[AISWorld] AMCIS CFP

Mahmood, M. Adam mmahmood at utep.edu
Fri Feb 1 15:08:47 EST 2013


Call for Papers: Information Security and Privacy in the use of Strategic and Competitive Information Technology

Strategic and Competitive Information Systems (SCIS)



Adolfo S. Coronado

Indiana University-Purdue University Fort Wayne
Coronado at ipfw.edu

Anyi Liu

Indiana University-Purdue University Fort Wayne
liua at ipfw.edu

Aurelia Donald

The University of Texas at El Paso
andonald at utep.edu
Description
In today's environment, security and privacy in the use of Strategic and Competitive Information Systems (SCIS) is not only necessary, but is also vital to support an organization's strategic and competitive goals and objectives. With increasing dependence on SCIS as a source for critical decision-making and generating business value, businesses and governments must provide a secure environment for these systems.
Suggested Topics
This mini-track solicits empirical, theoretical, conceptual, and case-based research studies that seek to explore the information privacy and security aspects of strategic and competitive information systems in general and the use of strategic and competitive information technology in particular. Suggested topics include, but are not limited to, the following:

*        The role of information privacy and security in the use of SCIS.

*        Economics of information privacy and security of SCIS.

*        Business value in utilizing secured SCIS.

*        Privacy, confidentially, and compliance with the use of SCIS.

*        IT privacy and security architecture for SCIS.

*        Alignment of SCIS security and privacy with the organizational privacy and security plan delineated in its business plan.

*        The role of information security and privacy human factors on the use of SCIS.

*        The role of top management on information privacy and security in the use of SCIS.

*        The vulnerabilities of the existing SCIS and potential attacks toward SCIS.

*        Risk analysis and risk assessment of outsource data management of SCIS.

*        Secure information sharing intra and inter-SCIS.

*        Legal, economic, and policy issues related to SCIS.

*        Physical infrastructure protection of SCIS.

*        The impact of mobile computing and social networks to SCIS.

*        Host and network intrusion and malware detection of SCIS



Paper submission due: February 22, 2013

Notification of acceptance: April 22, 2013

Conference: August 15-17, 2013, Chicago, Illinois

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20130201/c5282df9/attachment.html>


More information about the AISWorld mailing list