<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=us-ascii">
<meta name="Generator" content="Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
        {font-family:Wingdings;
        panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
        {font-family:"Cambria Math";
        panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
        {font-family:Calibri;
        panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
        {font-family:Consolas;
        panose-1:2 11 6 9 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
        {margin:0in;
        margin-bottom:.0001pt;
        font-size:11.0pt;
        font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
        {mso-style-priority:99;
        color:blue;
        text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
        {mso-style-priority:99;
        color:purple;
        text-decoration:underline;}
p.MsoPlainText, li.MsoPlainText, div.MsoPlainText
        {mso-style-priority:99;
        mso-style-link:"Plain Text Char";
        margin:0in;
        margin-bottom:.0001pt;
        font-size:11.0pt;
        font-family:"Calibri","sans-serif";}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
        {mso-style-priority:34;
        margin-top:0in;
        margin-right:0in;
        margin-bottom:0in;
        margin-left:.5in;
        margin-bottom:.0001pt;
        font-size:11.0pt;
        font-family:"Calibri","sans-serif";}
span.EmailStyle17
        {mso-style-type:personal-compose;
        font-family:"Calibri","sans-serif";
        color:windowtext;}
span.PlainTextChar
        {mso-style-name:"Plain Text Char";
        mso-style-priority:99;
        mso-style-link:"Plain Text";
        font-family:"Calibri","sans-serif";}
.MsoChpDefault
        {mso-style-type:export-only;}
@page WordSection1
        {size:8.5in 11.0in;
        margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
        {page:WordSection1;}
/* List Definitions */
@list l0
        {mso-list-id:191114560;
        mso-list-type:hybrid;
        mso-list-template-ids:1613254296 67698689 67698691 67698693 67698689 67698691 67698693 67698689 67698691 67698693;}
@list l0:level1
        {mso-level-number-format:bullet;
        mso-level-text:\F0B7;
        mso-level-tab-stop:none;
        mso-level-number-position:left;
        text-indent:-.25in;
        font-family:Symbol;}
@list l0:level2
        {mso-level-number-format:bullet;
        mso-level-text:o;
        mso-level-tab-stop:none;
        mso-level-number-position:left;
        text-indent:-.25in;
        font-family:"Courier New";}
@list l0:level3
        {mso-level-number-format:bullet;
        mso-level-text:\F0A7;
        mso-level-tab-stop:none;
        mso-level-number-position:left;
        text-indent:-.25in;
        font-family:Wingdings;}
@list l0:level4
        {mso-level-number-format:bullet;
        mso-level-text:\F0B7;
        mso-level-tab-stop:none;
        mso-level-number-position:left;
        text-indent:-.25in;
        font-family:Symbol;}
@list l0:level5
        {mso-level-number-format:bullet;
        mso-level-text:o;
        mso-level-tab-stop:none;
        mso-level-number-position:left;
        text-indent:-.25in;
        font-family:"Courier New";}
@list l0:level6
        {mso-level-number-format:bullet;
        mso-level-text:\F0A7;
        mso-level-tab-stop:none;
        mso-level-number-position:left;
        text-indent:-.25in;
        font-family:Wingdings;}
@list l0:level7
        {mso-level-number-format:bullet;
        mso-level-text:\F0B7;
        mso-level-tab-stop:none;
        mso-level-number-position:left;
        text-indent:-.25in;
        font-family:Symbol;}
@list l0:level8
        {mso-level-number-format:bullet;
        mso-level-text:o;
        mso-level-tab-stop:none;
        mso-level-number-position:left;
        text-indent:-.25in;
        font-family:"Courier New";}
@list l0:level9
        {mso-level-number-format:bullet;
        mso-level-text:\F0A7;
        mso-level-tab-stop:none;
        mso-level-number-position:left;
        text-indent:-.25in;
        font-family:Wingdings;}
ol
        {margin-bottom:0in;}
ul
        {margin-bottom:0in;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang="EN-US" link="blue" vlink="purple">
<div class="WordSection1">
<p class="MsoNormal"><span style="font-family:"Arial","sans-serif"">CALL FOR PAPERS<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-family:"Arial","sans-serif"">HICSS-47 (2014) (<a href="http://www.hicss.hawaii.edu">http://www.hicss.hawaii.edu</a>)  <o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-family:"Arial","sans-serif"">Minitrack: <b>
KM and Security</b> (<a href="http://www.hicss.hawaii.edu/hicss_47/track/ks/KS-Security.pdf">http://www.hicss.hawaii.edu/hicss_47/track/ks/KS-Security.pdf</a> )<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-family:"Arial","sans-serif"">January 6-9, 2014
<br>
Hilton Waikoloa, Big Island (<a href="http://www.hiltonwaikoloavillage.com">http://www.hiltonwaikoloavillage.com</a>)<br>
<br>
<b>Submission deadline</b>: <b>June 15, 2013</b> <br>
<br>
<o:p></o:p></span></p>
<p class="MsoNormal" style="text-autospace:none"><span style="font-family:"Arial","sans-serif";color:black">We have heard and read many times in the last several decades that the most important asset of an organization is the knowledge of its employees. While
 this knowledge can be a target of sophisticated cyber-attacks or fraud, most likely the leaking of knowledge can happen because of careless organizational practices, asset misuse, or behavior of employees. Organizations put in place many technology-based security
 measures (firewalls, filtering systems) to guard against attacks, yet it is not that easy to guard against the human-side of security practices. An organization can have the best security technology in place, yet a careless employee talking or emailing or
 posting on Facebook about the ‘new development’ at the company bypasses all this security technology with ease.
<o:p></o:p></span></p>
<p class="MsoNormal" style="text-autospace:none"><span style="font-family:"Arial","sans-serif";color:black"><o:p> </o:p></span></p>
<p class="MsoNormal" style="text-autospace:none"><span style="font-family:"Arial","sans-serif";color:black">Furthermore, one can find lot of information about current projects done by a company by searching the web. How can an organization effectively protect
 its intellectual property remains an unanswered question. What type of security and intelligence techniques are out that that can protect the intellectual property? What are the best ways to train employees so that they would spot potentially criminal activity,
 such as fraud, among employees? Could crowdsourcing be used in this case, meaning asking employees to vote on a particular issue to determine whether it represents a potential threat?
<o:p></o:p></span></p>
<p class="MsoNormal" style="text-autospace:none"><span style="font-family:"Arial","sans-serif";color:black"><o:p> </o:p></span></p>
<p class="MsoNormal" style="text-autospace:none"><span style="font-family:"Arial","sans-serif";color:black">This mini-track seeks papers that investigate issues related to security and protection of intellectual assets and explore how organizations can use
 security measures to protect their KM practices. Possible topics include, but are not limited to:<o:p></o:p></span></p>
<p class="MsoListParagraph" style="text-indent:-.25in;mso-list:l0 level1 lfo1;text-autospace:none">
<![if !supportLists]><span style="font-family:Symbol;color:black"><span style="mso-list:Ignore">·<span style="font:7.0pt "Times New Roman"">        
</span></span></span><![endif]><span style="font-family:"Arial","sans-serif";color:black">Securing intellectual assets;<o:p></o:p></span></p>
<p class="MsoListParagraph" style="text-indent:-.25in;mso-list:l0 level1 lfo1;text-autospace:none">
<![if !supportLists]><span style="font-family:Symbol;color:black"><span style="mso-list:Ignore">·<span style="font:7.0pt "Times New Roman"">        
</span></span></span><![endif]><span style="font-family:"Arial","sans-serif";color:black">Techniques used to scan employee communication channels (e.g., email, Facebook, text messages);
<o:p></o:p></span></p>
<p class="MsoListParagraph" style="text-indent:-.25in;mso-list:l0 level1 lfo1;text-autospace:none">
<![if !supportLists]><span style="font-family:Symbol;color:black"><span style="mso-list:Ignore">·<span style="font:7.0pt "Times New Roman"">        
</span></span></span><![endif]><span style="font-family:"Arial","sans-serif";color:black">Security strategies within and outside the company boundaries;<o:p></o:p></span></p>
<p class="MsoListParagraph" style="text-indent:-.25in;mso-list:l0 level1 lfo1;text-autospace:none">
<![if !supportLists]><span style="font-family:Symbol;color:black"><span style="mso-list:Ignore">·<span style="font:7.0pt "Times New Roman"">        
</span></span></span><![endif]><span style="font-family:"Arial","sans-serif";color:black">Training employees on potential threats to security breaches;<o:p></o:p></span></p>
<p class="MsoListParagraph" style="text-indent:-.25in;mso-list:l0 level1 lfo1;text-autospace:none">
<![if !supportLists]><span style="font-family:Symbol;color:black"><span style="mso-list:Ignore">·<span style="font:7.0pt "Times New Roman"">        
</span></span></span><![endif]><span style="font-family:"Arial","sans-serif";color:black">Preventative measures to secure KM assets;<o:p></o:p></span></p>
<p class="MsoListParagraph" style="text-indent:-.25in;mso-list:l0 level1 lfo1;text-autospace:none">
<![if !supportLists]><span style="font-family:Symbol;color:black"><span style="mso-list:Ignore">·<span style="font:7.0pt "Times New Roman"">        
</span></span></span><![endif]><span style="font-family:"Arial","sans-serif";color:black">Knowledge loss risk management;<o:p></o:p></span></p>
<p class="MsoListParagraph" style="text-indent:-.25in;mso-list:l0 level1 lfo1;text-autospace:none">
<![if !supportLists]><span style="font-family:Symbol;color:black"><span style="mso-list:Ignore">·<span style="font:7.0pt "Times New Roman"">        
</span></span></span><![endif]><span style="font-family:"Arial","sans-serif";color:black">Impact of immigration and cultural issues on potential KM security breach;<o:p></o:p></span></p>
<p class="MsoListParagraph" style="text-indent:-.25in;mso-list:l0 level1 lfo1;text-autospace:none">
<![if !supportLists]><span style="font-family:Symbol;color:black"><span style="mso-list:Ignore">·<span style="font:7.0pt "Times New Roman"">        
</span></span></span><![endif]><span style="font-family:"Arial","sans-serif";color:black">Using KM security to mitigate impacts of retirement and worker transience;<o:p></o:p></span></p>
<p class="MsoListParagraph" style="text-indent:-.25in;mso-list:l0 level1 lfo1;text-autospace:none">
<![if !supportLists]><span style="font-family:Symbol;color:black"><span style="mso-list:Ignore">·<span style="font:7.0pt "Times New Roman"">        
</span></span></span><![endif]><span style="font-family:"Arial","sans-serif";color:black">Measuring risk of knowledge loss due to security breach;<o:p></o:p></span></p>
<p class="MsoListParagraph" style="text-indent:-.25in;mso-list:l0 level1 lfo1;text-autospace:none">
<![if !supportLists]><span style="font-family:Symbol;color:black"><span style="mso-list:Ignore">·<span style="font:7.0pt "Times New Roman"">        
</span></span></span><![endif]><span style="font-family:"Arial","sans-serif";color:black">Security models and architectures for knowledge systems;<o:p></o:p></span></p>
<p class="MsoListParagraph" style="text-indent:-.25in;mso-list:l0 level1 lfo1;text-autospace:none">
<![if !supportLists]><span style="font-family:Symbol;color:black"><span style="mso-list:Ignore">·<span style="font:7.0pt "Times New Roman"">        
</span></span></span><![endif]><span style="font-family:"Arial","sans-serif";color:black">Modeling risk in knowledge systems;<o:p></o:p></span></p>
<p class="MsoListParagraph" style="text-indent:-.25in;mso-list:l0 level1 lfo1;text-autospace:none">
<![if !supportLists]><span style="font-family:Symbol;color:black"><span style="mso-list:Ignore">·<span style="font:7.0pt "Times New Roman"">        
</span></span></span><![endif]><span style="font-family:"Arial","sans-serif";color:black">Tradeoffs in knowledge systems between security and knowledge sharing;<o:p></o:p></span></p>
<p class="MsoListParagraph" style="text-indent:-.25in;mso-list:l0 level1 lfo1;text-autospace:none">
<![if !supportLists]><span style="font-family:Symbol;color:black"><span style="mso-list:Ignore">·<span style="font:7.0pt "Times New Roman"">        
</span></span></span><![endif]><span style="font-family:"Arial","sans-serif";color:black">Technologies for knowledge system security.<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText"><span style="font-family:"Arial","sans-serif";color:black">How to Submit a Paper: Follow Author Instructions on the conference web site:<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-family:"Arial","sans-serif""><a href="http://www.hicss.hawaii.edu/hicss_47/apahome47.htm">http://www.hicss.hawaii.edu/hicss_47/apahome47.htm</a><o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText"><span style="font-family:"Arial","sans-serif";color:black">HICSS papers must contain original material. They may not have been previously published, nor currently submitted elsewhere. All submissions undergo a double-blind peer review
 process; so initial submission must be without author names.<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-family:"Arial","sans-serif";color:black"><o:p> </o:p></span></p>
<p class="MsoPlainText"><span style="font-family:"Arial","sans-serif";color:black">Abstracts are optional, but strongly recommended. You may contact the Minitrack Chair(s) for guidance or verification of content.<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-family:"Arial","sans-serif";color:black"><o:p> </o:p></span></p>
<p class="MsoPlainText"><span style="font-family:"Arial","sans-serif";color:black">Submit a paper to only one Minitrack. If a paper is submitted to more than one minitrack, then either paper may be rejected by either minitrack without consultation with author
 or other chairs.  If you are not sure of the appropriate Minitrack, submit an abstract to the Track Chair(s) – see names and contact information below, for determination, and/or seek informal opinion(s) of Minitrack Chair(s) before submitting.<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-family:"Arial","sans-serif";color:black">Do not author or co-author more than 5 papers. This means that an individual may be listed as author or co-author on no more than 5 submitted papers. Track Chairs must approve
 any names added after submission or acceptance on August 15.<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-family:"Arial","sans-serif";color:black"><o:p> </o:p></span></p>
<p class="MsoPlainText"><b><span style="font-family:"Arial","sans-serif";color:black">Important 2013 Deadlines for Authors<o:p></o:p></span></b></p>
<p class="MsoPlainText"><b><span style="font-family:"Arial","sans-serif";color:black">June 1st</span></b><span style="font-family:"Arial","sans-serif";color:black"> - Submit an abstract/idea to any of the mini-track co-chairs.<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-family:"Arial","sans-serif";color:black"><o:p> </o:p></span></p>
<p class="MsoPlainText"><b><span style="font-family:"Arial","sans-serif";color:black">June 15</span></b><span style="font-family:"Arial","sans-serif";color:black"> -  Submit full manuscripts for review as instructed. The review is double-blind; therefore, this
 initial submission must be without author names.<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-family:"Arial","sans-serif";color:black"><o:p> </o:p></span></p>
<p class="MsoPlainText"><b><span style="font-family:"Arial","sans-serif";color:black">Aug 15</span></b><span style="font-family:"Arial","sans-serif";color:black"> - Review System emails Acceptance Notices to authors. It is very important that at least one author
 of each accepted paper attend the conference. Therefore, all travel guarantees – including visa or your organization’s fiscal funding procedures – should begin immediately.  Make sure your server accepts the review system address
</span><span class="MsoHyperlink"><span style="font-family:"Arial","sans-serif""><a href="https://precisionconference.com/~hicss">https://precisionconference.com/~hicss</a></span></span><span style="font-family:"Arial","sans-serif";color:black">.<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-family:"Arial","sans-serif";color:black"><o:p> </o:p></span></p>
<p class="MsoPlainText"><b><span style="font-family:"Arial","sans-serif";color:black">Sept 15 -</span></b><span style="font-family:"Arial","sans-serif";color:black">  SUBMIT FINAL PAPER. Add author names to your paper, and submit your Final Paper for Publication
 to the site provided in your Acceptance Notice. (This URL is not public knowledge.) Oct 1 - Early Registration fee deadline. At least one author of each paper should register by this date in order secure publication in the Proceedings. Fees will increase on
 Oct 2 and Dec 2.<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-family:"Arial","sans-serif";color:black"><o:p> </o:p></span></p>
<p class="MsoPlainText"><b><span style="font-family:"Arial","sans-serif";color:black">Oct 15</span></b><span style="font-family:"Arial","sans-serif";color:black"> - Papers without at least one paid-in-full registered author may be deleted from the Proceedings
 and not scheduled for presentation; authors will be so notified by the Conference Office.<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-family:"Arial","sans-serif";color:black"><o:p> </o:p></span></p>
<p class="MsoNormal"><span style="font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoNormal" style="text-autospace:none"><b><span style="font-family:"Arial","sans-serif";color:black">Minitrack Leaders<o:p></o:p></span></b></p>
<p class="MsoNormal" style="text-autospace:none"><b><span style="font-family:"Arial","sans-serif";color:black">Alexandra Durcikova (primary contact)<o:p></o:p></span></b></p>
<p class="MsoNormal" style="text-autospace:none"><span style="font-family:"Arial","sans-serif";color:black">Division of MIS<o:p></o:p></span></p>
<p class="MsoNormal" style="text-autospace:none"><span style="font-family:"Arial","sans-serif";color:black">Price College of Business<o:p></o:p></span></p>
<p class="MsoNormal" style="text-autospace:none"><span style="font-family:"Arial","sans-serif";color:black">The University of Oklahoma<o:p></o:p></span></p>
<p class="MsoNormal" style="text-autospace:none"><span style="font-family:"Arial","sans-serif";color:black">Norman, OK, USA<o:p></o:p></span></p>
<p class="MsoNormal" style="text-autospace:none"><span style="font-family:"Arial","sans-serif";color:black">Tel: 450-325-3213<o:p></o:p></span></p>
<p class="MsoNormal" style="text-autospace:none"><span style="font-family:"Arial","sans-serif";color:black">Email: alex@ou.edu<o:p></o:p></span></p>
<p class="MsoNormal" style="text-autospace:none"><b><span style="font-family:"Arial","sans-serif";color:black"><o:p> </o:p></span></b></p>
<p class="MsoNormal" style="text-autospace:none"><b><span style="font-family:"Arial","sans-serif";color:black">Murray E. Jennex<o:p></o:p></span></b></p>
<p class="MsoNormal" style="text-autospace:none"><span style="font-family:"Arial","sans-serif";color:black">Information and Decision Science<o:p></o:p></span></p>
<p class="MsoNormal" style="text-autospace:none"><span style="font-family:"Arial","sans-serif";color:black">San Diego State University<o:p></o:p></span></p>
<p class="MsoNormal" style="text-autospace:none"><span style="font-family:"Arial","sans-serif";color:black">San Diego, CA, USA<o:p></o:p></span></p>
<p class="MsoNormal" style="text-autospace:none"><span style="font-family:"Arial","sans-serif";color:black">Tel: (760) 966-0548<o:p></o:p></span></p>
<p class="MsoNormal" style="text-autospace:none"><span style="font-family:"Arial","sans-serif";color:black">Fax: (760) 722-2668<o:p></o:p></span></p>
<p class="MsoNormal" style="text-autospace:none"><span style="font-family:"Arial","sans-serif";color:black">Email:
</span><span style="font-family:"Arial","sans-serif";color:blue">Murphjen@aol.com</span><span style="font-family:"Arial","sans-serif";color:black">, mjennex@mail.sdsu.edu<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoNormal"><span style="font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
</div>
</body>
</html>