Abbrevation
IFIP
City
ProvoUT
Country
United States
Deadline Paper
Start Date
End Date
Abstract

Following the success of the first three International Information Systems Security Workshops held in Cape Town, South Africa, May 2009; Bentley University, October 2010; and Virginia Tech, September, 2011; the fourth workshop will continue efforts to advance the research discipline of information systems security through the creation, dissemination, and preservation of well&#8211;formed research&#046; Through the active discussion in the workshop, participants will receive specific feedback on their papers and provide feedback to others&#046;<p> While relevant for advanced practical development, our primary audience consists of researchers in this area&#046; We value research products with highly reliable and validated theory, empirical data, or quantitative/qualitative social scientific methodology&#046; Editors of EJIS and MISQ will screen potentially high quality papers that may be fast tracked to these journals after revisions&#046; The workshop is also intended to nurture individual journal articles for submission to a wide variety of other management research journals&#046; Selection for the workshop is highly competitive, and only authors of the accepted papers and working group members will be invited to participate&#046;</p><p> Anchoring the workshop to information systems means the research will attend and extend the social, organizational, and managerial literature in this area&#046; Note that this is not an appropriate venue for papers with a purely technical, design&#8211;science or economic approach&#046; While we assume an effective foundation in information security technology, we regard information systems risks broadly, for example computer crime, employee misconduct, cyber warfare, cyber terrorism, human error and/or accident, natural events, etc&#046; We also address information systems security broadly, for example, privacy, awareness, policies, strategy, audit, planning and control&#046; These and related research topics will be the focus of this workshop&#046; Topics may include (but are not limited to):</p><p> </p><ul><li>Theoretical and empirical analyses of information security behavior</li><li>Adoption, use, and continuance of information security technologies and policies</li><li>Compliance with information security and privacy policies, procedures, and regulations</li><li>Investigations of computer crime and security violations</li><li>Individuals motivators and inhibitors of employee computer crime</li><li>Forensic analysis of security breaches and computer crimes</li><li>Legal, societal, and ethical issues in information security</li></ul><p><br></p>