You are invited to participate in The Third International Conference on Informatics Engineering and Information Science (ICIEIS2014) that will be held at  Lodz University of Technology, Lodz, Poland on September 22-24, 2014. The event will be held over three days, with presentations delivered by researchers from the international community, including presentations from keynote speakers and state-of-the-art lectures.

The conference welcomes papers on the following (but not limited to) research topics:
Information Ethics Information Content Security
Data Compression E-Technology
E-Government E-Learning
Cloud Computing Grid Computing
Green Computing Access Controls
Data Mining Social Search
Computer Forensics Computer Security
Critical Computing and Storage Critical Infrastructure Management
Peer-to-Peer Social Networks Information and Data Management
Network Security Social Networks
Real-Time Systems Internet Modeling
Assurance of Service Image Processing
Web Services Security Multimedia Computing
Software Engineering Biometrics Technologies
Wireless Communications Semantic Web, Ontologies
Mobile Social Networks Anti-cyberterrorism
XML-Based Languages Soft Computing Techniques
Computational Intelligence Mobile Networking, Mobility and Nomadicity
Ubiquitous Computing, Services and Applications Forensics, Recognition Technologies and Applications
Fuzzy and Neural Network Systems Signal Processing, Pattern Recognition and Applications
Distributed and Parallel Applications User Interfaces,Visualization and Modeling
Mobile, Ad Hoc and Sensor Network Management Web Services Architecture, Modeling and Design
Quality of Service, Scalability and Performance Self-Organizing Networks and Networked Systems
Data Management in Mobile Peer-to-Peer Networks Data Stream Processing in Mobile/Sensor Networks
Indexing and Query Processing for Moving Objects User Interfaces and Usability Issues form Mobile Applications
Sensor Networks and Social Sensing Embedded Systems and Software
Information Propagation on Social Networks Resource and Knowledge Discovery Using Social Networks
Computer Crime Prevention and Detection Confidentiality Protection
Critical Infrastructure Management Critical Computing and Storage
Cryptography and Data Protection Distributed Information Systems

All the registered papers will be included in SDIWC Digital Library, and in the proceedings of the conference.

All the submitted papers will be reviewed by a minimum of two reviewers. The published proceedings will be indexed in ResearchBib, ProQuest, and Google Scholar Databases, in addition they will be submitted for POSSIBLE inclusion within the INSPEC, EI, DBLP, Microsoft Academic Research, and ResearchGate. In addition, BEST registered papers will be published in one of the following special issues provided that the author do major improvements and extension within the time frame that will be set by the conference and his/her paper is approved by the chief editor: