As information and communication technologies permeate our lives, ethics and the ethical considerations of our actions become important. This is particularly important in light of how we interact with technology and how it allows us to interact with each other. In many ways, central to all communication is our ability to maintain and sustain ethical relationships, within and beyond the confines of an enterprise. The Ethics Conference aims to generate a dialogue around these topics and is part of the Vegas Conferences, which are organized by the Information Institute. The organizer for 2016 event is Winona State University.
Call for Papers
Technology has become so integrated in society, examining ethical issues surrounding technology can be challenging. Whether it is social networking to simple emails updates, it is paramount that discourse on ethical implications and how to find a balance between the rights and wrongs of using information technology every day.
Topics area covered in the conference, but not limited to include:
– Professional ethics
– Ethics and the Internet
– Ethics and social implications
– Ethics and data mining
– Ethics and privacy
– Ethics and property
– Ethics at workplace
– Ethics and computer games
– Computer ethics
– Ethics and codes of practice
– Professional Responsibility and Globalization
- Ethics and Education
Papers submission deadline: January 15, 2016. We allocate papers for review as these are submitted. Early submission is recommended.
Notification of acceptance: All decisions are emailed by February 15, 2016
Final version of papers: March 1, 2016 (please use this Template)
Participation can be in the following categories (but not limited to):
Industry Participants: If you have an interesting story to share we welcome your participation. We can guarantee an engaging participation from the floor, where you can discuss and talk freely about what you have been thinking. We just require a title of your presentation, a few lines describing your topic area and a brief biographical note (about a 100 words). If you agree, we will video record your presentation and make it available for a wider audience. If you rather not be recorded, we understand. Requirement: Please submit via our submission system. On acceptance, you will be required to register for the conference.
Academic Participants: We encourage you to submit an abstract, a full paper, a research note, or a case study. There are three modes of submission. You can decide which one works best for you. Please format the paper as per APA: http://www.apastyle.org
a) Traditional Peer Review Submissions. In this submission mode you are simply uploading you paper into our conference submission system. The length of the paper can be anywhere between 5-10,000 words. A double blind peer review will be performed. Publishing opportunity: All submissions are considered for possible fast tracking to the European Journal of Management Studies, Journal of Information System Security, Information and Computer Security. If your paper is not fast tracked, you can still publish in an edited book.
b) Abstract/Extended Abstract Submissions. If you are simply presenting an idea to generate some discussion and enter into a discourse, you can submit an abstract (100 words) or an extended abstract (unto 1000 words).
c) Case Studies. We particularly welcome cyber security case studies that document a breach. The length of the paper can be anywhere between 5-10,000 words.
All submissions should be through the conference management system.