This workshop aims to encourage research that provides insights into the issue of cybersecurity management. Most organizations now have to be careful in assessing risks associated with data science activities. The massive collection and storage of user data exposes organizations to significant risks associated with any potential data breach arising from an improper handling of such data. For data protection, the reliance on technological solutions alone is inadequate and any successful effort requires a business-centric approach to mitigate risk. Further, the diffusion of computer technologies has resulted in an unprecedented global expansion of cybercriminal activities that are rapidly evolving, with new techniques being developed and exploited by hackers worldwide.
Organizations are also witnessing constant IT misuse by insiders leading to significant security issues. We need a greater understanding of ways to de-incentivize the impetus that drives individuals and groups to circumvent cybersecurity policies. Overall, it has become imperative to effectively protect information assets. We need to investigate the challenges and opportunities to effectively manage an organization’s cybersecurity requirements and resources. This workshop solicits promising papers that will enhance our understanding about cybersecurity management.
The endeavor of this workshop is to encourage diverse perspectives including organizational, behavioral, cultural, socio-technical, economic, or other appropriate theoretical lenses to address cybersecurity problem. Few topics of interest include (but not limited to):
- Cybersecurity policy and controls
- Information security strategy
- Planning for cybersecurity
- Cybersecurity Governance and compliance
- Organizational barriers to security
- Understanding security culture
- Socio-technical mechanisms for countering cyber threats
- Risk analysis and management
- Security Education, Training and Awareness (SETA)
- Mitigating insider threats and cybercrime
- Economics of Cybersecurity
- Legal and ethical aspects of cybersecurity We encourage you to submit a paper to this workshop. You may obtain additional information about the conference at (http://bis.ue.poznan.pl/bis2020). Please feel free to email any inquiries on potential papers for submission.
- Mar 01, 2020: Submit full manuscripts for review
- Apr 05, 2020: Acceptance notices to authors
- May 05, 2020: Camera-ready copy due for accepted papers
The workshop invites following types of papers:
- Research papers
- Case studies All papers should be in English and must not exceed 12 LNBIP pages (including abstract and references). Papers must be submitted via EasyChair in PDF format according to Springer LNBIP template.
Submission Site: to be updated
Proceedings Papers approved for presentation at the workshop will be published in BIS 2020 workshop post- conference proceedings, as a volume in Springer’s Lecture Notes in Business Information Processing (LNBIP) series.
Organizers and Chair
Gurvirender Tejay, University of Colorado Colorado Springs
Manish Agrawal, University of South Florida, USA
Dave Chatterjee, University of Georgia, USA
Rui “Ray” Chen, Iowa State University, USA
Robert Crossler, Washington State University, USA
Deanna House, University of Tampa, USA
Michael Lane, University of Southern Queensland, Australia
Xin “Robert” Luo, University of New Mexico, USA
Jacques Ophoff, University of Cape Town, South Africa
Michael “Clay” Posey, University of Central Florida, USA
Karen Renaud, Abertay University, UK
Anthony Vance, Temple University, USA
Ali Yayla, Binghamton University, State University of New York, USA
Gurvirender Tejay (firstname.lastname@example.org)