Framing social movement Iidentity with cyber-artifacts: a case study of the International Falun Gong Movement / Yi-Da Chen, Ahmed Abbasi, and Hsinchun Chen -- Patterns of word use for deception in testimony / David B. Skillicorn and Ayron Little -- Information integration for terrorist or criminal social networks / Christopher C. Yang and Xuning Tang -- Processing constrained k-closest pairs queries in crime databases / Shaojie Qiao ... [et al.] -- Emergency response through higher order voronoi diagrams / Ickjai Lee ... [et al.] -- Identity management architecture / Uwe Glässer and Mona Vajihollahi -- A game theoretic framework for multi-agent deployment in intrusion detection systems / Yi-Ming Chen, Dachrahn Wu, and Cheng-Kuang Wu -- ETKnet: a distributed network system for sharing event data and multi-facted knowledge in a collaboration federation / Stanley Y.W. Su ... [et al.] -- Duplicate work reduction in business continuity and risk management processes / Shi-Cho Cha ... [et al.]