[AISWorld] CFP 2014 Dewald Roode Workshop on Information Systems Security Research

Paul Michael Di Gangi pdigangi at uab.edu
Thu Oct 31 15:24:40 EDT 2013


2014 Dewald Roode Workshop on Information Systems Security Research
IFIP WG8.11/WG11.13 
June 16-17, 2014 Newcastle, England

CALL FOR PAPERS
 
Following the success of the first five Information Systems Security Research Workshops (University of Cape Town, May 2009; Bentley University, October 2010; Virginia Tech, September, 2011; Brigham Young University, September, 2012; and University at Buffalo, October, 2013), the sixth workshop will continue the efforts to advance the discipline of information systems security through the creation, dissemination, and preservation of well-formed research.  Through the active discussion in the workshop, participants will receive specific feedback on their research and provide feedback to others.

As in the previous five years, the Dewald Roode Workshop places a premium on research with highly reliable and validated theories, empirical data, and quantitative/qualitative social scientific methodologies.  The workshop is intended to nurture individual papers for submission to a wide variety of top quality research journals.  Selection for the workshop is competitive, and only authors of the accepted papers and the active working group members will be invited to participate.

Anchoring the workshop to information systems means that the research will attend and extend the social, organizational, and managerial literature in focal areas.  Note that this is not an appropriate venue for papers with a purely technical, design-science, or economic approach.  While we assume an effective foundation in information security technology, we regard information systems risk broadly, for example, computer crime, employee misconduct, cyber warfare, cyber terrorism, human error and/or accident, natural events, etc.  We also address information systems security broadly, for example, privacy, awareness, policies, strategy, audit, planning and control.  These and related research topics will be the focus of this workshop.  

Topics may include (but are not limited to):

- Theoretical and empirical analyses of information security behavior
 
- Adoption, use, and continuance of information security technologies and policies
  
- Compliance with information security and privacy policies, procedures, and regulations
 
- Investigations of computer crime and security violations
 
- Individuals motivators and inhibitors of employee computer crime
 
- Forensic analysis of security breaches and computer crimes
  
- Legal, societal, and ethical issues in information security
 
- Theoretical and empirical analyses of information security behavior
 
- Adoption, use, and continuance of information security technologies and policies
  
- Compliance with information security and privacy policies, procedures, and regulations
 
- Investigations of computer crime and security violations
 
- Individuals motivators and inhibitors of employee computer crime
 
- Forensic analysis of security breaches and computer crimes
 
- Legal, societal, and ethical issues in information security


IFIP WG 8.11/11.13 Chair:
 Merrill Warkentin, Ph.D., Mississippi State University, USA

IFIP WG 8.11/11.13 Vice Chair:
 H. Raghav Rao, Ph.D., University at Buffalo, USA

General Chair:
 Robert Willison, Ph.D., Newcastle University, UK
 
Program Chairs:
 Allen Johnston, Ph.D., University of Alabama at Birmingham, USA
 Alexandra Durcikova, Ph.D., University of Oklahoma, USA 
 Heng Xu, Ph.D., Penn State University, USA
 
Continuity Chairs:
 Clay Posey, Ph.D., University of Alabama, USA 
 Teju Herath, Ph.D., Brock University, USA

Communications Chair:
 Paul M. Di Gangi, Ph.D., University of Alabama at Birmingham, USA

Webmaster:
 Jayna Kehres, University of Alabama at Birmingham, USA
 
Submission Information:
Submission deadline: February 15, 2014
Notification to authors: March 30, 2014
Attending participants must register by:  May 9, 2014 
Deadline for final papers: May 16, 2014 
Workshop dates: June 16-17, 2014

Papers should be submitted via Dewald.Roode at gmail.com. 

Manuscripts will be prescreened by the program chairs to ensure that all papers sent to reviewers are reasonably complete, well-formed and appropriate to the scope and mission of the workshop. Double blind reviews will follow for prescreened papers.  Authors can submit the manuscripts as "early stage" or "completed papers".  Manuscripts must be anonymous for the review process.
 
In recognition that the review process greatly relies upon a scarce resource of the services of reviewers, authors, by the act of submission, are implicitly promising to serve as a reviewer on one to two conference papers, if requested.

For general questions about the workshop, please contact Robert Willison at robert.willison at newcastle.ac.uk. 

For questions about the program, please contact Allen Johnston at ajohnston at uab.edu.

Workshop Date and Location: The workshop will take place on June 16-17, 2014 in Newcastle, England hosted by Newcastle University Business School (http://www.ncl.ac.uk/).

Please visit http://www.business.uab.edu/drw2014 for more information about the DRW 2014 workshop.




More information about the AISWorld mailing list