posted by user: mgupta3 || 4659 views || tracked by 8 users: [display]

Security Book 2011 : Strategic and Practical Approaches for Information Security Governance: Technologies and Applied Solutions

FacebookTwitterLinkedInGoogle

Link: http://www.igi-global.com/AuthorsEditors/AuthorEditorResources/CallForBookChapters/CallForChapterDetails.aspx?CallForContentId=6dcb0d13-8271-4266-96fe-bfbfc9dab1a9
 
When N/A
Where N/A
Abstract Registration Due Aug 15, 2010
Submission Deadline Oct 30, 2010
Categories    information security   security governance   security management   security practices
 

Call For Papers

CALL FOR CHAPTERS
Strategic and Practical Approaches for Information Security Governance: Technologies and Applied Solutions
http://www.acsu.buffalo.edu/~mgupta3/Call.pdf

Editors:
Manish Gupta, State University of New York & M&T Bank Corporation, USA
John Walp, M&T Bank Corporation, USA
Raj Sharman, State University of New York, USA

Proposals Submission Deadline: August 15, 2010

Introduction
Organizations are increasingly relying on information in electronic form to conduct business. While this evolution of an electronic-based society from a paper-based one has been advantageous to both enterprises and individuals alike, the amount of personal information has also grown exponentially. With rapid growth in the number of information systems and related processes, managing information security program while effectively managing risks has never been so critical. A recent survey of 600 IT and security executives finds that there is a widespread lack of confidence in their organizations ability to defend against a cyberattack. About 40% of those surveyed expected a major incident -- an attack resulting in major consequences -- within a year, and 80% said they expected a major incident within 5 years (pp 13). On average, respondents estimated that 24 hours of down time from a major attack would cost their own organization (U.S.) $6.3 million. Also, more than 60% say that the frequency and intensity of cyberattacks have increased in the past year. Given the rise of threats and technologies to launch and hide these attacks, the situation is clearly getting worse for organizations. Effective Information Security Management and Governance is the most important action organizations can take to thwart and manage these risks. In such an environment, information security management and governance issues are at the forefront of any discussions for security organizations information assets, which includes considerations for managing risks, data and costs.

Objective of the Book
The proposed book aims to provide high-quality research papers and practice articles on management and governance issues in the field of information security. The main focus of the book is to provide an organization with insights into practical and applied solutions, frameworks, technologies and practices on technological and organizational factors.The book will present Information Security Management solutions being researched on or deployed through book chapters from leading researchers and practitioners in the field. This will culminate in submissions to a high quality book. The key objective is to fill a gap in the existing literature on the latest advances in practice and in research by providing the audience one comprehensive source of latest trends, issues and research in the field. The book will host topics both on theoretical (research) aspects of information security management by presenting solutions and issues in the area while supplementing them with real- world implications and implementations (practice) of the research.

Target Audience
The primary audience for the book is professionals, scholars, researchers and academicians working in this field that is fast evolving and growing as an area of information assurance. Practitioners and managers working in information technology or information security areas across all industries would vastly improve their knowledge and understanding of critical human and social aspects of information security. Auditors and lawyers from organizations will also find this book as a very helpful resource.
Recommended topics include, but are not limited to, the following:

Information Security Governance Frameworks
Identification and Authentication technologies and issues
Information Security Management Frameworks
Business value, return of security investments, planning and budgeting
Security Auditing and Accountability Issues
Legal and regulatory oversight issues
Access Control Methods and Models
Incident Response and Management and Emergency Preparedness
Storage and device security
Forensics and Investigation Issues
Fraud and Identity theft issues
Enterprise Information Security Policies, Standards and Procedures
Data Loss Prevention Approaches and enforcement policies
Phishing, Pharming and other social engineering issues
Risk Management, Governance and Compliance
Security Awareness, communications and training issues
Employee monitoring and surveillance
Security economics
Messaging and Communications Security
Case studies and deployment experiences
Corporate Espionage and information warfare
National and Critical Infrastructure security issues
Vulnerability and Patch Management
Trust, Privacy and anonymity issues
Security Architectures, Models and Evaluations
Open Security Standards and Protocols
Application Security, audits and penetration testing

Submission Procedure
Researchers and practitioners are invited to submit on or before August 15, 2010, a 2-3 page chapter proposal clearly explaining the mission and concerns of his or her proposed chapter. Authors of accepted proposals will be notified by August 30, 2010 about the status of their proposals and sent chapter guidelines. Full chapters are expected to be submitted by November 30, 2010. All submitted chapters will be reviewed on a double-blind review basis. Contributors may also be requested to serve as reviewers for this project.
Publisher
This book is scheduled to be published by IGI Global (formerly Idea Group Inc.), publisher of the Information Science Reference (formerly Idea Group Reference), Medical Information Science Reference, Business Science Reference, and Engineering Science Reference imprints. For additional information regarding the publisher, please visit www.igi-global.com. This publication is anticipated to be released in 2011.

Important Dates
August 15, 2010: Proposal Submission Deadline
August 30, 2010: Notification of Proposal Acceptance
October 30, 2010: Full Chapter Submission
December 15, 2010: Review Results Returned
January 15, 2011: Revised Chapter Submission
February 1, 2011: Final Acceptance Notification
March 1, 2011: Final Chapter Submission

Inquiries and submissions can be forwarded electronically (Word document) to:
mgupta3@buffalo.eduand/or mgupta@mtb.com

Related Resources

SEAS 2025   14th International Conference on Software Engineering and Applications
IEEE BDAI 2025   IEEE--2025 the 8th International Conference on Big Data and Artificial Intelligence (BDAI 2025)
IJCIS 2024   International Journal on Cryptography and Information Security
ISKE 2025   The 20th International Conference on Intelligent Systems and Knowledge Engineering (ISKE 2025)
SECRYPT 2025   22nd International Conference on Security and Cryptography
ICIME--EI 2025   2025 13th International Conference on Information Management and Engineering (ICIME 2025)
ACM ICIIT 2025   ACM--2025 10th International Conference on Intelligent Information Technology (ICIIT 2025)--ESCI
ICICSP 2025   2025 8th International Conference on Information Communication and Signal Processing (ICICSP 2025)
BDE 2025   2025 7th International Conference on Big Data Engineering (BDE 2025)
JITST 2024   Journal of Internet Technology and Secured Transactions