posted by user: kotzgroup || 11363 views || tracked by 22 users: [display]

WEIS 2011 : Workshop on Economics of Information Security

FacebookTwitterLinkedInGoogle


Conference Series : Workshop on the Economics of Information Security
 
Link: http://weis2011.econinfosec.org/index.html
 
When Jun 14, 2011 - Jun 15, 2011
Where George Mason University, USA
Submission Deadline Feb 28, 2011
Notification Due Apr 11, 2011
Final Version Due May 14, 2011
Categories    economics   information security   computer security
 

Call For Papers


The Tenth Workshop on Economics of Information Security (WEIS 2011)
http://weis2011.econinfosec.org/index.html

George Mason University, USA
June 14-15, 2011

Call for Participation

Information security continues to grow in importance, as threats proliferate, privacy erodes, and attackers find new sources of value. Yet the security of information systems depends on more than just technology. Good security requires an understanding of the incentives and tradeoffs inherent to the behavior of systems and organizations. As society's dependence on information technology has deepened, policy makers, including the President of the United States, have taken notice. Now more than ever, careful research is needed to accurately characterize threats and countermeasures, in both the public and private sectors.

The Workshop on the Economics of Information Security (WEIS) is the leading forum for interdisciplinary scholarship on information security, combining expertise from the fields of economics, social science, business, law, policy and computer science. Prior workshops have explored the role of incentives between attackers and defenders, identified market failures dogging Internet security, and assessed investments in cyber-defense. This workshop will build on past efforts using empirical and analytic tools to not only understand threats, but also strengthen security through novel evaluations of available solutions. How should information risk be modeled given the constraints of rare incidence and high interdependence? How do individuals' and organizations' perceptions of privacy and security color their decision making? How can we move towards a more secure information infrastructure and code base while accounting for the incentives of stakeholders?

We encourage economists, computer scientists, business school researchers, legal scholars, security and privacy specialists, as well as industry experts to submit their research and attend the workshop. Suggested topics include (but are not limited to) empirical and theoretical studies of:

* Optimal investment in information security
* Online crime (including botnets, phishing and spam)
* Models and analysis of online crime
* Risk management and cyberinsurance
* Security standards and regulation
* Cybersecurity policy
* Privacy, confidentiality and anonymity
* Behavioral security and privacy
* Security models and metrics
* Psychology of risk and security
* Vulnerability discovery, disclosure, and patching
* Cyberwar strategy and game theory
* Incentives for information sharing and cooperation

We highlight two key areas of particular focus for this year's workshop. First, we encourage submissions that consider the design and evaluation of policy solutions for improving information security. Second, given the importance of data-driven decision making, we encourage submissions with empirical components. A selection of papers accepted to this workshop will appear in an edited volume designed to help policy makers, managers, researchers and practitioners better understand the information security landscape.
Important Dates

Submissions due February 28, 2011
Notification of acceptance April 11, 2011
Camera-ready papers due May 14, 2011
Workshop June 14-15, 2011

Submitted manuscripts should represent significant and novel research contributions. Please note that WEIS has no formal formatting guidelines. Previous contributors spanned fields from economics and psychology to computer science and law, each with different norms and expectations about manuscript length and formatting. Advisable rules of thumb include: using past WEIS accepted papers as templates and adhering to your community's publication standards.

Related Resources

IEEE BDAI 2025   IEEE--2025 the 8th International Conference on Big Data and Artificial Intelligence (BDAI 2025)
SECRYPT 2025   22nd International Conference on Security and Cryptography
ICTC 2025   2025 6th Information Communication Technologies Conference (ICTC 2025)--SCI
ICISSP 2025   11th International Conference on Information Systems Security and Privacy
ICICSP 2025   2025 8th International Conference on Information Communication and Signal Processing (ICICSP 2025)
BDE 2025   2025 7th International Conference on Big Data Engineering (BDE 2025)
ACM ICIIT 2025   ACM--2025 10th International Conference on Intelligent Information Technology (ICIIT 2025)--ESCI
SCID @ AsiaCCS 2025   The 2nd workshop on Security-Centric Strategies for Combating Information Disorder
ICIME--EI 2025   2025 13th International Conference on Information Management and Engineering (ICIME 2025)
IVSP 2025   2025 7th International Conference on Image, Video and Signal Processing (IVSP 2025)