posted by user: ecihewu || 4540 views || tracked by 4 users: [display]

Behavioral Information Security Research 2014 : Behavioral Information Security Research with Emerging Technologies

FacebookTwitterLinkedInGoogle

Link: http://academics.utep.edu/Portals/3241/proposal_security_behavior.pdf
 
When N/A
Where N/A
Submission Deadline Feb 15, 2014
Notification Due Mar 31, 2014
Final Version Due May 15, 2014
Categories    information security   information systems
 

Call For Papers

We are soliciting papers for a special issue in Journal of Information Privacy & Security (JIPS). Recent NSF “Secure and Trustworthy Cyberspace” program solicitation recognizes the importance of human behavior when designing, building and using cyber security technology. Studies show that incorporating an understanding of human behavior into cyber security products and processes can lead to more effective technology (Pfleeger & Caputo, 2012).

With the rapid development of emerging technologies such as Web 2.0, social media, mobile technology, virtual environment, online role-playing games, massive open online course (MOOC) systems, cloud computing and Internet of Things, better understanding of human behaviors with these emerging technologies is greatly needed. This special issue of JIPS is intended to provide an important venue for collecting high quality research and papers relating to behavioral information security research with emerging technologies.

Topics of Interest (but are not limited to):
• Encouraging information security behavior with the use of emerging technologies in organizations
• Promoting secure behavior with emerging technologies among Internet users
• Organizations’ security & privacy concerns with emerging technologies
• Leveraging behavioral science to mitigate cyber security risk
• Behavioral and cognitive research into security design, development, implementation, and use of emerging technologies
• Methods to train end-users to improve their cyber security behavior
• End-users’ motivation of practicing secure behavior with emerging technologies
• Strategies for decreasing risky user behavior with emerging technologies
• Human factor and information security behavior
• Social engineering and emerging technologies
• Case studies of behavior information security in different industries such as health care, business, engineering, entertainment and education
• Other related topics


Tentative Important Dates:
Initial submissions due: February 15, 2014
Notification to authors: March 31, 2014
Revised papers due: May 15, 2014
Publication of the issue: Fall or Winter of 2014

Submission Guidelines:

Prospective authors are encouraged to submit an abstract, as early as feasible, to the Guest Editors for preliminary review on the appropriateness of their expected manuscript. Please forward your submission in Microsoft Word format by e-mail to Dr. Wu He at whe@odu.edu and Dr. Xiaohong Yuan at xhyuan@ncat.edu. You need to ensure that all identification information is removed from your manuscript and its meta-data prior to submission, as submissions will be doubled-blind reviewed. The submission guideline can be found at http://academics.utep.edu/Default.aspx?tabid=72777

Guest Editors:
• Dr. Wu He
Assistant Professor of Information Technology
Department of Information Technology & Decision Sciences
College of Business and Public Administration
Old Dominion University, Norfolk, VA 23529
whe@odu.edu

• Dr. Xiaohong Yuan
Associate Professor of Computer science
Department of Computer Science
North Carolina A&T State University
Greensboro, NC 27411
xhyuan@ncat.edu

Related Resources

JISA-CYBER-SEC 2020   Special Issue on Trends in Cybersecurity, Journal of Information Security and Applications, Elsevier
AIP Journal - Indexed in Scopus 2020   Journal of Social and Business Informatics - Acta Informatica Pragensia
NISecurity 2021   2021 International Conference on Network and Information Security (NISecurity 2021)
ACM--ICSIE--Ei Compendex, Scopus 2020   2020 9th International Conference on Software and Information Engineering (ICSIE 2020)--ACM, Ei Compendex, Scopus
RDAAPS 2021   Reconciling Data Analytics, Automation, Privacy, and Security: A Big Data Challenge
ICISPP--IEEE, Ei, Scopus 2020   IEEE--2020 International Conference on Information Security and Privacy Protection (ICISPP 2020)--Ei Compendex, Scopus
CISDM 2020   2020 2nd Euro-Asia Conference on Information System and Data Mining (CISDM 2020)
KEOD 2020   12th International Conference on Knowledge Engineering and Ontology Development
FCSIT 2020   2020 2nd Euro-Asia Conference on Frontiers of Computer Science and Information Technology (FCSIT 2020)
CSW 2021   2021 International Workshop on Cyber Security (CSW 2021)