| |||||||||||||||||
ISSA 2009 : Information Security for South AfricaConference Series : Information Security for South Africa | |||||||||||||||||
Link: http://www.infosecsa.co.za | |||||||||||||||||
| |||||||||||||||||
Call For Papers | |||||||||||||||||
We apologize in advance if you receive multiple copies of this CFP.
Information Security for South Africa - ISSA2009 6 - 8 July 2009 http://www.infosecsa.co.za The 8th Annual ISSA Conference invites participation across the Information Security spectrum including but not being limited to functional, business, managerial, theoretical and technological issues. As with the previous ISSA conferences, the forthcoming ISSA2009 will again attract a variety of national and international information security academics and practitionars. Due dates: 23 March 2009: Abstract submission 31 March 2009: Notification of abstract acceptance 18 April 2009: Full papers submission for review 26 May 2009: Notification of acceptance 6 June 2009: Submission of final camera-ready papers 6-8 July 2009: Conference Topics include, but are not limited to: ? Access Control ? Architectures and infrastructures ? Audit ? Authentication ? Anti-Virus ? Awareness and training in Security ? Backup, Storage, Recovery ? Biometrics ? Business Continuity Planning and Management ? Challenges and solutions of managing security ? Communications / network security ? Content Security ? Corporate governance / Enterprise security ? Digital forensics ? Digital Identification and Authentication ? Economy and philosophy of information security ? Evaluation of Information Security in companies and information security surveys ? Future visions for Information Security Management ? Hacking / cracking ? Information right management ? Information security project management ? Legal, ethical and social issues related to Information Security ? Managing Information Security ? Mobile Computing Security ? Mobile phone security ? Phishing ? Practical industry presentations on managing information security ? Privacy ? Information Security Risk Analysis ? Security Policy and Procedures ? Small distribution applications ? Smart Cards ? Standards - Local & International ? Strategic Information Security ? Trust ? Usability issues in information security ? Vulnerability Assessments Organising committee Hein Venter (hventer@cs.up.ac.za) Department of Computer Science, University of Pretoria Les Labuschagne (lesl@uj.ac.za) Department Business IT, University of Johannesburg Marijke Coetzee (marijkec@uj.ac.za) Academy for Information Technology, University of Johannesburg |
|