A ACM S SIGMIS a
Transcription
A ACM S SIGMIS a
C Call for Papers P A ACM SIGMIS S S Comp puters a and Pe eople Resear R rch 201 15 http:///www.sigmis.o org ber Securrity Workfforce in the t Globa al Contex xt Cyb L Location: Newport Beach, California USA U JJune 4-6, 2015 C Conferenc ce website e: http://w www.sigmiis.org/sigccpr2015 S Submissio on website e: https://e easychairr.org/confe erences/? ?conf=acm msigmiscp pr2015 NT DATES IMPORTAN P Paper submisssion N Notification of o acceptancee C Camera-readyy papers netw worked assetss from attacck by hackerrs, insider threa ats, and unkn nown adversa aries. Often, managing riskss means b balancing security and privacy conccerns. The recent revvelations by Edward Snow wden, an IT contractor w working for th he United State es National Security A Agency, high hlight this tens ion between n security an nd privacy. Important omputers and d people” researchers quesstions for “co (CPR R) include: how are cybersecurity proffessionals man aging this tension? a are they a adequately pared to do so? are futture members of the prep cybe ersecurity wo orkforce being g adequately prepared to ta ake on the p privacy and ssecurity challlenges of tomo orrow? Answ wers to these e questions a are being conssidered throug gh efforts succh as the 2013 United State es National Research Co ouncil investtigation of profe essionalizatio on in buildin ng the cyb bersecurity workkforce. It sseeks to sh hed light o on which profe essionalizatio on activities (e.g., ce ertification, licen nsure, codess of ethics, continuing education requ uirements) miight positivelyy impact ourr ability to crea ate a workfo orce capable e of addresssing the erging threat. W We believe th hat the “CPR”” research eme nswers. com munity can also provide an addition to the cyber security topics listed In a here eunder, autho ors are invite ed to submitt work on topiccs related to Computers and People research and practice traditionally prese M SIGMIS ented at ACM R. CPR Dec. 199, 2014 Februaary 20, 2015 March 29, 2015 C Conference e Theme T The theme of o this conferrence is time ely given the e g global deman nd for a cy ybersecurity workforce off ssufficient scop pe and capab bility to meet ever-growing g ccybersecurity threats. T The 2013 (ISC)2 Glob bal Informatiion Security y W Workforce Sttudy revealed d that even with double-d digit growth in recent years, and d significantt in nvestments in n the develop pment of the cybersecurity y w workforce fro om national governments s and otherr sstakeholders across the globe, the demand forr ccybersecurity nals still significantly y profession o outpaces the e supply. Se ecurity profe essionals are e ccritical to the successful im mplementation of strategic c ccybersecurity initiatives, technical cybersecurity y p products, an nd security awareness s programs. A Accordingly, the vitality y of the cybersecurity y w workforce, an nd the vulne erability to ou ur networked d in nfrastructure and data sto ores posed by b a shortage e o of qualified prrofessionals, is an urgent priority p facing g the global ec conomy. The e National Association A off S State Chief Information I Officers O (NAS SCIO) in the e U United States s ranked sec curity as the number one e sstrategic management prio ority in 2014. This concern n iss shared by individuals, i organizations, o and national sstate governm ments alike. The T increasin ngly complex x g global environment in n which cybersecurity y p professionals must op perate includes rapid d a advancements in technolo ogy artifacts (e.g., mobile e d devices) and evolving in nfrastructures (e.g., cloud d ccomputing, so ocial media) that supportt changes in n u user behaviorr. A As the (ISC)2 report indic cates, these professionals s m must manage e a dynamic set of risks wh hile defending g The DATA BASE for Advances in Information Systems Con nference L Location The conference will be held d in Newport Beach, Califfornia. Hotel information and logisticcs will be anno ounced in upccoming weekss. Listt of Releva ant Topics ACM M SIGMIS CPR 2015 we elcomes rese earch and pracctice submissions that add dress issues ccongruent with the conference theme. Th hese topics include, but not limited to: are n 72 Volume 45, Number 4, November 2014 consortium should submit a 10-page research proposal (including all text, figures, and references) to be reviewed by a panel of highly qualified senior faculty mentors. The 3-5 students selected to participate in the doctoral consortium will receive two rounds of written feedback on their proposal. At the conference, each student will have 40-60 minutes to present their research ideas and receive feedback in-person from six-to-eight experienced CPR researchers. Additional information, including submission deadlines, can be found at http://www.sigmis.org/sigcpr2015. Cyber security professionals (attraction, retention and development) Recruitment and retention of IT and IT security related “majors” Workplace security policies: compliance implications for managers and employees Managers’ beliefs and attitudes toward information privacy and security IT personnel perspectives on IT and information security and privacy Financial factors and “Return on Investment” in hiring and retaining IT security personnel Making a business case for organizational investment in IT security personnel Staffing models for IT security personnel Role of IT personnel in organizational response to data security breaches Employee monitoring, surveillance and privacy Information security technologies, operations, controls and human behavioral controls Implications of privacy, security and confidentiality laws and regulations on IT professionals The role of IT personnel in workplace monitoring and surveillance Education and preparation programs for cyber security IT professionals Personnel implications of cyber warfare, cybercrimes, and cyber terrorism Knowledge, skills, and abilities required to become an IT security professional in the coming decade Challenges of maintenance and securing of electronic records in the workplace IT security personnel work satisfaction and turnover in the workplace The impact of social media and open culture on confidentiality, privacy and security Diversity in the cyber security workforce Professionalization of the cyber security workforce Student Research Competition Students’ posters and demo submissions will be entered into the ACM Student Research Competition. Qualified entrants must have current ACM student membership, have graduate or undergraduate student status at the time of submission, and be the only student working on the project. While not mandatory, entrants are encouraged to submit a letter from their advisor describing the specific contributions made by the student. High School, Undergraduate and Graduate students will be treated in separate divisions (students starting their first year of graduate school at the time of the conference will be considered as undergraduates). Format of Submissions ACM SIGMIS CPR 2015 welcomes completed research papers, research-in-progress papers, industry case studies, or proposals for panel discussions or tutorials. All papers must be original, unpublished elsewhere, and in the style of MIS Quarterly. All reviewing will be double-blind. ● Completed research papers must not exceed 5000 words or 28 double-spaced pages including all text, figures, and tables. The cover page, abstract, keywords, and references are excluded from this page count. ● Research-in-progress papers must not exceed 2000 words or 12 double-spaced pages including all text, figures, and tables. The cover page, abstract, keywords, and references are excluded from this page count. ● Panel and tutorial proposals must include the names and affiliations of panelists who have agreed to participate and a 1-2 page summary of the topic, including a description of how the session will be structured. ● Industry case studies may report specific strategies being employed or under development to address CPR issues and should be no longer than 3500 words or 21 doublespaced pages including all text, figures, and Doctoral Consortium A doctoral consortium will take place on the day prior to the conference. This doctoral consortium is targeted for students who are at an early stage of writing their dissertation proposal (typically in the 2nd or 3rd year in a doctoral program), and who are conducting research on a CPR topic. The purpose of the consortium is two-fold: 1) provide feedback and guidance to students on their proposal while at a stage where feedback can be considered for future dissertation work, and 2) provide mentoring and networking opportunities to students who wish to pursue careers as CPR researchers. Doctoral students must be nominated to the consortium by a faculty sponsor. Students nominated for the The DATA BASE for Advances in Information Systems 73 Volume 45, Number 4, November 2014 ● tables. The cover page, abstract, keywords, and references are excluded from this page count. Posters/demo sessions provide an opportunity to showcase work-in-progress in an informal setting. Authors should submit a two-page abstract in PDF format describing what the poster would present. The abstract should clearly state: (a) the problem being addressed; (b) what makes this problem interesting, important, and difficult; (c) your approach to the problem; and (d) the key contribution. In the final version of the abstract, you should include a URL that provides additional information about your work. We strongly encourage doctoral, masters, undergraduate, community college and high school research student submissions. The SIGMIS 2015 Poster and Demo committee will review all posters and demo proposals. Authors of accepted posters must present student posters at the conference and have a printed version of the abstract or poster to handout to attendees. all previous CPR conferences are available in the ACM Digital Library at http://portal.acm.org/dl.cfm. Conference Committee Conference Co-Chairs Diana Burley, The George Washington University, USA ([email protected]) Indira Guzman, Trident University International, USA ([email protected]) Program Co-Chairs Daniel P. Manson, California State Polytechnic University, Pomona, USA ([email protected]) Leigh Ellen Potter, Griffith University, Australia ([email protected]) Local Arrangements Co-Chairs Conrad Shayo, Cal State San Bernardino, USA ([email protected]) Treasurer Poster Requirements Susan Yager, Southern Illinois University Edwardsville, USA ([email protected]) A poster is A0 paper size in portrait mode (841 × 1189mm), to which you can affix visually appealing material that describes your research. Alternatively, you can use the space as a continuum. You should prepare the best material (visually appealing and succinct) that effectively communicates your research problem, techniques, results, and what is novel/important about the work. Publicity Co-Chairs Americas Region: Joon Park, Syracuse University, USA ([email protected]) Conrad Shayo, Cal State San Bernardino, USA ([email protected]) European Region: Proceedings Andreas Eckhardt, Goethe University Frankfurt, Germany ([email protected]) Accepted papers will be published by ACM in the refereed conference proceedings, which will be distributed at the conference. Completed research and case study papers will be published in their entirety. Extended abstracts will be published for panel discussions and research-in-progress papers. All presented papers will be considered for the Magid Igbaria Outstanding Conference Paper of the Year Award. The Magid Igbaria Outstanding Conference Paper and other exemplar papers will be invited for publication in the DATA BASE for Advances in Information Systems – the quarterly journal publication of ACM SIG-MIS. Proceedings of Austral-Asia-Pacific Region: Rajendra Bandi, Indian Institute of Management Bangalore, India ([email protected]) Doctoral Consortium Co-Chairs Lorne Olfman, Claremont Graduate University, USA ([email protected]) Damien Joseph, Nanyang Technological University, Singapore ([email protected]) Submission Website: https://easychair.org/conferences/?conf=acmsigmiscpr2015 The DATA BASE for Advances in Information Systems 74 Volume 45, Number 4, November 2014