AISM: Australian Information Security Management Conference

FacebookTwitterLinkedInGoogle

 

Past:   Proceedings on DBLP

Future:  Post a CFP for 2013 or later   |   Invite the Organizers Email

 
 

All CFPs on WikiCFP

Event When Where Deadline
AISM 2012 10th Australian Information Security Management Conference
Dec 3, 2012 - Dec 5, 2012 Perth, Western Australia Sep 30, 2012
AISM 2011 9th Australian Information Security Management Conference
Dec 5, 2011 - Dec 7, 2011 Perth, Western Australia Sep 30, 2011
AISM 2010 8th Australian Information Security Management Conference
Nov 30, 2010 - Dec 2, 2010 Perth, Australia Sep 1, 2010
 
 

Present CFP : 2012

Information security is the core of security, namely the maintenance of confidentiality, availability and integrity. In a dynamic environment constructed of heterogeneous systems that access and transfer large volumes of data, alongside an increasing reliance on remote access to these information systems, it is essential to discuss, discover and critically evaluate new models and processes for the protection of information. The aim of AISM 2012 is to encourage the dissemination of research and practice to all stakeholders in the information security sphere of influence, including security practitioners, academics, law enforcement and management, who are all cordially invited to participate.

Papers are invited in the following areas, but not limited to:

• Information Security Management
• Data Security
• Data Governance
• Information Assurance
• Security Policy
• Information Security Awareness
• Enterprise Data Protection
• Authentication & Authorisation
• Privacy
• Mobile Security
• Network Security
• Risk Assessment
• Secure Development
• Internet Security
• Application and Platform Security
• Software Protection
• Information Security Threats

All submitted papers will be double blind peer reviewed.

Submitting Papers
Papers must adhere to the maximum word limit of 3500 words and must include a 200 word abstract and keywords identifying the paper’s area. Papers must be submitted prior to 30 September 2012.
All papers must be submitted via the conference website. Detailed author instructions regarding submission requirements can be found at:
http://conferences.secau.org/paper-submission.php
Best papers will be considered for submission to selected Journals.

Further information
Visit the conference website http://conferences.secau.org/ or contact: the Congress Coordinator Lisa McCormack – secau@ecu.edu.au
 

Related Resources

JMC 2022   JOURNAL OF MATHEMATICAL CRYPTOLOGY
NISecurity 2022   2022 International Conference on Network and Information Security (NISecurity 2022)
IJIBM 2022   Call For Papers - International Journal of Information, Business and Management
ICISS--ACM, Ei Compendex and Scopus 2022   ACM--2022 The 5th International Conference on Information Science and Systems (ICISS 2022)--EI Compendex, Scopus
CSP--Scopus, Ei 2023   2023 7th International Conference on Cryptography, Security and Privacy (CSP 2023)--Ei Compendex, Scopus
CSP 2023   2023 7th International Conference on Cryptography, Security and Privacy (CSP 2023)
DMMLACS 2022   3rd International Special Session on Data Mining and Machine Learning Applications for Cyber Security
BDACCIP 2022   The 6th International Workshop on Big Data Analytic for Cyber Crime Investigation and Prevention
ICBTA--EI Compendex, Scopus 2022   2022 5th International Conference on Blockchain Technology and Applications (ICBTA 2022)--Ei Compendex, Scopus
SI on ATD&IS II 2022   Special Issue on Advanced Technologies in Data and Information Security II, Applied Sciences, MDPI