<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML xmlns:o = "urn:schemas-microsoft-com:office:office"><HEAD>
<META content="text/html; charset=UTF-8" http-equiv=Content-Type>
<META name=GENERATOR content="MSHTML 10.00.9200.16618"></HEAD>
<BODY id=role_body style="FONT-SIZE: 10pt; FONT-FAMILY: Arial; COLOR: #000000"
bottomMargin=7 leftMargin=7 rightMargin=7 topMargin=7><FONT id=role_document
color=#000000 size=2 face=Arial>
<DIV>
<DIV>
<P class=MsoNormal><SPAN style="FONT-FAMILY: 'Arial','sans-serif'">This is a
unique minitrack combining the sharing of knowledge management with the need for
security, if you are interested in tackling these interesting issues then we'd
love to see your work!</SPAN></P>
<P class=MsoNormal><SPAN style="FONT-FAMILY: 'Arial','sans-serif'">Final CALL
FOR PAPERS<o:p></o:p></SPAN></P>
<P class=MsoNormal><SPAN style="FONT-FAMILY: 'Arial','sans-serif'">HICSS-47
(2014) (<A title=http://www.hicss.hawaii.edu/
href="http://www.hicss.hawaii.edu/">http://www.hicss.hawaii.edu</A>)
<o:p></o:p></SPAN></P>
<P class=MsoNormal><SPAN style="FONT-FAMILY: 'Arial','sans-serif'">Minitrack:
<B>KM and Security</B> (<A
title=http://www.hicss.hawaii.edu/hicss_47/track/ks/KS-Security.pdf
href="http://www.hicss.hawaii.edu/hicss_47/track/ks/KS-Security.pdf">http://www.hicss.hawaii.edu/hicss_47/track/ks/KS-Security.pdf</A>
)<o:p></o:p></SPAN></P>
<P class=MsoNormal><SPAN style="FONT-FAMILY: 'Arial','sans-serif'">January 6-9,
2014 <BR>Hilton Waikoloa, Big Island (<A
title=http://www.hiltonwaikoloavillage.com/
href="http://www.hiltonwaikoloavillage.com/">http://www.hiltonwaikoloavillage.com</A>)<BR><BR><B>Submission
deadline</B>: <B>June 15, 2013</B> <BR><BR><o:p></o:p></SPAN></P>
<P class=MsoNormal style="TEXT-AUTOSPACE: "><SPAN
style="FONT-FAMILY: 'Arial','sans-serif'; COLOR: black">We have heard and read
many times in the last several decades that the most important asset of an
organization is the knowledge of its employees. While this knowledge can be a
target of sophisticated cyber-attacks or fraud, most likely the leaking of
knowledge can happen because of careless organizational practices, asset misuse,
or behavior of employees. Organizations put in place many technology-based
security measures (firewalls, filtering systems) to guard against attacks, yet
it is not that easy to guard against the human-side of security practices. An
organization can have the best security technology in place, yet a careless
employee talking or emailing or posting on Facebook about the ‘new development’
at the company bypasses all this security technology with ease.
<o:p></o:p></SPAN></P>
<P class=MsoNormal style="TEXT-AUTOSPACE: "><SPAN
style="FONT-FAMILY: 'Arial','sans-serif'; COLOR: black"><o:p></o:p></SPAN></P>
<P class=MsoNormal style="TEXT-AUTOSPACE: "><SPAN
style="FONT-FAMILY: 'Arial','sans-serif'; COLOR: black">Furthermore, one can
find lot of information about current projects done by a company by searching
the web. How can an organization effectively protect its intellectual property
remains an unanswered question. What type of security and intelligence
techniques are out that that can protect the intellectual property? What are the
best ways to train employees so that they would spot potentially criminal
activity, such as fraud, among employees? Could crowdsourcing be used in this
case, meaning asking employees to vote on a particular issue to determine
whether it represents a potential threat? <o:p></o:p></SPAN></P>
<P class=MsoNormal style="TEXT-AUTOSPACE: "><SPAN
style="FONT-FAMILY: 'Arial','sans-serif'; COLOR: black"><o:p></o:p></SPAN></P>
<P class=MsoNormal style="TEXT-AUTOSPACE: "><SPAN
style="FONT-FAMILY: 'Arial','sans-serif'; COLOR: black">This mini-track seeks
papers that investigate issues related to security and protection of
intellectual assets and explore how organizations can use security measures to
protect their KM practices. Possible topics include, but are not limited
to:<o:p></o:p></SPAN></P>
<P class=MsoListParagraph
style="TEXT-AUTOSPACE: ; TEXT-INDENT: -0.25in; mso-list: l0 level1 lfo1"><SPAN
style="FONT-FAMILY: Symbol; COLOR: black"><SPAN style="mso-list: Ignore">·<SPAN
style="FONT: 7pt 'Times New Roman'">
</SPAN></SPAN></SPAN><SPAN
style="FONT-FAMILY: 'Arial','sans-serif'; COLOR: black">Securing intellectual
assets;<o:p></o:p></SPAN></P>
<P class=MsoListParagraph
style="TEXT-AUTOSPACE: ; TEXT-INDENT: -0.25in; mso-list: l0 level1 lfo1"><SPAN
style="FONT-FAMILY: Symbol; COLOR: black"><SPAN style="mso-list: Ignore">·<SPAN
style="FONT: 7pt 'Times New Roman'">
</SPAN></SPAN></SPAN><SPAN
style="FONT-FAMILY: 'Arial','sans-serif'; COLOR: black">Techniques used to scan
employee communication channels (e.g., email, Facebook, text messages);
<o:p></o:p></SPAN></P>
<P class=MsoListParagraph
style="TEXT-AUTOSPACE: ; TEXT-INDENT: -0.25in; mso-list: l0 level1 lfo1"><SPAN
style="FONT-FAMILY: Symbol; COLOR: black"><SPAN style="mso-list: Ignore">·<SPAN
style="FONT: 7pt 'Times New Roman'">
</SPAN></SPAN></SPAN><SPAN
style="FONT-FAMILY: 'Arial','sans-serif'; COLOR: black">Security strategies
within and outside the company boundaries;<o:p></o:p></SPAN></P>
<P class=MsoListParagraph
style="TEXT-AUTOSPACE: ; TEXT-INDENT: -0.25in; mso-list: l0 level1 lfo1"><SPAN
style="FONT-FAMILY: Symbol; COLOR: black"><SPAN style="mso-list: Ignore">·<SPAN
style="FONT: 7pt 'Times New Roman'">
</SPAN></SPAN></SPAN><SPAN
style="FONT-FAMILY: 'Arial','sans-serif'; COLOR: black">Training employees on
potential threats to security breaches;<o:p></o:p></SPAN></P>
<P class=MsoListParagraph
style="TEXT-AUTOSPACE: ; TEXT-INDENT: -0.25in; mso-list: l0 level1 lfo1"><SPAN
style="FONT-FAMILY: Symbol; COLOR: black"><SPAN style="mso-list: Ignore">·<SPAN
style="FONT: 7pt 'Times New Roman'">
</SPAN></SPAN></SPAN><SPAN
style="FONT-FAMILY: 'Arial','sans-serif'; COLOR: black">Preventative measures to
secure KM assets;<o:p></o:p></SPAN></P>
<P class=MsoListParagraph
style="TEXT-AUTOSPACE: ; TEXT-INDENT: -0.25in; mso-list: l0 level1 lfo1"><SPAN
style="FONT-FAMILY: Symbol; COLOR: black"><SPAN style="mso-list: Ignore">·<SPAN
style="FONT: 7pt 'Times New Roman'">
</SPAN></SPAN></SPAN><SPAN
style="FONT-FAMILY: 'Arial','sans-serif'; COLOR: black">Knowledge loss risk
management;<o:p></o:p></SPAN></P>
<P class=MsoListParagraph
style="TEXT-AUTOSPACE: ; TEXT-INDENT: -0.25in; mso-list: l0 level1 lfo1"><SPAN
style="FONT-FAMILY: Symbol; COLOR: black"><SPAN style="mso-list: Ignore">·<SPAN
style="FONT: 7pt 'Times New Roman'">
</SPAN></SPAN></SPAN><SPAN
style="FONT-FAMILY: 'Arial','sans-serif'; COLOR: black">Impact of immigration
and cultural issues on potential KM security breach;<o:p></o:p></SPAN></P>
<P class=MsoListParagraph
style="TEXT-AUTOSPACE: ; TEXT-INDENT: -0.25in; mso-list: l0 level1 lfo1"><SPAN
style="FONT-FAMILY: Symbol; COLOR: black"><SPAN style="mso-list: Ignore">·<SPAN
style="FONT: 7pt 'Times New Roman'">
</SPAN></SPAN></SPAN><SPAN
style="FONT-FAMILY: 'Arial','sans-serif'; COLOR: black">Using KM security to
mitigate impacts of retirement and worker transience;<o:p></o:p></SPAN></P>
<P class=MsoListParagraph
style="TEXT-AUTOSPACE: ; TEXT-INDENT: -0.25in; mso-list: l0 level1 lfo1"><SPAN
style="FONT-FAMILY: Symbol; COLOR: black"><SPAN style="mso-list: Ignore">·<SPAN
style="FONT: 7pt 'Times New Roman'">
</SPAN></SPAN></SPAN><SPAN
style="FONT-FAMILY: 'Arial','sans-serif'; COLOR: black">Measuring risk of
knowledge loss due to security breach;<o:p></o:p></SPAN></P>
<P class=MsoListParagraph
style="TEXT-AUTOSPACE: ; TEXT-INDENT: -0.25in; mso-list: l0 level1 lfo1"><SPAN
style="FONT-FAMILY: Symbol; COLOR: black"><SPAN style="mso-list: Ignore">·<SPAN
style="FONT: 7pt 'Times New Roman'">
</SPAN></SPAN></SPAN><SPAN
style="FONT-FAMILY: 'Arial','sans-serif'; COLOR: black">Security models and
architectures for knowledge systems;<o:p></o:p></SPAN></P>
<P class=MsoListParagraph
style="TEXT-AUTOSPACE: ; TEXT-INDENT: -0.25in; mso-list: l0 level1 lfo1"><SPAN
style="FONT-FAMILY: Symbol; COLOR: black"><SPAN style="mso-list: Ignore">·<SPAN
style="FONT: 7pt 'Times New Roman'">
</SPAN></SPAN></SPAN><SPAN
style="FONT-FAMILY: 'Arial','sans-serif'; COLOR: black">Modeling risk in
knowledge systems;<o:p></o:p></SPAN></P>
<P class=MsoListParagraph
style="TEXT-AUTOSPACE: ; TEXT-INDENT: -0.25in; mso-list: l0 level1 lfo1"><SPAN
style="FONT-FAMILY: Symbol; COLOR: black"><SPAN style="mso-list: Ignore">·<SPAN
style="FONT: 7pt 'Times New Roman'">
</SPAN></SPAN></SPAN><SPAN
style="FONT-FAMILY: 'Arial','sans-serif'; COLOR: black">Tradeoffs in knowledge
systems between security and knowledge sharing;<o:p></o:p></SPAN></P>
<P class=MsoListParagraph
style="TEXT-AUTOSPACE: ; TEXT-INDENT: -0.25in; mso-list: l0 level1 lfo1"><SPAN
style="FONT-FAMILY: Symbol; COLOR: black"><SPAN style="mso-list: Ignore">·<SPAN
style="FONT: 7pt 'Times New Roman'">
</SPAN></SPAN></SPAN><SPAN
style="FONT-FAMILY: 'Arial','sans-serif'; COLOR: black">Technologies for
knowledge system security.<o:p></o:p></SPAN></P>
<P class=MsoNormal><SPAN
style="FONT-FAMILY: 'Arial','sans-serif'"><o:p> </o:p></SPAN></P>
<P class=MsoPlainText><SPAN
style="FONT-FAMILY: 'Arial','sans-serif'; COLOR: black">How to Submit a Paper:
Follow Author Instructions on the conference web site:<o:p></o:p></SPAN></P>
<P class=MsoPlainText><SPAN style="FONT-FAMILY: 'Arial','sans-serif'"><A
title=http://www.hicss.hawaii.edu/hicss_47/apahome47.htm
href="http://www.hicss.hawaii.edu/hicss_47/apahome47.htm">http://www.hicss.hawaii.edu/hicss_47/apahome47.htm</A><o:p></o:p></SPAN></P>
<P class=MsoPlainText><SPAN
style="FONT-FAMILY: 'Arial','sans-serif'"><o:p> </o:p></SPAN></P>
<P class=MsoPlainText><SPAN
style="FONT-FAMILY: 'Arial','sans-serif'; COLOR: black">HICSS papers must
contain original material. They may not have been previously published, nor
currently submitted elsewhere. All submissions undergo a double-blind peer
review process; so initial submission must be without author
names.<o:p></o:p></SPAN></P>
<P class=MsoPlainText><SPAN
style="FONT-FAMILY: 'Arial','sans-serif'; COLOR: black"><o:p></o:p></SPAN></P>
<P class=MsoPlainText><SPAN
style="FONT-FAMILY: 'Arial','sans-serif'; COLOR: black">Abstracts are optional,
but strongly recommended. You may contact the Minitrack Chair(s) for guidance or
verification of content.<o:p></o:p></SPAN></P>
<P class=MsoPlainText><SPAN
style="FONT-FAMILY: 'Arial','sans-serif'; COLOR: black"><o:p></o:p></SPAN></P>
<P class=MsoPlainText><SPAN
style="FONT-FAMILY: 'Arial','sans-serif'; COLOR: black">Submit a paper to only
one Minitrack. If a paper is submitted to more than one minitrack, then either
paper may be rejected by either minitrack without consultation with author or
other chairs. If you are not sure of the appropriate Minitrack, submit an
abstract to the Track Chair(s) – see names and contact information below, for
determination, and/or seek informal opinion(s) of Minitrack Chair(s) before
submitting.<o:p></o:p></SPAN></P>
<P class=MsoPlainText><SPAN
style="FONT-FAMILY: 'Arial','sans-serif'; COLOR: black">Do not author or
co-author more than 5 papers. This means that an individual may be listed as
author or co-author on no more than 5 submitted papers. Track Chairs must
approve any names added after submission or acceptance on August
15.<o:p></o:p></SPAN></P>
<P class=MsoPlainText><SPAN
style="FONT-FAMILY: 'Arial','sans-serif'; COLOR: black"><o:p> </o:p></SPAN></P>
<P class=MsoPlainText><B><SPAN
style="FONT-FAMILY: 'Arial','sans-serif'; COLOR: black">Important 2013 Deadlines
for Authors<o:p></o:p></SPAN></B></P>
<P class=MsoPlainText><B><SPAN
style="FONT-FAMILY: 'Arial','sans-serif'; COLOR: black">June 15</SPAN></B><SPAN
style="FONT-FAMILY: 'Arial','sans-serif'; COLOR: black"> - Submit full
manuscripts for review as instructed. The review is double-blind; therefore,
this initial submission must be without author names.<o:p></o:p></SPAN></P>
<P class=MsoPlainText><SPAN
style="FONT-FAMILY: 'Arial','sans-serif'; COLOR: black"><o:p> </o:p></SPAN></P>
<P class=MsoPlainText><B><SPAN
style="FONT-FAMILY: 'Arial','sans-serif'; COLOR: black">Aug 15</SPAN></B><SPAN
style="FONT-FAMILY: 'Arial','sans-serif'; COLOR: black"> - Review System emails
Acceptance Notices to authors. It is very important that at least one author of
each accepted paper attend the conference. Therefore, all travel guarantees –
including visa or your organization’s fiscal funding procedures – should begin
immediately. Make sure your server accepts the review system address
</SPAN><SPAN class=MsoHyperlink><SPAN
style="FONT-FAMILY: 'Arial','sans-serif'"><A
title=https://precisionconference.com/~hicss
href="https://precisionconference.com/~hicss">https://precisionconference.com/~hicss</A></SPAN></SPAN><SPAN
style="FONT-FAMILY: 'Arial','sans-serif'; COLOR: black">.<o:p></o:p></SPAN></P>
<P class=MsoPlainText><SPAN
style="FONT-FAMILY: 'Arial','sans-serif'; COLOR: black"><o:p> </o:p></SPAN></P>
<P class=MsoPlainText><B><SPAN
style="FONT-FAMILY: 'Arial','sans-serif'; COLOR: black">Sept 15
-</SPAN></B><SPAN style="FONT-FAMILY: 'Arial','sans-serif'; COLOR: black">
SUBMIT FINAL PAPER. Add author names to your paper, and submit your Final Paper
for Publication to the site provided in your Acceptance Notice. (This URL is not
public knowledge.) Oct 1 - Early Registration fee deadline. At least one author
of each paper should register by this date in order secure publication in the
Proceedings. Fees will increase on Oct 2 and Dec 2.<o:p></o:p></SPAN></P>
<P class=MsoPlainText><SPAN
style="FONT-FAMILY: 'Arial','sans-serif'; COLOR: black"><o:p> </o:p></SPAN></P>
<P class=MsoPlainText><B><SPAN
style="FONT-FAMILY: 'Arial','sans-serif'; COLOR: black">Oct 15</SPAN></B><SPAN
style="FONT-FAMILY: 'Arial','sans-serif'; COLOR: black"> - Papers without at
least one paid-in-full registered author may be deleted from the Proceedings and
not scheduled for presentation; authors will be so notified by the Conference
Office.<o:p></o:p></SPAN></P>
<P class=MsoPlainText><SPAN
style="FONT-FAMILY: 'Arial','sans-serif'; COLOR: black"><o:p></o:p></SPAN></P>
<P class=MsoNormal><SPAN
style="FONT-FAMILY: 'Arial','sans-serif'"><o:p></o:p></SPAN></P>
<P class=MsoNormal style="TEXT-AUTOSPACE: "><B><SPAN
style="FONT-FAMILY: 'Arial','sans-serif'; COLOR: black"></SPAN></B><B><SPAN
style="FONT-FAMILY: 'Arial','sans-serif'; COLOR: black"></SPAN></B> </P>
<P class=MsoNormal style="TEXT-AUTOSPACE: "><B><SPAN
style="FONT-FAMILY: 'Arial','sans-serif'; COLOR: black">Minitrack
Leaders<o:p></o:p></SPAN></B></P>
<P class=MsoNormal style="TEXT-AUTOSPACE: "><B><SPAN
style="FONT-FAMILY: 'Arial','sans-serif'; COLOR: black">Alexandra Durcikova
(primary contact)<o:p></o:p></SPAN></B></P>
<P class=MsoNormal style="TEXT-AUTOSPACE: "><SPAN
style="FONT-FAMILY: 'Arial','sans-serif'; COLOR: black">Division of
MIS<o:p></o:p></SPAN></P>
<P class=MsoNormal style="TEXT-AUTOSPACE: "><SPAN
style="FONT-FAMILY: 'Arial','sans-serif'; COLOR: black">Price College of
Business<o:p></o:p></SPAN></P>
<P class=MsoNormal style="TEXT-AUTOSPACE: "><SPAN
style="FONT-FAMILY: 'Arial','sans-serif'; COLOR: black">The University of
Oklahoma<o:p></o:p></SPAN></P>
<P class=MsoNormal style="TEXT-AUTOSPACE: "><SPAN
style="FONT-FAMILY: 'Arial','sans-serif'; COLOR: black">Norman, OK,
USA<o:p></o:p></SPAN></P>
<P class=MsoNormal style="TEXT-AUTOSPACE: "><SPAN
style="FONT-FAMILY: 'Arial','sans-serif'; COLOR: black">Tel:
450-325-3213<o:p></o:p></SPAN></P>
<P class=MsoNormal style="TEXT-AUTOSPACE: "><SPAN
style="FONT-FAMILY: 'Arial','sans-serif'; COLOR: black">Email:
alex@ou.edu<o:p></o:p></SPAN></P>
<P class=MsoNormal style="TEXT-AUTOSPACE: "><B><SPAN
style="FONT-FAMILY: 'Arial','sans-serif'; COLOR: black"><o:p> </o:p></SPAN></B></P>
<P class=MsoNormal style="TEXT-AUTOSPACE: "><B><SPAN
style="FONT-FAMILY: 'Arial','sans-serif'; COLOR: black">Murray E.
Jennex<o:p></o:p></SPAN></B></P>
<P class=MsoNormal style="TEXT-AUTOSPACE: "><SPAN
style="FONT-FAMILY: 'Arial','sans-serif'; COLOR: black">Management
Information Systems</SPAN></P>
<P class=MsoNormal style="TEXT-AUTOSPACE: "><SPAN
style="FONT-FAMILY: 'Arial','sans-serif'; COLOR: black">San Diego State
University<o:p></o:p></SPAN></P>
<P class=MsoNormal style="TEXT-AUTOSPACE: "><SPAN
style="FONT-FAMILY: 'Arial','sans-serif'; COLOR: black">San Diego, CA,
USA<o:p></o:p></SPAN></P>
<P class=MsoNormal style="TEXT-AUTOSPACE: "><SPAN
style="FONT-FAMILY: 'Arial','sans-serif'; COLOR: black">Tel: (760)
966-0548<o:p></o:p></SPAN></P>
<P class=MsoNormal style="TEXT-AUTOSPACE: "><SPAN
style="FONT-FAMILY: 'Arial','sans-serif'; COLOR: black">Fax: (760)
722-2668<o:p></o:p></SPAN></P>
<P class=MsoNormal style="TEXT-AUTOSPACE: "><SPAN
style="FONT-FAMILY: 'Arial','sans-serif'; COLOR: black">Email: </SPAN><SPAN
style="FONT-FAMILY: 'Arial','sans-serif'; COLOR: blue">Murphjen@aol.com</SPAN><SPAN
style="FONT-FAMILY: 'Arial','sans-serif'; COLOR: black">,
mjennex@mail.sdsu.edu<o:p></o:p></SPAN></P></DIV></DIV></FONT></BODY></HTML>