The proceedings of the 14th ICGS3 will be published by Springer ‘Advanced Sciences and Technologies for Security Applications’ series.

14th ICGS3-22 will take place virtually and soft copies of the proceedings will be sent to delegates after the event.

Date: 7 – 8 September 2022

Location: Virtual Conference, with a blended format considered if COVID-19 situation improves

About the Conference

Following the successful 13th ICGS3, we have much pleasure in announcing the 14th International conference on Global Security, Safety & Sustainability.

2020 will be remembered as a year of COVID-19 pandemic year with a profound impact on our lives and challenging times for governments around the world with technology as a backbone of tools to assist us to work remotely while in self isolations and in total lockdown. Every individual and organization are faced with the challenges of the adoption of technological change and understand that nothing will be the same for some time after and even when normality resumes. AI, blockchain, machine learning, IoT, IoMT, IIoT all are tested and applied at a very rapid turnaround as we go through the pandemic day after day. However, all this transformation can bring many associated risks regarding data, such as privacy, transparency, exploitation, and ownership.

Since the pandemic in January 2020, governments, and organizations; small or large have seen an increase in cyber-attacks. Hackers, through reconnaissance and some network intrusions, targeting nation-states medical research facilities, healthcare organizations conducting research into the virus, financial sectors, and so on. Early in April 2020, the UK, and US security agencies sound COVID-19 threat alert“…Cybersecurity Infrastructure and Security Agency issued a joint warning that hacking groups associated with nation-state governments are exploiting the COVID-19 pandemic as part of their cyber operations…”

The advancement of Artificial Intelligence (AI), coupled with the prolificacy of the Internet of Things (IoT) devices are creating smart societies that are interconnected. The expansion of Big Data and volumetric metadata generated and collated by these mechanisms not only give greater depth of understanding but as change is coming at an unprecedented pace covid19 is drives the cultural changes and the public sector innovations to a new height of responsibilities.

Further development and analysis of defence tactics and countermeasures are needed fast to understand security vulnerabilities which will be exploited by cybercriminals by identifying newer technologies that can aid in protecting and securing data with a range of supporting processes to provide a higher level of cyber resilience.

The ethical implications of connecting the physical and digital worlds, and presenting the reality of a truly interconnected society, presents the realization of the concept of smart societies in reality.

This Annual International Conference is an established platform in which security, safety, and sustainability issues can be examined from several global perspectives through dialogue between academics, students, government representatives, chief executives, security professionals, and research scientists from the United Kingdom and from around the globe.

The TWO-days Virtual conference will focus on the challenges of complexity, the rapid pace of change, and risk/opportunity issues associated with the 21st-century lifestyle, systems, and infrastructures.

Important dates
Important dates
Abstract Submission deadline 25 March 2022
Submission deadline 23 June 2022
Peer review to be completed 12 July 2022
Camera ready/Authors Notification 10 August 2022
Author registration 10 August 2022
The Virtual ICGS3 Conference takes place 07 – 08 September 2022

The list of topics includes (but are not limited to):

  • Security in Connected world
  • Smart Cities, and Societies
  • Augmented Humanity and cyborgs
  • Self-Sovereign Identity (SSI)
  • Security of Medical Data for Smart Healthcare
  • SCADA and Ransomware
  • Cyber War and Cyber Warfare, Cybersecurity Kill Chain
  • Biohacking and bio-computing Threat/ Attack Vectors
  • Predictive Control and Analysis of Cyber Attacks
  • Attack Vectors & APTS (Advanced Persistent Threats)
  • Digital Twins
  • Cyber Threat Intelligence
  • Intelligence Led penetration testing
  • Blockchain and smart contracts
  • Biometric Recognition Systems and Biometry Information Exchange Security
  • Big data – from criminals angle and law enforcers angle
  • 5G, 6G and Smart cities
  • Vulnerability Assessments, Attack Pattern Recognition, Enterprise Architecture Security
  • Cyber Intelligence and Operation
  • Digital leadership and Governance
  • Cyber-Crime Detection and Prevention
  • Crime Information Intelligence Network
  • Cyber Threat Intelligence
  • Open-Source Intelligence
  • Social Media governance
  • Digital footprint, Deepfake
  • Impact of technology on crime investigation (policing)
  • Cyber Criminology
  • Domestic Abuse in smart societies
  • Cyber Criminology, Theories and Models, Psychology of the Cyber Criminals
  • Criminal Data Mining, Threat Analysis and Prediction
  • Victimisation, Radicalisation, social media, Terrorist Threats
  • Cybercrime Justice Models
  • Dark Web/ Darknet
  • Ethics in Smart and AI driven societies
  • Smart Societies and Data Exploitation
  • Age of Artificial Intelligence (AI)
  • Moral and Ethical implications of Digital Societies
  • Privacy of Medical Data for Smart Healthcare
  • Data Ownership, GDPR, Digital foot print, privacy and transparency
  • IOT, IoMT, IoNT
  • Insider Threat – The Human Element, Strategic Approaches to Security
  • Information Systems Security Management
  • Cyber Risk Management
  • Modelling Approaches, Security and Systems Assurance Frameworks
  • Cyber Resilience, Safety and Security Evaluation, Assessment and Certification
  • Digital transformation and leadership
  • IT Audit, Governance and Security, Risk Assessment, Methodologies and Tools
  • Security and Privacy Architecture and Design for Software and Systems
  • Human Aspects in Security and Privacy
  • The Future of Digital Forensics and Anti-forensics

Full research papers limited 7000-9000 words report on novel and completed work of important value to the community. The work should not be published or in submission anywhere else.

All accepted papers would be included in the proceedings of the 14th ICGS3 will be published by Springer ‘Advanced Sciences and Technologies for Security Applications’ series.

There is an expectation and trust that all submissions are of high quality with substantial novel research achievements. All papers have to be written in English language. All submissions will be peer reviewed for publication.

Manuscripts must adhere to the Springer, conference paper templates. All Authors must complete and submit the correct copyright form which will be provided after the peer review completion.

All articles for 14th ICGS3-22 must be submitted using online submissions system at:

https://cmt3.research.microsoft.com/ICGS32022.

You need to register to use the online submission system.

On submission, please remove all identifying information from your submission, including author names, affiliations, and any acknowledgments.

Registration Details

All authors must register by 10th August 2022, for papers to be included in the Conference. 

Category Fee
Author Registration (one paper only) and general participation £150
PhD Student Registration (all PhD student registrations must be accompanied by a letter from their University confirming current PhD student status) £130
Student & Supervisor Joint Registration (one paper only) £200
Each additional paper per registered author £50
Late Registration (non-authors), Full Registration (after 10 August 2022) £210
Student Participation with no submissions (attendance of the conference sessions only) £70

 

Authors and General Participation rates include: attendance to all sessions, soft copy of the Proceedings.

PhD Student rates apply to full time or Part-time students who provide declaration from the University, stating their status. This information should be emailed to the organisers with the registration form, otherwise it won’t be considered.

Please download the registration form

Committee

General Chair:

Professor Hamid Jahankhani, UK

hamid.jahankhani@northumbria.ac.uk

  • Professor Shaun Lawson, Northumbria University, UK
  • Dr Arshad Jamal, QAHE and Northumbria University London, UK
  • Dr Reza Montasari, University of Swansea, UK
  • Professor Stuart Macdonald, University of Swansea, UK
  • Professor Amin Hosseinian-Far, University of Northampton, UK
  • Professor Mohammad Dastbaz, Deputy Vice-Chancellor, University of Suffolk, UK
  • Dr John McCarthy, Director, Oxford Systems, UK
  • Professor Ali Hessami, Director Vega Systems, UK
  • Dr Sina Pournouri, Sheffield Hallam University, UK
  • Dr Rose Cheuk Wai, QAHE and Northumbria University London, UK
  • Mr Usman J. Butt, QAHE and Northumbria University London, UK
  • Dr Mathews Z. Nkhoma, RMIT International University Vietnam, Ho Chi Minh City, Vietnam
  • Professor Babak Akhgar, Director of CENTRIC, Sheffield Hallam University, UK
  • Professor Gianluigi Me, Luiss University, Italy
  • Professor Vitor Sa, University of Minho, Braga, Portugal
  • Professor Bobby Tait, University of South Africa, South Africa
  • Dr Omar S. Arabiat, Balqa Applied University, Jordan Mr
  • Konstantinos Kardaras, Technical Consultant, Greece
  • Dr Chafika Benzaid, Computer Security Division, CERIST, University of Sciences and Technology Houari Boumediene, Algeria
  • Dr Fouad Khelifi, Northumbria University,
  • Dr Ken Dick, Nebraska University Centre for Information Assurance, USA
  • Dr Elias Pimenidis, University of West of England, UK
  • Mr Ray Brown, QAHE and Northumbria University,
  • UK Professor Murdoch Watney, University of Johannesburg, South Africa
  •  Dr Mamoun Alazab, Macquarie University, Australia
  • Dr Gregory Epiphaniou, Associate Professor of Security Engineering at University of Warwick, UK
  • Dr Haider Alkhateeb, Wolverhampton Cyber Research Institute, University of Wolverhampton, UK
  • Dr Carlisle George, Middlesex University, UK
  • Professor Gianluigi Me, University of Rome LUISS “Guido Carli”, Italy
  • Dr Ameer Al -Nemrat, University of East London, UK
  • Mrs Sukhvinder Hara, Middlesex University, UK
  • Dr Ian Mitchell, Middlesex University
  • Dr Amin Hosseinian-Far, University of Northampton, UK
  • Dr Reza Montasari, University of Swansea, UK
  • Dr Ayman El Hajjar, Westminster University, UK
  • Dr George Weir, University of Strathclyde, UK
  • Dr Sufian Yousef, Anglia Ruskin University, UK
  • Dr Alireza Daneshkhah, Coventry University, UK
  • Dr Maryam Farsi, Cranfield University, UK
  • Mr Stefan Kendzierskyj, CYFORTIS, UK

“I chose Northumbria because the AACSB double accreditation for the Business School was attractive to me. The ability to develop my language skills was another element which I liked, I wanted to improve my English and work with a diverse group of people. I most enjoy being in an environment which is so diverse as it gives you more vocational skills. Participating in group work has encouraged me to adapt my learning style and ability to work with a wider range of people.  The teachers here are very open and encourage us to keep in touch with them regarding our work.”

Anabel Castillo

Image

Quick contact

This field is required
This field is required
Please enter a valid email address
Please enter a valid telephone number
This field is required
This field is required
This field is required
This field is required
By providing your email address and/or phone number, you are confirming that you give us permission to respond to your enquiry via these means. We will process your information in accordance with our data policy, more details of which can be found on our privacy statement. In future we would like to contact you with relevant information on our courses, facilities and events. Please confirm you are happy to receive this information and indicate below how you would like us to communicate with you. Please note, this will overwrite any previous communication preferences you may have already specified to us.
Marketing Opt-in
This field is required