posted by user: mattord || 2943 views || tracked by 4 users: [display]

RandCV2: Law and Ethics 2008 : Readings and Cases in the Mgt of InfoSec: Law and Ethics

FacebookTwitterLinkedInGoogle

 
When Jan 1, 2008 - May 1, 2008
Where Book Chapters
Submission Deadline May 1, 2008
Notification Due Jun 1, 2008
Categories    information security mgt   information security   legal issues   ethical issues
 

Call For Papers

post CFPCALL FOR CHAPTER PROPOSAL SUBMISSIONS AND REVIEWERS
Proposal Deadline: May 1, 2008

Readings and Cases in the Management of Information Security,
Volume II: Legal and Ethical Issues in Information Security Management

A book edited by
Michael E. Whitman, Ph.D., CISSP
&
Herbert J. Mattord, CISSP

Published by Course Technology, a division of Cengage Learning, Inc.

As global networks expand the interconnection of the worldâ??s technically complex infrastructure, communication and computing systems gain added importance. Information security has gained increased importance as a professional practice. We only recently are witnessing the emergence of information security as an academic discipline. Recent events and attacks point out the weaknesses inherent in unprotected systems and expose the need for heightened security of these systems. In order to secure technologically advanced systems and networks, education and the infrastructure to deliver that education is needed to prepare the next generation of professionals as they develop a more secure and ethical computing environment. Therefore, improved tools and more sophisticated techniques are needed to prepare students of technology to recognize the threats and vulnerabilities present in existing systems and learn to design and develop the secure systems needed in the near future. This collection of works is designed to supplement other works in examining the management of information security. The text focuses on specific aspects in the management of information security â?? specifically ether current recommended practices or the legal and ethical issues associated with the following domains:

â?¢ Information Security Policy
â?¢ Information Security Strategic Planning
â?¢ Disaster Recovery and Business Continuity Planning
â?¢ Risk Management
â?¢ Regulatory Compliance
â?¢ Incident Response Planning
â?¢ Information Security Performance Metrics
â?¢ Privacy
â?¢ Other topics related to Information Security Management
Call for Proposals and Contributions
This book will use a blind review process to assure that quality subject matter and case materials will be placed into the hands of those who need it most: future information security managers and information technologists. As such, submissions are sought to support the topics listed above within the management of information security focusing on either current recommended practices or legal and ethical issues. Individuals are invited to electronically submit by May 1, 2008, a cover letter and one to three manuscript proposal(s) of at least 200 words but no more than 650 words per proposal. Each proposal must clearly explain the mission and concerns of the proposed contribution(s). Individuals may submit proposals for up to three contributions; however, no more than two proposals per contributor will be accepted. If you wish email confirmation of receipt of your submission, please indicate so in your cover letter. Please do not submit completed manuscripts at this time. If the manuscript is complete, please note that in the proposal and submit an abstract that conforms to the proposal submission requirement.
Authors of accepted proposals will be notified by June 1, 2008 about the status of their proposal(s) and sent guidelines for the preparation of the manuscript. Completed manuscripts must be submitted by
September 1, 2008. All submissions will be reviewed on a blind basis. The editors will make final decisions regarding acceptance, revision or rejection, based on the recommendations of the reviewers and notify authors by October 1, 2008. Those works selected for publication must submit an electronic copy of the final version, and signed contracts for publication no later than November 1, 2008.
The focus of any given submission should be clearly identified in its proposal as being within one of the topic domains listed above and of one of three specific types:
â?¢ Academic survey on the management of information security focusing on current recommended practices associated with one of the defined domains listed earlier. This chapter should be suitable as a complete summary of the current recommended practices for the identified topic. Complete scholarly citation and reference using APA-style is required for this chapter.
â?¢ Academic readings regarding one or more specific aspect the legal and/or ethical issues associated with the management of information security as they affect the specific domain. Suitable scholarly citation and reference using APA-style is required for this chapter.
â?¢ Topical cases exemplifying the management of information security. Cases should provide educational discussion material depicting real or realistic organizational situations and be summarized with discussion questions.
No papers featuring exclusive use of a specific application or product will be published. This is not a venue for marketing literature or market development efforts. Authors who are encouraged to submit multiple proposals or works since there is expected to be some degree of overlap in submissions which will be resolved in the selection process.
Note: All contributors will be expected to serve as reviewers for this project.
Submissions must identify the author, reply postal address, email address for acknowledgment of receipt, domain and type of proposal are to be electronically mailed to RandC.CT@gmail.com with the subject: Readings & Cases in MoIS Vol II submission. The format of your submission must be Microsoft Word or RTF text. Please label all files with your surname and the type of submission (i.e. Whitman_Cover_letter.doc, Whitman_Survey.doc, Whitman_Case and/or Whitman_Reading.doc).
Need for Reviewers
You are cordially invited to become part of this project, by volunteering to serve as a reviewer of submissions. This work is projected to include 20-30 high-quality papers on the management of information security. If you are interested in serving as a reviewer, please email your name, professional title, address, and a brief statement of your qualifications to serve as a reviewer of information security materials the email address listed above. Accepted reviewers will receive prompt notification and specific instructions.
For additional information please contact Michael E. Whitman, Ph.D. at mwhitman@kennesaw.edu or Herbert Mattord, CISM, CISSP at hmattord@kennesaw.edu.

Related Resources

EXTRAAMAS 2024   EXplainable and TRAnsparent AI and Multi-Agent Systems
IJCIS 2024   International Journal on Cryptography and Information Security
BTSD 2024   The 5th International Workshop on Big Data & AI Tools, Models, and Use Cases for Innovative Scientific Discovery (BTSD) 2024
IEEE BDAI 2025   IEEE--2025 the 8th International Conference on Big Data and Artificial Intelligence (BDAI 2025)
Topical collection Springer 2025   CFP: Sense-Making and Collective Virtues among AI Innovators. Aligning Shared Concepts and Common Goals
SECRYPT 2025   22nd International Conference on Security and Cryptography
Canadian AI 2025   38th Canadian Conference on Artificial Intelligence
ACM ICIIT 2025   ACM--2025 10th International Conference on Intelligent Information Technology (ICIIT 2025)--ESCI
ICRES 2025   10th International Conference on Robot Ethics and Standards
CAD-SI-TOXIC 2025   CfP Culture and Dialogue, Special Issue: The Aesthetics and Ethics of the Toxic