posted by user: secau_ECU || 4107 views || tracked by 10 users: [display]

AISM 2012 : 10th Australian Information Security Management Conference

FacebookTwitterLinkedInGoogle


Conference Series : Australian Information Security Management Conference
 
Link: http://conferences.secau.org
 
When Dec 3, 2012 - Dec 5, 2012
Where Perth, Western Australia
Submission Deadline Sep 30, 2012
Notification Due Oct 28, 2012
Final Version Due Nov 11, 2012
Categories    information security   security policy   data governance   software protection
 

Call For Papers

Information security is the core of security, namely the maintenance of confidentiality, availability and integrity. In a dynamic environment constructed of heterogeneous systems that access and transfer large volumes of data, alongside an increasing reliance on remote access to these information systems, it is essential to discuss, discover and critically evaluate new models and processes for the protection of information. The aim of AISM 2012 is to encourage the dissemination of research and practice to all stakeholders in the information security sphere of influence, including security practitioners, academics, law enforcement and management, who are all cordially invited to participate.

Papers are invited in the following areas, but not limited to:

• Information Security Management
• Data Security
• Data Governance
• Information Assurance
• Security Policy
• Information Security Awareness
• Enterprise Data Protection
• Authentication & Authorisation
• Privacy
• Mobile Security
• Network Security
• Risk Assessment
• Secure Development
• Internet Security
• Application and Platform Security
• Software Protection
• Information Security Threats

All submitted papers will be double blind peer reviewed.

Submitting Papers
Papers must adhere to the maximum word limit of 3500 words and must include a 200 word abstract and keywords identifying the paper’s area. Papers must be submitted prior to 30 September 2012.
All papers must be submitted via the conference website. Detailed author instructions regarding submission requirements can be found at:
http://conferences.secau.org/paper-submission.php
Best papers will be considered for submission to selected Journals.

Further information
Visit the conference website http://conferences.secau.org/ or contact: the Congress Coordinator Lisa McCormack – secau@ecu.edu.au

Related Resources

ACISP 2019   The 24th Australasian Conference on Information Security and Privacy
IFIPSEC 2019   IFIP Information Security Conference & Privacy Conference - IFIP Technical Commitee 11
IJIBM 2019   Call For Papers - International Journal of Information, Business and Management
CRIS 2019   International Conference on Cryptography and Information Security
MDPI Information 2019   MDPI OA Journal of Information Science, Technology and Engineering --SI on Machine Learning for Cyber-Security
SPT-SN-IoT 2019   Special Issue Security, Privacy, and Trustworthiness of Sensor Networks and Internet of Things
ICIM--IEEE, Ei and Scopus 2019   IEEE--2019 The 5th International Conference on Information Management (ICIM 2019)--Ei Compendex and Scopus
MLCS-MDPI 2019   Special issue on Machine Learning for Cyber-Security (MDPI Journal of INFORMATION)
ICIKM--EI Compendex, Scopus 2019   2019 8th International Conference on Innovation, Knowledge, and Management (ICIKM 2019)--EI Compendex, Scopus
ICBCT--EI and Scopus 2019   2019 International Conference on Blockchain Technology (ICBCT 2019)--EI Compendex and Scopus