posted by user: mattord || 2535 views || tracked by 4 users: [display]

RandCV2: Law and Ethics 2008 : Readings and Cases in the Mgt of InfoSec: Law and Ethics


When Jan 1, 2008 - May 1, 2008
Where Book Chapters
Submission Deadline May 1, 2008
Notification Due Jun 1, 2008
Categories    information security mgt   information security   legal issues   ethical issues

Call For Papers

Proposal Deadline: May 1, 2008

Readings and Cases in the Management of Information Security,
Volume II: Legal and Ethical Issues in Information Security Management

A book edited by
Michael E. Whitman, Ph.D., CISSP
Herbert J. Mattord, CISSP

Published by Course Technology, a division of Cengage Learning, Inc.

As global networks expand the interconnection of the world??s technically complex infrastructure, communication and computing systems gain added importance. Information security has gained increased importance as a professional practice. We only recently are witnessing the emergence of information security as an academic discipline. Recent events and attacks point out the weaknesses inherent in unprotected systems and expose the need for heightened security of these systems. In order to secure technologically advanced systems and networks, education and the infrastructure to deliver that education is needed to prepare the next generation of professionals as they develop a more secure and ethical computing environment. Therefore, improved tools and more sophisticated techniques are needed to prepare students of technology to recognize the threats and vulnerabilities present in existing systems and learn to design and develop the secure systems needed in the near future. This collection of works is designed to supplement other works in examining the management of information security. The text focuses on specific aspects in the management of information security ?? specifically ether current recommended practices or the legal and ethical issues associated with the following domains:

? Information Security Policy
? Information Security Strategic Planning
? Disaster Recovery and Business Continuity Planning
? Risk Management
? Regulatory Compliance
? Incident Response Planning
? Information Security Performance Metrics
? Privacy
? Other topics related to Information Security Management
Call for Proposals and Contributions
This book will use a blind review process to assure that quality subject matter and case materials will be placed into the hands of those who need it most: future information security managers and information technologists. As such, submissions are sought to support the topics listed above within the management of information security focusing on either current recommended practices or legal and ethical issues. Individuals are invited to electronically submit by May 1, 2008, a cover letter and one to three manuscript proposal(s) of at least 200 words but no more than 650 words per proposal. Each proposal must clearly explain the mission and concerns of the proposed contribution(s). Individuals may submit proposals for up to three contributions; however, no more than two proposals per contributor will be accepted. If you wish email confirmation of receipt of your submission, please indicate so in your cover letter. Please do not submit completed manuscripts at this time. If the manuscript is complete, please note that in the proposal and submit an abstract that conforms to the proposal submission requirement.
Authors of accepted proposals will be notified by June 1, 2008 about the status of their proposal(s) and sent guidelines for the preparation of the manuscript. Completed manuscripts must be submitted by
September 1, 2008. All submissions will be reviewed on a blind basis. The editors will make final decisions regarding acceptance, revision or rejection, based on the recommendations of the reviewers and notify authors by October 1, 2008. Those works selected for publication must submit an electronic copy of the final version, and signed contracts for publication no later than November 1, 2008.
The focus of any given submission should be clearly identified in its proposal as being within one of the topic domains listed above and of one of three specific types:
? Academic survey on the management of information security focusing on current recommended practices associated with one of the defined domains listed earlier. This chapter should be suitable as a complete summary of the current recommended practices for the identified topic. Complete scholarly citation and reference using APA-style is required for this chapter.
? Academic readings regarding one or more specific aspect the legal and/or ethical issues associated with the management of information security as they affect the specific domain. Suitable scholarly citation and reference using APA-style is required for this chapter.
? Topical cases exemplifying the management of information security. Cases should provide educational discussion material depicting real or realistic organizational situations and be summarized with discussion questions.
No papers featuring exclusive use of a specific application or product will be published. This is not a venue for marketing literature or market development efforts. Authors who are encouraged to submit multiple proposals or works since there is expected to be some degree of overlap in submissions which will be resolved in the selection process.
Note: All contributors will be expected to serve as reviewers for this project.
Submissions must identify the author, reply postal address, email address for acknowledgment of receipt, domain and type of proposal are to be electronically mailed to with the subject: Readings & Cases in MoIS Vol II submission. The format of your submission must be Microsoft Word or RTF text. Please label all files with your surname and the type of submission (i.e. Whitman_Cover_letter.doc, Whitman_Survey.doc, Whitman_Case and/or Whitman_Reading.doc).
Need for Reviewers
You are cordially invited to become part of this project, by volunteering to serve as a reviewer of submissions. This work is projected to include 20-30 high-quality papers on the management of information security. If you are interested in serving as a reviewer, please email your name, professional title, address, and a brief statement of your qualifications to serve as a reviewer of information security materials the email address listed above. Accepted reviewers will receive prompt notification and specific instructions.
For additional information please contact Michael E. Whitman, Ph.D. at or Herbert Mattord, CISM, CISSP at

Related Resources

FutureCyberspace 2022   The Future of Cyberspace: From Neutrality and Liberation towards Warfare and Control
CSE 2022   10th International Conference on Computational Science and Engineering
Social Media during COVID-19 & MonkeyPox 2023   SPECIAL ISSUE: The Role of Social Media during the Ongoing Outbreaks of COVID-19 and Monkeypox: Applications, Use-Cases, Analytics, and Beyond
ICISSP 2023   9th International Conference on Information Systems Security and Privacy
BTSD 2022   The 4th International Workshop on Big Data Tools, Methods, and Use Cases for Innovative Scientific Discovery (BTSD) 2022
IJESA 2022   International Journal of Embedded Systems and Applications
SI-KM4LAW 2023   Journal Special Issue KNOWLEDGE MANAGEMENT FOR LAW in Computer Law and Security Review
IJCIS 2022   International Journal on Cryptography and Information Security
EthiCS 2023   The 2nd International Workshop on Ethics in Computer Security
ACIE--EI 2023   2023 The 3rd Asia Conference on Information Engineering (ACIE 2023)