[AISWorld] Please post this call for papers

Steven Simon SIMON_SJ at mercer.edu
Wed Apr 22 09:10:28 EDT 2015


SUBMISSION DUE DATE: February 15, 2016
REVIEWER FIRST REPORTS: June 15, 2016
REVISED PAPER SUBMISSION: September 15, 2016
REVIEWER SECOND REPORTS: December 10, 2016
FINAL MANUSCRIPT SUBMISSIONS TO PUBLISHER: March 15, 2017

SPECIAL ISSUE Cyber Insurance and Threat Mitigation

Journal of Information System Security (www.jissec.org<http://www.jissec.org/>)

Guest Editors:
Steven “Doc” Simon, PhD.  Associate Professor of Information Technology, Stetson School of Business and Economics, Mercer University, Atlanta, GA

Harold Weston, Clinical Assistant Professor, Dept. of Risk Management & Insurance, Georgia State University - Robinson College of Business, Atlanta, Georgia

Introduction:
Cyber attacks and data breaches have become systemic in today’s business environment.  In 2014, more than 1 billion records containing personal identifying information (PII) were stolen. Cyber crime  costs the global economy an estimated $5 trillion annually, with retail breaches such as Home Depot, Target, Nordstrom, and others, and now Anthem Healthcare, the first medical insurer known to be hit. Businesses and consumers are alarmed, bored, and inured to the inevitability of attacks on business IT systems and the resulting theft of consumer and corporate records. Attacks are also purloining corporate records and intellectual property. Distributed Denial of Service Attacks (DDOS) have taken down websites at critical times causing loss of sales.  Despite the fact that security of corporate information has become a foremost concern of many organizations, breaches and losses occur with painful regularity.  The expense of data breach notifications and other remediations to consumers, computer forensics and repairs, and other costs that result form IT attacks has made cyber insurance as much a key insurance coverage for business as the traditional lines of insurance. State-sponsored and semi-state-sponsored attacks complicate every aspect of IT defense and cyber insurance.

Objective:
The main objective of this special issue is to fill this knowledge gap. This special issue will explore what actions companies are taking to mitigate this risk and examine the models used to identify potential system short comings, monitor systems, and understand potential losses, and the role that cyber insurance can provide in this expanding area of loss and liability

Recommended Topics:
The topics to be discussed in this special issue include but are not limited to the following:
- - models to determine the potential threat
- models to understand losses and establish premium tables
- industry best practices to reduce losses and strengthen systems
-evaluation of information security in companies and organizations
- information security and case studies as they relate to this topic
- international standards for information security management
- understanding of the cyber insurance marketplace
government’s role


Submission Procedure
Please follow the journal submission guidelines available at www.jissec.org<http://www.jissec.org/> and submit online

About JISSec
The JISSec mission is to significantly expand the domain of information system security research to a wide and eclectic audience of academics, consultants and executives who are involved in the management of security and generally maintaining the integrity of the business operations.

Editor-in-Chief: Gurpreet Dhillon
Virginia Commonwealth University, USA

All special issue inquiries should be directed to the attention of:

Steven “Doc” Simon, PhD.  simon_sj at mercer.edu<mailto:simon_sj at mercer.edu>
Harold Weston, hweston at gsu.edu<mailto:hweston at gsu.edu>


~~

======
Steven "Doc" Simon, PhD
Captain, USN
Associate Professor of Information Technology
Stetson School of Business and Economics
Mercer University
Atlanta, GA
678-547-6118 (o)




More information about the AISWorld mailing list