[AISWorld] CFP: Information Security Management Track - Australasian Conference on IS

Sean Maynard sean.maynard at unimelb.edu.au
Wed Jun 13 18:06:48 EDT 2018


Call for Papers: 29th Australasian Conference on Information Systems (ACIS2018) http://www.acis2018.org/

SYDNEY, AUSTRALIA



IMPORTANT DATES:

30th July 2018 - Full and RIP Paper Submission Deadline - submission system closes

15th October 2018 - Camera-Ready Versions of Accepted Full and RIP Paper Submissions Due

3rd - 5th December 2018 - ACIS2018 Conference

CONFERENCE THEME: STRATEGIC POSITIONING
Within the current global context, resilience is a key driver for various facets of decision-making processes. Information systems have a critical role to facilitate such processes. Indeed, information system researchers have pioneered many of the conceptual tools that this vantage point of decision making demands. This thematic view of IS will offer IS researchers to position and present their efforts not only more cohesively but also will provide a platform to focus on the impact of IS research to solve ongoing societal challenges. These include a focus on organisational resilience and sustainability encompassing risk assessment, cyber threats mitigation, the role of big data, disaster management, and environmental modelling.

INFORMATION SECURITY TRACK
Ensuring the resilience of organisational systems (not just IT systems), remains a pressing concern for organisations, governments and individuals alike.  Security attacks in terms of frequency, scale, diversity and seriousness are unprecedented.  Attacks come from outside as well as within organisational boundaries, can be malicious, or may be accidental.  Additionally, as information and knowledge is being collected and analysed more frequently by organisations, unauthorized access and leakage is a serious problem for organisations.  The use of the internet of things, mobile devices and the like further exacerbates these issues.  A number of controls are used to attempt to mitigate these issues including policies, strategies, training and technological controls.
This track welcomes empirical and rich theoretical papers that provide interesting insights on these and other issues in the IS sphere from a security and privacy perspective. In particular, we welcome papers that furnish new and creative approaches to understanding the modern threat landscape, via new theoretical lenses, innovative practical contexts, and novel data analysis techniques. The track welcomes design science, empirical, economic, managerial, behavioural, and theoretical submissions across a diverse range of topics-from technical management aspects to broader social and managerial issues at the individual, organizational, or societal levels. We invite theoretical perspectives from behavioural, organizational, cognitive, cultural, socio-technical, or other lenses for analysis of these issues.

TOPICS OF INTEREST
Topics include, but are not limited to, the following aspects of IS security and privacy:

*         Adoption, use, and continuance of information security technologies and policies

*         Costs and benefits of information security and privacy

*         Cross-cultural issues in IS security and privacy

*         Cyberwarfare and cybersecurity

*         Design and development of information security and privacy enhancing technologies

*         Digital forensics, testing and incident investigations;

*         Identity management for individuals and organisations;

*         Incident response and investigations of security violations

*         Information security policy development and impact

*         Information security strategy and governance

*         Intrusion detection/prevention

*         IT audit and controls

*         Knowledge Leakage

*         Legal, societal, and ethical issues in IS security and privacy

*         Risk analysis and management, risk and fraud assessment

*         Security and privacy concerning social media, social networking, big data, the IOT or mobile devices

*         Security and privacy metrics

*         Security Analytics

*         Security, Education, Training, and Awareness (SETA) programs and campaigns

*         Social engineering and human risks, including the role of employees and customers;

*         Theoretical and empirical analyses of information security behaviours and on information, user and customer privacy;

TRACK CHAIRS
Sean Maynard & Atif Ahmad (University of Melbourne)
Dragana Calic (Defense Science and Technology Group)
Robert Willison (University of Newcastle)


Sean
++++++++++++++++++++++++++++
Dr Sean Maynard
School of Computing and Information Systems<http://www.cis.unimelb.edu.au/>, Melbourne School of Engineering<http://www.eng.unimelb.edu.au/>, The University of Melbourne<http://www.unimelb.edu.au/>, Victoria, 3010.
W: http://people.eng.unimelb.edu.au/seanbm/, LinkedIn: https://www.linkedin.com/in/seanbm69/
unimelb.edu.au | facebook.com/unimelb | twitter.com/unimelb




More information about the AISWorld mailing list