Organization‎ > ‎Conference tracks‎ > ‎

Track18: IS Security and Privacy

Track Chairs

Benjamin Fabian, Humboldt-Universität zu Berlin, Germany, bfabian@wiwi.hu-berlin.de
Jens Strüker, Albert-Ludwig University of Freiburg, Germany, strueker@iig.uni-freiburg.de

Description

Virtually all areas of a society are increasingly reliant on the Internet and emerging infrastructures such as pervasive computing. Accordingly, information security breaches reach from causing financial losses to organizations and online market participants to life-threatening malfunctions of critical infrastructures such as energy systems. Moreover, information censorship and threats to individual privacy become increasingly abundant. Recent generations of governmental malware could indicate the beginning of a new age of surveillance and cyber war. Information systems (IS) research, with its intersections to disciplines such as computer science, economics, law and psychology, is particularly well-suited to identify potential security and privacy threats as well as design and evaluate technical and organizational countermeasures to mitigate them.

In addition to inviting submissions focusing on established topics and methods in privacy research and security engineering, we also encourage scientists working at the intersections to other fields such as those mentioned above. We are looking for full research papers that feature high relevance for a broader audience, combined with scientific rigor and solid evaluation. As we would like to emphasize the complementary role of design science and behavioral science approaches in the IS discipline, research based on both approaches is equally welcome.

Topics of interest

Potential topics include, but are not limited, to:

  • Anonymous Communication
  • Anonymity in Databases and Cloud Computing
  • Awareness, Education and Curriculum Development for Security and Privacy
  • Behavioral Economics of Security and Privacy
  • "Big Data" Analytics and Security and Privacy
  • Business Processes for Security and Privacy
  • Censorship Resistance
  • Costs and Return on Investment for Security and Privacy
  • Critical Infrastructure Protection
  • Cyber War
  • Evaluation of Security and Privacy Technology Deployment
  • Governance and Management of Security and Privacy
  • Malware and Intrusion Detection
  • Metrics for Security and Privacy
  • Privacy-Enhancing Technologies
  • Procedures and Policies for Security and Privacy
  • Psychological Studies on Security, Privacy, and Trust
  • Requirements Engineering for Security and Privacy
  • Risk Management for Security and Privacy
  • Secure Software Development
  • Security and Privacy in Federated Information Systems
  • Security and Privacy in Internet Infrastructure Services
  • Security and Privacy in Peer-to-Peer Systems and Cloud Computing
  • Security and Privacy in Pervasive Computing
  • Security and Privacy in Process-aware Information Systems
  • Security and Privacy for Smart Grids, Smart Metering, Home Automation
  • Security and Privacy in Social Media and the Social Web
  • Social, Legal and Ethical aspects of Security and Privacy
  • Surveillance Practices and Evasion
  • Standardization for Security and Privacy
  • Trust Formation and Management
  • Usability of Security and Privacy Measures
  • Vulnerability Management

Associate Editors

Rafael Accorsi, University of Freiburg
Alessandro Acquisti, Carnegie Mellon University
Rainer Böhme, University of Münster
Jens Großklags, Pennsylvania State University
Seda Gürses, Katholieke Universiteit Leuven
Luigi Lo Iacono, European University of Applied Sciences Brühl
Sören Preibusch, University of Cambridge
Stefanie Rinderle-Ma, University of Vienna
Guido Schryen, University of Regensburg
Christoph Sorge, University of Paderborn
Mark Strembeck, Vienna University of Economics and Business

Comments