[AISWorld] CFP: HICSS 47 Minitrack KM and Security

Durcikova, Alexandra alex at ou.edu
Tue Apr 2 16:26:37 EDT 2013


CALL FOR PAPERS
HICSS-47 (2014) (http://www.hicss.hawaii.edu)
Minitrack: KM and Security (http://www.hicss.hawaii.edu/hicss_47/track/ks/KS-Security.pdf )
January 6-9, 2014
Hilton Waikoloa, Big Island (http://www.hiltonwaikoloavillage.com)

Submission deadline: June 15, 2013

We have heard and read many times in the last several decades that the most important asset of an organization is the knowledge of its employees. While this knowledge can be a target of sophisticated cyber-attacks or fraud, most likely the leaking of knowledge can happen because of careless organizational practices, asset misuse, or behavior of employees. Organizations put in place many technology-based security measures (firewalls, filtering systems) to guard against attacks, yet it is not that easy to guard against the human-side of security practices. An organization can have the best security technology in place, yet a careless employee talking or emailing or posting on Facebook about the 'new development' at the company bypasses all this security technology with ease.

Furthermore, one can find lot of information about current projects done by a company by searching the web. How can an organization effectively protect its intellectual property remains an unanswered question. What type of security and intelligence techniques are out that that can protect the intellectual property? What are the best ways to train employees so that they would spot potentially criminal activity, such as fraud, among employees? Could crowdsourcing be used in this case, meaning asking employees to vote on a particular issue to determine whether it represents a potential threat?

This mini-track seeks papers that investigate issues related to security and protection of intellectual assets and explore how organizations can use security measures to protect their KM practices. Possible topics include, but are not limited to:

*         Securing intellectual assets;

*         Techniques used to scan employee communication channels (e.g., email, Facebook, text messages);

*         Security strategies within and outside the company boundaries;

*         Training employees on potential threats to security breaches;

*         Preventative measures to secure KM assets;

*         Knowledge loss risk management;

*         Impact of immigration and cultural issues on potential KM security breach;

*         Using KM security to mitigate impacts of retirement and worker transience;

*         Measuring risk of knowledge loss due to security breach;

*         Security models and architectures for knowledge systems;

*         Modeling risk in knowledge systems;

*         Tradeoffs in knowledge systems between security and knowledge sharing;

*         Technologies for knowledge system security.


How to Submit a Paper: Follow Author Instructions on the conference web site:

http://www.hicss.hawaii.edu/hicss_47/apahome47.htm



HICSS papers must contain original material. They may not have been previously published, nor currently submitted elsewhere. All submissions undergo a double-blind peer review process; so initial submission must be without author names.



Abstracts are optional, but strongly recommended. You may contact the Minitrack Chair(s) for guidance or verification of content.



Submit a paper to only one Minitrack. If a paper is submitted to more than one minitrack, then either paper may be rejected by either minitrack without consultation with author or other chairs.  If you are not sure of the appropriate Minitrack, submit an abstract to the Track Chair(s) - see names and contact information below, for determination, and/or seek informal opinion(s) of Minitrack Chair(s) before submitting.

Do not author or co-author more than 5 papers. This means that an individual may be listed as author or co-author on no more than 5 submitted papers. Track Chairs must approve any names added after submission or acceptance on August 15.



Important 2013 Deadlines for Authors

June 1st - Submit an abstract/idea to any of the mini-track co-chairs.



June 15 -  Submit full manuscripts for review as instructed. The review is double-blind; therefore, this initial submission must be without author names.



Aug 15 - Review System emails Acceptance Notices to authors. It is very important that at least one author of each accepted paper attend the conference. Therefore, all travel guarantees - including visa or your organization's fiscal funding procedures - should begin immediately.  Make sure your server accepts the review system address https://precisionconference.com/~hicss.



Sept 15 -  SUBMIT FINAL PAPER. Add author names to your paper, and submit your Final Paper for Publication to the site provided in your Acceptance Notice. (This URL is not public knowledge.) Oct 1 - Early Registration fee deadline. At least one author of each paper should register by this date in order secure publication in the Proceedings. Fees will increase on Oct 2 and Dec 2.



Oct 15 - Papers without at least one paid-in-full registered author may be deleted from the Proceedings and not scheduled for presentation; authors will be so notified by the Conference Office.



Minitrack Leaders
Alexandra Durcikova (primary contact)
Division of MIS
Price College of Business
The University of Oklahoma
Norman, OK, USA
Tel: 450-325-3213
Email: alex at ou.edu

Murray E. Jennex
Information and Decision Science
San Diego State University
San Diego, CA, USA
Tel: (760) 966-0548
Fax: (760) 722-2668
Email: Murphjen at aol.com, mjennex at mail.sdsu.edu


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20130402/8f98561f/attachment.html>


More information about the AISWorld mailing list