[AISWorld] Final Reminder HICSS47 KM and Security minitrack submission deadline
MurphJen at aol.com
MurphJen at aol.com
Fri Jun 14 15:59:23 EDT 2013
This is a unique minitrack combining the sharing of knowledge management
with the need for security, if you are interested in tackling these
interesting issues then we'd love to see your work!
Final CALL FOR PAPERS
HICSS-47 (2014) (_http://www.hicss.hawaii.edu_
(http://www.hicss.hawaii.edu/) )
Minitrack: KM and Security
(http://www.hicss.hawaii.edu/hicss_47/track/ks/KS-Security.pdf )
January 6-9, 2014
Hilton Waikoloa, Big Island (_http://www.hiltonwaikoloavillage.com_
(http://www.hiltonwaikoloavillage.com/) )
Submission deadline: June 15, 2013
We have heard and read many times in the last several decades that the
most important asset of an organization is the knowledge of its employees.
While this knowledge can be a target of sophisticated cyber-attacks or fraud,
most likely the leaking of knowledge can happen because of careless
organizational practices, asset misuse, or behavior of employees. Organizations
put in place many technology-based security measures (firewalls, filtering
systems) to guard against attacks, yet it is not that easy to guard against
the human-side of security practices. An organization can have the best
security technology in place, yet a careless employee talking or emailing or
posting on Facebook about the ‘new development’ at the company bypasses all
this security technology with ease.
Furthermore, one can find lot of information about current projects done
by a company by searching the web. How can an organization effectively
protect its intellectual property remains an unanswered question. What type of
security and intelligence techniques are out that that can protect the
intellectual property? What are the best ways to train employees so that they
would spot potentially criminal activity, such as fraud, among employees?
Could crowdsourcing be used in this case, meaning asking employees to vote on
a particular issue to determine whether it represents a potential threat?
This mini-track seeks papers that investigate issues related to security
and protection of intellectual assets and explore how organizations can use
security measures to protect their KM practices. Possible topics include,
but are not limited to:
· Securing intellectual assets;
· Techniques used to scan employee communication channels (e.g.,
email, Facebook, text messages);
· Security strategies within and outside the company boundaries;
· Training employees on potential threats to security breaches;
· Preventative measures to secure KM assets;
· Knowledge loss risk management;
· Impact of immigration and cultural issues on potential KM
security breach;
· Using KM security to mitigate impacts of retirement and worker
transience;
· Measuring risk of knowledge loss due to security breach;
· Security models and architectures for knowledge systems;
· Modeling risk in knowledge systems;
· Tradeoffs in knowledge systems between security and knowledge
sharing;
· Technologies for knowledge system security.
How to Submit a Paper: Follow Author Instructions on the conference web
site:
http://www.hicss.hawaii.edu/hicss_47/apahome47.htm
HICSS papers must contain original material. They may not have been
previously published, nor currently submitted elsewhere. All submissions undergo
a double-blind peer review process; so initial submission must be without
author names.
Abstracts are optional, but strongly recommended. You may contact the
Minitrack Chair(s) for guidance or verification of content.
Submit a paper to only one Minitrack. If a paper is submitted to more than
one minitrack, then either paper may be rejected by either minitrack
without consultation with author or other chairs. If you are not sure of the
appropriate Minitrack, submit an abstract to the Track Chair(s) – see names
and contact information below, for determination, and/or seek informal
opinion(s) of Minitrack Chair(s) before submitting.
Do not author or co-author more than 5 papers. This means that an
individual may be listed as author or co-author on no more than 5 submitted papers.
Track Chairs must approve any names added after submission or acceptance
on August 15.
Important 2013 Deadlines for Authors
June 15 - Submit full manuscripts for review as instructed. The review is
double-blind; therefore, this initial submission must be without author
names.
Aug 15 - Review System emails Acceptance Notices to authors. It is very
important that at least one author of each accepted paper attend the
conference. Therefore, all travel guarantees – including visa or your organization’
s fiscal funding procedures – should begin immediately. Make sure your
server accepts the review system address
https://precisionconference.com/~hicss.
Sept 15 - SUBMIT FINAL PAPER. Add author names to your paper, and submit
your Final Paper for Publication to the site provided in your Acceptance
Notice. (This URL is not public knowledge.) Oct 1 - Early Registration fee
deadline. At least one author of each paper should register by this date in
order secure publication in the Proceedings. Fees will increase on Oct 2
and Dec 2.
Oct 15 - Papers without at least one paid-in-full registered author may be
deleted from the Proceedings and not scheduled for presentation; authors
will be so notified by the Conference Office.
Minitrack Leaders
Alexandra Durcikova (primary contact)
Division of MIS
Price College of Business
The University of Oklahoma
Norman, OK, USA
Tel: 450-325-3213
Email: alex at ou.edu
Murray E. Jennex
Management Information Systems
San Diego State University
San Diego, CA, USA
Tel: (760) 966-0548
Fax: (760) 722-2668
Email: Murphjen at aol.com, mjennex at mail.sdsu.edu
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20130614/7e001072/attachment.html>
More information about the AISWorld
mailing list