-------- Original Message -------- Subject: [AISWorld] CFP: AMCIS 2011 Mini-Track on Design Considerations for IT Security and Privacy Management Date: Wed, 22 Dec 2010 18:12:03 -0500 From: John D'Arcy jdarcy1@nd.edu To: aisworld@lists.aisnet.org aisworld@lists.aisnet.org
Call for Papers 17th Americas Conference on Information Systems August 4-7, 2011, Detroit, MI, USA
Track: HUMAN COMPUTER INTERACTION Mini Track Title: DESIGN CONSIDERATIONS FOR IT SECURITY AND PRIVACY MANAGEMENT
DESCRIPTION: The importance of security and privacy management has increased as witnessed by the increasing number of security and privacy breach incidents that organizations have encountered within the last few years. For instance, the website privacyrights.org details nearly two thousand data breaches made public since 2005 that have compromised over a half million personal records. Security and privacy management is especially challenging in that users vary widely in level of motivation, knowledge, and perceptions of threat severity. The decentralized computing environment in which end users exercise some degree of autonomous control over IT resources further complicates security management efforts. To address these complex issues, we solicit research papers on the design and usability of tools and technologies employed for all types of IT security management tasks, including those utilized by both end users and IT administrators.
A fully functional IT environment requires a consolidated and convincing set of privacy and security safeguards in place at various levels: system, user, organizational, and sector. Therefore, design-based research efforts are expected to bring system requirement, user controllable privacy and security, organizational compliance, and legal requirements into better alignment. This minitrack provides a forum for focused discussion and exchange on design considerations for IT security and privacy management. We welcome research papers that explore interesting questions related to the design and usability aspects of IS security and privacy, such as:
·How should organizations design and implement tools and procedures that help IT professionals, business leaders, and policy makers bring system requirements, business strategies, and policies into better alignment?
·How should firms design and implement tools and practices for detection, reporting, investigation of, and recovery from security incidents?
·What is unique about privacy and security management and why should the AIS-SIGHCI community care?
We refer potential authors to papers in recent MIS Quarterly and European Journal of Information Systems special issues on information security (e.g., Abbasi et al. 2010; Zhang et al. 2009) and the IFIP Working Group 8.11/11.13 Dewald Roode Information Security Workshop proceedings for potential ideas. However, the range of acceptable topics and methodological approaches is by no means limited to these studies.
*POTENTIAL TOPICS: Example topics of interest include, but are not limited to, the following:*
**
·Design and usability evaluations of privacy and security enhancing features
·User mental models and behavioral dynamics
·Tools or applications that support security and privacy assurance
·Designs to improve IS security and IT policy compliance
·User interface design for security tools
·Deployment, integration, modification, and maintenance of organizational security solutions
·Design of organizational security controls and procedures
·Information visualization for security analysis
·Integration of security tools with organizational security policies and procedures
·Design of user security and privacy awareness and training modules
REFERENCES: Abbasi, A., Zhang, Z., Zimbra, D., and Chen, H. (2010). Detecting Fake Websites: The Contribution of Statistical Learning Theory. MIS Quarterly 34(3), pp. 435-461.
Zhang, J., Luo, X., Akkaladevi, S., and Ziegelmayer, J. (2009). Improving Multiple-Password Recall: An Empirical Study. European Journal of Information Systems 18(2), pp. 165-176.
SUBMISSION SITE: http://mc.manuscriptcentral.com/amcis2011
IMPORTANT DATES: Deadline for paper submissions: February 17, 2011 Notification of Acceptance: March 24, 2011 Final Copy Due: April 21, 2011
CHAIRS CONTACT INFORMATION: Heng Xu Assistant Professor College of Information Sciences and Technology The Pennsylvania State University Phone: (814) 867-0469 Email: hxu@ist.psu.edu
John D’Arcy Assistant Professor
Department of Management
Mendoza College of Business University of Notre Dame Phone: (574) 631-1735 Email: jdarcy1@nd.edu