<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML xmlns:o = "urn:schemas-microsoft-com:office:office"><HEAD>
<META content="text/html; charset=UTF-8" http-equiv=Content-Type>
<META name=GENERATOR content="MSHTML 8.00.6001.19222"></HEAD>
<BODY style="FONT-FAMILY: Arial; COLOR: #000000; FONT-SIZE: 10pt" id=role_body
bottomMargin=7 leftMargin=7 rightMargin=7 topMargin=7><FONT id=role_document
color=#000000 size=2 face=Arial>
<DIV>
<DIV class=WordSection1>
<P class=MsoNormal><B><SPAN style="FONT-SIZE: 12pt">CALL FOR
PAPERS<o:p></o:p></SPAN></B></P>
<P class=MsoNormal><SPAN style="FONT-SIZE: 12pt"><o:p> </o:p></SPAN></P>
<P class=MsoNormal><B><SPAN style="FONT-SIZE: 12pt">HICSS 2013 : 46th Hawaii
International Conference on System Sciences<o:p></o:p></SPAN></B></P>
<P class=MsoNormal><B><I><SPAN style="FONT-SIZE: 12pt">Maui, Hawaii, January
7-10, 2013<o:p></o:p></SPAN></I></B></P>
<P class=MsoNormal><SPAN style="FONT-SIZE: 12pt"><o:p> </o:p></SPAN></P>
<P class=MsoNormal><B><SPAN style="FONT-SIZE: 12pt">TRACK:</SPAN></B><SPAN
style="FONT-SIZE: 12pt"> Knowledge Systems<o:p></o:p></SPAN></P>
<P class=MsoNormal><B><SPAN style="FONT-SIZE: 12pt">MINI-TRACK:</SPAN></B><SPAN
style="FONT-SIZE: 12pt"> KM and Security: Protecting Intellectual
Property<o:p></o:p></SPAN></P>
<P class=MsoNormal><SPAN style="FONT-SIZE: 12pt"><o:p> </o:p></SPAN></P>
<P class=MsoNormal><SPAN style="FONT-SIZE: 12pt">The most important asset of an
organization is the knowledge of its employees. To allow easy access to
knowledge, organizations are implementing Knowledge Repositories. While this
type of automation makes it easy to store and distribute knowledge, it also
makes it easy to move knowledge outside the boundaries of a company.
Organizations put in place many technology-based security measures (firewalls,
filtering systems), yet they shouldn’t overlook the human-side of security
practices. An organization can have the best security technology in place, yet a
careless employee talking or emailing or posting on Facebook about the ‘new
development’ at the company bypasses all this security technology with ease.
<o:p></o:p></SPAN></P>
<P class=MsoNormal><SPAN style="FONT-SIZE: 12pt"><o:p> </o:p></SPAN></P>
<P class=MsoNormal><SPAN style="FONT-SIZE: 12pt">Furthermore, one can find lot
of information about current projects done by a company by searching the web.
How an organization can effectively protect its intellectual property remains an
answered question. What type of security and intelligence techniques can
be used to protect intellectual property? What are the best ways to train
employees so that they could spot potentially criminal activity among employees?
Could crowdsourcing be used to determine whether something represents a
potential threat? <o:p></o:p></SPAN></P>
<P class=MsoNormal><SPAN style="FONT-SIZE: 12pt"><o:p> </o:p></SPAN></P>
<P class=MsoNormal><SPAN style="FONT-SIZE: 12pt">This mini-track seeks papers
that investigate issues related to security and protection of intellectual
assets and explore how organizations can use security measures to protect their
KM practices. Possible topics include, but are not limited
to:<o:p></o:p></SPAN></P>
<P class=MsoNormal><SPAN style="FONT-SIZE: 12pt"><o:p> </o:p></SPAN></P>
<P style="TEXT-INDENT: -0.25in; mso-list: l1 level1 lfo1"
class=MsoListParagraph><SPAN style="FONT-FAMILY: Symbol; FONT-SIZE: 12pt"><SPAN
style="mso-list: Ignore">·<SPAN
style="FONT: 7pt 'Times New Roman'">
</SPAN></SPAN></SPAN><SPAN style="FONT-SIZE: 12pt">Securing intellectual
assets;<o:p></o:p></SPAN></P>
<P style="TEXT-INDENT: -0.25in; mso-list: l1 level1 lfo1"
class=MsoListParagraph><SPAN style="FONT-FAMILY: Symbol; FONT-SIZE: 12pt"><SPAN
style="mso-list: Ignore">·<SPAN
style="FONT: 7pt 'Times New Roman'">
</SPAN></SPAN></SPAN><SPAN style="FONT-SIZE: 12pt">Security strategies within
and outside the company boundaries;<o:p></o:p></SPAN></P>
<P style="TEXT-INDENT: -0.25in; mso-list: l1 level1 lfo1"
class=MsoListParagraph><SPAN style="FONT-FAMILY: Symbol; FONT-SIZE: 12pt"><SPAN
style="mso-list: Ignore">·<SPAN
style="FONT: 7pt 'Times New Roman'">
</SPAN></SPAN></SPAN><SPAN style="FONT-SIZE: 12pt">Training employees on
potential threats to security breaches;<o:p></o:p></SPAN></P>
<P style="TEXT-INDENT: -0.25in; mso-list: l1 level1 lfo1"
class=MsoListParagraph><SPAN style="FONT-FAMILY: Symbol; FONT-SIZE: 12pt"><SPAN
style="mso-list: Ignore">·<SPAN
style="FONT: 7pt 'Times New Roman'">
</SPAN></SPAN></SPAN><SPAN style="FONT-SIZE: 12pt">Preventative measures to
secure KM assets;<o:p></o:p></SPAN></P>
<P style="TEXT-INDENT: -0.25in; mso-list: l1 level1 lfo1"
class=MsoListParagraph><SPAN style="FONT-FAMILY: Symbol; FONT-SIZE: 12pt"><SPAN
style="mso-list: Ignore">·<SPAN
style="FONT: 7pt 'Times New Roman'">
</SPAN></SPAN></SPAN><SPAN style="FONT-SIZE: 12pt">Knowledge loss risk
management;<o:p></o:p></SPAN></P>
<P style="TEXT-INDENT: -0.25in; mso-list: l1 level1 lfo1"
class=MsoListParagraph><SPAN style="FONT-FAMILY: Symbol; FONT-SIZE: 12pt"><SPAN
style="mso-list: Ignore">·<SPAN
style="FONT: 7pt 'Times New Roman'">
</SPAN></SPAN></SPAN><SPAN style="FONT-SIZE: 12pt">Impact of immigration and
cultural issues on potential KM security breach; <o:p></o:p></SPAN></P>
<P style="TEXT-INDENT: -0.25in; mso-list: l1 level1 lfo1"
class=MsoListParagraph><SPAN style="FONT-FAMILY: Symbol; FONT-SIZE: 12pt"><SPAN
style="mso-list: Ignore">·<SPAN
style="FONT: 7pt 'Times New Roman'">
</SPAN></SPAN></SPAN><SPAN style="FONT-SIZE: 12pt">Using KM security to mitigate
impacts of retirement and worker transience;<o:p></o:p></SPAN></P>
<P style="TEXT-INDENT: -0.25in; mso-list: l1 level1 lfo1"
class=MsoListParagraph><SPAN style="FONT-FAMILY: Symbol; FONT-SIZE: 12pt"><SPAN
style="mso-list: Ignore">·<SPAN
style="FONT: 7pt 'Times New Roman'">
</SPAN></SPAN></SPAN><SPAN style="FONT-SIZE: 12pt">Measuring risk of knowledge
loss due to security breach;<o:p></o:p></SPAN></P>
<P class=MsoNormal><SPAN style="FONT-SIZE: 12pt"><o:p> </o:p></SPAN></P>
<P class=MsoNormal><SPAN style="FONT-SIZE: 12pt">Mini-track
chairs:<o:p></o:p></SPAN></P>
<P class=MsoNormal><B><SPAN style="FONT-SIZE: 12pt">Alexandra
Durcikova</SPAN></B><SPAN style="FONT-SIZE: 12pt"> (primary
contact)<o:p></o:p></SPAN></P>
<P class=MsoNormal><SPAN style="FONT-SIZE: 12pt">Department of
MIS<o:p></o:p></SPAN></P>
<P class=MsoNormal><SPAN style="FONT-SIZE: 12pt">Eller College of
Management<o:p></o:p></SPAN></P>
<P class=MsoNormal><SPAN style="FONT-SIZE: 12pt">The University of
Arizona<o:p></o:p></SPAN></P>
<P class=MsoNormal><SPAN style="FONT-SIZE: 12pt">Tucson, AZ,
USA<o:p></o:p></SPAN></P>
<P class=MsoNormal><SPAN style="FONT-SIZE: 12pt">Phone:
520-621-3927<o:p></o:p></SPAN></P>
<P class=MsoNormal><SPAN style="FONT-SIZE: 12pt">Email:
alex@eller.arizona.edu<o:p></o:p></SPAN></P>
<P class=MsoNormal><SPAN style="FONT-SIZE: 12pt"><o:p> </o:p></SPAN></P>
<P class=MsoNormal><B><SPAN style="FONT-SIZE: 12pt">Murray E.
Jennex<o:p></o:p></SPAN></B></P>
<P class=MsoNormal><SPAN style="FONT-SIZE: 12pt">Information and Decision
Science<o:p></o:p></SPAN></P>
<P class=MsoNormal><SPAN style="FONT-SIZE: 12pt">San Diego State
University<o:p></o:p></SPAN></P>
<P class=MsoNormal><SPAN style="FONT-SIZE: 12pt">San Diego, CA,
USA<o:p></o:p></SPAN></P>
<P class=MsoNormal><SPAN style="FONT-SIZE: 12pt">Phone: (760)
966-0548<o:p></o:p></SPAN></P>
<P class=MsoNormal><SPAN style="FONT-SIZE: 12pt">Email: Murphjen@aol.com,
<A title=mailto:mjennex@mail.sdsu.edu
href="mailto:mjennex@mail.sdsu.edu">mjennex@mail.sdsu.edu</A><o:p></o:p></SPAN></P>
<P class=MsoNormal><SPAN style="FONT-SIZE: 12pt"><o:p> </o:p></SPAN></P>
<P class=MsoNormal><B><SPAN style="FONT-SIZE: 12pt">Submission Procedure:
<o:p></o:p></SPAN></B></P>
<P class=MsoNormal><SPAN style="FONT-SIZE: 12pt">Follow Author Instructions on
the conference web site. <A
title=http://www.hicss.hawaii.edu/hicss_46/apahome46.htm
href="http://www.hicss.hawaii.edu/hicss_46/apahome46.htm">http://www.hicss.hawaii.edu/hicss_46/apahome46.htm</A>
<o:p></o:p></SPAN></P>
<P class=MsoNormal><SPAN style="FONT-SIZE: 12pt"><o:p> </o:p></SPAN></P>
<P class=MsoNormal><B><SPAN style="FONT-SIZE: 12pt">Important
Dates:<o:p></o:p></SPAN></B></P>
<P style="TEXT-INDENT: -0.25in; mso-list: l0 level1 lfo2"
class=MsoListParagraph><SPAN style="FONT-FAMILY: Symbol; FONT-SIZE: 12pt"><SPAN
style="mso-list: Ignore">·<SPAN
style="FONT: 7pt 'Times New Roman'">
</SPAN></SPAN></SPAN><SPAN style="FONT-SIZE: 12pt">June 15, 2012: Deadline for
paper submission<o:p></o:p></SPAN></P>
<P style="TEXT-INDENT: -0.25in; mso-list: l0 level1 lfo2"
class=MsoListParagraph><SPAN style="FONT-FAMILY: Symbol; FONT-SIZE: 12pt"><SPAN
style="mso-list: Ignore">·<SPAN
style="FONT: 7pt 'Times New Roman'">
</SPAN></SPAN></SPAN><SPAN style="FONT-SIZE: 12pt">August 15, 2012: Authors will
be notified of acceptances<o:p></o:p></SPAN></P>
<P style="TEXT-INDENT: -0.25in; mso-list: l0 level1 lfo2"
class=MsoListParagraph><SPAN style="FONT-FAMILY: Symbol; FONT-SIZE: 12pt"><SPAN
style="mso-list: Ignore">·<SPAN
style="FONT: 7pt 'Times New Roman'">
</SPAN></SPAN></SPAN><SPAN style="FONT-SIZE: 12pt">September 15, 2012: For
accepted papers, camera ready copy
due<o:p></o:p></SPAN></P></DIV><BR><BR></DIV></FONT></BODY></HTML>