-------- Original-Nachricht -------- Betreff: [isworld] Security in Virtual Worlds and 3D Webs: Final Call for Chapter Proposals Datum: Mon, 23 Feb 2009 06:09:28 -0500 Von: rea rea@acm.org Antwort an: rea rea@acm.org An: AISWORLD Information Systems World Network isworld@lyris.isworld.org
Final Call for Chapter Proposals: Security in Virtual Worlds and 3D Webs
Apologies for Cross Postings
Proposal Submission Deadline: March 1, 2009
Call for Chapter Proposals
Security in Virtual Worlds and 3D Webs: Models for Development and Management
A book edited by Dr. Alan Rea Western Michigan University, USA
Introduction
This book intersects at least three major fields of research: Security, Virtual Worlds, and 3D Webs, you can choose to focus in one area more than another, as long as your chapter centers around one of the topics discussed below.
Although one finds much discussion and research on the features and functionality of Rich Internet Applications (RIAs), the 3D Web, and Virtual Worlds in both scholarly and popular publications, very little is written about the issues and techniques one must consider when creating, deploying, and managing them securely. Reports of cross-site scripting exploits in poorly implemented Webtops, risks of embedded viruses in social computing platforms, such as Facebook or MySpace, and technical and social engineering exploits in Multi-user Virtual Environments (MuVEs) represent some of the security challenges contemporary organizations face.
This project will bring together the issues that managers, practitioners, and researchers must consider when planning, implementing, and managing these promising virtual technologies for secure processes and organizational initiatives.
Objective of the Book
In this book we will discuss the uses and potential of these virtual technologies and examine secure policy formation and practices that can be applied specifically to each. Authors will contribute guidelines, techniques, cases, and methods that explore security in Virtual Worlds and 3D Webs.
The book will focus on research and discussions about planning, implementing, managing, and supporting these powerful technologies using accepted system development models, secure testing techniques, robust monitoring tools, and other accepted approaches. Moreover, discussions on security policy creation to guide development, as well as user interaction with these technologies will play an important role in the book. The book will also use cases to illustrate successful, and unsuccessful, implementations of RIAs, Webtops, and Virtual Worlds. Of course, this book would not be complete without looking forward to the potential security considerations and questions that must be asked as more organizations move into virtual offerings.
Ultimately, this project will provide the latest research on virtual security in order to provide researchers, practitioners, and students the necessary background in theory and practice to deploy, plan, manage, and maintain robust and safe virtual offerings.
Target Audience
This book appeals to those interested not only in security but also advanced virtual offerings whether these are RIAs, the 3D Web, or Virtual Worlds. Security researchers, as well as researchers from diverse fields--computer science, information systems, psychology, sociology, and telecommunications--will find valuable research questions posed within the context of privacy, security, and trust as well. But this book appeals to more than just researchers. Practitioners and managers looking to offer robust virtual platforms will also benefit from the pragmatic techniques, case discussions, and implementation guidelines. In addition, upper-level and graduate-level students will find this research useful in their course work and research. Finally, this book will be a welcome addition to academic libraries' research collections.
Recommended topics include, but are not limited to, the following
--Case Studies of Secure or Insecure Virtual Applications --Developing Secure Virtual Offerings --Hacker Attacks on Virtual Offerings --Identity or Data Theft in Virtual Offerings --Implementing Secure Virtual Offerings --Issues of Privacy and/or Trust in Virtual Offerings --Managing Secure Virtual Offerings --Secure Policy Formation in Virtual Offerings --Secure Virtual Models --Security in 3D Web applications --Security in Virtual Worlds --Social Engineering in Virtual Worlds
Submission Procedure
Researchers and practitioners are invited to submit on or before March 1, 2009, a 2-3 page chapter proposal clearly explaining the mission and concerns of their proposed chapter. Authors of accepted proposals will be notified by March 15, 2009 about the status of their proposals and sent chapter guidelines. Full chapters are expected to be submitted by April 30, 2009. All submitted chapters will be reviewed on a double-blind review basis. This book is scheduled to be published by IGI Global (formerly Idea Group Inc.), publisher of books under IGI Publishing, IRM Press, Information Science Publishing, CyberTech Publishing, and Information Science Reference. For additional information regarding the publisher, please visit http://www.igi-global.com/.
Inquiries and submissions (Word document or RTF) can be sent electronically to:
Dr. Alan Rea Computer Information Systems Haworth College of Business Western Michigan University Kalamazoo, MI 49008-5412 e-mail: rea@wmich.edu, rea@acm.org phone: 1.269.387.4247 fax: 1.269.387.5410
The AISWorld LISTSERV is a service of the Association for Information Systems (http://www.aisnet.org). To unsubscribe, redirect, or change subscription options please go to http://lyris.isworld.org/. You are subscribed to AISworld as: neumann@wu-wien.ac.at. Each Sender assumes responsibility that his or her message conforms to the AISWorld LISTSERV policy and conditions of use available at http://lyris.isworld.org/isworldlist.htm.