This workshop aims to encourage research that provides insights into the issue of cybersecurity management. Most organizations now have to be careful in assessing risks associated with data science activities. The massive collection and storage of user data exposes organizations to significant risks associated with any potential data breach arising from an improper handling of such data. For data protection, the reliance on technological solutions alone is inadequate and any successful effort requires a business-centric approach to mitigate risk. Further, the diffusion of computer technologies has resulted in an unprecedented global expansion of cybercriminal activities that are rapidly evolving, with new techniques being developed and exploited by hackers worldwide.
Organizations are also witnessing constant IT misuse by insiders leading to significant security issues. We need a greater understanding of ways to de-incentivize the impetus that drives individuals and groups to circumvent cybersecurity policies. Overall, it has become imperative to effectively protect information assets. We need to investigate the challenges and opportunities to effectively manage an organization’s cybersecurity requirements and resources. This workshop solicits promising papers that will enhance our understanding about cybersecurity management.
Short URL: IWCM.BISconf.org
Topics of interest
The endeavor of this workshop is to encourage diverse perspectives including organizational, behavioral, cultural, socio-technical, economic, or other appropriate theoretical lenses to address cybersecurity problem. Few topics of interest include (but not limited to):
- Cybersecurity policy and controls
- Information security strategy
- Planning for cybersecurity
- Cybersecurity Governance and compliance
- Organizational barriers to security
- Understanding security culture
- Socio-technical mechanisms for countering cyber threats
- Risk analysis and management
- Security Education, Training and Awareness (SETA)
- Mitigating insider threats and cybercrime
- Economics of Cybersecurity
- Legal and ethical aspects of cybersecurity
We encourage you to submit a paper to this workshop. You may obtain additional information about the conference at https://bisconf.org/2020. Please feel free to email any inquiries on potential papers for submission.
- March 30, 2020 – submission deadline for papers
- April 21, 2020 – notification of acceptance/rejection
- May 6, 2020 – submission of final papers (for presentation)
- June 8-10, 2020 – the workshop
The workshop invites following types of papers:
- Research papers: Max 12 pages
- Research-in-progress: Max 6 pages
- Case studies: Max 6 pages
All papers should be in English and must not exceed 12 LNBIP pages (including abstract and references). Papers must be submitted via EasyChair in PDF format according to Springer LNBIP template.
Submission system is available at EasyChair.
Proceedings Papers approved for presentation at the workshop will be published in BIS 2020 workshop post-conference proceedings, as a volume in Springer’s Lecture Notes in Business Information Processing (LNBIP) series.
Organizers and Chair
Gurvirender Tejay, University of Colorado Colorado Springs
Manish Agrawal, University of South Florida, USA
Dave Chatterjee, University of Georgia, USA
Rui “Ray” Chen, Iowa State University, USA
Robert Crossler, Washington State University, USA
Deanna House, University of Tampa, USA
Michael Lane, University of Southern Queensland, Australia
Xin “Robert” Luo, University of New Mexico, USA
Jacques Ophoff, University of Cape Town, South Africa
Michael “Clay” Posey, University of Central Florida, USA
Karen Renaud, Abertay University, UK
Anthony Vance, Temple University, USA
Ali Yayla, Binghamton University, State University of New York, USA
Gurvirender Tejay (firstname.lastname@example.org)