Friday, 14 February 2014

A Predatory, very predatory and bogus conference where IEEE is involved. Congratulations IEEE for being partner to this fake, bogus, predatory, spam-aggresive crappy conference,

A Predatory, very predatory and bogus conference where IEEE is involved. Congratulations IEEE for being partner to this fake, bogus, predatory, spam-aggresive crappy conference. This is the SPAM:
* Apologies for cross-postings *

Dear Colleagues,
please find attached the preliminary Call for Papers for our Mini-Track on Soft Computing to be held within the Track on "Decision Analytics, Mobile Services and Service Science" (co-organized by Christer Carlsson and Haluk Demirkan) in the Hawaii International Conference on System Sciences (HICSS-48) (Grand Hyatt Kauai, January 5-8, 2015).

This will be the 48th consecutive conference year. Among 18 top Information Systems conferences, HICSS is ranked 2nd in citation ranking, 2nd in value among IS conferences, and 3rd in value to the MIS field. The Australian Government's Excellence in Research Project (ERA) gave HICSS an A rating in the December 2009 report.

If you are interested in submitting a paper to our Mini-Track, please do not hesitate to contact by e-mail one of the organizers with a tentative title and abstract of your contribution.

Of course, papers submitted for Mini-Tracks are to be peer-reviewed double-blind (submission must be without author names) with the same criteria used for the rest of contributed papers.
As a result, all accepted papers (with at least one author registered by September 15th, 2014) will be included in the HICSS-48 Conference Proceedings, distributed by the IEEE Computer Society Press, and included in Explore, the IEEE Digital Library.
PS: http://iaria-highsci.blogspot.com    http://netdriver.blogspot.com

2 comments:

  1. I think you might be mistaken. There are two conferences that go by the name HICSS, and I believe you are attacking the wrong one. See this blog article: https://blogs.ischool.utexas.edu/infomatters/2014/02/05/hijacking-conferences-by-any-other-name/ for details.

    ReplyDelete