<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40"><head><META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=us-ascii"><meta name=Generator content="Microsoft Word 15 (filtered medium)"><style><!--
/* Font Definitions */
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
{font-family:TimesNewRomanPS-BoldMT;
panose-1:0 0 0 0 0 0 0 0 0 0;}
@font-face
{font-family:Times-Roman;
panose-1:0 0 0 0 0 0 0 0 0 0;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin:0in;
margin-bottom:.0001pt;
font-size:11.0pt;
font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:#0563C1;
text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
{mso-style-priority:99;
color:#954F72;
text-decoration:underline;}
p.MsoPlainText, li.MsoPlainText, div.MsoPlainText
{mso-style-priority:99;
mso-style-link:"Plain Text Char";
margin:0in;
margin-bottom:.0001pt;
font-size:11.0pt;
font-family:"Calibri","sans-serif";}
span.EmailStyle17
{mso-style-type:personal-compose;
font-family:"Calibri","sans-serif";
color:windowtext;}
span.PlainTextChar
{mso-style-name:"Plain Text Char";
mso-style-priority:99;
mso-style-link:"Plain Text";
font-family:"Calibri","sans-serif";}
.MsoChpDefault
{mso-style-type:export-only;
font-family:"Calibri","sans-serif";}
@page WordSection1
{size:8.5in 11.0in;
margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]--></head><body lang=EN-US link="#0563C1" vlink="#954F72"><div class=WordSection1><p class=MsoPlainText>Dear Colleagues,<o:p></o:p></p><p class=MsoPlainText><o:p> </o:p></p><p class=MsoPlainText>We invite you to submit your manuscripts to our mini-track "Infrastructure Security" at the 47th Annual Hawaii International Conference on Systems Sciences (HICSS).<o:p></o:p></p><p class=MsoPlainText><o:p> </o:p></p><p class=MsoPlainText>The mini-track description and CFP can be found at <a href="http://www.hicss.hawaii.edu/hicss_47/track/eg/EG-Infrastructure.pdf">http://www.hicss.hawaii.edu/hicss_47/track/eg/EG-Infrastructure.pdf</a><o:p></o:p></p><p class=MsoPlainText><o:p> </o:p></p><p class=MsoPlainText>Submission deadline is June 15, 2013. Other important dates available at: <a href="http://www.hicss.hawaii.edu/hicss_47/47cfp.pdf">http://www.hicss.hawaii.edu/hicss_47/47cfp.pdf</a><o:p></o:p></p><p class=MsoPlainText><o:p> </o:p></p><p class=MsoPlainText>Mahalo,<o:p></o:p></p><p class=MsoPlainText><o:p> </o:p></p><p class=MsoPlainText>Art, Ray and Greg<o:p></o:p></p><p class=MsoPlainText><o:p> </o:p></p><p class=MsoNormal style='text-autospace:none'><b><span style='font-size:14.0pt;font-family:"TimesNewRomanPS-BoldMT","sans-serif"'>Minitrack: Infrastructure Security<o:p></o:p></span></b></p><p class=MsoNormal style='text-autospace:none'><span style='font-size:10.0pt;font-family:"Times-Roman","sans-serif"'><o:p> </o:p></span></p><p class=MsoNormal style='text-autospace:none'><span style='font-size:10.0pt;font-family:"Times-Roman","sans-serif"'>The cybersecurity aspects of critical infrastructure systems has become a hot topic for countries all across the globe. Information Technology has become pervasive in all aspects of our lives and this includes elements referred to as critical infrastructures. This minitrack examines aspects associated with the security of information technology used by governments and critical infrastructures (with an emphasis on automated control systems) and explores ways that IT can enhance the ability of governments to ensure the safety and security of its citizens. The names for these systems vary, from industrial control systems to SCADA to process control networks and more. The systems they control range from electricity (SmartGrid), pipelines, chemical plants, manufacturing, traffic control and more. If a computer is interfaced to a physical system and it is important for safety or process control, odds are it fits in this minitrack.<o:p></o:p></span></p><p class=MsoNormal style='text-autospace:none'><span style='font-size:10.0pt;font-family:"Times-Roman","sans-serif"'><o:p> </o:p></span></p><p class=MsoNormal style='text-autospace:none'><span style='font-size:10.0pt;font-family:"Times-Roman","sans-serif"'>Governments have also embraced IT to interface with citizens in a more efficient manner. Security issues have risen to the forefront as a result of data disclosures and identity theft incidents discussed in mainstream media. Other issues include intellectual property theft and criminal acts involving computers.<o:p></o:p></span></p><p class=MsoNormal style='text-autospace:none'><span style='font-size:10.0pt;font-family:"Times-Roman","sans-serif"'>Although 85% of the US critical infrastructure components are privately owned and operated, government has a place at the table regarding regulation and operating rules. Many foreign governments have more control over their infrastructure, but in the end, security is still an important topic that needs to be addressed.<o:p></o:p></span></p><p class=MsoNormal style='text-autospace:none'><span style='font-size:10.0pt;font-family:"Times-Roman","sans-serif"'><o:p> </o:p></span></p><p class=MsoNormal style='text-autospace:none'><span style='font-size:10.0pt;font-family:"Times-Roman","sans-serif"'>Topics acceptable to this minitrack can range from technical, to process, to people-related as security is a result of these main topics working together. Topics and research areas include, but are not limited to:<o:p></o:p></span></p><p class=MsoNormal style='text-autospace:none'><span style='font-size:10.0pt;font-family:"Times-Roman","sans-serif"'><o:p> </o:p></span></p><p class=MsoNormal style='text-autospace:none'><span style='font-size:10.0pt;font-family:"Times-Roman","sans-serif"'>1. Systems for governments to respond to security events<o:p></o:p></span></p><p class=MsoNormal style='text-autospace:none'><span style='font-size:10.0pt;font-family:"Times-Roman","sans-serif"'>2. Critical Infrastructure Protection (CIP)<o:p></o:p></span></p><p class=MsoNormal style='text-autospace:none'><span style='font-size:10.0pt;font-family:"Times-Roman","sans-serif"'>3. Cyber Physical Systems security<o:p></o:p></span></p><p class=MsoNormal style='text-autospace:none'><span style='font-size:10.0pt;font-family:"Times-Roman","sans-serif"'>4. Supervisory Control and Data Acquisition (SCADA) and control systems<o:p></o:p></span></p><p class=MsoNormal style='text-autospace:none'><span style='font-size:10.0pt;font-family:"Times-Roman","sans-serif"'>5. Information Assurance and Trusted Computing<o:p></o:p></span></p><p class=MsoNormal style='text-autospace:none'><span style='font-size:10.0pt;font-family:"Times-Roman","sans-serif"'>6. Security Related Information Sharing<o:p></o:p></span></p><p class=MsoNormal style='text-autospace:none'><span style='font-size:10.0pt;font-family:"Times-Roman","sans-serif"'>7. Information Security Economics<o:p></o:p></span></p><p class=MsoNormal style='text-autospace:none'><span style='font-size:10.0pt;font-family:"Times-Roman","sans-serif"'>8. Information Warfare<o:p></o:p></span></p><p class=MsoNormal style='text-autospace:none'><span style='font-size:10.0pt;font-family:"Times-Roman","sans-serif"'>9. Incident Response<o:p></o:p></span></p><p class=MsoNormal style='text-autospace:none'><span style='font-size:10.0pt;font-family:"Times-Roman","sans-serif"'>10. Digital Forensics<o:p></o:p></span></p><p class=MsoNormal style='text-autospace:none'><span style='font-size:10.0pt;font-family:"Times-Roman","sans-serif"'>11. Privacy and Freedom of Information<o:p></o:p></span></p><p class=MsoNormal style='text-autospace:none'><span style='font-size:10.0pt;font-family:"Times-Roman","sans-serif"'>12. Security Management<o:p></o:p></span></p><p class=MsoNormal style='text-autospace:none'><span style='font-size:10.0pt;font-family:"Times-Roman","sans-serif"'>13. Laws and Regulation of IT Security<o:p></o:p></span></p><p class=MsoNormal style='text-autospace:none'><span style='font-size:10.0pt;font-family:"Times-Roman","sans-serif"'>14. Security concerns of new technologies, e.g. Social Media, mobile computing<o:p></o:p></span></p><p class=MsoNormal style='text-autospace:none'><span style='font-size:10.0pt;font-family:"Times-Roman","sans-serif"'>15. Government Disaster Recovery and Business Continuity<o:p></o:p></span></p><p class=MsoPlainText><span style='font-size:10.0pt;font-family:"Times-Roman","sans-serif"'>16. Case Reports Related to Security Experiences Within Government</span><o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>Wm. Arthur Conklin, PhD<o:p></o:p></p><p class=MsoNormal>CISSP, CSSLP, CSDP, CRISC, Security+, CASP, IAM, IEM, DFCP<o:p></o:p></p><p class=MsoNormal>Associate Professor, Department of Information & Logistics Technology<o:p></o:p></p><p class=MsoNormal>Director, Center for Information Security Research and Education <o:p></o:p></p><p class=MsoNormal>College of Technology <o:p></o:p></p><p class=MsoNormal>University of Houston <o:p></o:p></p><p class=MsoNormal>312 Technology Building<o:p></o:p></p><p class=MsoNormal>Houston, TX 77204<o:p></o:p></p><p class=MsoNormal>(713) 743-1556 (o)<o:p></o:p></p><p class=MsoNormal>(210) 379-3671 (c) <o:p></o:p></p><p class=MsoNormal>(713) 743-4032 (f)<o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>A Carnegie-designated Tier One public research university<o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>http://tech.uh.edu/faculty/conklin<o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p></div></body></html>