posted by user: kotzgroup || 10384 views || tracked by 22 users: [display]

WEIS 2011 : Workshop on Economics of Information Security

FacebookTwitterLinkedInGoogle


Conference Series : Workshop on the Economics of Information Security
 
Link: http://weis2011.econinfosec.org/index.html
 
When Jun 14, 2011 - Jun 15, 2011
Where George Mason University, USA
Submission Deadline Feb 28, 2011
Notification Due Apr 11, 2011
Final Version Due May 14, 2011
Categories    economics   information security   computer security
 

Call For Papers


The Tenth Workshop on Economics of Information Security (WEIS 2011)
http://weis2011.econinfosec.org/index.html

George Mason University, USA
June 14-15, 2011

Call for Participation

Information security continues to grow in importance, as threats proliferate, privacy erodes, and attackers find new sources of value. Yet the security of information systems depends on more than just technology. Good security requires an understanding of the incentives and tradeoffs inherent to the behavior of systems and organizations. As society's dependence on information technology has deepened, policy makers, including the President of the United States, have taken notice. Now more than ever, careful research is needed to accurately characterize threats and countermeasures, in both the public and private sectors.

The Workshop on the Economics of Information Security (WEIS) is the leading forum for interdisciplinary scholarship on information security, combining expertise from the fields of economics, social science, business, law, policy and computer science. Prior workshops have explored the role of incentives between attackers and defenders, identified market failures dogging Internet security, and assessed investments in cyber-defense. This workshop will build on past efforts using empirical and analytic tools to not only understand threats, but also strengthen security through novel evaluations of available solutions. How should information risk be modeled given the constraints of rare incidence and high interdependence? How do individuals' and organizations' perceptions of privacy and security color their decision making? How can we move towards a more secure information infrastructure and code base while accounting for the incentives of stakeholders?

We encourage economists, computer scientists, business school researchers, legal scholars, security and privacy specialists, as well as industry experts to submit their research and attend the workshop. Suggested topics include (but are not limited to) empirical and theoretical studies of:

* Optimal investment in information security
* Online crime (including botnets, phishing and spam)
* Models and analysis of online crime
* Risk management and cyberinsurance
* Security standards and regulation
* Cybersecurity policy
* Privacy, confidentiality and anonymity
* Behavioral security and privacy
* Security models and metrics
* Psychology of risk and security
* Vulnerability discovery, disclosure, and patching
* Cyberwar strategy and game theory
* Incentives for information sharing and cooperation

We highlight two key areas of particular focus for this year's workshop. First, we encourage submissions that consider the design and evaluation of policy solutions for improving information security. Second, given the importance of data-driven decision making, we encourage submissions with empirical components. A selection of papers accepted to this workshop will appear in an edited volume designed to help policy makers, managers, researchers and practitioners better understand the information security landscape.
Important Dates

Submissions due February 28, 2011
Notification of acceptance April 11, 2011
Camera-ready papers due May 14, 2011
Workshop June 14-15, 2011

Submitted manuscripts should represent significant and novel research contributions. Please note that WEIS has no formal formatting guidelines. Previous contributors spanned fields from economics and psychology to computer science and law, each with different norms and expectations about manuscript length and formatting. Advisable rules of thumb include: using past WEIS accepted papers as templates and adhering to your community's publication standards.

Related Resources

InCIT 2024   The 8th International Conference on Information Technology
BIoT 2024   5th International Conference on Block chain and Internet of Things
LAJC 2024   Latin-American Journal of Computing
ECTIJ 2024   Economics, Commerce and Trade Management: An International Journal
BDPC 2025   2025 3rd International Conference on Big Data and Privacy Computing (BDPC 2025)
Hacktivity 2024   Hacktivity 2024 - IT Security Festival
ACM ICCNS 2024   ACM--2024 14th International Conference on Communication and Network Security (ICCNS 2024)
ICISDM 2024   2024 8th International Conference on Information System and Data Mining (ICISDM 2024)
ICISE 2024   ACM--2024 9th International Conference on Information Systems Engineering (ICISE 2024)
ICBTA 2024   ACM--2024 7th International Conference on Blockchain Technology and Applications (ICBTA 2024)