posted by organizer: mitko_bogdanoski || 2101 views || tracked by 6 users: [display]

IGI Global 2015 : Call for Chapters: Handbook of Research on Civil Society and National Security in the Era of Cyber Warfare


When N/A
Where N/A
Abstract Registration Due Sep 30, 2014
Submission Deadline Oct 30, 2014
Notification Due Jan 5, 2015
Final Version Due Mar 15, 2015
Categories    cyber security   cyber warfare   national security   digital forensics

Call For Papers

Metodi Hadji-Janev (Military Academy "General Mihailo Apostolski")
Mitko Bogdanoski (Military Academy "General Mihailo Apostolski")

Call for Chapters
Proposals Submission Deadline: September 30, 2014
Full Chapters Due: October 30, 2014
Submission Date: March 15, 2015

For release in Advances in Digital Crime, Forensics, and Cyber Terrorism Book Series
ISSN: 2327-0381
The Advances in Digital Crime, Forensics, and Cyber Terrorism (ADCFCT) Book Series seeks to publish the latest research in diverse fields pertaining to crime, warfare, terrorism and forensics in the digital sphere. By advancing research available in these fields, the ADCFCT aims to present researchers, academicians, and students with the most current available knowledge and assist security and law enforcement professionals with a better understanding of the current tools, applications, and methodologies being implemented and discussed in the field.

The existence of a modern society nowadays is almost inconceivable without having to follow the latest technological achievements. The dependence of the individuals and society on computer systems, communications, robotics, drones and other advance technology, is like never before. People, machines, businesses, organizations and even things have ever increasing need for communication in everyday life. Nevertheless, besides the positive effects, the global connectivity and easy access to the modern technologies also enables malicious users in their activities. They can access in the systems and networks without authorization, and moreover the global network offers them an opportunity to bind together across the globe, thus increasing their capacities and capabilities.

The cases such as Estonian and Georgian cyber attacks, or Stuxnet-like cases, rising concerns about the effects that attacks from cyberspace can cause to the overall society. Due to the interconnectivity and their interrelations the systems of networks today bring benefits, but also vulnerable to the civil society too. The air-traffic controllers, the electricity grid, transport, in fact the entire economy depend on the computers as the armed forces do too. Hence the modern military’s dependence on civilian networks definitely puts civilian society’s information infrastructure a new center of gravity to target.

Apart from this today it is well known that cyber attacks are disproportionate to the sophistication, efforts and cost to launch the attack. The threat is real and affects our security in physical, information, cognitive and social context. As a result, the need to build “resilience” against such shocks has become one of the magic words of cyber security. Today, it is also well accepted that regulatory authorities need to focus attention on enhancing infrastructure resilience. If we are about to keep the commodity, welfare and benefits from cyberspace, we need to build effective and cyber resilient society. We need to improve our woefully inadequate approach to the cyber space. This will enable our systems to withstand the attack or failure, maintain an acceptable mode of operation, manage the consequences in a careful and timely manner, mitigate negative effects and fight back effectively while operating in the shared network of networks.

The academic community has long considered resilience in the context of disaster prevention, emergency preparedness, environmental sciences and even social psychology. After 9/11 this concept has turned attention to the security professionals too. However, according to some views resilience is one of those concepts that are both overused and underexplored. Part of the challenges stem from the fact that there is an absence of common understanding of what constitutes the resilience (for example for different countries the term has different meaning). Another challenge comes from the absence of developing methods to measure and asses the resilience. Finally to build resilience in an age of dynamic and rapid change governments needs permanent structural and conceptual changes and adjustments.

Addressing these challenges requires a comprehensive approach that will enable one to understand the drivers behind multidimensional societal resilience to the threats from cyberspace in general and cyber war in specific. Eventually building resilience to cyber war threats is not only a matter of architecture and organization, it is about the people and processes in the society as a whole.

This book will present academic and professional articles that consider the issues associated with the cyber war and the approaches in building cyber resilient societies to it. It will provide an overview of the state of the art developments in the area of cyber warfare and explain how different kind of cyber operations could harm the civil society. Giving that these threats are real and that there is growing acceptance among the academic and expert community for building cyber resilient society the book will heavily focus on this subject too. Although many have already addressed different aspects of cyber warfare or on building resilience, there are few who have addressed building cyber resilient society as whole and even fewer who have connected cyber war and resilience to it.

The clear benefits of this book, however, will stem from the fact that the authors (academicians and experts) will explore current trends and challenges in building cyber resilient society from different aspects. Articles will focus on technical (IT), organization-policy (public and private sector), operational (military and civil defense approach), legal (International Law of Armed Conflict-ILOAC and International Human Rights Law-IHRL), and economic aspects and best practices in building cyber resilient society to cyber war.

Writings from the distinguished experts and academicians on the subjects that address the whole of the societies approach in building cyber resilience against cyber war activities will have great influence in our future work in this field. It will expand our ability in providing academic and professional advise to Macedonian government in developing appropriate cyber strategy especially in the context of building cyber resilient society. Giving that in this context all of the South East European countries share the same challenges as Macedonia, and the same is true for most of the NATO and EU countries, we believe that this book will serve not just as a platform for future researches, but also as a contributor to the overall academic and professional efforts in creating secure cyberspace for our societies.

Target Audience
The book will target multiple audiences. It will have an interdisciplinary theoretical and practical approach to the treats from cyber war and cyberspace operations to the civil society. It could be used as guidance for the government officials and the academia in implementing the whole of the government approach while building cyber resilient society from cyber war. Furthermore, it could be used as a platform for further research and writings on the technical, strategic-policy, operational, corporate, legal and economic aspects of building cyber resilient societies. The target audience of this book will be composed of professionals and researchers working in the field of policy/strategy making, cyber-operations (military and civilians), cyber security, national CERT's, legal aspects of human rights protection in the cyberspace, legal aspects of cyber warfare, economic aspects of cyber war and business continuity experts for cyber security. The book will be also suitable for graduate students, researchers, academia, and industry practitioners working in the area of cyber security who want to improve their understanding of the latest developments in this field, as well as representatives of government and NGOs.

Recommended Topics
The authors are invited to submit original contributions on all aspects of cyber warfare, cyber operations, and different aspects of building cyber resilient society to cyber warfare activities.

Recommended topics include, but are not limited to, the following:
Cyber Warfare
Cyber Operations
Cyber Espionage
Cyber Threats
Cyber Attacks
Cyber Security
System Security
Network Security
Cyber Policy
Cyber Strategy
Malwares and Botnets
Wireless Security
Mobile Security
Cyber Crime
Cyber Terrorism
Cyber Conflict
Patriotic Hackers
Intrusion Tolerance
All aspects of resilience in cyber space (from technical, operational, strategic policy, legal and economic aspects)
Risk Assessment
Incident Response
Consequence Management
Legal aspects of the Cyber security - ILOAC and IHRL aspects
Critical Information Infrastructure Protection
Warfare & Critical Infrastructure Protection

These are the tentative topics that the book will cover:

Part 1: Threats from cyber warfare activities to the civil society
Understanding the contemporary Cyber Security
Cyber Warfare - how real is the threat?
Cyber Operations
Cyber Espionage
Part 2: Toward resilient society against cyber war
The philosophy of resilience
Addressing the Challenges to measure cyber resilience of the civil societies in the context of cyber war
Social, organizational (structural) and cultural perspectives of cyber resilience
Technical aspects of resilience in cyberspace
The critical information infrastructure resilience
Operational aspects (focus on different processes) of cyber resilience
Operational aspects (focus on human factor capacities) of cyber resilience
Applying International Law of Armed Conflict to protect civilians from cyber war
Protecting civilians from cyber war activities while respecting the International Human Rights Law principles
Ensuring business and economic continuity in time of cyber war
Building cyber resilient society through forging the global partnership

Submission Procedure
Researchers and practitioners are invited to submit on or before June 30, 2014, a 2-3 page chapter proposal clearly explaining the mission and concerns of his or her proposed chapter. Submissions should be made through the link at the bottom of this page. Authors of accepted proposals will be notified by July 30, 2014 about the status of their proposals and sent chapter guidelines. Full chapters are expected to be submitted by October 30, 2014. All submitted chapters will be reviewed on a double-blind review basis. Contributors may also be requested to serve as reviewers for this project. Proposals should be submitted through the link at the bottom of this page.

This book is scheduled to be published by IGI Global (formerly Idea Group Inc.), publisher of the "Information Science Reference" (formerly Idea Group Reference), "Medical Information Science Reference," "Business Science Reference," and "Engineering Science Reference" imprints. For additional information regarding the publisher, please visit This publication is anticipated to be released in 2015.

Important Dates
September 30, 2014: Proposal Submission Deadline
October 05, 2014: Notification of Acceptance
October 30, 2014: Full Chapter Submission
January 5, 2015: Review Results Returned
February 28, 2015: Final Acceptance Notification
March 15, 2015: Final Chapter Submission

Dr. Metodi Hadji-Janev, Military Academy "General Mihailo Apostolski", an associated member of "Goce Delcev" University, R. Macedonia

Dr. Mitko Bogdanoski, Military Academy "General Mihailo Apostolski", an associated member of "Goce Delcev" University, R. Macedonia

Related Resources

SIGIR 2017   The 40th International ACM SIGIR Conference on Research and Development in Information Retrieval
AIP Special Issue 2016   Journal Acta Informatica Pragensia - Special Issue on Systems
IJITSA - IoT Challenges 2016   IGI Global IJITSA journal -) Computing Challenges on IoT and Pervasive Systems
IJISS 2016   International Journal of Information Security Science (IJISS)
SI: Digital Forensics 2017   Call for Papers for Special Issue on Digital Forensics for IEEE S&P magazine
ICSCER 2017   2017 International Conference on Structure and Civil Engineering Research (ICSCER 2017)
10th SEE Economic Research Workshop 2016   Bank of Albania Call for Papers - 10th South-Eastern European Economic Research Workshop
SeMoCloud 2017   The International Workshop on The Security, Privacy, and Digital Forensics of Mobile Cloud
ACMRS Conference 2017   23rd Annual ACMRS Conference (2017) – Call for Papers
WICSPIT 2017   IoTBDS/SMARTGREENS Workshop -- Innovative CyberSecurity and Privacy for Internet of Things: Strategies, Technologies, and Implementations