posted by user: mgupta3 || 4100 views || tracked by 8 users: [display]

Security Book 2011 : Strategic and Practical Approaches for Information Security Governance: Technologies and Applied Solutions


When N/A
Where N/A
Abstract Registration Due Aug 15, 2010
Submission Deadline Oct 30, 2010
Categories    information security   security governance   security management   security practices

Call For Papers

Strategic and Practical Approaches for Information Security Governance: Technologies and Applied Solutions

Manish Gupta, State University of New York & M&T Bank Corporation, USA
John Walp, M&T Bank Corporation, USA
Raj Sharman, State University of New York, USA

Proposals Submission Deadline: August 15, 2010

Organizations are increasingly relying on information in electronic form to conduct business. While this evolution of an electronic-based society from a paper-based one has been advantageous to both enterprises and individuals alike, the amount of personal information has also grown exponentially. With rapid growth in the number of information systems and related processes, managing information security program while effectively managing risks has never been so critical. A recent survey of 600 IT and security executives finds that there is a widespread lack of confidence in their organizations ability to defend against a cyberattack. About 40% of those surveyed expected a major incident -- an attack resulting in major consequences -- within a year, and 80% said they expected a major incident within 5 years (pp 13). On average, respondents estimated that 24 hours of down time from a major attack would cost their own organization (U.S.) $6.3 million. Also, more than 60% say that the frequency and intensity of cyberattacks have increased in the past year. Given the rise of threats and technologies to launch and hide these attacks, the situation is clearly getting worse for organizations. Effective Information Security Management and Governance is the most important action organizations can take to thwart and manage these risks. In such an environment, information security management and governance issues are at the forefront of any discussions for security organizations information assets, which includes considerations for managing risks, data and costs.

Objective of the Book
The proposed book aims to provide high-quality research papers and practice articles on management and governance issues in the field of information security. The main focus of the book is to provide an organization with insights into practical and applied solutions, frameworks, technologies and practices on technological and organizational factors.The book will present Information Security Management solutions being researched on or deployed through book chapters from leading researchers and practitioners in the field. This will culminate in submissions to a high quality book. The key objective is to fill a gap in the existing literature on the latest advances in practice and in research by providing the audience one comprehensive source of latest trends, issues and research in the field. The book will host topics both on theoretical (research) aspects of information security management by presenting solutions and issues in the area while supplementing them with real- world implications and implementations (practice) of the research.

Target Audience
The primary audience for the book is professionals, scholars, researchers and academicians working in this field that is fast evolving and growing as an area of information assurance. Practitioners and managers working in information technology or information security areas across all industries would vastly improve their knowledge and understanding of critical human and social aspects of information security. Auditors and lawyers from organizations will also find this book as a very helpful resource.
Recommended topics include, but are not limited to, the following:

Information Security Governance Frameworks
Identification and Authentication technologies and issues
Information Security Management Frameworks
Business value, return of security investments, planning and budgeting
Security Auditing and Accountability Issues
Legal and regulatory oversight issues
Access Control Methods and Models
Incident Response and Management and Emergency Preparedness
Storage and device security
Forensics and Investigation Issues
Fraud and Identity theft issues
Enterprise Information Security Policies, Standards and Procedures
Data Loss Prevention Approaches and enforcement policies
Phishing, Pharming and other social engineering issues
Risk Management, Governance and Compliance
Security Awareness, communications and training issues
Employee monitoring and surveillance
Security economics
Messaging and Communications Security
Case studies and deployment experiences
Corporate Espionage and information warfare
National and Critical Infrastructure security issues
Vulnerability and Patch Management
Trust, Privacy and anonymity issues
Security Architectures, Models and Evaluations
Open Security Standards and Protocols
Application Security, audits and penetration testing

Submission Procedure
Researchers and practitioners are invited to submit on or before August 15, 2010, a 2-3 page chapter proposal clearly explaining the mission and concerns of his or her proposed chapter. Authors of accepted proposals will be notified by August 30, 2010 about the status of their proposals and sent chapter guidelines. Full chapters are expected to be submitted by November 30, 2010. All submitted chapters will be reviewed on a double-blind review basis. Contributors may also be requested to serve as reviewers for this project.
This book is scheduled to be published by IGI Global (formerly Idea Group Inc.), publisher of the Information Science Reference (formerly Idea Group Reference), Medical Information Science Reference, Business Science Reference, and Engineering Science Reference imprints. For additional information regarding the publisher, please visit This publication is anticipated to be released in 2011.

Important Dates
August 15, 2010: Proposal Submission Deadline
August 30, 2010: Notification of Proposal Acceptance
October 30, 2010: Full Chapter Submission
December 15, 2010: Review Results Returned
January 15, 2011: Revised Chapter Submission
February 1, 2011: Final Acceptance Notification
March 1, 2011: Final Chapter Submission

Inquiries and submissions can be forwarded electronically (Word document) to:

Related Resources

SI on ATD&IS II 2023   Special Issue on Advanced Technologies in Data and Information Security II, Applied Sciences, MDPI
NISecurity 2022   2022 International Conference on Network and Information Security (NISecurity 2022)
ICISPP 2023   IEEE--2023 4th International Conference on Information Security and Privacy Protection (ICISPP 2023)
CyberHunt 2022   IEEE BigData Workshop on Cyber Threat Intelligence and Hunting
ICCDA--Ei 2023   2023 The 7th International Conference on Compute and Data Analysis (ICCDA 2023)
CSE 2022   10th International Conference on Computational Science and Engineering
IEEE ICISPP 2023   IEEE--2023 4th International Conference on Information Security and Privacy Protection (ICISPP 2023)
IJITMC 2022   The International Journal of Information Technology, Modeling and Computing
SI-KM4LAW 2023   Journal Special Issue KNOWLEDGE MANAGEMENT FOR LAW in Computer Law and Security Review
ICCSN 2023   IEEE--2023 15th International Conference on Communication Software and Networks (ICCSN 2023)