| |||||||||||||||
ISSA 2008 : Information Security South Africa (ISSA) Conference 2008Conference Series : Information Security for South Africa | |||||||||||||||
Link: http://www.infosecsa.co.za | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
7th Annual ISSA Conference The premier information security conference Gauteng Region (Johannesburg), South Africa 2 - 4 July 2008 http://www.infosecsa.co.za The 7th Annual ISSA Conference will be held from 2 to 4 July 2008 (Venue to be announced). As with the previous ISSA conferences, the forthcoming â??ISSA2008â?? will again attract a variety of national and international information security practitioners, managers, executives and academics. This event is not to be missed by any Information Security enthusiast! First call for papers Details of the First Call for Papers have been posted on the ISSA Website â?? please visit http://www.infosecsa.co.za for more details on the topics, guidelines and other information. Due dates: Abstract submission: 7 March 2008 (1 page) Notification of abstract acceptance: 21 March 2008 Full papers submission for review: 18 April 2008 Notification of acceptance: 26 May 2008 Submission of final camera-ready papers: 6 June 2008 (±10-12 pages) Conference 2 - 4 July 2008 Instructions for Authors Abstracts and papers must be submitted electronically via the ISSA Website: http://www.infosecsa.co.za. On receipt of your abstract or paper an acknowledgement will be sent to you. If you do not receive an acknowledgement within 7 days, please contact the organising committee. Topics include but are not limited to: Access Control Architectures and infrastructures Audit Authentication Anti-Virus Awareness and training in Security Backup, Storage, Recovery Biometrics Business Continuity Planning and Management Challenges and solutions of managing security Communications / network security Content Security Corporate governance / Enterprise security Digital forensics Digital Identification and Authentication Economy and philosophy of information security Evaluation of Information Security in companies and information security surveys Future visions for Information Security Management Hacking / cracking Information right management Information security project management Legal, ethical and social issues related to Information Security Managing Information Security Mobile Computing Security Mobile phone security Phishing Practical industry presentations on managing information security Privacy Information Security Risk Analysis Security Policy and Procedures Small distribution applications Smart Cards Standards - Local & International Strategic Information Security Trust Usability issues in information security Vulnerability Assessments The following types of contributions are requested: Research papers Case studies Lessons learned Current research Short tutorial Research in progress (student or short papers) Programme / organising committee Jan Eloff (eloff@cs.up.ac.za) HOD: Department Computer Science, University of Pretoria / IFIP TC11 Member / Co-leader of ICSA Research Team, UP Les Labuschagne (lesl@uj.ac.za) HOD: Department Business IT, University of Johannesburg / PMSA Board Member Mariki Eloff (eloffmm@unisa.ac.za) Professor in School of Computing, UNISA |
|