RandCV2: Law and Ethics 2008 : Readings and Cases in the Mgt of InfoSec: Law and Ethics
Call For Papers
post CFPCALL FOR CHAPTER PROPOSAL SUBMISSIONS AND REVIEWERS
Proposal Deadline: May 1, 2008
Readings and Cases in the Management of Information Security,
Volume II: Legal and Ethical Issues in Information Security Management
A book edited by
Michael E. Whitman, Ph.D., CISSP
Herbert J. Mattord, CISSP
Published by Course Technology, a division of Cengage Learning, Inc.
As global networks expand the interconnection of the worldâ??s technically complex infrastructure, communication and computing systems gain added importance. Information security has gained increased importance as a professional practice. We only recently are witnessing the emergence of information security as an academic discipline. Recent events and attacks point out the weaknesses inherent in unprotected systems and expose the need for heightened security of these systems. In order to secure technologically advanced systems and networks, education and the infrastructure to deliver that education is needed to prepare the next generation of professionals as they develop a more secure and ethical computing environment. Therefore, improved tools and more sophisticated techniques are needed to prepare students of technology to recognize the threats and vulnerabilities present in existing systems and learn to design and develop the secure systems needed in the near future. This collection of works is designed to supplement other works in examining the management of information security. The text focuses on specific aspects in the management of information security â?? specifically ether current recommended practices or the legal and ethical issues associated with the following domains:
â?¢ Information Security Policy
â?¢ Information Security Strategic Planning
â?¢ Disaster Recovery and Business Continuity Planning
â?¢ Risk Management
â?¢ Regulatory Compliance
â?¢ Incident Response Planning
â?¢ Information Security Performance Metrics
â?¢ Other topics related to Information Security Management
Call for Proposals and Contributions
This book will use a blind review process to assure that quality subject matter and case materials will be placed into the hands of those who need it most: future information security managers and information technologists. As such, submissions are sought to support the topics listed above within the management of information security focusing on either current recommended practices or legal and ethical issues. Individuals are invited to electronically submit by May 1, 2008, a cover letter and one to three manuscript proposal(s) of at least 200 words but no more than 650 words per proposal. Each proposal must clearly explain the mission and concerns of the proposed contribution(s). Individuals may submit proposals for up to three contributions; however, no more than two proposals per contributor will be accepted. If you wish email confirmation of receipt of your submission, please indicate so in your cover letter. Please do not submit completed manuscripts at this time. If the manuscript is complete, please note that in the proposal and submit an abstract that conforms to the proposal submission requirement.
Authors of accepted proposals will be notified by June 1, 2008 about the status of their proposal(s) and sent guidelines for the preparation of the manuscript. Completed manuscripts must be submitted by
September 1, 2008. All submissions will be reviewed on a blind basis. The editors will make final decisions regarding acceptance, revision or rejection, based on the recommendations of the reviewers and notify authors by October 1, 2008. Those works selected for publication must submit an electronic copy of the final version, and signed contracts for publication no later than November 1, 2008.
The focus of any given submission should be clearly identified in its proposal as being within one of the topic domains listed above and of one of three specific types:
â?¢ Academic survey on the management of information security focusing on current recommended practices associated with one of the defined domains listed earlier. This chapter should be suitable as a complete summary of the current recommended practices for the identified topic. Complete scholarly citation and reference using APA-style is required for this chapter.
â?¢ Academic readings regarding one or more specific aspect the legal and/or ethical issues associated with the management of information security as they affect the specific domain. Suitable scholarly citation and reference using APA-style is required for this chapter.
â?¢ Topical cases exemplifying the management of information security. Cases should provide educational discussion material depicting real or realistic organizational situations and be summarized with discussion questions.
No papers featuring exclusive use of a specific application or product will be published. This is not a venue for marketing literature or market development efforts. Authors who are encouraged to submit multiple proposals or works since there is expected to be some degree of overlap in submissions which will be resolved in the selection process.
Note: All contributors will be expected to serve as reviewers for this project.
Submissions must identify the author, reply postal address, email address for acknowledgment of receipt, domain and type of proposal are to be electronically mailed to RandC.CT@gmail.com with the subject: Readings & Cases in MoIS Vol II submission. The format of your submission must be Microsoft Word or RTF text. Please label all files with your surname and the type of submission (i.e. Whitman_Cover_letter.doc, Whitman_Survey.doc, Whitman_Case and/or Whitman_Reading.doc).
Need for Reviewers
You are cordially invited to become part of this project, by volunteering to serve as a reviewer of submissions. This work is projected to include 20-30 high-quality papers on the management of information security. If you are interested in serving as a reviewer, please email your name, professional title, address, and a brief statement of your qualifications to serve as a reviewer of information security materials the email address listed above. Accepted reviewers will receive prompt notification and specific instructions.
For additional information please contact Michael E. Whitman, Ph.D. at firstname.lastname@example.org or Herbert Mattord, CISM, CISSP at email@example.com.