posted by user: stjoa || 5368 views || tracked by 8 users: [display]

OSA 2010 : The Second International Workshop on Organizational Security Aspects

FacebookTwitterLinkedInGoogle

Link: http://osa.ares-conference.eu
 
When Feb 15, 2010 - Feb 18, 2010
Where Krakow, Poland
Abstract Registration Due Nov 14, 2009
Submission Deadline Oct 20, 2009
Notification Due Nov 1, 2009
Final Version Due Nov 14, 2009
Categories    security   economics   computer   risk management
 

Call For Papers

********************************************************************************


The Second International Workshop on Organizational Security Aspects (OSA 2010)


********************************************************************************

To be held in conjunction with the Fifth International Conference on Availability, Reliability and Security (ARES 2010 – http://www.ares-conference.eu).

February 15th – 18th, 2010
Andrzej Frycz Modrzewski Cracow College
Krakow, Poland

In today's global economy, where conditions change often and rapidly, the efficiency and effectiveness of the execution of business processes has become a central issue. As these processes depend on the

assigned resources, a considerable optimization focus lies on the minimization of the resources' costs and simultaneously on the maximization of their returns. Another critical factor, which substantially

influences the ability to compete, is the continuous operation of a company's business processes. The reasons why the execution of business processes may be interrupted are manifold and are addressed by

several fields of research.
Exercising for instance strong computer security is a company’s crucial task in order to strengthen the resilience of IT systems against arising threats. However, the most sophisticated technical security

techniques will fail, if there is no adequate organizational structure covering the appropriate planning, design and implementation of these techniques. Furthermore, processes within the companies have to be

set up, lived and monitored to continuously improve the company’s ability to survive while simultaneously maximizing its returns.

The main objectives of this workshop are to bring together users and researchers (from industry and academy) to present their recent work, discuss and identify problems, synergize different views on methods

and techniques, and brainstorm future research directions on various aspects of organizational security issues.


***********************************

TOPICS

***********************************
Topics of interest comprise but are not limited to:
- Auditing

- Business Continuity

- Cost/Benefit Analysis

- Disaster Recovery

- Identity Management

- Information Assurance

- Information Security Management

- Insider Threats

- IT Governance

- IT Service Continuity

- Risk Management

- Security Awareness

- Security Culture

- Security Requirements Engineering

- Standards, Guidelines, Best Practices and Certification



***********************************

IMPORTANT DATES

***********************************
Submission Deadline October 20th, 2009
Author Notification November, 01st 2009
Author Registration November, 14th, 2009
Proceedings Version November, 14th 2009
Conference/Workshop February, 15th - 18th 2010


**********************************

SUBMISSION GUIDELINES

**********************************
The submission guidelines valid for the OSA workshop are the same as for the ARES conference. They can be found at:
http://www.ares-conference.eu/conf/index.php/submission-guidelines
Submission of a paper implies that should the paper be accepted, at least one of the authors will register and present the paper in the conference.
Accepted papers will be given guidelines in preparing and submitting the final manuscript(s) together with the notification of acceptance.
All accepted papers will be published as ISBN proceedings published by the IEEE Computer Society - Conference Publishing Services (CPS).


**********************************

Workshop Co-Chairs

**********************************
Gerald Quirchmayr
University of Vienna and University of South Australia
Gerald[dot]Quirchmayr[at]univie[dot]ac[dot]at

Tsetsutaro Uehara
Kyoto University
uehara[at]media[dot]kyoto-u[dot]ac[dot]jp


**********************************

Program Committee

**********************************
Helen Armstrong, Curtin Univeristy of Technology, Australia
Dorothea Aniola, Sail Labs Technology, Vienna, Austria
Maximilian Bielecki, University of Vienna, Austria
Chrsitophe Feltus, Centre de Recherche Public Henri Tudor, Luxembourg
Eduardo Fernandez, Florida Atlantic University, USA
Nandan Garg, Wayne State Univeristy, USA
Yoshiaki Hori, Kyushu University, Japan
Stefan Jakoubi, Secure Business Austria, Austria
Jorma Kajava, Oulu University, Finland
Sokratis A. Katsikas, University of Piraeus, Greece
Günther Pernul, Univeristät Regensburg, Germany
Reijo Savola, VTT Research, Finland
Simon Tjoa, St. Pölten University of Applied Sciences, Austria
Benjamin Turnbull, University of South Australia, Australia
José L. Vivas, Universidad de Malaga, Spain
Matthew Warren, Deakin University, Australia
Christopher C. Wills, Kingston University, UK
Louise Yngström, Stockholm University, Sweden

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
CCS 2025   ACM Conference on Computer and Communications Security 2024 (round 2)
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
SEAS 2025   14th International Conference on Software Engineering and Applications
IJCSITY 2024   International Journal of Computational Science and Information Technology
ISKE 2025   The 20th International Conference on Intelligent Systems and Knowledge Engineering (ISKE 2025)
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
IEEE BDAI 2025   IEEE--2025 the 8th International Conference on Big Data and Artificial Intelligence (BDAI 2025)
SIGCOMM 2025   ACM Special Interest Group on Data Communication
CHASE 2025   Cooperative and Human Aspects of Software Engineering