[AISWorld] 3rd CFP 2014 Dewald Roode Workshop on Information Systems Security Research

Paul Michael Di Gangi pdigangi at uab.edu
Wed Jan 15 11:54:01 EST 2014


2014 Dewald Roode Workshop on Information Systems Security Research

IFIP WG8.11/WG11.13

** June 16-17, 2014 **

Newcastle, England



** The workshop will be hosted earlier than in past years.  Please take note of the earlier deadline and conference for planning your submissions and travel. **



CALL FOR PAPERS

Following the success of the first five Information Systems Security Research Workshops (University of Cape Town, May 2009; Bentley University, October 2010; Virginia Tech, September, 2011; Brigham Young University, September, 2012; and University at Buffalo, October, 2013), the sixth workshop will continue the efforts to advance the discipline of information systems security through the creation, dissemination, and preservation of well-formed research.  Through the active discussion in the workshop, participants will receive specific feedback on their research and provide feedback to others.



As in the previous five years, the Dewald Roode Workshop places a premium on research with highly reliable and validated theories, empirical data, and quantitative/qualitative social scientific methodologies.  The workshop is intended to nurture individual papers for submission to a wide variety of top quality research journals.  Selection for the workshop is competitive, and only authors of the accepted papers and the active working group members will be invited to participate.



Anchoring the workshop to information systems means that the research will attend and extend the social, organizational, and managerial literature in focal areas.  Note that this is not an appropriate venue for papers with a purely technical, design-science, or economic approach.  While we assume an effective foundation in information security technology, we regard information systems risk broadly, for example, computer crime, employee misconduct, cyber warfare, cyber terrorism, human error and/or accident, natural events, etc.  We also address information systems security broadly, for example, privacy, awareness, policies, strategy, audit, planning and control.  These and related research topics will be the focus of this workshop.



Topics may include (but are not limited to):



- Theoretical and empirical analyses of information security behavior

- Adoption, use, and continuance of information security technologies and policies



- Compliance with information security and privacy policies, procedures, and regulations

- Investigations of computer crime and security violations

- Individuals motivators and inhibitors of employee computer crime

- Forensic analysis of security breaches and computer crimes



- Legal, societal, and ethical issues in information security

- Theoretical and empirical analyses of information security behavior

- Adoption, use, and continuance of information security technologies and policies



- Compliance with information security and privacy policies, procedures, and regulations

- Investigations of computer crime and security violations

- Individuals motivators and inhibitors of employee computer crime

- Forensic analysis of security breaches and computer crimes

- Legal, societal, and ethical issues in information security



IFIP WG 8.11/11.13 Chair:

Merrill Warkentin, Ph.D., Mississippi State University, USA



IFIP WG 8.11/11.13 Vice Chair:

H. Raghav Rao, Ph.D., University at Buffalo, USA



General Chair:

Robert Willison, Ph.D., Newcastle University, UK

Program Chairs:

Allen Johnston, Ph.D., University of Alabama at Birmingham, USA  Alexandra Durcikova, Ph.D., University of Oklahoma, USA  Heng Xu, Ph.D., Penn State University, USA

Continuity Chairs:

Clay Posey, Ph.D., University of Alabama, USA  Teju Herath, Ph.D., Brock University, USA



Communications Chair:

Paul M. Di Gangi, Ph.D., University of Alabama at Birmingham, USA



Webmaster:

Jayna Kehres, University of Alabama at Birmingham, USA

Submission Information:

Submission deadline: February 15, 2014

Notification to authors: March 30, 2014

Attending participants must register by:  May 9, 2014 Deadline for final papers: May 16, 2014 Workshop dates: June 16-17, 2014



Papers should be submitted via Dewald.Roode at gmail.com<mailto:Dewald.Roode at gmail.com>.



Manuscripts will be prescreened by the program chairs to ensure that all papers sent to reviewers are reasonably complete, well-formed and appropriate to the scope and mission of the workshop. Double blind reviews will follow for prescreened papers.  Authors can submit the manuscripts as "early stage" or "completed papers".  Manuscripts must be anonymous for the review process.

In recognition that the review process greatly relies upon a scarce resource of the services of reviewers, authors, by the act of submission, are implicitly promising to serve as a reviewer on one to two conference papers, if requested.



For general questions about the workshop, please contact Robert Willison at robert.willison at newcastle.ac.uk<mailto:robert.willison at newcastle.ac.uk>.



For questions about the program, please contact Allen Johnston at ajohnston at uab.edu<mailto:ajohnston at uab.edu>.



Workshop Date and Location: The workshop will take place on June 16-17, 2014 in Newcastle, England hosted by Newcastle University Business School (http://www.ncl.ac.uk/).



Please visit http://www.business.uab.edu/drw2014 for more information about the DRW 2014 workshop.

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20140115/8a536ee3/attachment.html>


More information about the AISWorld mailing list