies in Malaysia
- Addressing Enterprise Information Security
- A New Technique for Automatic Text Categorization for Arabic Documents
- Perceptions on SPAM in a South African Context
- IT and Psychosocial Occupational Risks: A Delphi Study
- Factors Affecting Successful Implementation of Intranet Based Knowledge Management Systems
- An Approach to the Human Values Scale from Smart User Models
- Electronic Customer Relationship Management (e-CRM): A Strategic Approach to Managing Customer Relationship
- Towards a Generic Conceptual Model for Data Warehouses
- Using Cluster Analysis in Classification of Categories: Evidence from the Holly Qur’an
- Web Site Reliability in Web Commerce Applications
- Question Answering Arabic System based on Passage Selection
- An Algorithm for Extracting the Root of Arabic Words
- Multi-Dimensional Role of Trust in Internet Banking Adoption
- The Website Features and Categories in the Context of Fortune e-50 Companies
- Getting Knowledge Measured, Getting Knowledge Managed
- Causes of Internet Addiction: Boredom or loneliness
- Scope and Potential of Teleshoping in India (Case Study of Punjab State)
- The Application of Grid and Agent Technology in CBR
Special Topics Sessions
You can also submit a proposal to organize a special topics session, workshop, and/or tutorial. The of organizing a special topic session is that it brings together researchers and audience together to discuss a specific research question of interest and/or share your research efforts with others who have worked in the same area. These sessions could result in joint research efforts and/or co-authorship of journal articles. Special topics session are highly beneficial if they are well organized.
Proposals to organize a special topic session should include the following information: name and address, e-mail of proposer, title of session, a 100-word description of the topic of the session, and a short description on how the session will be advertised. Usually, session proposers solicit papers from colleagues and researchers whose work is known to the session proposer.
Each special topic session will have at least 3 paper. The session chairs will be responsible for all aspects of their sessions; including, soliciting papers, reviewing, selecting, etc. The review process for invited sessions will strictly follow the review process for regular submission. Papers will be evaluated for originality, significance, clarity, and contribution. Each paper will be exposed to a full blind peer review by two reviewers in the topical area. Final camera-ready papers will be reviewed by one reviewer. Papers must not have been previously published or currently submitted for publication elsewhere.
The efforts of the Special Topics Sessions' Organizers will be recognized during the conference and their names will appear on the conference proceedings as Associate Editors |
Appel à Communication
Tous les chercheurs, universitaires et praticiens s'intéressant aux thèmes de la conférence sont invités à soumettre leurs communications. Deux types de contributions pourront être présentées :
- Papiers de recherche en format long: pour les travaux aboutis (5000 mots max) avec la liste complète des références.
- Papiers en format court : pour les recherches en cours, résumés, idées que vous voudriez discuter avec l'audience à la conférence ou ébauche des papiers pour une éventuelle co-écriture : (5 pages max ou 1000 mots)
Les papiers seront évalués par rapport à leur originalité, leur cohérence, leur clarté et leur contribution scientifique. Chaque papier sera révisé en aveugle à l'aide d'une grille d'évaluation. Les papiers de recherche seront révisés par les membres du comité scientifique. Les papiers en format court seront révisés par l'éditeur. Chaque auteur recevra après la révision de son papier une fiche de synthèse des évaluations. Les commentaires et suggestions de cette révision doivent être prises en compte dans la soumission finale.
Les papiers soumis ne doivent pas avoir été précédemment édités ou actuellement soumis pour publication dans d'autres conférences ou revues.
Les actes de la conférence seront édités sous forme d'un e-book sur un CD (avec ISBN).
Tous les papiers se rattacheront à l'un des thèmes proposés.
Thèmes de la Conférence
Les thématiques visées peuvent se regrouper dans les rubriques suivantes :
Business et Internet
|
Applications e-Administration / e-Gouvernement
|
Applications M-Commerce
|
Génie Logiciel et Technologies
|
Systèmes d'Aide à la Décision et Intelligence Artificielle
|
Systèmes d'Information
|
Transformation Organisationnelle
|
Intégration des Infrastructures d'Entreprise et ERP
|
Sessions Invitées
Vous pouvez également soumettre une proposition pour organiser une session parallèle, un atelier et/ou un tutorial. Organiser une session invitée permet de réunir des chercheurs pour discuter d'une question spécifique de recherche ou pour réfléchir autour thématique bien délimitée et complémentaire de la conférence et/ou pour partager vos résultats de recherche avec d'autres qui travaille sur le même domaine de recherche.
Les propositions de sessions invitées doivent inclure clairement les informations suivantes: nom du ou des organisateurs, affiliation, adresse, courriel, titre de la session, une description de 100 mots du thème de la session et une courte description sur la façon dont la session sera annoncée. Habituellement, les organisateurs de sessions sollicitent des papiers à leurs collègues et à des chercheurs dont les travaux leur sont connus.
Chaque session invitée comptera au moins trois papiers. Les présidents de session seront responsables de tous les aspects de leurs sessions; y compris, l'appel à communication, la révision, la sélection, etc. Le processus de révision pour des sessions invitées est strictement le même pour les soumissions régulières. Les papiers seront évalués par rapport à leur originalité, leur cohérence, leur clarté et leur contribution scientifique. Chaque papier sera révisé en aveugle par deux évaluateurs du domaine de recherche en question. La version finale sera révisée par un seul évaluateur. Les papiers soumis ne doivent pas avoir été précédemment édités ou actuellement soumis pour publication dans d'autres conférences ou revues.
Les efforts des organisateurs des sessions invitées seront reconnus pendant la conférence. Leurs noms apparaîtront sur les actes de la conférence comme Editeurs Associés. |
Présentations virtuelles
Toute personne ne pouvant pas se déplacer pour assister à la conférence mais souhaitant quand même y participer, une présentation virtuelle des travaux est possible. Une présentation virtuelle permet aux participants de soumettre leurs papiers pour référencement et publication dans les actes de la conférence tout comme pour un papier régulier. Les participants virtuels recevront une copie complète des actes de la conférence. En 2004, pendant les conférences IBIMA nous avons eu plus que 60 présentations virtuelles.
Le processus de révision pour les présentations virtuelles est strictement le même pour les soumissions régulières.
Les papiers seront évalués par rapport à leur originalité, leur cohérence, leur clarté et leur contribution scientifique. Chaque papier sera révisé en aveugle à l'aide d'une grille d'évaluation. Chaque auteur recevra après la révision de son papier une fiche de synthèse des évaluations. Les commentaires et suggestions de cette révision doivent être prises en compte dans la soumission finale. Les papiers soumis ne doivent pas avoir été précédemment édités ou actuellement soumis pour publication dans d'autres conférences ou revues.
* Veuillez noter qu'une présentation virtuelle ne signifie pas que vous pouvez exposer en direct en ligne (par exemple Internet streaming ou télé-conference).
Dates Importantes
- Soumission des papiers : Fermé
- Notification de l'avis d'acceptation : Après de trois semaines de la date de soumission (dans la plupart des cas)
- Date limite de soumission des papiers : Fermé
- Date limite de réception des versions finales des papiers : Fermé
- Date limite d'inscription : Fermé
Important Dates
- Paper submission: closed
- Notification of Acceptance: Within 3 week from submission date (in most cases)
- 2nd Phase Paper submission deadline: October 25, 2005
- 2nd Phase Camera ready submission: November 20, 2005
- 2nd PhaseRegistration fee deadline: November 20, 2005
The conference is closed
Conference Closed