[AISWorld] Final Reminder HICSS47 KM and Security minitrack submission deadline

MurphJen at aol.com MurphJen at aol.com
Fri Jun 14 15:59:23 EDT 2013


 
 
This is a  unique minitrack combining the sharing of knowledge management 
with the need for  security, if you are interested in tackling these 
interesting issues then we'd  love to see your work! 
Final CALL  FOR PAPERS 
HICSS-47  (2014) (_http://www.hicss.hawaii.edu_ 
(http://www.hicss.hawaii.edu/) )   
Minitrack:  KM and Security 
(http://www.hicss.hawaii.edu/hicss_47/track/ks/KS-Security.pdf  ) 
January 6-9,  2014 
Hilton Waikoloa, Big Island (_http://www.hiltonwaikoloavillage.com_ 
(http://www.hiltonwaikoloavillage.com/) )

Submission  deadline: June 15, 2013 

We have heard and read  many times in the last several decades that the 
most important asset of an  organization is the knowledge of its employees. 
While this knowledge can be a  target of sophisticated cyber-attacks or fraud, 
most likely the leaking of  knowledge can happen because of careless 
organizational practices, asset misuse,  or behavior of employees. Organizations 
put in place many technology-based  security measures (firewalls, filtering 
systems) to guard against attacks, yet  it is not that easy to guard against 
the human-side of security practices. An  organization can have the best 
security technology in place, yet a careless  employee talking or emailing or 
posting on Facebook about the ‘new development’  at the company bypasses all 
this security technology with ease.   
Furthermore, one can  find lot of information about current projects done 
by a company by searching  the web. How can an organization effectively 
protect its intellectual property  remains an unanswered question. What type of 
security and intelligence  techniques are out that that can protect the 
intellectual property? What are the  best ways to train employees so that they 
would spot potentially criminal  activity, such as fraud, among employees? 
Could crowdsourcing be used in this  case, meaning asking employees to vote on 
a particular issue to determine  whether it represents a potential threat?  
This mini-track seeks  papers that investigate issues related to security 
and protection of  intellectual assets and explore how organizations can use 
security measures to  protect their KM practices. Possible topics include, 
but are not limited  to: 
·         Securing intellectual  assets; 
·         Techniques used to scan  employee communication channels (e.g., 
email, Facebook, text messages);   
·         Security strategies  within and outside the company boundaries; 
·         Training employees on  potential threats to security breaches; 
·         Preventative measures to  secure KM assets; 
·         Knowledge loss risk  management; 
·         Impact of immigration  and cultural issues on potential KM 
security breach; 
·         Using KM security to  mitigate impacts of retirement and worker 
transience; 
·         Measuring risk of  knowledge loss due to security breach; 
·         Security models and  architectures for knowledge systems; 
·         Modeling risk in  knowledge systems; 
·         Tradeoffs in knowledge  systems between security and knowledge 
sharing; 
·         Technologies for  knowledge system security. 
How to Submit a Paper:  Follow Author Instructions on the conference web 
site: 
http://www.hicss.hawaii.edu/hicss_47/apahome47.htm 
HICSS papers must  contain original material. They may not have been 
previously published, nor  currently submitted elsewhere. All submissions undergo 
a double-blind peer  review process; so initial submission must be without 
author  names. 
Abstracts are optional,  but strongly recommended. You may contact the 
Minitrack Chair(s) for guidance or  verification of content. 
Submit a paper to only  one Minitrack. If a paper is submitted to more than 
one minitrack, then either  paper may be rejected by either minitrack 
without consultation with author or  other chairs.  If you are not sure of the 
appropriate Minitrack, submit an  abstract to the Track Chair(s) – see names 
and contact information below, for  determination, and/or seek informal 
opinion(s) of Minitrack Chair(s) before  submitting. 
Do not author or  co-author more than 5 papers. This means that an 
individual may be listed as  author or co-author on no more than 5 submitted papers. 
Track Chairs must  approve any names added after submission or acceptance 
on August  15. 
Important 2013 Deadlines  for Authors 
June 15 -  Submit full  manuscripts for review as instructed. The review is 
double-blind; therefore,  this initial submission must be without author 
names. 
Aug 15 - Review System emails  Acceptance Notices to authors. It is very 
important that at least one author of  each accepted paper attend the 
conference. Therefore, all travel guarantees –  including visa or your organization’
s fiscal funding procedures – should begin  immediately.  Make sure your 
server accepts the review system address 
https://precisionconference.com/~hicss. 
Sept 15  -   SUBMIT FINAL PAPER. Add author names to your paper, and submit 
your Final Paper  for Publication to the site provided in your Acceptance 
Notice. (This URL is not  public knowledge.) Oct 1 - Early Registration fee 
deadline. At least one author  of each paper should register by this date in 
order secure publication in the  Proceedings. Fees will increase on Oct 2 
and Dec 2. 
Oct 15 - Papers without at  least one paid-in-full registered author may be 
deleted from the Proceedings and  not scheduled for presentation; authors 
will be so notified by the Conference  Office. 
Minitrack  Leaders 
Alexandra Durcikova  (primary contact) 
Division of  MIS 
Price College of  Business 
The University of  Oklahoma 
Norman, OK,  USA 
Tel:  450-325-3213 
Email:  alex at ou.edu 
Murray E.  Jennex 
Management  Information Systems 
San Diego State  University 
San Diego, CA,  USA 
Tel: (760)  966-0548 
Fax: (760)  722-2668 
Email: Murphjen at aol.com,  mjennex at mail.sdsu.edu
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20130614/7e001072/attachment.html>


More information about the AISWorld mailing list