CALL FOR CHAPTERS

(Manuscript Proposal Submission Deadline: December 15, 2006)

PDF version

Social and Human Elements of Information Security:

Emerging Trends and Countermeasures

A book edited by Manish Gupta and Dr. Raj Sharman, State University of New York, Buffalo, NY, USA

 

 

Introduction

                It is becoming increasingly evident that the weakest links in an information-security chain are the people because human nature and social interactions are much easier to manipulate than targeting the complex technological protections of information systems. Concerns and threats regarding human and social factors in organizational security are increasing at an exponential rate and shifting the information security paradigm. With the abundance of confidential information that organizations must protect, and with consumer fraud and identity theft at an all time high, security has never been as important as it is today for businesses and individuals alike. A security breach can happen by bypassing millions of dollars invested in technical and non-technical protection mechanisms by exploiting the human and social aspects of information security.

 

Overall objectives

                The proposed book aims to provide high-quality research papers, industrial articles and practice articles on social and human aspects of information security. The main focus of the book is to provide insight into the social and human elements of information security measures being researched on or deployed through book chapters from leading researchers and practitioners in the field, culminating submissions into a high quality book. The key objective is to fill a gap in existing literature on human and social dimensions of information security by providing the audience one comprehensive source of latest trends, issues and research in the field. . Book will host topics both on theoretical (research) aspects of securing information systems and infrastructure from social engineering attacks, as well as real- world implications and implementations (practice) of the research.

 

Target Audience

The book is aimed towards primary audiences of professionals, researchers and academics working in the fast evolving and growing field of information technology and information security. Practitioners, researchers, auditors and lawyers working in information technology or information security areas across all industries would vastly improve their knowledge and understanding of trends, issues and research on human and social aspects of information security.

 

Recommended topics and themes

            Original papers on the aspects of social and human elements of information security are invited. Submissions could be based on previous research or data, but must not substantially duplicate work that has been published elsewhere or is submitted in parallel to a conference or workshop with proceedings. In case of re-use of previous research or data, the language included in the chapter submissions must be original. Possible topics may include (but are not limited to):

 

-          Phishing and Pharming

-          Trojan horses and Rat-ting

-          Trends and advances in attack types

-          Security Usability

-          Response and detection

-          Technical, procedural and administrative countermeasures

-          Impersonation and psychological persuasion

-          Information disclosure: Internet and web site search

-          Organizational memory, learning and information diffusion

-          Social engineering attack channels

-          Viruses and worms

-          Awareness, communications and training issues

-          Social Network theory

-          Employee monitoring and surveillance

-          Insider and workplace threats

-          Threat and protection modeling and security economics

-          Organizational security culture

-          SE vulnerability assessments

-          Case studies

-          Reverse social engineering

-          Corporate espionage and information warfare

-          Personnel and organizational knowledge management

-          Privacy and anonymity issues

 


 

SUBMISSION PROCEDURE

                Researchers and practitioners are invited to submit on or before December 15, 2006, a 2 to 5 page manuscript proposal clearly explaining the mission and concerns of the proposed chapter. Authors of accepted proposals will be notified by January 31, 2007 about the status of their proposals and sent chapter organizational guidelines. Full chapters (7000- 9000 words) are expected to be submitted by April 30, 2007. All submitted chapters will be reviewed by at least two reviewers on a blind review basis. The book is scheduled to be published by Idea Group, Inc., http://www.idea-group.com, publisher of the Idea Group Publishing, Information Science Publishing, IRM Press, CyberTech Publishing and Idea Group Reference imprints.

 

 

Please e-mail all inquiries and proposal submissions to mgupta@mandtbank.com or mgupta3@buffalo.edu

 

 

Call for chapters at publisher’s site

 

Editors

 

Manish Gupta, CISSP, CISM, CISA, PMP

Executive, Information Security, M&T Bank Corp

PhD Candidate, State University of New York at Buffalo

465 Main Street, Suite 800, Buffalo, NY, 14203

Phone: 716-5101676 / 716-8485579

Fax: 716-8485060

Email: mgupta@mandtbank.com / mgupta3@buffalo.edu

 

           

Dr. Raj Sharman

Asst. Professor, MSS, School of Management

State University of New York

Buffalo, NY, 14260, USA

Phone: 716-6452081

Fax: 716-6456117

Email: rsharman@buffalo.edu