The 15th Annual Security Conference is scheduled for March 29-31, 2016. The conference is part of the Vegas Conferences organized by the Information Institute. Co-organizers for the 2015 event are Virginia Commonwealth University, Plymouth University, The University of South Carolina and DePaul University. Administrative offices for the conference are at Virginia Commonwealth University.
Conference theme for 2016 is: Internet of Things and Security
Call for Papers
Security, assurance and privacy challenges are abound. Advances in information and communication technologies have brought many security problems to the fore. Such problems may be technical in nature or organizationally grounded. Whatever be the nature and scope of the security problems, there is a need to engage in discourses pertaining to security, assurance and privacy. To that effect we welcome participation in the Annual Security Conference.
Topic areas covered in the conference include, but are not limited to the following:
- Cyber security in specific sectors (healthcare, baking, government etc)
- Cyber terrorism
- Digital forensics
- Electronic espionage
- Ethical and legal aspects of security
- Intrusion detection and prevention
- IT audit and control
- Risky habits risky behaviors
- Security and BYOD
- Security breaches and data analytics
- Security governance
- Security in social media and online communities
- Security policies
- Socio-technical aspects of security
- System vulnerabilities and risk exposure
- Technology enabled crime
Papers submission deadline: January 15, 2016. We allocate papers for review as these are submitted. Early submission is recommended.
Notification of acceptance: All decisions are emailed by February 15, 2016
Final version of papers: March 1, 2016 (please use this Template)
Participation can be in the following categories (but not limited to):
Industry Participants: If you have an interesting story to share we welcome your participation. We can guarantee an engaging participation from the floor, where you can discuss and talk freely about what you have been thinking. We just require a title of your presentation, a few lines describing your topic area and a brief biographical note (about a 100 words). If you agree, we will video record your presentation and make it available for a wider audience. If you rather not be recorded, we understand. Requirement: Please submit via our submission system. On acceptance, you will be required to register for the conference.
Academic Participants: We encourage you to submit an abstract, a full paper, a research note, or a case study. There are two modes of submission. You can decide which one works best for you. Please format the paper as per APA: http://www.apastyle.org
a) Traditional Peer Review Submissions. In this submission mode you are simply uploading you paper into our conference submission system. The length of the paper can be anywhere between 5-10,000 words. A double blind peer review will be performed. Publishing opportunity: All submissions are considered for possible fast tracking to the European Journal of Management Studies, Journal of Information System Security, Information and Computer Security. If your paper is not fast tracked, you can still publish in an edited book.
b) Abstract/Extended Abstract Submissions. If you are simply presenting an idea to generate some discussion and enter into a discourse, you can submit an abstract (100 words) or an extended abstract (unto 1000 words).
c) Case Studies. We particularly welcome cyber security case studies that document a breach. The length of the paper can be anywhere between 5-10,000 words.
All submissions should be through the conference management system.