| |||||||||||||
CFC: Cyber Book 2014 : Call for Chapters: Handbook of Research on New Threats and Countermeasures in Digital Crime and Cyber Terrorism | |||||||||||||
Link: http://www.igi-global.com/publish/call-for-papers/call-details/1205 | |||||||||||||
| |||||||||||||
Call For Papers | |||||||||||||
Call for Chapters:
Proposals Submission Deadline: March 15, 2014 Full Chapters Due: June 15, 2014 Submission Date: October 15, 2014 Introduction: This handbook of research will explore multiple aspects of cyber terrorism and cyber crime in today's society. This book provides insights on the negatives uses of technology with comprehensive review of the associated vulnerabilities and mitigations. Researchers, practitioners, and professionals will benefits from this publication’s broad perspective. Objective: This proposed publication takes an entirely different route in describing digital crime and cyber terrorism. This publication has the potential to aid organizations everywhere to effectively defend their systems. Target Audience: The handbook of research is expected to get a large amount of attention in the cyber security realm. This will cover all emerging negative uses of technologies which will allow individuals to gain insight so they can better defend these new attacks. This can be used by training organization, intelligence community, and others responsible for network defense. Recommended Topics: Network and Mobile Security Virtual Words for Terrorism Training Grounds Attacking Health Care Devices Automobiles Access Points Cyber Terrorism Cyber Crime Software Assurance Exploiting Code Vulnerabilities Future Predictions of Cyber Crime Department of Defense Information Assurance Controls Reverse Engineering Vulnerabilities in Mixed & Augmented Reality Vulnerabilities in Google Glass Systems of Systems Attacks Unmanned Systems Exploitations Certification and Accreditation Cryptosystems We strongly welcome other topics suggestions, dealing with other negative uses of technology and science such as attacking national infrastructure, cloud computing security, offensive security practices, and other unknown exploits. Submission Procedure: Researchers are invited to submit on or before February 15, 2014, a 2-3 page chapter proposal clearly explaining the mission and concerns of his or her proposed chapter. Authors of accepted proposals will be notified March 31, 2014 about the status of their proposals and sent chapter guidelines. Authors of accepted proposals will be sent guidelines to prepare the full chapter (7,000 – 11,000 words length). Full chapters are expected to be submitted by June 15, 2014. All submitted chapter will be reviewed on a double-blind review basis. Contributors may also be requested to serve as a reviewer for this project. Publisher: This handbook of research is scheduled to be published by IGI Global (formerly Idea Group Inc.), publisher of the “Information Science Reference” (formerly Idea Group Reference), “Medical Information Science Reference”, “Business Science Reference”, and “Engineering Science Reference” imprints. For additional information regarding the publisher, please visit www.igi-global.com.. This publication is anticipated to be released early 2015. Important Dates: 1st Proposal Submission Deadline: February 15, 2014 [Passed] 2nd Proposal Submission Deadline: March 15, 2014 Last Call for Proposals: April 15, 2014 Full chapter Submission: June 15, 2014 Review Process: June 15, 2014 –July 30, 2014 Review Results to Authors: August 15, 2014 Revised Chapter Submission: September 15, 2014 Final Acceptance Notifications: September 30, 2014 Submission of Final Chapters: October 15, 2014 Final Deadline: November 30, 2014 Inquiries: Inquires can be forwarded to electronically (Word document): Dr. Maurice Dawson Department of Management and Marketing College of Business and Public Affairs Alabama A&M University Tel.: +1-256-372-4801 Primary Email: maurice.e.dawson@gmail.com Secondary Email: maurice.dawson@aamu.edu Propose a chapter for this book |
|