posted by user: stjoa || 3596 views || tracked by 8 users: [display]

OSA 2010 : The Second International Workshop on Organizational Security Aspects

FacebookTwitterLinkedInGoogle

Link: http://osa.ares-conference.eu
 
When Feb 15, 2010 - Feb 18, 2010
Where Krakow, Poland
Abstract Registration Due Nov 14, 2009
Submission Deadline Oct 20, 2009
Notification Due Nov 1, 2009
Final Version Due Nov 14, 2009
Categories    security   economics   computer   risk management
 

Call For Papers

********************************************************************************


The Second International Workshop on Organizational Security Aspects (OSA 2010)


********************************************************************************

To be held in conjunction with the Fifth International Conference on Availability, Reliability and Security (ARES 2010 – http://www.ares-conference.eu).

February 15th – 18th, 2010
Andrzej Frycz Modrzewski Cracow College
Krakow, Poland

In today's global economy, where conditions change often and rapidly, the efficiency and effectiveness of the execution of business processes has become a central issue. As these processes depend on the

assigned resources, a considerable optimization focus lies on the minimization of the resources' costs and simultaneously on the maximization of their returns. Another critical factor, which substantially

influences the ability to compete, is the continuous operation of a company's business processes. The reasons why the execution of business processes may be interrupted are manifold and are addressed by

several fields of research.
Exercising for instance strong computer security is a company’s crucial task in order to strengthen the resilience of IT systems against arising threats. However, the most sophisticated technical security

techniques will fail, if there is no adequate organizational structure covering the appropriate planning, design and implementation of these techniques. Furthermore, processes within the companies have to be

set up, lived and monitored to continuously improve the company’s ability to survive while simultaneously maximizing its returns.

The main objectives of this workshop are to bring together users and researchers (from industry and academy) to present their recent work, discuss and identify problems, synergize different views on methods

and techniques, and brainstorm future research directions on various aspects of organizational security issues.


***********************************

TOPICS

***********************************
Topics of interest comprise but are not limited to:
- Auditing

- Business Continuity

- Cost/Benefit Analysis

- Disaster Recovery

- Identity Management

- Information Assurance

- Information Security Management

- Insider Threats

- IT Governance

- IT Service Continuity

- Risk Management

- Security Awareness

- Security Culture

- Security Requirements Engineering

- Standards, Guidelines, Best Practices and Certification



***********************************

IMPORTANT DATES

***********************************
Submission Deadline October 20th, 2009
Author Notification November, 01st 2009
Author Registration November, 14th, 2009
Proceedings Version November, 14th 2009
Conference/Workshop February, 15th - 18th 2010


**********************************

SUBMISSION GUIDELINES

**********************************
The submission guidelines valid for the OSA workshop are the same as for the ARES conference. They can be found at:
http://www.ares-conference.eu/conf/index.php/submission-guidelines
Submission of a paper implies that should the paper be accepted, at least one of the authors will register and present the paper in the conference.
Accepted papers will be given guidelines in preparing and submitting the final manuscript(s) together with the notification of acceptance.
All accepted papers will be published as ISBN proceedings published by the IEEE Computer Society - Conference Publishing Services (CPS).


**********************************

Workshop Co-Chairs

**********************************
Gerald Quirchmayr
University of Vienna and University of South Australia
Gerald[dot]Quirchmayr[at]univie[dot]ac[dot]at

Tsetsutaro Uehara
Kyoto University
uehara[at]media[dot]kyoto-u[dot]ac[dot]jp


**********************************

Program Committee

**********************************
Helen Armstrong, Curtin Univeristy of Technology, Australia
Dorothea Aniola, Sail Labs Technology, Vienna, Austria
Maximilian Bielecki, University of Vienna, Austria
Chrsitophe Feltus, Centre de Recherche Public Henri Tudor, Luxembourg
Eduardo Fernandez, Florida Atlantic University, USA
Nandan Garg, Wayne State Univeristy, USA
Yoshiaki Hori, Kyushu University, Japan
Stefan Jakoubi, Secure Business Austria, Austria
Jorma Kajava, Oulu University, Finland
Sokratis A. Katsikas, University of Piraeus, Greece
Günther Pernul, Univeristät Regensburg, Germany
Reijo Savola, VTT Research, Finland
Simon Tjoa, St. Pölten University of Applied Sciences, Austria
Benjamin Turnbull, University of South Australia, Australia
José L. Vivas, Universidad de Malaga, Spain
Matthew Warren, Deakin University, Australia
Christopher C. Wills, Kingston University, UK
Louise Yngström, Stockholm University, Sweden

Related Resources

ESORICS 2019   The 24th European Symposium on Research in Computer Security
ICSD 2019   7th International Conference on Sustainable Development,4 - 5 September ICSD 2019
BIOC 2019   2nd Workshop on Blockchains for Inter-Organisational Collaboration
EJSD Journal 2019   European Journal of Sustainable Development
CogSIMA 2019   IEEE Conference on Cognitive and Computational Aspects of Situation Management
ETRIJ Cyber Security & AI 2019   ETRI Journal Special issue on Cyber Security and AI
CHASE 2019   12th International Workshop on Cooperative and Human Aspects of Software Engineering
ACISP 2019   The 24th Australasian Conference on Information Security and Privacy
SPT-SN-IoT 2019   Special Issue Security, Privacy, and Trustworthiness of Sensor Networks and Internet of Things
ICTAC 2019   16th International Colloquium on Theoretical Aspects of Computing