posted by user: stjoa || 4097 views || tracked by 8 users: [display]

OSA 2010 : The Second International Workshop on Organizational Security Aspects

FacebookTwitterLinkedInGoogle

Link: http://osa.ares-conference.eu
 
When Feb 15, 2010 - Feb 18, 2010
Where Krakow, Poland
Abstract Registration Due Nov 14, 2009
Submission Deadline Oct 20, 2009
Notification Due Nov 1, 2009
Final Version Due Nov 14, 2009
Categories    security   economics   computer   risk management
 

Call For Papers

********************************************************************************


The Second International Workshop on Organizational Security Aspects (OSA 2010)


********************************************************************************

To be held in conjunction with the Fifth International Conference on Availability, Reliability and Security (ARES 2010 – http://www.ares-conference.eu).

February 15th – 18th, 2010
Andrzej Frycz Modrzewski Cracow College
Krakow, Poland

In today's global economy, where conditions change often and rapidly, the efficiency and effectiveness of the execution of business processes has become a central issue. As these processes depend on the

assigned resources, a considerable optimization focus lies on the minimization of the resources' costs and simultaneously on the maximization of their returns. Another critical factor, which substantially

influences the ability to compete, is the continuous operation of a company's business processes. The reasons why the execution of business processes may be interrupted are manifold and are addressed by

several fields of research.
Exercising for instance strong computer security is a company’s crucial task in order to strengthen the resilience of IT systems against arising threats. However, the most sophisticated technical security

techniques will fail, if there is no adequate organizational structure covering the appropriate planning, design and implementation of these techniques. Furthermore, processes within the companies have to be

set up, lived and monitored to continuously improve the company’s ability to survive while simultaneously maximizing its returns.

The main objectives of this workshop are to bring together users and researchers (from industry and academy) to present their recent work, discuss and identify problems, synergize different views on methods

and techniques, and brainstorm future research directions on various aspects of organizational security issues.


***********************************

TOPICS

***********************************
Topics of interest comprise but are not limited to:
- Auditing

- Business Continuity

- Cost/Benefit Analysis

- Disaster Recovery

- Identity Management

- Information Assurance

- Information Security Management

- Insider Threats

- IT Governance

- IT Service Continuity

- Risk Management

- Security Awareness

- Security Culture

- Security Requirements Engineering

- Standards, Guidelines, Best Practices and Certification



***********************************

IMPORTANT DATES

***********************************
Submission Deadline October 20th, 2009
Author Notification November, 01st 2009
Author Registration November, 14th, 2009
Proceedings Version November, 14th 2009
Conference/Workshop February, 15th - 18th 2010


**********************************

SUBMISSION GUIDELINES

**********************************
The submission guidelines valid for the OSA workshop are the same as for the ARES conference. They can be found at:
http://www.ares-conference.eu/conf/index.php/submission-guidelines
Submission of a paper implies that should the paper be accepted, at least one of the authors will register and present the paper in the conference.
Accepted papers will be given guidelines in preparing and submitting the final manuscript(s) together with the notification of acceptance.
All accepted papers will be published as ISBN proceedings published by the IEEE Computer Society - Conference Publishing Services (CPS).


**********************************

Workshop Co-Chairs

**********************************
Gerald Quirchmayr
University of Vienna and University of South Australia
Gerald[dot]Quirchmayr[at]univie[dot]ac[dot]at

Tsetsutaro Uehara
Kyoto University
uehara[at]media[dot]kyoto-u[dot]ac[dot]jp


**********************************

Program Committee

**********************************
Helen Armstrong, Curtin Univeristy of Technology, Australia
Dorothea Aniola, Sail Labs Technology, Vienna, Austria
Maximilian Bielecki, University of Vienna, Austria
Chrsitophe Feltus, Centre de Recherche Public Henri Tudor, Luxembourg
Eduardo Fernandez, Florida Atlantic University, USA
Nandan Garg, Wayne State Univeristy, USA
Yoshiaki Hori, Kyushu University, Japan
Stefan Jakoubi, Secure Business Austria, Austria
Jorma Kajava, Oulu University, Finland
Sokratis A. Katsikas, University of Piraeus, Greece
Günther Pernul, Univeristät Regensburg, Germany
Reijo Savola, VTT Research, Finland
Simon Tjoa, St. Pölten University of Applied Sciences, Austria
Benjamin Turnbull, University of South Australia, Australia
José L. Vivas, Universidad de Malaga, Spain
Matthew Warren, Deakin University, Australia
Christopher C. Wills, Kingston University, UK
Louise Yngström, Stockholm University, Sweden

Related Resources

CASON 2020   The 9th International Conference on Computational Aspects of Social Networks
ICSD 2020   8th International Conference on Sustainable Development,9 - 10 September ICSD 2020
CogSIMA 2020   2020 IEEE Conference on Cognitive and Computational Aspects of Situation Management
SP 2020   IEEE Symposium on Security and Privacy
PST 2020   18th Annual International Conference on Privacy, Security, and Trust (PST2020)
CSW 2021   2021 International Workshop on Cyber Security (CSW 2021)
IEEE COINS 2020   Internet of Things IoT | Artificial Intelligence | Machine Learning | Big Data | Blockchain | Edge & Cloud Computing | Security | Embedded Systems | Circuit and Systems | WSN | 5G
CPCS 2020   Call for Chapters: Security and Privacy in Cyber-Physical Systems: Threats and Defenses
SPTM 2020   8th International Conference of Security, Privacy and Trust Management
CANS 2020   Cryptology and Network Security