<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40"><head><META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=us-ascii"><meta name=Generator content="Microsoft Word 14 (filtered medium)"><style><!--
/* Font Definitions */
@font-face
        {font-family:Wingdings;
        panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
        {font-family:Wingdings;
        panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
        {font-family:LiberationSerif;
        panose-1:0 0 0 0 0 0 0 0 0 0;}
@font-face
        {font-family:"\@LiberationSerif";
        panose-1:0 0 0 0 0 0 0 0 0 0;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
        {margin-top:0in;
        margin-right:0in;
        margin-bottom:6.0pt;
        margin-left:0in;
        text-align:justify;
        font-size:10.0pt;
        font-family:"Times New Roman","serif";}
h1
        {mso-style-link:"Heading 1 Char";
        margin-top:6.0pt;
        margin-right:0in;
        margin-bottom:6.0pt;
        margin-left:0in;
        text-align:justify;
        page-break-after:avoid;
        font-size:9.0pt;
        font-family:"Arial","sans-serif";
        text-transform:uppercase;}
p.MsoTitle, li.MsoTitle, div.MsoTitle
        {mso-style-link:"Title Char";
        mso-margin-top-alt:auto;
        margin-right:0in;
        margin-bottom:6.0pt;
        margin-left:0in;
        text-align:center;
        font-size:18.0pt;
        font-family:"Arial","sans-serif";
        font-weight:bold;}
a:link, span.MsoHyperlink
        {mso-style-priority:99;
        color:blue;
        text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
        {mso-style-priority:99;
        color:purple;
        text-decoration:underline;}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
        {mso-style-priority:34;
        margin-top:0in;
        margin-right:0in;
        margin-bottom:6.0pt;
        margin-left:.5in;
        mso-add-space:auto;
        text-align:justify;
        font-size:10.0pt;
        font-family:"Times New Roman","serif";}
p.MsoListParagraphCxSpFirst, li.MsoListParagraphCxSpFirst, div.MsoListParagraphCxSpFirst
        {mso-style-priority:34;
        mso-style-type:export-only;
        margin-top:0in;
        margin-right:0in;
        margin-bottom:0in;
        margin-left:.5in;
        margin-bottom:.0001pt;
        mso-add-space:auto;
        text-align:justify;
        font-size:10.0pt;
        font-family:"Times New Roman","serif";}
p.MsoListParagraphCxSpMiddle, li.MsoListParagraphCxSpMiddle, div.MsoListParagraphCxSpMiddle
        {mso-style-priority:34;
        mso-style-type:export-only;
        margin-top:0in;
        margin-right:0in;
        margin-bottom:0in;
        margin-left:.5in;
        margin-bottom:.0001pt;
        mso-add-space:auto;
        text-align:justify;
        font-size:10.0pt;
        font-family:"Times New Roman","serif";}
p.MsoListParagraphCxSpLast, li.MsoListParagraphCxSpLast, div.MsoListParagraphCxSpLast
        {mso-style-priority:34;
        mso-style-type:export-only;
        margin-top:0in;
        margin-right:0in;
        margin-bottom:6.0pt;
        margin-left:.5in;
        mso-add-space:auto;
        text-align:justify;
        font-size:10.0pt;
        font-family:"Times New Roman","serif";}
span.EmailStyle17
        {mso-style-type:personal-compose;
        font-family:"Calibri","sans-serif";
        color:windowtext;}
span.Heading1Char
        {mso-style-name:"Heading 1 Char";
        mso-style-link:"Heading 1";
        font-family:"Arial","sans-serif";
        text-transform:uppercase;
        font-weight:bold;}
span.TitleChar
        {mso-style-name:"Title Char";
        mso-style-link:Title;
        font-family:"Arial","sans-serif";
        font-weight:bold;}
p.Author, li.Author, div.Author
        {mso-style-name:Author;
        margin:0in;
        margin-bottom:.0001pt;
        text-align:center;
        font-size:12.0pt;
        font-family:"Times New Roman","serif";
        color:black;
        font-weight:bold;}
p.Affiliation, li.Affiliation, div.Affiliation
        {mso-style-name:Affiliation;
        margin:0in;
        margin-bottom:.0001pt;
        text-align:center;
        font-size:12.0pt;
        font-family:"Times New Roman","serif";
        color:black;}
.MsoChpDefault
        {mso-style-type:export-only;
        font-family:"Calibri","sans-serif";}
@page WordSection1
        {size:8.5in 11.0in;
        margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
        {page:WordSection1;}
/* List Definitions */
@list l0
        {mso-list-id:1924290889;
        mso-list-type:hybrid;
        mso-list-template-ids:1124206736 67698689 67698691 67698693 67698689 67698691 67698693 67698689 67698691 67698693;}
@list l0:level1
        {mso-level-number-format:bullet;
        mso-level-text:\F0B7;
        mso-level-tab-stop:none;
        mso-level-number-position:left;
        text-indent:-.25in;
        font-family:Symbol;}
@list l0:level2
        {mso-level-number-format:bullet;
        mso-level-text:o;
        mso-level-tab-stop:none;
        mso-level-number-position:left;
        text-indent:-.25in;
        font-family:"Courier New";}
@list l0:level3
        {mso-level-number-format:bullet;
        mso-level-text:\F0A7;
        mso-level-tab-stop:none;
        mso-level-number-position:left;
        text-indent:-.25in;
        font-family:Wingdings;}
@list l0:level4
        {mso-level-number-format:bullet;
        mso-level-text:\F0B7;
        mso-level-tab-stop:none;
        mso-level-number-position:left;
        text-indent:-.25in;
        font-family:Symbol;}
@list l0:level5
        {mso-level-number-format:bullet;
        mso-level-text:o;
        mso-level-tab-stop:none;
        mso-level-number-position:left;
        text-indent:-.25in;
        font-family:"Courier New";}
@list l0:level6
        {mso-level-number-format:bullet;
        mso-level-text:\F0A7;
        mso-level-tab-stop:none;
        mso-level-number-position:left;
        text-indent:-.25in;
        font-family:Wingdings;}
@list l0:level7
        {mso-level-number-format:bullet;
        mso-level-text:\F0B7;
        mso-level-tab-stop:none;
        mso-level-number-position:left;
        text-indent:-.25in;
        font-family:Symbol;}
@list l0:level8
        {mso-level-number-format:bullet;
        mso-level-text:o;
        mso-level-tab-stop:none;
        mso-level-number-position:left;
        text-indent:-.25in;
        font-family:"Courier New";}
@list l0:level9
        {mso-level-number-format:bullet;
        mso-level-text:\F0A7;
        mso-level-tab-stop:none;
        mso-level-number-position:left;
        text-indent:-.25in;
        font-family:Wingdings;}
ol
        {margin-bottom:0in;}
ul
        {margin-bottom:0in;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]--></head><body lang=EN-US link=blue vlink=purple><div class=WordSection1><p class=MsoTitle align=left style='text-align:left'>Call for Papers: Information Security and Privacy in the use of Strategic and Competitive Information Technology <o:p></o:p></p><p class=MsoTitle align=left style='text-align:left'><i><span style='font-size:16.0pt'>Strategic and Competitive Information Systems (SCIS)<o:p></o:p></span></i></p><p class=Author align=left style='text-align:left'><o:p> </o:p></p><p class=Author align=left style='text-align:left'><span style='font-size:11.0pt'>Adolfo S. Coronado<o:p></o:p></span></p><p class=Affiliation align=left style='text-align:left'><span style='font-size:11.0pt'>Indiana University-Purdue University Fort Wayne<o:p></o:p></span></p><p class=MsoNormal align=left style='text-align:left'><span style='font-size:11.0pt'>Coronado@ipfw.edu<o:p></o:p></span></p><p class=Author align=left style='text-align:left'><span style='font-size:11.0pt'>Anyi Liu<o:p></o:p></span></p><p class=Affiliation align=left style='text-align:left'><span style='font-size:11.0pt'>Indiana University-Purdue University Fort Wayne<o:p></o:p></span></p><p class=MsoNormal align=left style='text-align:left'><span style='font-size:11.0pt'>liua@ipfw.edu<o:p></o:p></span></p><p class=Author align=left style='text-align:left'><span style='font-size:11.0pt'>Aurelia Donald<o:p></o:p></span></p><p class=Affiliation align=left style='text-align:left'><span style='font-size:11.0pt'>The University of Texas at El Paso<o:p></o:p></span></p><p class=MsoNormal align=left style='text-align:left'><span style='font-size:11.0pt'>andonald@utep.edu<o:p></o:p></span></p><h1>Description<o:p></o:p></h1><p class=MsoNormal>In today’s environment, security and privacy in the use of Strategic and Competitive Information Systems (SCIS) is not only necessary, but is also vital to support an organization’s strategic and competitive goals and objectives. With increasing dependence on SCIS as a source for critical decision-making and generating business value, businesses and governments must provide a secure environment for these systems.<o:p></o:p></p><h1>Suggested Topics<o:p></o:p></h1><p class=MsoNormal>This mini-track solicits empirical, theoretical, conceptual, and case-based research studies that seek to explore the information privacy and security aspects of strategic and competitive information systems in general and the use of strategic and competitive information technology in particular. Suggested topics include, but are not limited to, the following:<o:p></o:p></p><p class=MsoListParagraphCxSpFirst style='margin-bottom:0in;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-.25in;mso-list:l0 level1 lfo1;text-autospace:none'><![if !supportLists]><span style='font-family:Symbol;color:black'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>        </span></span></span><![endif]><span style='color:black'>The role of information privacy and security in the use of SCIS.<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0in;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-.25in;mso-list:l0 level1 lfo1;text-autospace:none'><![if !supportLists]><span style='font-family:Symbol;color:black'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>        </span></span></span><![endif]><span style='color:black'>Economics of information privacy and security of SCIS.<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0in;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-.25in;mso-list:l0 level1 lfo1;text-autospace:none'><![if !supportLists]><span style='font-family:Symbol;color:black'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>        </span></span></span><![endif]><span style='color:black'>Business value in utilizing secured SCIS.<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0in;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-.25in;mso-list:l0 level1 lfo1;text-autospace:none'><![if !supportLists]><span style='font-family:Symbol;color:black'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>        </span></span></span><![endif]><span style='color:black'>Privacy, confidentially, and compliance with the use of SCIS.<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0in;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-.25in;mso-list:l0 level1 lfo1;text-autospace:none'><![if !supportLists]><span style='font-family:Symbol;color:black'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>        </span></span></span><![endif]><span style='color:black'>IT privacy and security architecture for SCIS.<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0in;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-.25in;mso-list:l0 level1 lfo1;text-autospace:none'><![if !supportLists]><span style='font-family:Symbol;color:black'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>        </span></span></span><![endif]><span style='color:black'>Alignment of SCIS security and privacy with the organizational privacy and security plan delineated in its business plan.<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0in;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-.25in;mso-list:l0 level1 lfo1;text-autospace:none'><![if !supportLists]><span style='font-family:Symbol'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>        </span></span></span><![endif]>The role of information security and privacy human factors on the use of SCIS.<o:p></o:p></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0in;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-.25in;mso-list:l0 level1 lfo1;text-autospace:none'><![if !supportLists]><span style='font-family:Symbol'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>        </span></span></span><![endif]>The role of top management on information privacy and security in the use of SCIS.<o:p></o:p></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0in;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-.25in;mso-list:l0 level1 lfo1;text-autospace:none'><![if !supportLists]><span style='font-family:Symbol'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>        </span></span></span><![endif]>The vulnerabilities of the existing <a name="OLE_LINK1"></a><a name="OLE_LINK2">SCIS </a>and potential attacks toward SCIS.<o:p></o:p></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0in;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-.25in;mso-list:l0 level1 lfo1;text-autospace:none'><![if !supportLists]><span style='font-family:Symbol'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>        </span></span></span><![endif]>Risk analysis and risk assessment of outsource data management of SCIS.<o:p></o:p></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0in;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-.25in;mso-list:l0 level1 lfo1;text-autospace:none'><![if !supportLists]><span style='font-family:Symbol'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>        </span></span></span><![endif]>Secure information sharing intra and inter-SCIS.<o:p></o:p></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0in;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-.25in;mso-list:l0 level1 lfo1;text-autospace:none'><![if !supportLists]><span style='font-family:Symbol'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>        </span></span></span><![endif]>Legal, economic, and policy issues related to SCIS.<o:p></o:p></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0in;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-.25in;mso-list:l0 level1 lfo1;text-autospace:none'><![if !supportLists]><span style='font-family:Symbol'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>        </span></span></span><![endif]>Physical infrastructure protection of SCIS.<o:p></o:p></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0in;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-.25in;mso-list:l0 level1 lfo1;text-autospace:none'><![if !supportLists]><span style='font-family:Symbol'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>        </span></span></span><![endif]>The impact of mobile computing and social networks to SCIS.<o:p></o:p></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0in;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-.25in;mso-list:l0 level1 lfo1;text-autospace:none'><![if !supportLists]><span style='font-family:Symbol'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>        </span></span></span><![endif]>Host and network intrusion and malware detection of SCIS<o:p></o:p></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0in;margin-bottom:.0001pt;mso-add-space:auto;text-autospace:none'><o:p> </o:p></p><p class=MsoListParagraphCxSpMiddle style='margin:0in;margin-bottom:.0001pt;mso-add-space:auto;text-autospace:none'>Paper submission due: February 22, 2013 <o:p></o:p></p><p class=MsoListParagraphCxSpMiddle style='margin:0in;margin-bottom:.0001pt;mso-add-space:auto;text-autospace:none'>Notification of acceptance: April 22, 2013<o:p></o:p></p><p class=MsoListParagraphCxSpLast style='margin:0in;margin-bottom:.0001pt;mso-add-space:auto;text-autospace:none'>Conference: August 15-17, 2013, Chicago, Illinois<o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p></div></body></html>