skip to main content
10.1145/2512209acmconferencesBook PagePublication PagesiteConference Proceedingsconference-collections
RIIT '13: Proceedings of the 2nd annual conference on Research in information technology
ACM2013 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
SIGITE/RIIT'13: SIGITE/RIIT 2013 Orlando Florida USA October 10 - 12, 2013
ISBN:
978-1-4503-2494-6
Published:
01 October 2013
Sponsors:

Bibliometrics
Skip Abstract Section
Abstract

There's been a lot of change for SIGITE over the years -- growth in membership, increased cooperation with other SIGs, sponsorship of affiliated conferences, and new IT programs from around the world contributing to a steadily enhanced stature for IT as a computing subarea, just to name a few. Last year's inauguration of the Research in Information Technology (RIIT) conference as a co-located event with the annual SIGITE conference is one change that has proved warranted, given the number and quality of the submissions we received this year and last. The RIIT thread complements the more widely known and more heavily subscribed SIGITE conference, given the increased interest industry continues to show in partnering with academia to address collaboratively applied research advances in areas related to our five curricular pillars. As Dave Armitage and Jeff Brewer wrote in last year's Program Chairs' message, "With a hands-on flavor and stronger connections with industry, [research in IT] is clearly differentiating itself from research in more traditional computing disciplines, and is deserving of its own conference venue."

As authors and reviewers no doubt noticed, we changed conference management systems this year. Several years ago, Grinnell University's Henry Walker was kind enough to mirror his databases and web forms used to organize SIGCSE to accommodate SIGITE, and we appreciate his consistent support. This year, however, we opted for change in this area, too. Colleagues in SIGKDD developed and manage the Microsoft CMT application we selected to use. Although there were a few bumps in the transition, most of our contributors and volunteers found it to be an easy-to-use system. 12 RIIT reviewers made recommendations on 24 submissions to RIIT, and 64 peer reviewers scored and commented on 70 submissions to SIGITE.

The number and substance of these submissions, in relation to the venue of this year's conferences, provided yet other opportunities for change in the conferences. These include providing more panel discussions, more workshops and more time allotted for individual paper presentations. As interest grows in SIGITE/RIIT, we're able to be more selective and more inclusive at the same time. 28 technical papers will be presented at SIGITE, which will significantly reduce our acceptance rate from a 6-year average of 54% to 40% this year, while RIIT's acceptance rate came in at 50%. We are able to provide inclusivity by offering 24 authors - a four-fold increase over last year - the opportunity to present their work as poster papers that are included in the ACM Digital Library. We would like to thank a highly responsive group of 76 peer reviewers, several of whom got tagged late in the process to review more papers than they bargained for.

Perhaps the most significant change to the proceedings is that they are available for download to conference registrants for two weeks preceding and two weeks following the conference dates, thus providing more opportunity for conversation among authors and attendees. From a community building perspective, this is a tremendous opportunity for advancement provided by the ACM Publications Board.

As you look through the schedule of events, you'll notice that we have doubled the panel session time from 30 to 60 minutes, and these panels will run concurrently and not opposite any technical papers, so you can participate and contribute to the topic that is most important to you. We have also moved the workshops to Saturday morning in an attempt to make the best use of a time block that in the past has not been well attended. We know that Orlando attractions beckon, but please consider taking advantage of the workshops.

All of us on the organizing committees would like to hear from you about these changes so that we can continue to innovate and provide SIGITE/RIIT attendees with the best experience possible.

We welcome you to SIGITE 2013 and RIIT 2013. Engage the panels and the paper and poster authors, meet new colleagues and reengage with old friends. Thanks for attending!

Skip Table Of Content Section
SESSION: Paper session A3: defining IT
research-article
Termediator: early studies in terminological mediation between disciplines

A glossary is a terminological document that binds terms to concepts to illuminate the meaning of the term within in a specific domain. Many of the same terms are bound to different concepts within different domains, which often leads to ...

research-article
Advancing the IT research agenda

The potential benefits of pursuing an intentional community-wide development of a research agenda for IT are discussed. Motivation to undertake this task arises from the continuing evolution of IT as a distinct discipline. There is an opportunity to ...

SESSION: Paper session B3: security 1
research-article
Using agent technologies to correlate and compare anti-malware software

Malware is a fast growing threat that consists of software used to disrupt, or impact the confidentiality, availability or integrity of a user's computer experience. Antivirus software can help protect a user against these threats. There are numerous ...

research-article
MP3 files as a steganography medium

There is a lot of work done on hiding information inside picture files in formats such as JPEG, however not much has been done to date on hiding information inside MP3 audio files. This paper looks at ways to hide information inside MP3 files and ...

PANEL SESSION: Panel D3
panel
The emergence of an it 'profession'

Whenever society comes to depend on the services of a group of skilled individuals, society demands a way to recognize if a particular individual has the skills needed to support that dependency. Doctors, lawyers, engineers, dentists, plumbers, ...

SESSION: Paper session E3: software development
research-article
ChronoZoom: travel through time for education, exploration, and information technology research

In this paper, we describe the architecture, infrastructure requirements, and technical evolution of ChronoZoom, a unique infinite-zoom, temporal-data-visualization open-source platform. With ChronoZoom, it is possible to browse through time and history ...

research-article
Design patterns as first-class connectors

We propose a technique using design patterns as an abstract modeling construct to connect software components built individually by software developers. Given a set of requirements structured as design problems, we can solve each problem individually by ...

SESSION: Paper session F3: security 2
research-article
Improving service continuity: IT disaster prevention and mitigation for data centers

Data centers provide highly-scalable and reliable computing for enterprise services such as web hosting, email, applications, and file storage. Because they integrate a range of different systems, data center administration is a complex process. ...

research-article
Administrative evaluation of intrusion detection system

Due to the complexity of intrusion detection systems and their application in security architectures, there is a need to objectively assess intrusion detection systems in the perspective of system and network administration in order to select a right ...

POSTER SESSION: Poster session
poster
DNS: (do not suspect)

This project investigates the possibility of using the DNS (Domain Name System) protocol to communicate with a zombie host while avoiding detection by an IDS (Intrusion Detection System).

Right now this communication is often made through the IRC (...

poster
Securing insurance reimbursements with RFID technologies

As RFID enhances many realms of the functional world including: retail, pharmaceutical, aerospace, and defense, it is beginning to show great promise in healthcare. Insurance companies constantly battle fraud among health care providers and new ...

poster
Resource utilization prediction: long term network web service traffic

Short-term prediction has been established in computing as a mechanism for improving services. Long-term prediction has not been pursued because attempts to use multiple steps to extend short-term predictions have been shown to become less accurate the ...

poster
Security mechanisms for multi-user collaborative CAx

Advances in computing technologies have provided the needed tools to transform traditional single user architecture Computer Aided Applications (CAx) to multi-user collaborative CAx architectures that supports simultaneous concurrency. To allow for a ...

poster
A grounded theory analysis of modern web applications: knowledge, skills, and abilities for DevOps

Since 2009, DevOps, the combination of development and operation, has been adopted within organizations in industry, such as Netflix, Flickr, and Fotopedia. Configuration management tools have been used to support DevOps. However, in this paper we ...

poster
Sitemap explorer: browser integrated web navigation

A fundamental issue is still not addressed in current web navigation designs is the consistency of navigation models across different websites. In addition, almost all of the current designs are static and passive; users have to adapt their navigation ...

SESSION: Paper session G3: UML & UI
research-article
Design and evaluation of face tracking user interfaces for accessibility

Some individuals have difficulty using standard hand-manipulated computer input devices such as a mouse and a keyboard effectively. However, if these users have sufficient control over their face and head movement, a robust face tracking user interface ...

research-article
Formalizing the design of embedded software using sequence diagrams and abstract state machines

The latest specification of the Unified Modeling Language (UML) 2.x revised completely the structure and elements of sequence diagrams by expanding their modularity via interaction fragments. These fragments are based on a set of operators that can ...

SESSION: Paper session H3: browser and network analytics
research-article
Automated webpage evaluation

Webpage evaluation and metrics have historically focused on page-level characteristics or on key words. We introduce an automated technique for graphically measuring specific elements on a webpage. Our technique provides a means to increase the fidelity ...

research-article
Implementation of SHA-1 and ECDSA for vehicular ad-hoc network using NS-3

VANET, the Vehicular Ad-Hoc Network, treats cars as nodes in a mobile network. Not surprisingly, VANET must be very secured since one of the network characteristics allows the network to be open to public. The digital signature used in VANET is the ...

Contributors
  • University of South Florida, Tampa
  • Capella University

Index Terms

  1. Proceedings of the 2nd annual conference on Research in information technology
    Index terms have been assigned to the content through auto-classification.

    Recommendations

    Acceptance Rates

    RIIT '13 Paper Acceptance Rate12of24submissions,50%Overall Acceptance Rate51of116submissions,44%
    YearSubmittedAcceptedRate
    RIIT '1711655%
    RIIT '1620945%
    RIIT '15221045%
    RIIT '14391436%
    RIIT '13241250%
    Overall1165144%