[AISWorld] CFP: New Approaches to Behavioral Information Security and Privacy Research - AMCIS 2015 Deadline Approaching
AJ Burns
AJ.Burns at owen.vanderbilt.edu
Fri Feb 20 11:03:56 EST 2015
Call for Papers: Submissions Due February 25th
AMCIS 2015 Mini-track on New Approaches to Behavioral Information Security and Privacy Research
Mini-track chairs:
Clay Posey, The University of Alabama, cposey at cba.ua.edu<mailto:cposey at cba.ua.edu>
A.J. Burns, Vanderbilt University, AJ.Burns at owen.vanderbilt.edu<mailto:AJ.Burns at owen.vanderbilt.edu>
Call for Papers
In today's hyper-connected organizational environments, the influence of individuals' behavior on information security and privacy is increasingly difficult to conceptualize. However, recent advances in related fields such as behavioral operations research, computational economics, and generative social science show much promise in enabling researchers to model human behavior and associated consequences of the modeled activity. Additionally, ubiquitous computing and pervasive networks enable researchers to capture behavioral data in novel ways. Digital experimentation and the use of wearable devices and/or sensors are examples of new and exciting ways researchers can glean insights into individuals' behavior.
This minitrack seeks completed papers and research-in-progress that utilize or exhibit novel approaches to behavioral information security and/or information privacy issues. These approaches are meant to complement other on-going research efforts in the examination of human behavior and its influence on the security and privacy of information at the personal, organizational, and/or societal levels.
Examples of research that fit this call include but are not limited to:
Approaches using agent-based modeling (ABM) and associated toolkits (e.g., MASON, NetLogo, Repast, Swarm) in the examination of information security and privacy issues;
Approaches relying on Complex Adaptive Systems (CAS) theory, which argue and/or display how higher-order patterns emerge from individual-level characteristics and interactions;
Simulation studies that attempt to find the optimum levels of organizational interventions in the protection of sensitive information and/or deterrence of negative insider behaviors;
The utilization of novel techniques for online, digital data collections such as randomized, digital experimentation and ecological momentary assessments (EMA);
Approaches that harness data from wearable computing mechanisms and other 'quantified self' techniques to determine behavioral patterns, which promote protective behavior and/or deter detrimental behavior as they relate to information security and privacy
Track information:
Information Systems Security, Assurance and Privacy (SIGSEC)
http://amcis2015.aisnet.org/2-uncategorised/42-information-systems-security-assurance-and-privacy-sigsec-track
Important Upcoming dates:
**February 25, 2015: Manuscript submissions close**
May 5, 2015: Final decisions are made
Please consider joining us in Puerto Rico this August!
AJ Burns
Postdoctoral Research Scholar
Owen Graduate School of Management
Vanderbilt University
Nashville, TN 37203
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20150220/ae2f5951/attachment.htm>
More information about the AISWorld
mailing list