-------- Original-Nachricht -------- Betreff: [AISWorld] Call for papers (CfP): ECIS 2014 - IS Security and Privacy track - **Reminder** Datum: Fri, 6 Dec 2013 03:17:13 +0000 Von: Yair Levy levyy@nova.edu An: aisworld@lists.aisnet.org aisworld@lists.aisnet.org
**************************************************************************** 22nd European Conference on Information Systems (ECIS 2014) CALL FOR PAPERS (CfPs) http://ecis2014.eu/call-for-papers/
Track: IS Security and Privacy (http://ecis2014.eu/wp-content/uploads/2013/07/14.-IS-Security-and-Privacy2.p...)
June 9-11, 2014, Tel-Aviv, Israel (http://ecis2014.eu/) (Apologies for cross posting) ****************************************************************************
Track Description The importance of information security and privacy in the context of digital work and digital life is well documented in the literature. Cybercrimes have been identified by law enforcement around the globe as a significant epidemic with cyber-attacks causing losses of billions of dollars for organizations and individuals. The majority of small to medium size enterprises (SMEs) are faced with limited budgets to properly secure their networks, yet significantly rely on their information systems to support their financial operations. At the same time, the tools, knowledge, and skills for engagement in cybercrimes appear to be widely available on the Internet. With significant digital crimes on the rise, combined with the ubiquitous use of digital devices, this track is intended to be a forum for scholars, practitioners, and doctoral students interested in information-, cyber-, and homeland security.
The IS Security and Privacy track invites submissions of empirical research articles, prototype papers, case studies, position papers, and research-in-progress that address all interesting aspects of information and cyber security.
Track Topics of Interest Possible topics include, but are not limited to: - Socio technical analysis of information security and privacy - Cultural issues in management of information security and privacy - IT risk analysis and management - Economics of information security - Behavioral and cognitive research into security design, development, implementation, and use - Compliance with information security and privacy policies, procedures, and regulations - Strategies for decreasing risky habits and user behavior - Analysis of system vulnerabilities and risk exposure - Data analytics of system vulnerabilities and information security breaches - Protection of organizational knowledge and proprietary data - Simulation of information security and risk management - Management of electronic espionage and technological crime - Cyber terrorism - Security in the healthcare industry - Security and privacy in e-government - Security and privacy in social networks and online communities - Security and privacy in e-learning - Cases in infrastructure protection - Ethical aspects of information security: Employees’ and users’ surveillance - Legal, societal, and ethical issues in high technology crimes - NeuroIS perspectives on information security - Cyber-security skills - Information security and privacy education - Ensuring efficacy of operations for high integrity - Homeland security and cyber terrorism - Security and mobility - Security and Bring your own device (BYOD)
Selected high quality papers may be fast-tracked for publication in Journal of Computer and Information Systems (JCIS) (http://www.iacis.org/jcis/jcis.php) and Information Systems Frontiers (ISF) (http://link.springer.com/journal/10796)
Track Associate Editors Nathan Clarke, Plymouth University, UK John D'Arcy, Notre Dame University, USA Filipe de Sá-Soares, Universidade do Minho, Portugal Gurpreet Dhillon, Virginia Commonwealth University, USA Steven M. Furnell, Plymouth University, UK Karin Hedström, Örebro University, Sweden Fredrik Karlsson, Örebro University, Sweden Byung Cho Kim, Korea University Business School, South Korea Herbert Mattord, Kennesaw State University, USA Jean-Henry Morin, University of Geneva, Switzerland Ronit Purian Lukatch, Tel-Aviv University, Israel Raj Sharman, University at Buffalo, USA Bracha Shapira, Ben-Gurion University, Israel Steven Simon, United States Naval Academy, USA Jannine Spears, DePaul University, USA Michelle M. Ramim, University System of Georgia, USA Anthony Vance, Brigham Young University, USA
Track Chairs Anat Hovav Korea University Business School South Korea
Yair Levy Nova Southeastern University Florida, USA
Important dates Paper Submission begins: 1 November, 2013 Call for Papers Submission Deadline Date: 8 December, 2013 Notification of acceptance: 3 March, 2014 Panel submission deadline: 5 March, 2014 Final version of accepted papers due: 30 March, 2014 Early Bird Registration closes: 16 April, 2014
For additional information regarding ECIS2014 see: http://ecis2014.eu/
----------------------
Regards, Yair
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Yair Levy, Ph.D. Professor of Information Systems Director, Center for e-Learning Security Research (CeLSR)http://celsr.nova.edu/ Graduate School of Computer and Information Scienceshttp://scis.nova.edu/ Nova Southeastern Universityhttp://www.nova.edu/ The DeSantis Building - Room 4058 3301 College Avenue Fort Lauderdale, FL 33314 Tel.: 954-262-2006 or 1-800-541-NOVA ext. 22006 Fax: 954-262-3915 E-mail: levyy@nova.edumailto:levyy@nova.edu Website: http://scis.nova.edu/~levyy/ CeLSR website: http://CeLSR.nova.edu/http://celsr.nova.edu/ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
_______________________________________________ AISWorld mailing list AISWorld@lists.aisnet.org