-------- Forwarded Message --------
FINAL Call for Papers - Information Security and Privacy Track:
30th Australasian Conference on Information Systems (ACIS 2019)
https://www.acis2019.org/, PERTH, AUSTRALIA
IMPORTANT DATES:
2nd August - Paper Submission (Full and Research in Progress
papers) 27th September - Paper Acceptance 25th October -
Camera-Ready versions of accepted Full and RIP papers 9th - 11th
December - ACIS2019 Conference
CONFERENCE THEME: Making the World a Better Place with Information
Systems While the discipline of Information Systems arose within
the field of Business and Management and much of the research in
Information Systems has a business emphasis, it has grown to
become both multidisciplinary and transdisciplinary providing
insights into and encompassing research in many other fields,
including computer science, design, engineering, psychology, and
sociology As research and knowledge in information systems and
other disciplines have progressed, businesses have achieved
unprecedented levels of productivity and profit. Many of the
benefits of these developments have also flowed to the public in
terms of employment, new products, lower prices, and taxes paid to
government. Similarly, the production of food is at an all-time
high and its distribution continues to improve. Information
systems can be developed, deployed, and used in myriad ways to
transform and impact positively on the world for
everyone, not just for businesses, for their owners, or for
regions of relative wealth. The theme of this conference is to
explore new ways to use information systems and information
technology to improve social conditions and all of the areas that
doing so entails, including reducing poverty, hunger, war, and
oppression and improving the quality of working life, health,
education, equality, freedom, and emancipation.
Information Security Management and Privacy Track Whilst, research
and knowledge in information systems and other disciplines have
progressed and businesses have achieved unprecedented levels of
productivity and profit, security attacks in terms of frequency,
scale, diversity and seriousness are happening at unprecedented
levels. As the theme of this conference is to "explore new ways to
use information systems and information technology to improve
social conditions and all of the areas that doing so entails", the
Information Security Management and Privacy track will focus on
how we can help organisations and society protect themselves in
light of these new information systems developments. Attacks on
these new systems will still come from outside as well as within
organisational boundaries, can be malicious, or may be accidental.
Additionally, as information and knowledge is being collected and
analysed more frequently by organisations, unauthorized access and
leakage is a serious problem for organisations. The use of the
internet of things, mobile devices and the like further
exacerbates these issues. A number of controls are used to attempt
to mitigate these issues including policies, strategies, training
and technological controls.
This track welcomes empirical and rich theoretical papers that
provide interesting insights on these and other issues in the IS
sphere from an information security management and privacy
perspective. In particular, we welcome papers that furnish new and
creative approaches to understanding the modern threat landscape,
via new theoretical lenses, innovative practical contexts, and
novel data analysis techniques. The track welcomes design science,
empirical, economic, managerial, behavioural, and theoretical
submissions across a diverse range of topics-from technical
management aspects to broader social and managerial issues at the
individual, organizational, or societal levels. We invite
theoretical perspectives from behavioural, organizational,
cognitive, cultural, socio-technical, or other lenses for analysis
of these issues.
Topics of Interest
Topics include, but are not limited to, the following aspects of
IS security and privacy:
* Adoption, use, and continuance of information security
technologies and policies
* Costs and benefits of information security and privacy
* Cross-cultural issues in IS security and privacy
* Cyberwarfare and cybersecurity
* Design and development of information security and privacy
enhancing technologies
* Digital forensics, testing and incident investigations;
* Identity management for individuals and organisations;
* Incident response and investigations of security violations
* Information security policy development and impact
* Information security strategy and governance
* Intrusion detection/prevention
* IT audit and controls
* Knowledge Leakage
* Legal, societal, and ethical issues in IS security and privacy
* Risk analysis and management, risk and fraud assessment
* Security and privacy concerning social media, social networking,
big data, the IOT or mobile devices
* Security and privacy metrics
* Security Analytics
* Security, Education, Training, and Awareness (SETA) programs and
campaigns
* Social engineering and human risks, including the role of
employees and customers;
* Theoretical and empirical analyses of information security
behaviours and on information, user and customer privacy;
Track Chairs
Sean Maynard & Atif Ahmad (University of Melbourne) Dragana
Calic (Defense Science and Technology Group)
Sean
++++++++++++++++++++++++++++
Dr Sean Maynard | Course Director, Master of Information Systems
(MIS) : CRICOS: 055847J For information on the MIS please refer to
Master of Information Sytems For information about course planning
please refer to Course Planning Location Details: Level 10, Room
21, Doug McDonell Building
School of Computing and Information Systems, Melbourne School of
Engineering, The University of Melbourne, Victoria, 3010.
W:
http://people.eng.unimelb.edu.au/seanbm/, LinkedIn:
https://www.linkedin.com/in/seanbm69/
unimelb.edu.au | facebook.com/unimelb | twitter.com/unimelb
I acknowledge the Traditional Owners of the land on which I work,
and pay my respects to the Elders, past and present.
This email and any attachments may contain personal information or
information that is otherwise confidential or the subject of
copyright. Any use, disclosure or copying of any part of it is
prohibited. The University does not warrant that this email or any
attachments are free from viruses or defects. Please check any
attachments for viruses and defects before opening them. If this
email is received in error, please delete it and notify us by
return email.
_______________________________________________
AISWorld mailing list
AISWorld@lists.aisnet.org