<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40"><head><META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=us-ascii"><meta name=Generator content="Microsoft Word 12 (filtered medium)"><style><!--
/* Font Definitions */
@font-face
        {font-family:"Cambria Math";
        panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
        {font-family:Calibri;
        panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
        {font-family:Verdana;
        panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
        {margin:0cm;
        margin-bottom:.0001pt;
        font-size:11.0pt;
        font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
        {mso-style-priority:99;
        color:blue;
        text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
        {mso-style-priority:99;
        color:purple;
        text-decoration:underline;}
strong
        {mso-style-priority:22;
        font-style:normal;}
em
        {mso-style-priority:20;
        font-weight:normal;}
span.EmailStyle17
        {mso-style-type:personal-compose;
        font-family:"Calibri","sans-serif";
        color:windowtext;}
span.invisible6
        {mso-style-name:invisible6;}
span.js-display-url
        {mso-style-name:js-display-url;}
.MsoChpDefault
        {mso-style-type:export-only;}
@page WordSection1
        {size:612.0pt 792.0pt;
        margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
        {page:WordSection1;}
/* List Definitions */
@list l0
        {mso-list-id:1173489958;
        mso-list-template-ids:1327028648;}
@list l0:level1
        {mso-level-number-format:bullet;
        mso-level-text:\F0B7;
        mso-level-tab-stop:36.0pt;
        mso-level-number-position:left;
        text-indent:-18.0pt;
        mso-ansi-font-size:10.0pt;
        font-family:Symbol;}
@list l1
        {mso-list-id:1635595517;
        mso-list-template-ids:630615884;}
@list l1:level1
        {mso-level-number-format:bullet;
        mso-level-text:\F0B7;
        mso-level-tab-stop:36.0pt;
        mso-level-number-position:left;
        text-indent:-18.0pt;
        mso-ansi-font-size:10.0pt;
        font-family:Symbol;}
ol
        {margin-bottom:0cm;}
ul
        {margin-bottom:0cm;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]--></head><body lang=EN-AU link=blue vlink=purple><div class=WordSection1><p class=MsoNormal><span style='font-size:14.0pt;color:#C00000'>Call for Papers<o:p></o:p></span></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal style='mso-margin-top-alt:12.0pt;margin-right:0cm;margin-bottom:15.0pt;margin-left:0cm;mso-line-height-alt:12.0pt;background:white;vertical-align:top'><b><span lang=EN-US style='font-size:18.0pt;font-family:"Arial","sans-serif"'>Consumerization of IT/BYOD<o:p></o:p></span></b></p><p class=MsoNormal style='mso-margin-top-alt:12.0pt;margin-right:0cm;margin-bottom:15.0pt;margin-left:0cm;mso-line-height-alt:12.0pt;background:white;vertical-align:top'><b><span lang=EN-US style='font-size:14.0pt;font-family:"Arial","sans-serif"'>IEEE <i><a href="http://www.computer.org/itpro">IT Professional</a></i><o:p></o:p></span></b></p><p class=MsoNormal style='mso-margin-top-alt:auto;margin-bottom:12.0pt;line-height:16.8pt;background:white;vertical-align:top'><b><span lang=EN-US style='font-size:10.0pt;font-family:"Verdana","sans-serif"'>Submission deadline: <span style='color:#C00000'>24 February 2014</span></span></b><b><span lang=EN-US style='font-size:10.0pt;font-family:"Verdana","sans-serif"'><br></span></b><b><span lang=EN-US style='font-size:10.0pt;font-family:"Verdana","sans-serif"'>Publication: September/October 2014<o:p></o:p></span></b></p><p class=MsoNormal style='mso-margin-top-alt:auto;margin-bottom:12.0pt;line-height:16.8pt;background:white;vertical-align:top'><span style='font-size:14.0pt;color:#002060'><a href="http://tinyurl.com/itpro-2014cfp5"><span style='color:#002060'>http://tinyurl.com/itpro-2014cfp5</span></a></span><span lang=EN-US style='font-size:10.0pt;font-family:"Verdana","sans-serif"'><o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:auto;margin-bottom:12.0pt;line-height:16.8pt;background:white;vertical-align:top'><span lang=EN-US style='font-size:10.0pt;font-family:"Verdana","sans-serif"'>This special issue of </span><i><span lang=EN-US style='font-size:10.0pt;font-family:"Verdana","sans-serif"'>IT Professional</span></i><span lang=EN-US style='font-size:10.0pt;font-family:"Verdana","sans-serif"'> will review trends, risk factors, and approaches that businesses must consider to capitalize on demographic and technological shifts in the information environment and avoid the pitfalls brought about by the blurring line between consumer and business technologies.<o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:auto;margin-bottom:12.0pt;line-height:16.8pt;background:white;vertical-align:top'><span lang=EN-US style='font-size:10.0pt;font-family:"Verdana","sans-serif"'>In today's enterprise, the consumerization of IT is being pushed by a younger, more mobile workforce comprising active users of new technologies and applications. Employees expect to be able to use their personal devices — and applications they are familiar with — at work, which relates to concepts of BYOX — Bring Your Own Device, Cloud, App, and Network. Instead of new technology flowing down from business to the consumer, as it did with the desktop computer, the flow has reversed and the consumer market often gets new technology before it enters (and is fully leveraged by) the enterprise.<o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:auto;margin-bottom:12.0pt;line-height:16.8pt;background:white;vertical-align:top'><span lang=EN-US style='font-size:10.0pt;font-family:"Verdana","sans-serif"'>This blending of personal and business technology is having a significant impact on corporate IT departments, which traditionally issue and control the technology that employees use to do their jobs. Consequently, IT departments must decide how to protect their networks and manage technology that they perhaps did not procure or provision.<o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:auto;margin-bottom:12.0pt;line-height:16.8pt;background:white;vertical-align:top'><span lang=EN-US style='font-size:10.0pt;font-family:"Verdana","sans-serif"'>We are looking for high-quality contributions from industry, government, business, and academia that address these trends, issues, and challenges. Topics of interest include:<o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;margin-left:22.5pt;text-indent:-18.0pt;line-height:16.8pt;mso-list:l0 level1 lfo1;background:white;vertical-align:top'><![if !supportLists]><span lang=EN-US style='font-size:10.0pt;font-family:Symbol'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:10.0pt;font-family:"Verdana","sans-serif"'>How organizations have successfully embraced the consumerization of IT<o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;margin-left:22.5pt;text-indent:-18.0pt;line-height:16.8pt;mso-list:l0 level1 lfo1;background:white;vertical-align:top'><![if !supportLists]><span lang=EN-US style='font-size:10.0pt;font-family:Symbol'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:10.0pt;font-family:"Verdana","sans-serif"'>Frameworks for governance and policy development<o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;margin-left:22.5pt;text-indent:-18.0pt;line-height:16.8pt;mso-list:l0 level1 lfo1;background:white;vertical-align:top'><![if !supportLists]><span lang=EN-US style='font-size:10.0pt;font-family:Symbol'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:10.0pt;font-family:"Verdana","sans-serif"'>Risk identification and mitigation, including regulatory issues and protection of IP<o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;margin-left:22.5pt;text-indent:-18.0pt;line-height:16.8pt;mso-list:l0 level1 lfo1;background:white;vertical-align:top'><![if !supportLists]><span lang=EN-US style='font-size:10.0pt;font-family:Symbol'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:10.0pt;font-family:"Verdana","sans-serif"'>Assessing impact on processes and legacy environments<o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;margin-left:22.5pt;text-indent:-18.0pt;line-height:16.8pt;mso-list:l0 level1 lfo1;background:white;vertical-align:top'><![if !supportLists]><span lang=EN-US style='font-size:10.0pt;font-family:Symbol'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:10.0pt;font-family:"Verdana","sans-serif"'>Changes to technology evaluation criteria<o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;margin-left:22.5pt;text-indent:-18.0pt;line-height:16.8pt;mso-list:l0 level1 lfo1;background:white;vertical-align:top'><![if !supportLists]><span lang=EN-US style='font-size:10.0pt;font-family:Symbol'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:10.0pt;font-family:"Verdana","sans-serif"'>Vendor strategies around consumerization issues<o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;margin-left:22.5pt;text-indent:-18.0pt;line-height:16.8pt;mso-list:l0 level1 lfo1;background:white;vertical-align:top'><![if !supportLists]><span lang=EN-US style='font-size:10.0pt;font-family:Symbol'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:10.0pt;font-family:"Verdana","sans-serif"'>Pros and cons of consumerization<o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;margin-left:22.5pt;text-indent:-18.0pt;line-height:16.8pt;mso-list:l0 level1 lfo1;background:white;vertical-align:top'><![if !supportLists]><span lang=EN-US style='font-size:10.0pt;font-family:Symbol'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:10.0pt;font-family:"Verdana","sans-serif"'>Cultural implications around adoption and buy in<o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;margin-left:22.5pt;text-indent:-18.0pt;line-height:16.8pt;mso-list:l0 level1 lfo1;background:white;vertical-align:top'><![if !supportLists]><span lang=EN-US style='font-size:10.0pt;font-family:Symbol'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:10.0pt;font-family:"Verdana","sans-serif"'>Impact on innovation, collaboration, and economic performance<o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;margin-left:22.5pt;text-indent:-18.0pt;line-height:16.8pt;mso-list:l0 level1 lfo1;background:white;vertical-align:top'><![if !supportLists]><span lang=EN-US style='font-size:10.0pt;font-family:Symbol'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:10.0pt;font-family:"Verdana","sans-serif"'>Applying consumer technology development approaches to internal development processes<o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;margin-left:22.5pt;text-indent:-18.0pt;line-height:16.8pt;mso-list:l0 level1 lfo1;background:white;vertical-align:top'><![if !supportLists]><span lang=EN-US style='font-size:10.0pt;font-family:Symbol'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:10.0pt;font-family:"Verdana","sans-serif"'>Understanding and modeling business users from a consumer perspective<o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;margin-left:22.5pt;text-indent:-18.0pt;line-height:16.8pt;mso-list:l0 level1 lfo1;background:white;vertical-align:top'><![if !supportLists]><span lang=EN-US style='font-size:10.0pt;font-family:Symbol'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:10.0pt;font-family:"Verdana","sans-serif"'>Security challenges<o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:12.0pt;margin-right:0cm;margin-bottom:3.75pt;margin-left:0cm;line-height:18.0pt;background:white;vertical-align:top'><b><span lang=EN-US style='font-size:16.0pt;font-family:"Arial","sans-serif"'>Submissions<o:p></o:p></span></b></p><p class=MsoNormal style='mso-margin-top-alt:auto;margin-bottom:12.0pt;line-height:16.8pt;background:white;vertical-align:top'><span lang=EN-US style='font-size:10.0pt;font-family:"Verdana","sans-serif"'>We also welcome multimedia features (related videos, demos, audio clips, and so on). Feature articles should be no longer than 4,200 words (with tables and figures each counting as 300 words) and have no more than 20 references. Illustrations are welcome. For author guidelines, including sample articles see <a href="http://www.computer.org/portal/web/peerreviewmagazines/acitpro" target="_blank"><b><span style='color:#014E86;text-decoration:none'>http://www.computer.org/portal/web/peerreviewmagazines/acitpro</span></b></a>.<o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:auto;margin-bottom:12.0pt;line-height:16.8pt;background:white;vertical-align:top'><span lang=EN-US style='font-size:10.0pt;font-family:"Verdana","sans-serif"'>Submit your article at <a href="https://mc.manuscriptcentral.com/itpro-cs%20" target="_blank"><b><span style='color:#014E86;text-decoration:none'>https://mc.manuscriptcentral.com/itpro-cs</span></b></a>.<o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:12.0pt;margin-right:0cm;margin-bottom:3.75pt;margin-left:0cm;line-height:18.0pt;background:white;vertical-align:top'><b><span lang=EN-US style='font-size:16.0pt;font-family:"Arial","sans-serif"'>Questions?</span></b><b><span lang=EN-US style='font-size:16.0pt;font-family:"Arial","sans-serif"'><o:p></o:p></span></b></p><p class=MsoNormal style='mso-margin-top-alt:auto;margin-bottom:12.0pt;line-height:16.8pt;background:white;vertical-align:top'><span lang=EN-US style='font-size:10.0pt;font-family:"Verdana","sans-serif"'>For further information contact the Guest Editors:<o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;margin-left:22.5pt;text-indent:-18.0pt;line-height:16.8pt;mso-list:l1 level1 lfo2;background:white;vertical-align:top'><![if !supportLists]><span lang=EN-US style='font-size:10.0pt;font-family:Symbol'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:10.0pt;font-family:"Verdana","sans-serif"'>Seth Earley, <a href="mailto:seth@earley.com"><b><span style='color:#014E86;text-decoration:none'>seth@earley.com</span></b></a>, Earley & Associates, Inc.<o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;margin-left:22.5pt;text-indent:-18.0pt;line-height:16.8pt;mso-list:l1 level1 lfo2;background:white;vertical-align:top'><![if !supportLists]><span lang=EN-US style='font-size:10.0pt;font-family:Symbol'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:10.0pt;font-family:"Verdana","sans-serif"'>Robert Harmon, <a href="mailto:harmonr@pdx.edu" target="_blank"><b><span style='color:#014E86;text-decoration:none'>harmonr@pdx.edu</span></b></a>, Portland State University<o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;margin-left:22.5pt;text-indent:-18.0pt;line-height:16.8pt;mso-list:l1 level1 lfo2;background:white;vertical-align:top'><![if !supportLists]><span lang=EN-US style='font-size:10.0pt;font-family:Symbol'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:10.0pt;font-family:"Verdana","sans-serif"'>Maria R. Lee, <a href="mailto:maria.lee@mail.usc.edu.tw" target="_blank"><b><span style='color:#014E86;text-decoration:none'>maria.lee@mail.usc.edu.tw,</span></b></a> Shih Chien University<o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;margin-left:22.5pt;text-indent:-18.0pt;line-height:16.8pt;mso-list:l1 level1 lfo2;background:white;vertical-align:top'><![if !supportLists]><span lang=EN-US style='font-size:10.0pt;font-family:Symbol'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:10.0pt;font-family:"Verdana","sans-serif"'>Sunil Mithas, <a href="mailto:smithas@umd.edu" target="_blank"><b><span style='color:#014E86;text-decoration:none'>smithas@umd.edu</span></b></a>, University of Maryland<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p></div></body></html>