New Trends in Informatics Research Conference
Location | UAlbany ETEC - View Map and Directions
Dates | April 24 to 25, 2025
Registration: Register Now
Follow us on Instagram and X (Twitter)
Location | UAlbany ETEC - View Map and Directions
Dates | April 24 to 25, 2025
Registration: Register Now
Follow us on Instagram and X (Twitter)
NTIR is an informative conference held by the College of Emergency Preparedness, Homeland Security and Cybersecurity. The event features keynote speeches, panel discussions, poster presentations and workshops that bring together researchers, practitioners and students from various fields of information studies. In this conference, you will have the opportunity to share and discuss your exciting research with fellow scholars and practitioners, learn about trending topics and inspire influential ideas that will shape the future of information science.
NASA Project Scientist Dr. Jennifer Wei delivers a keynote speech.
An information science doctoral student presents a paper on government open data.
Information science doctoral students from the AI Lab answer questions after a paper presentation.
An information science doctoral student presents her poster.
Two information science doctoral students enthusiastically discuss their research during the poster session.
An information science doctoral student explains his research to his classmate during the poster session.
CEHC Professor Brandon Behlendorf delivers a lecture in the grant writing workshop.
A participant snaps a picture of the presentation slide during a keynote speech.
Conference participants from multiple universities engage in a lively panel discussion.
Conference participants enjoy networking over lunch.
An abstract with 250 to 500 words (250 words is recommended). Include authors’ names, preferred pronouns, titles and affiliations to appear in the proceedings.
Proposal: An abstract and a draft poster (48-inches by 36-inches horizontal) outlining the research questions, methodology, findings and implications. The draft poster is optional but preferred.
Presentation: Illustrate research and findings of completed research, works in progress, or class projects in detail. Presenters will receive binder clips, an easel and a cardboard backing to affix the posters.
Topics: Data science & analytics, human-computer interaction, information policy & ethics, information retrieval & organization, and knowledge management, etc.
Proposal: An abstract outlining the research questions, methodology, findings and implications.
Presentation: Research and findings of completed research, works in progress, or class projects in detail with a 15-minute talk and 10-minute group discussion at the end of each session.
Topics: Combating misinformation & AI regulation / AI governance, conflict over semiconductors, quantum computing and utilization of augmented data, etc.
Proposal: An abstract describing the theme and necessary accommodations for the proposed workshop (e.g., space, materials, and time for preparation).
Presentation: 75 minutes of presenter-led hands-on activities.
Topics: Topics relevant to "Where Innovation Meets Information.” Applications for hands-on workshops in informatics are particularly welcomed.
Registration fee: Free
Scholarships
Thursday, April 24, 2025
8 a.m.: Light Breakfast and Registration (ETEC Atrium)
9 a.m.: Keynote Speech (ETEC 149/151)
Generative AI: Transforming Enterprises
Dr. Jane L. Snowdon, IBM Research Innovation Engagement Leader
10 a.m.: Paper Presentations
11:15 a.m.: Break (ETEC Atrium)
11:30 a.m.: Workshops
1 p.m.: Lunch (ETEC Atrium)
2 p.m.: Panel Discussion (ETEC 149/151)
Covert and Overt: How Ben Ami Lipetz and Colleagues Highlighted the Connection between National Security Intelligence and Information Science
2:40 p.m.: Poster Pitches (ETEC 149/151)
3:15 p.m.: Paper Presentations
4:45 p.m.: Poster Presentations (ETEC Atrium)
Friday, April 25, 2025
8 a.m.: Light Breakfast and Registration (ETEC Atrium)
9 a.m.: Paper Presentations
10:15 a.m.: Break (ETEC Atrium)
10:30 a.m.: Panel Discussions
Noon: Keynote Speech (ETEC 149/151)
Detecting Coordinated Problematic Behavior in Meta Ads: The 2024 U.S. Case
Dr. Jenny Stromer-Galley, Syracuse University School of Information Studies
1 p.m.: Lunch (ETEC Atrium)
TBA
BLE Hacking and Machine Learning
Brain Tumor Classification Using Inception3V
Cyber Attack on Public Sector: A Closer Look for Strategies to Prevention
Dimaz Cahya Ardhi, University at Albany, State University of New York, USA
Dark Web Forum Scraping
Decision-making amongst stakeholders of cultural heritage organizations during recovery operations
Enhancing Cybersecurity Risk Assessment in Power Generation Operational Technology (OT) Systems: A User-Centric Risk Registry Methodology
Enhancing Mental Health Support through Human-AI Collaboration: Toward Secure and Empathetic AI-enabled Chatbots
Gamifying Government
Haemorrhage detection Using Artificial Intelligence
How Does Incorporating AI within Organizations Influence Employees’ Creativity, Risk-taking, and Social Innovation? A Mediated-moderated Model
Laugh and Learn: Effectiveness of Policy Communication Incorporating Internet Memes
LLM Honeypot: Leveraging Large Language Models as Advanced Interactive Honeypot Systems
Mapping Cropland Distribution in Southern Malawi: A Remote Sensing Approach to Land Use Analysis
Motivation, perception, and trust: A framework for participation in game-based interventions
Offensive AI for ICS Attack Scenario Generation Using Text-Based Datasets
Place Attachment in Mitigation and Recovery
Public Opinion and Public Policy: A New York State Analysis
Shaping Student Research: Exploring the Impact of AI-Driven Discovery Systems on Information Literacy through the Lens of the Technology Acceptance Model
The Impact of Cognitive Load on Belief in Fake News and Real News
The Impact of Cognitive Load on Responses to Security Alerts
Threat-Centered Vulnerability Prioritization through Prompt Engineering
Covert and Overt: How Ben Ami Lipetz and Colleagues Highlighted the Connection Between National Security Intelligence and Information Science
This panel features a discussion for graduate students about the topics and themes of the 2005 book Covert and Overt: Recollecting and Connecting Intelligence Service and Information Science, edited by Ben-Ami Lipetz and others. It will cover the role that early military intelligence activities played in shaping information science, intelligence collection, and intelligence analysis as information science topics, and how information science might help address new and emerging intelligence topics, like cybersecurity and open-source intelligence (OSINT).
Panelists:
Moderator: To be announced
AI Governance
Major risks exist in the form of bias, privacy infringement, and misuse of artificial intelligence. AI governance can address these issues through processes, standards, and guardrails to realize AI systems and tools that are safe, ethical, and respect human rights. This fosters innovation and builds trust. To achieve this, collaborative efforts are required from stakeholders, including AI developers, users, policymakers, and ethicists, so that the principles of empathy, bias control, transparency, and accountability can be achieved.
The panelists will guide us through various mechanisms that can be used to ensure the current oversight mechanisms align AI behaviors with ethical standards and societal expectations, thereby mitigating potential adverse impacts in data privacy, algorithmic biases, and AI decision-making processes.
Panelists:
Moderator:
Quantum Computing
Quantum information processing has become a huge interdisciplinary field at the intersection of both theoretical and experimental quantum physics, computer science, mathematics, and quantum engineering. Currently, we are experiencing industry-level quantum-computing maturity, affecting various aspects of life – healthcare, energy, finance, logistics, and public policy – with a rising adoption rate of this technology among industry leaders. However, there remain substantial challenges to the growth of quantum computing, from error correction and scalability to developing efficient algorithms and overcoming hardware limitations.
In this panel, the experts in quantum research will share their perspectives on the current development trajectory of quantum computing, as well as issues that need to be addressed. The panel aims to provide insights into the transformative power of quantum computing and discuss ways to harness this technology.
Panelists:
Moderator:
Data Augmentation for Machine Learning
Data augmentation is the process of generating new, artificial data from existing data, primarily for training machine learning models. Data augmentation techniques are diverse and dependent upon specific needs and requirements of the data scientist, but they are all employed to address the issue of unbalanced data. Augmented data can help improve a model’s generalization to diverse datasets and greatly enhance performance in general. Given the benefits of data augmentation, questions remain regarding its actual effectiveness, as well as technical and ethical issues that may arise when handling this new type of data.
In this panel, three expert panelists, from different areas of research, will share their unique experience and perspectives on the utility of augmented data in their own fields. They will also discuss recent advancements in data augmentation, as well as prominent challenges that need tackling.
Panelists:
Moderator:
A Local Differential Privacy Watermark with Guaranteed Utility for Large Language Models
A Novel Application of Conservation Dogs: Round Goby Detection
An Integrated Multimodal Framework for Skin Cancer Prediction Using Histocartography, Knowledge Graphs, and Large Language Models
Brain Tumor Detection through MRI Images Using Deep Learning: Optimized Approach
Brain Tumor Radiogenomic Classification Using Deep Learning Techniques
Chatbots for Legal Information Seeking: A Mixed-Methods Investigation into User Perceptions and Effectiveness
Comparative Analysis of Educational Planning Journals
Current AI Governance Practices in Public Libraries
Enhancing Robotic Surgery Systems Using Real-time Imaging and AI-assisted Navigation to Improve Accuracy and Precision in Intraoperative Procedures in Orthopedic Surgery
Ethical and Practical Implications of AI in Disaster Communication, Misinformation Management, and Search & Rescue for Vulnerable Populations
Extreme Weather and Disaster Risk Reduction among Vulnerable Populations
Factors Associated with Prescription Pain Reliever Misuse in the United States: Insights from the 2022 NSDUH for Information Policy
Investigating Awareness of Health Data Privacy Among Healthcare Professionals in Ghana: Impacts on Digitalization Efforts and Privacy Policies
“It vibrated, that means this is it?” “Okay, yeah, that’s the start”: An Approach of Multimodal Conversation Analysis to Examine the Use of UsynligO in Orienteering
Making Python Accessible: Design and Implementation of PyNLPVIS, a Frontend Integrated Low-Code Library for Data Analysis and Visualization
Navigating AI-Generated Threats in Digital Forensics: Ensuring Evidence Integrity in the Age of Synthetic Media
OfficeGuard: Digital Game-Based Learning in Cybersecurity Education for High School Students
Optimizing Resilience of Smart Cities through Urban Planning
Repurposing Drugs for Alport Syndrome Using Graph Neural Networks
The Impact of Socially Responsible Business Practices on Performance: Insights from Youth-Owned Food Processing Enterprises in Ghana
Utilizing Educational Data Mining to Detect Course Bottlenecks
XSUB: Explanation-Driven Adversarial Attack against Blackbox Classifiers via Feature Substitution
TBA
Format
Items to bring
Provided items
Format
Presentation slides
Provided items
Arrival time
Dress code: Business formal or business casual attire is recommended to convey professionalism.
Audience etiquette: Please keep phones and other devices silent during talks. Practice active listening and avoid interrupting other speakers. Engage in respectful interactions, even in moments of disagreement.
Parking: Parking is available right next to the ETEC Building. Please check the “I will need a parking permit” box when registering for the conference, and a free parking permit will be provided if registered prior to March 15.
Buses
Trains
Flights
If you have any questions about the New Trends in Informatics Research Conference, please contact ntir@albany.edu or refer to the FAQs.