Call for Participation

Security, assurance and privacy challenges abound. Advances in information and communication technologies have brought many security problems to the fore. Such problems may be technical in nature or organizationally grounded. Whatever be the nature and scope of the security problems, there is a need to engage in discourses pertaining to security, assurance, and privacy. To that effect, we welcome participation in the 22nd Annual Security Conference.

Themes 
The conference welcomes submissions from academia, industry, and government addressing both theoretical and practical aspects of cybersecurity. Indicative themes include:

Access control and authentication            
Legal and regulatory aspects
Audit and risk analysis  Mobile device security
Awareness and education methods          
Network security
Biometric technologies and impacts        
Organizational issues and governance
Cloud and big data security         

Policy, standards and compliance
Cybercrime and misuse
Privacy protection and practices
Digital forensics                
Public attitudes and understanding
Human aspects of security
Trust management

Publishing opportunity: All submissions are considered for possible fast-tracking in the following academic journals: Journal of Information System Security, European Journal of Management Studies, Information and Computer Security. If your paper is not fast-tracked, it will still get published in an edited book.

Deadlines

Paper submissions: January 31, 2024 (Template)
Author notification: On a rolling basis
Author registration: March 22, 2024

Submission types

Participation can be in the following categories:

a) Traditional Peer Review Submissions.

In this submission mode you are uploading a full paper for double-blind, peer-review. Full papers must:

  • not exceed 10 pages (approx. 5,000 words, including figures, tables, references, and appendices)
  • use the APA formatting style (http://www.apastyle.org), and
  • use this Template.

Full papers that are accepted following the double-blind, peer-review will be published in their entirety in the conference proceedings and all eligible submissions that go through a full peer-review cycle will be fast-tracked to the Journal of Information System Security (http://www.jissec.org)JISSec is indexed in SCOPUS. 

b) Short Papers. Short papers present research in progress or simply an idea that aims to generate some discussion on the conference floor. In this submission mode, you can submit an abstract (100 words), or extended abstract (up to 1000 words), with a view to potentially developing a full paper after the event. Short paper submissions will be reviewed by the conference chairs to ensure relevance and credibility. The author names and titles of accepted short papers will be included in the conference proceedings. Please use this template.

c) Case Studies. Case study papers document a cybersecurity breach. The length of the case study can be anywhere between 5-10,000 words. Case study submissions will be reviewed by the conference chairs to ensure relevance and credibility. The author names and titles of accepted case study papers will be included in the conference proceedings. Please use this template.

Submit paper

The Information Institute uses Easy Chair to handle paper submissions. If you do not have an account already, you will be required to create one. Click on the “Submission System” link below to access the submission system.

Please make sure that you clearly indicate the type of submission (Traditional Peer Review Submission, Short Paper or Case Study) on the first page of your manuscript.