<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40"><head><META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=us-ascii"><meta name=Generator content="Microsoft Word 12 (filtered medium)"><!--[if !mso]><style>v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style><![endif]--><style><!--
/* Font Definitions */
@font-face
        {font-family:"Cambria Math";
        panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
        {font-family:Calibri;
        panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
        {font-family:Tahoma;
        panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
        {font-family:Verdana;
        panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
        {font-family:Consolas;
        panose-1:2 11 6 9 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
        {margin:0cm;
        margin-bottom:.0001pt;
        font-size:11.0pt;
        font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
        {mso-style-priority:99;
        color:blue;
        text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
        {mso-style-priority:99;
        color:purple;
        text-decoration:underline;}
strong
        {mso-style-priority:22;
        font-style:normal;}
em
        {mso-style-priority:20;
        font-weight:normal;}
p.MsoPlainText, li.MsoPlainText, div.MsoPlainText
        {mso-style-priority:99;
        mso-style-link:"Plain Text Char";
        margin:0cm;
        margin-bottom:.0001pt;
        font-size:10.5pt;
        font-family:Consolas;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
        {mso-style-priority:99;
        mso-style-link:"Balloon Text Char";
        margin:0cm;
        margin-bottom:.0001pt;
        font-size:8.0pt;
        font-family:"Tahoma","sans-serif";}
span.PlainTextChar
        {mso-style-name:"Plain Text Char";
        mso-style-priority:99;
        mso-style-link:"Plain Text";
        font-family:Consolas;}
span.BalloonTextChar
        {mso-style-name:"Balloon Text Char";
        mso-style-priority:99;
        mso-style-link:"Balloon Text";
        font-family:"Tahoma","sans-serif";}
span.EmailStyle22
        {mso-style-type:personal;
        font-family:"Calibri","sans-serif";
        color:windowtext;}
span.EmailStyle23
        {mso-style-type:personal;
        font-family:"Calibri","sans-serif";
        color:#1F497D;}
span.EmailStyle24
        {mso-style-type:personal;
        font-family:"Calibri","sans-serif";
        color:#1F497D;}
span.EmailStyle25
        {mso-style-type:personal;
        font-family:"Calibri","sans-serif";
        color:#1F497D;}
span.EmailStyle26
        {mso-style-type:personal;
        font-family:"Calibri","sans-serif";
        color:#1F497D;}
span.EmailStyle27
        {mso-style-type:personal;
        font-family:"Calibri","sans-serif";
        color:#1F497D;}
span.EmailStyle28
        {mso-style-type:personal;
        font-family:"Calibri","sans-serif";
        color:#1F497D;}
span.EmailStyle29
        {mso-style-type:personal;
        font-family:"Calibri","sans-serif";
        color:#1F497D;}
span.EmailStyle30
        {mso-style-type:personal;
        font-family:"Calibri","sans-serif";
        color:#1F497D;}
span.EmailStyle31
        {mso-style-type:personal;
        font-family:"Calibri","sans-serif";
        color:#1F497D;}
span.EmailStyle32
        {mso-style-type:personal;
        font-family:"Calibri","sans-serif";
        color:#1F497D;}
span.EmailStyle33
        {mso-style-type:personal;
        font-family:"Calibri","sans-serif";
        color:#1F497D;}
span.EmailStyle34
        {mso-style-type:personal;
        font-family:"Calibri","sans-serif";
        color:#1F497D;}
span.EmailStyle35
        {mso-style-type:personal-reply;
        font-family:"Calibri","sans-serif";
        color:#1F497D;}
.MsoChpDefault
        {mso-style-type:export-only;
        font-size:10.0pt;}
@page WordSection1
        {size:612.0pt 792.0pt;
        margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
        {page:WordSection1;}
/* List Definitions */
@list l0
        {mso-list-id:551120465;
        mso-list-template-ids:-517303082;}
@list l0:level1
        {mso-level-number-format:bullet;
        mso-level-text:\F0B7;
        mso-level-tab-stop:36.0pt;
        mso-level-number-position:left;
        text-indent:-18.0pt;
        mso-ansi-font-size:10.0pt;
        font-family:Symbol;}
@list l1
        {mso-list-id:760831838;
        mso-list-template-ids:-679812686;}
@list l1:level1
        {mso-level-number-format:bullet;
        mso-level-text:\F0B7;
        mso-level-tab-stop:36.0pt;
        mso-level-number-position:left;
        text-indent:-18.0pt;
        mso-ansi-font-size:10.0pt;
        font-family:Symbol;}
@list l2
        {mso-list-id:766459950;
        mso-list-template-ids:-677629792;}
@list l2:level1
        {mso-level-number-format:bullet;
        mso-level-text:\F0B7;
        mso-level-tab-stop:36.0pt;
        mso-level-number-position:left;
        text-indent:-18.0pt;
        mso-ansi-font-size:10.0pt;
        font-family:Symbol;}
@list l2:level2
        {mso-level-tab-stop:72.0pt;
        mso-level-number-position:left;
        text-indent:-18.0pt;}
@list l2:level3
        {mso-level-tab-stop:108.0pt;
        mso-level-number-position:left;
        text-indent:-18.0pt;}
@list l2:level4
        {mso-level-tab-stop:144.0pt;
        mso-level-number-position:left;
        text-indent:-18.0pt;}
@list l2:level5
        {mso-level-tab-stop:180.0pt;
        mso-level-number-position:left;
        text-indent:-18.0pt;}
@list l2:level6
        {mso-level-tab-stop:216.0pt;
        mso-level-number-position:left;
        text-indent:-18.0pt;}
@list l2:level7
        {mso-level-tab-stop:252.0pt;
        mso-level-number-position:left;
        text-indent:-18.0pt;}
@list l2:level8
        {mso-level-tab-stop:288.0pt;
        mso-level-number-position:left;
        text-indent:-18.0pt;}
@list l2:level9
        {mso-level-tab-stop:324.0pt;
        mso-level-number-position:left;
        text-indent:-18.0pt;}
@list l3
        {mso-list-id:1528759378;
        mso-list-template-ids:-1155514652;}
@list l3:level1
        {mso-level-number-format:bullet;
        mso-level-text:\F0B7;
        mso-level-tab-stop:36.0pt;
        mso-level-number-position:left;
        text-indent:-18.0pt;
        mso-ansi-font-size:10.0pt;
        font-family:Symbol;}
@list l3:level2
        {mso-level-tab-stop:72.0pt;
        mso-level-number-position:left;
        text-indent:-18.0pt;}
@list l3:level3
        {mso-level-tab-stop:108.0pt;
        mso-level-number-position:left;
        text-indent:-18.0pt;}
@list l3:level4
        {mso-level-tab-stop:144.0pt;
        mso-level-number-position:left;
        text-indent:-18.0pt;}
@list l3:level5
        {mso-level-tab-stop:180.0pt;
        mso-level-number-position:left;
        text-indent:-18.0pt;}
@list l3:level6
        {mso-level-tab-stop:216.0pt;
        mso-level-number-position:left;
        text-indent:-18.0pt;}
@list l3:level7
        {mso-level-tab-stop:252.0pt;
        mso-level-number-position:left;
        text-indent:-18.0pt;}
@list l3:level8
        {mso-level-tab-stop:288.0pt;
        mso-level-number-position:left;
        text-indent:-18.0pt;}
@list l3:level9
        {mso-level-tab-stop:324.0pt;
        mso-level-number-position:left;
        text-indent:-18.0pt;}
ol
        {margin-bottom:0cm;}
ul
        {margin-bottom:0cm;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]--></head><body lang=EN-AU link=blue vlink=purple><div class=WordSection1><p class=MsoNormal style='mso-margin-top-alt:12.0pt;margin-right:0cm;margin-bottom:15.0pt;margin-left:0cm;background:white;vertical-align:top'><span lang=EN-US style='font-size:12.0pt;color:#002060'>Dear All,<o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:12.0pt;margin-right:0cm;margin-bottom:15.0pt;margin-left:0cm;background:white;vertical-align:top'><span lang=EN-US style='font-size:12.0pt;color:#002060'>FYI – Call for papers for the special issue of <b><i><a href="http://www.computer.org/itpro">IT Professional</a></i></b> magazine on</span><span lang=EN-US style='font-size:12.0pt;color:#1F497D'> IT/IS Security</span><b><span lang=EN-US style='font-size:12.0pt;color:#002060'>.<o:p></o:p></span></b></p><p class=MsoNormal style='mso-margin-top-alt:12.0pt;margin-right:0cm;margin-bottom:15.0pt;margin-left:0cm;background:white;vertical-align:top'><span lang=EN-US style='font-size:12.0pt;color:#002060'>Regards<o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:12.0pt;margin-right:0cm;margin-bottom:15.0pt;margin-left:0cm;background:white;vertical-align:top'><span lang=EN-US style='font-size:12.0pt;color:#002060'>San<o:p></o:p></span></p><p class=MsoNormal><span style='color:#1F497D'>San Murugesan<o:p></o:p></span></p><p class=MsoNormal><span style='color:#1F497D'>Editor in Chief, IEEE <i><a href="http://www.computer.org/itpro">IT Professional</a><br></i></span><span style='font-size:12.0pt;color:#002060'>……………………………………………………………<o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:12.0pt;margin-right:0cm;margin-bottom:15.0pt;margin-left:0cm;background:white;vertical-align:top'><a href="http://www.computer.org/itpro" target="_blank"><b><span style='font-size:18.0pt;font-family:"Arial","sans-serif";color:windowtext;text-decoration:none'><img border=0 width=183 height=56 id="Picture_x0020_1" src="cid:image001.jpg@01CF37A5.97B38590" alt="http://www.computer.org/plugins/images/digitalLibrary/magazines/itpro.gif"></span></b></a><b><span lang=EN-US style='font-size:18.0pt;font-family:"Arial","sans-serif"'><o:p></o:p></span></b></p><p class=MsoNormal style='mso-margin-top-alt:12.0pt;margin-right:0cm;margin-bottom:15.0pt;margin-left:0cm;background:white;vertical-align:top'><span lang=EN-US style='font-size:12.0pt;font-family:"Arial","sans-serif"'><a href="http://www.computer.org/itpro">www.computer.org/itpro</a><o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:12.0pt;margin-right:0cm;margin-bottom:15.0pt;margin-left:0cm;mso-line-height-alt:12.0pt;background:white;vertical-align:top'><b><span lang=EN-US style='font-size:18.0pt;font-family:"Arial","sans-serif"'>IT Security<o:p></o:p></span></b></p><p class=MsoNormal style='mso-margin-top-alt:auto;margin-bottom:12.0pt;line-height:16.8pt;background:white;vertical-align:top'><b><span lang=EN-US style='font-size:10.0pt;font-family:"Verdana","sans-serif"'>Submission deadline: <span style='color:red'>1 June 2014</span></span></b><b><span lang=EN-US style='font-size:10.0pt;font-family:"Verdana","sans-serif"'><br></span></b><b><span lang=EN-US style='font-size:10.0pt;font-family:"Verdana","sans-serif"'>Publication: January/February 2015</span></b><span lang=EN-US style='font-size:10.0pt;font-family:"Verdana","sans-serif"'><o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:auto;margin-bottom:12.0pt;line-height:16.8pt;background:white;vertical-align:top'><span lang=EN-US style='font-size:10.0pt;font-family:"Verdana","sans-serif"'>This special issue of </span><i><span lang=EN-US style='font-size:10.0pt;font-family:"Verdana","sans-serif"'>IT Professional</span></i><span lang=EN-US style='font-size:10.0pt;font-family:"Verdana","sans-serif"'> seeks to provide readers with an overview of current issues and advances in information and computer security. We seek high quality contributions from industry, government, business, and academia that present recent developments in IT security, showcase successfully deployed security solutions, or discuss challenging security issues that deserve further study. Topics of interest include, but are not limited to, the following:<o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;margin-left:37.5pt;text-indent:-18.0pt;line-height:16.8pt;mso-list:l0 level1 lfo5;background:white;vertical-align:top'><![if !supportLists]><span lang=EN-US style='font-size:10.0pt;font-family:Symbol'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>        </span></span></span><![endif]><span lang=EN-US style='font-size:10.0pt;font-family:"Verdana","sans-serif"'>Authentication and access control<o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;margin-left:37.5pt;text-indent:-18.0pt;line-height:16.8pt;mso-list:l0 level1 lfo5;background:white;vertical-align:top'><![if !supportLists]><span lang=EN-US style='font-size:10.0pt;font-family:Symbol'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>        </span></span></span><![endif]><span lang=EN-US style='font-size:10.0pt;font-family:"Verdana","sans-serif"'>Biometrics<o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;margin-left:37.5pt;text-indent:-18.0pt;line-height:16.8pt;mso-list:l0 level1 lfo5;background:white;vertical-align:top'><![if !supportLists]><span lang=EN-US style='font-size:10.0pt;font-family:Symbol'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>        </span></span></span><![endif]><span lang=EN-US style='font-size:10.0pt;font-family:"Verdana","sans-serif"'>"Bring your own device" security<o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;margin-left:37.5pt;text-indent:-18.0pt;line-height:16.8pt;mso-list:l0 level1 lfo5;background:white;vertical-align:top'><![if !supportLists]><span lang=EN-US style='font-size:10.0pt;font-family:Symbol'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>        </span></span></span><![endif]><span lang=EN-US style='font-size:10.0pt;font-family:"Verdana","sans-serif"'>Cybersecurity challenges<o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;margin-left:37.5pt;text-indent:-18.0pt;line-height:16.8pt;mso-list:l0 level1 lfo5;background:white;vertical-align:top'><![if !supportLists]><span lang=EN-US style='font-size:10.0pt;font-family:Symbol'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>        </span></span></span><![endif]><span lang=EN-US style='font-size:10.0pt;font-family:"Verdana","sans-serif"'>Cloud and distributed system security<o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;margin-left:37.5pt;text-indent:-18.0pt;line-height:16.8pt;mso-list:l0 level1 lfo5;background:white;vertical-align:top'><![if !supportLists]><span lang=EN-US style='font-size:10.0pt;font-family:Symbol'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>        </span></span></span><![endif]><span lang=EN-US style='font-size:10.0pt;font-family:"Verdana","sans-serif"'>Computer forensics<o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;margin-left:37.5pt;text-indent:-18.0pt;line-height:16.8pt;mso-list:l0 level1 lfo5;background:white;vertical-align:top'><![if !supportLists]><span lang=EN-US style='font-size:10.0pt;font-family:Symbol'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>        </span></span></span><![endif]><span lang=EN-US style='font-size:10.0pt;font-family:"Verdana","sans-serif"'>The security of cyberphysical systems<o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;margin-left:37.5pt;text-indent:-18.0pt;line-height:16.8pt;mso-list:l0 level1 lfo5;background:white;vertical-align:top'><![if !supportLists]><span lang=EN-US style='font-size:10.0pt;font-family:Symbol'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>        </span></span></span><![endif]><span lang=EN-US style='font-size:10.0pt;font-family:"Verdana","sans-serif"'>Privacy issues in data mining and data analytics<o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;margin-left:37.5pt;text-indent:-18.0pt;line-height:16.8pt;mso-list:l0 level1 lfo5;background:white;vertical-align:top'><![if !supportLists]><span lang=EN-US style='font-size:10.0pt;font-family:Symbol'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>        </span></span></span><![endif]><span lang=EN-US style='font-size:10.0pt;font-family:"Verdana","sans-serif"'>Intrusion detection systems<o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;margin-left:37.5pt;text-indent:-18.0pt;line-height:16.8pt;mso-list:l0 level1 lfo5;background:white;vertical-align:top'><![if !supportLists]><span lang=EN-US style='font-size:10.0pt;font-family:Symbol'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>        </span></span></span><![endif]><span lang=EN-US style='font-size:10.0pt;font-family:"Verdana","sans-serif"'>The security of the Internet of Things<o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;margin-left:37.5pt;text-indent:-18.0pt;line-height:16.8pt;mso-list:l0 level1 lfo5;background:white;vertical-align:top'><![if !supportLists]><span lang=EN-US style='font-size:10.0pt;font-family:Symbol'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>        </span></span></span><![endif]><span lang=EN-US style='font-size:10.0pt;font-family:"Verdana","sans-serif"'>Malware detection<o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;margin-left:37.5pt;text-indent:-18.0pt;line-height:16.8pt;mso-list:l0 level1 lfo5;background:white;vertical-align:top'><![if !supportLists]><span lang=EN-US style='font-size:10.0pt;font-family:Symbol'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>        </span></span></span><![endif]><span lang=EN-US style='font-size:10.0pt;font-family:"Verdana","sans-serif"'>Mobile app security<o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;margin-left:37.5pt;text-indent:-18.0pt;line-height:16.8pt;mso-list:l0 level1 lfo5;background:white;vertical-align:top'><![if !supportLists]><span lang=EN-US style='font-size:10.0pt;font-family:Symbol'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>        </span></span></span><![endif]><span lang=EN-US style='font-size:10.0pt;font-family:"Verdana","sans-serif"'>Mobile device security<o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;margin-left:37.5pt;text-indent:-18.0pt;line-height:16.8pt;mso-list:l0 level1 lfo5;background:white;vertical-align:top'><![if !supportLists]><span lang=EN-US style='font-size:10.0pt;font-family:Symbol'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>        </span></span></span><![endif]><span lang=EN-US style='font-size:10.0pt;font-family:"Verdana","sans-serif"'>Network security<o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;margin-left:37.5pt;text-indent:-18.0pt;line-height:16.8pt;mso-list:l0 level1 lfo5;background:white;vertical-align:top'><![if !supportLists]><span lang=EN-US style='font-size:10.0pt;font-family:Symbol'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>        </span></span></span><![endif]><span lang=EN-US style='font-size:10.0pt;font-family:"Verdana","sans-serif"'>The legalities and ethics associated with security and privacy policies<o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;margin-left:37.5pt;text-indent:-18.0pt;line-height:16.8pt;mso-list:l0 level1 lfo5;background:white;vertical-align:top'><![if !supportLists]><span lang=EN-US style='font-size:10.0pt;font-family:Symbol'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>        </span></span></span><![endif]><span lang=EN-US style='font-size:10.0pt;font-family:"Verdana","sans-serif"'>The protection of personal information<o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;margin-left:37.5pt;text-indent:-18.0pt;line-height:16.8pt;mso-list:l0 level1 lfo5;background:white;vertical-align:top'><![if !supportLists]><span lang=EN-US style='font-size:10.0pt;font-family:Symbol'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>        </span></span></span><![endif]><span lang=EN-US style='font-size:10.0pt;font-family:"Verdana","sans-serif"'>Security architectures<o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;margin-left:37.5pt;text-indent:-18.0pt;line-height:16.8pt;mso-list:l0 level1 lfo5;background:white;vertical-align:top'><![if !supportLists]><span lang=EN-US style='font-size:10.0pt;font-family:Symbol'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>        </span></span></span><![endif]><span lang=EN-US style='font-size:10.0pt;font-family:"Verdana","sans-serif"'>Usability issues in security<o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;margin-left:37.5pt;text-indent:-18.0pt;line-height:16.8pt;mso-list:l0 level1 lfo5;background:white;vertical-align:top'><![if !supportLists]><span lang=EN-US style='font-size:10.0pt;font-family:Symbol'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>        </span></span></span><![endif]><span lang=EN-US style='font-size:10.0pt;font-family:"Verdana","sans-serif"'>Wearable device security<o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;margin-left:37.5pt;text-indent:-18.0pt;line-height:16.8pt;mso-list:l0 level1 lfo5;background:white;vertical-align:top'><![if !supportLists]><span lang=EN-US style='font-size:10.0pt;font-family:Symbol'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>        </span></span></span><![endif]><span lang=EN-US style='font-size:10.0pt;font-family:"Verdana","sans-serif"'>Web application security<o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;margin-left:37.5pt;text-indent:-18.0pt;line-height:16.8pt;mso-list:l0 level1 lfo5;background:white;vertical-align:top'><![if !supportLists]><span lang=EN-US style='font-size:10.0pt;font-family:Symbol'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>        </span></span></span><![endif]><span lang=EN-US style='font-size:10.0pt;font-family:"Verdana","sans-serif"'>The security of online transactions<o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:12.0pt;margin-right:0cm;margin-bottom:3.75pt;margin-left:0cm;line-height:18.0pt;background:white;vertical-align:top'><b><span lang=EN-US style='font-size:16.0pt;font-family:"Arial","sans-serif"'>Submissions<o:p></o:p></span></b></p><p class=MsoNormal style='mso-margin-top-alt:auto;margin-bottom:12.0pt;line-height:16.8pt;background:white;vertical-align:top'><span lang=EN-US style='font-size:10.0pt;font-family:"Verdana","sans-serif"'>Feature articles should be no longer than 4,200 words and have no more than 20 references (with tables and figures counting as 300 words). Illustrations are welcome. For author guidelines, including sample articles, see <a href="http://www.computer.org/portal/web/peerreviewmagazines/acitpro" target="_blank"><b><span style='color:#014E86;text-decoration:none'>www.computer.org/portal/web/peerreviewmagazines/acitpro</span></b></a>.<o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:auto;margin-bottom:12.0pt;line-height:16.8pt;background:white;vertical-align:top'><span lang=EN-US style='font-size:10.0pt;font-family:"Verdana","sans-serif"'>Submit your article at <a href="https://mc.manuscriptcentral.com/itpro-cs" target="_blank"><b><span style='color:#014E86;text-decoration:none'>https://mc.manuscriptcentral.com/itpro-cs</span></b></a>.<o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:12.0pt;margin-right:0cm;margin-bottom:3.75pt;margin-left:0cm;line-height:18.0pt;background:white;vertical-align:top'><b><span lang=EN-US style='font-size:16.0pt;font-family:"Arial","sans-serif"'>Questions?<o:p></o:p></span></b></p><p class=MsoNormal style='mso-margin-top-alt:auto;margin-bottom:12.0pt;line-height:16.8pt;background:white;vertical-align:top'><span lang=EN-US style='font-size:10.0pt;font-family:"Verdana","sans-serif"'>For more information, please contact the Guest Editors:<o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;margin-left:37.5pt;text-indent:-18.0pt;line-height:16.8pt;mso-list:l1 level1 lfo6;background:white;vertical-align:top'><![if !supportLists]><span lang=EN-US style='font-size:10.0pt;font-family:Symbol'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>        </span></span></span><![endif]><span lang=EN-US style='font-size:10.0pt;font-family:"Verdana","sans-serif"'>Morris Chang, Iowa State University, <a href="mailto:morris@iastate.edu"><b><span style='color:#014E86;text-decoration:none'>morris@iastate.edu</span></b></a><o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;margin-left:37.5pt;text-indent:-18.0pt;line-height:16.8pt;mso-list:l1 level1 lfo6;background:white;vertical-align:top'><![if !supportLists]><span lang=EN-US style='font-size:10.0pt;font-family:Symbol'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>        </span></span></span><![endif]><span lang=EN-US style='font-size:10.0pt;font-family:"Verdana","sans-serif"'>Rick Kuhn, NIST, <a href="mailto:kuhn@nist.gov"><b><span style='color:#014E86;text-decoration:none'>kuhn@nist.gov</span></b></a><o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:12.0pt;margin-right:0cm;margin-bottom:15.0pt;margin-left:0cm;background:white;vertical-align:top'><span lang=EN-US style='color:#1F497D'><o:p> </o:p></span></p></div></body></html>