posted by user: mohi4426 || 717 views || tracked by 1 users: [display]

EntSecGov 2021 : Call for Book Chapter: Next-Generation Enterprise Security and Governance

FacebookTwitterLinkedInGoogle

Link: https://mohi1257.wixsite.com/entsecgov
 
When Jan 31, 2021 - Jul 31, 2021
Where CRC Press USA
Abstract Registration Due Jan 31, 2021
Submission Deadline Mar 30, 2021
Notification Due May 15, 2021
Final Version Due Jun 15, 2021
 

Call For Papers

Internet is making our daily life as digital as possible and this new era is called the Internet of Everything (IoE). The key force behind the rapid growth of the Internet is the technological advances of enterprises. The digital world we live in is facilitated by these enterprises’ advances and business intelligence. Consequently, those enterprises need to deal with gazillions of bytes of data and in today’s age of General Data Protection Regulation, enterprises are required to ensure privacy and security of large-scale data collections. However, the increased connectivity and devices used to facilitate IoE are continually creating more room for cybercriminals to find vulnerabilities in enterprise systems and flaws in their corporate governance.



Ensuring cybersecurity and corporate governance for enterprises should not be an afterthought and a huge challenge. In recent times, the complex diversity of cyber-attacks has been skyrocketing, zero-day attacks are happening more frequently than before, such as ransomware, botnet, telecommunication attacks. New hacking strategies would easily bypass existing enterprise security and governance platforms using advanced persistent threats. For example, in 2020, the Toll group firm was exploited by a new crypto-attack family for violating its data privacy, where an advanced ransomware technique was launched to exploit the big corporations and a request a huge figure of monetary ransom. Even after applying rational governance hygiene, the cybersecurity configuration and software updates are often overlooked when it is most needed to fight cyber-crime and ensure data privacy. Therefore, the threat landscape in the context of enterprises becomes wider and far more challenging. There is a clear need for collaborative work throughout the entire value chain of the network.



In this context, this book will address the cybersecurity and cooperate governance challenges associated with the enterprises, which will provide a bigger picture of the concepts, intelligent techniques, practices, and open research directions in this area. Besides, the proposed book will serve as a single source of reference for acquiring the knowledge on the technology, process and people involved in the next-generation privacy and security.

Topics of interest include, but are not limited to:



Enterprise Security Management

Insider Threats - Human Element of Security

Intelligent Corporate Governance Frameworks

IT Governance and Enterprise Security Policy

Trust, Privacy and Authorization

Intelligent Risk management for corporate governance

Monitoring and Surveillance in Enterprise Environment

Real-Life Security Case Studies

Securing Enterprise Data

Critical Infrastructure Protection

IoT and industry 4.0 Security for Enterprise

Cloud Security for Enterprise

Real-Time Analysis & Response

Intelligent security and privacy approaches

Federated models-enabled security technology

Security Incident Management for Enterprise

​Submission Instructions


The expected manuscript length is 7,000 to 12,000 words. Longer manuscripts may be allowed based on the topic and need. Manuscripts submitted for the book must be original, must not be previously published or currently under review anywhere. The manuscript must be prepared with MS-Office (docx). Please do not use any special formatting or macros in your submission.

General formatting guideline: A4 page with 1 inch (2.54 cm) margin on all sides, single column format, 1.5 line spacing with 10 point sized font, Times New Roman. References should be cited within the text with numbers in sequence like [1], [2], [3], .... An all-in-one PDF file may be submitted for the initial version however, if the chapter is accepted, this formatting style must be followed and MS-Office file (docx) must be supplied.

A chapter proposal (1-2 pages including probable Table of Contents, author contact details and affiliation(s)) should be sent to the editors as soon as possible. Please email to the editors.

Editors' Contact Information





Dr. Mohiuddin Ahmed

Lecturer
Academic Centre of Cyber Security Excellence (ACCSE),

School of Science,
Edith Cowan University,
Email: m.ahmed.au@ieee.org

​​

Dr. Nour Moustafa

Lecturer

School of Engineering and IT,

UNSW Canberra

Email: nour.moustafa@unsw.edu.au



Associate Professor Abu Barkat

Faculty of Science & Technology,

University of Canberra

Email: Abu.Barkat@canberra.edu.au



Associate Professor Paul Haskell-Dowland

Associate Dean (Computing & Security)

Academic Centre of Cyber Security Excellence (ACCSE),

School of Science,
Edith Cowan University,
Email: p.haskelldowland@ecu.edu.au

Related Resources

The Mississippi River: A Cultural Artery 2025   Call for Papers: The Mississippi: Soundings on America’s Arterial River
Book 2025   Call for book Chapters Mitigating the Risks of AI Deepfakes
Call for Chapters - Wiley-IEEE Press 2024   Internet of Things A to Z: Technologies and Applications - Second Edition
IEEE Globecom 2024 NEXTG-WESEC 2024   WORKSHOP ON NEXTG (6G AND BEYOND) WIRELESS SECURITY (IEEE NEXTG-WESEC) with IEEE Globecom 2024, 8–12 December, 2024 - Cape Town, South Africa
ICNGN 2024   The 3rd International Conference on Intelligent Computing and Next Generation Networks
DLGM 2024   Call For Book Chapters 2024: Deep Learning in Genome Mapping, CRC Press (Taylor & Francis Group)
NGISE 2025   1st International Conference on Next Generation Information System Engineering
NG-RES 2025   Workshop on Next Generation Real-Time Embedded Systems
Next-Gen-BiGLA 2024   IEEE BigData 2024 Workshop on Next-Generation Big Graph Learning and Analytics
IJNGN 2024   International Journal of Next - Generation Networks