[AISWorld] (Deadline Extended) The 2018 Dewald Roode Workshop on Information Systems Security Research
s.flowerday at ru.ac.za
Thu Mar 1 02:47:08 EST 2018
The 2018 Dewald Roode Workshop on Information Systems Security Research
IFIP WG8.11/WG11.13 (https://ifip.byu.edu/) June 14-15, 2018 (Thursday – Friday noon) University of Cape Town, Cape Town, South Africa
CALL FOR PAPERS
For its 10th anniversary the Dewald Roode Workshop on Information Systems Security Research returns to the University of Cape Town. The workshop will continue the efforts to advance the discipline of information systems security through the creation, dissemination, and preservation of well-formed research, following the success of the first nine Information Systems Security Research Workshops (University of Cape Town, May 2009; Bentley University, October 2010; Virginia Tech, September 2011; Brigham Young University, September 2012; University at Buffalo, October 2013; Newcastle University Business School, June 2014; University of Delaware, October 2015; University of New Mexico, October 2016; University of South Florida, October 2017). The active discussions in the workshop provide participants specific feedback on their research.
As in the previous nine years, the workshop places a premium on research with highly reliable and validated theories, empirical data, and quantitative/qualitative social scientific methodologies. It is intended to nurture individual papers for submission to a wide variety of top quality research journals. (See https://ifip.byu.edu/ for past DRW papers which have been published in journals.) Selection for the workshop is competitive, and only authors of the accepted papers and the active working group members will be invited to participate.
Anchoring the workshop to information systems means that the research will attend to and extend the social, organizational, and managerial literature in the focal area. Note that this is not an appropriate venue for papers with a purely technical, design-science, or economic approach. While we assume an effective foundation in information security technology, we regard information systems risk broadly, for example, computer crime, employee misconduct, cyber warfare, cyber terrorism, human error and/or accident, natural events, etc. We also address information systems security broadly, for example, policies and policy compliance, diverse security behaviors, privacy, awareness, strategy, audit, planning and control. These and related research topics will be the focus of this workshop. Topics may include (but are not limited to):
* Theoretical and empirical analyses of information security behavior
* Adoption, use, and continuance of information security technologies and policies
* Compliance with information security and privacy policies, procedures, and regulations
* Investigations of computer crime and security violations
* Motivators and inhibitors of employee computer crime
* Forensic analysis of security breaches and computer crimes
* Individual, organizational, and group information privacy concerns and behaviors
* Legal, societal, and ethical issues in information security
* Neurosecurity (NeuroIS) investigations of information security behavior
Jacques Ophoff, University of Cape Town, South Africa
Kennedy Njenga, University of Johannesburg, South Africa Stephen Flowerday, Rhodes University, South Africa Irwin Brown, University of Cape Town, South Africa
Submission deadline: March 1, 2018 March 15, 2018
Notification to authors: April 16, 2018
Attending participants must register by April 30, 2018
Deadline for final papers: May 14, 2018 (to be distributed to workshop attendees in advance)
Manuscripts will be pre-screened by the program chairs to ensure that all papers sent to reviewers are reasonably complete, well-formed, and appropriate to the scope and mission of the workshop. Double-blind reviews will follow for pre-screened papers. Authors can submit the manuscripts as “early stage” or “completed papers”. Manuscripts must be anonymous for the review process.
In recognition that the review process greatly relies upon a scarce resource of the services of reviewers, authors, by the act of submission, are implicitly promising to serve as a reviewer on one to two conference papers, if requested.
For general questions about the workshop, please contact Jacques Ophoff at jacques.ophoff at uct.ac.za <mailto:jacques.ophoff at uct.ac.za> . For questions about the program, please contact Kennedy Njenga at knjenga at uj.ac.za <mailto:knjenga at uj.ac.za> , Stephen Flowerday at s.flowerday at ru.ac.za <mailto:s.flowerday at ru.ac.za> or Irwin Brown at irwin.brown at uct.ac.za <mailto:irwin.brown at uct.ac.za> .
Workshop Date and Location
The workshop, hosted by the University of Cape Town, will take place on June 14-15, 2018 at the Protea Hotel Breakwater Lodge (http://www.breakwaterlodge.co.za/), V&A Waterfront. The hotel is closely linked with the University of Cape Town’s Graduate School of Business. The venue offers views of the bay and the famous Table Mountain, with other attractions and activities close by. The hotel is approximately 40 minutes from Cape Town International Airport. The airport has direct flights to several destinations in Africa, Europe, and Asia.
The IFIP Working Group 8.11/11.13 holds The Dewald Roode Workshop on Information Systems Security Research annually. WG 8.11/11.13 (Raghav Rao, Chair; Allen Johnston, Vice Chair) is the IFIP Working Group on Information Systems Security Research. Please visit https://ifip.byu.edu/ for more information on the IFIP Working Group 8.11/11.13 and for past workshop proceedings.
Limited travel grants may be available to support authors/co-authors from developing countries. For more details please check with Professor Raghav Rao.
More information about the AISWorld