CALL
FOR CHAPTERS
(Manuscript Proposal
Submission Deadline: December 15, 2006)
It is becoming increasingly evident that the weakest links in an
information-security chain are the people because human nature and social interactions
are much easier to manipulate than targeting the complex technological
protections of information systems. Concerns and threats regarding human and
social factors in organizational security are increasing at an exponential rate
and shifting the information
security paradigm. With the abundance of confidential information that organizations must
protect, and with consumer fraud and identity theft at an all time high,
security has never been as important as it is today for businesses and
individuals alike. A security breach can happen by bypassing millions of dollars invested
in technical and non-technical protection mechanisms by exploiting the human
and social aspects of information security.
The
proposed book aims to provide high-quality research papers, industrial articles
and practice articles on social and human aspects of information security. The
main focus of the book is to provide insight into the social and human elements
of information security measures being researched on or deployed through book
chapters from leading researchers and practitioners in the field, culminating
submissions into a high quality book. The key objective is to fill a gap in
existing literature on human and social dimensions of information security by
providing the audience one comprehensive source of latest trends, issues and
research in the field. . Book will host topics both on theoretical (research)
aspects of securing information systems and infrastructure from social
engineering attacks, as well as real- world implications and implementations
(practice) of the research.
Target
Audience
The book is
aimed towards primary audiences of professionals, researchers and academics
working in the fast evolving and growing field of information technology and
information security. Practitioners, researchers, auditors and lawyers working
in information technology or information security areas across all industries
would vastly improve their knowledge and understanding of trends, issues and
research on human and social aspects of information security.
Recommended
topics and themes
Original papers on the
aspects of social and human elements of information security are invited.
Submissions could be based on previous research or data, but must not substantially
duplicate work that has been published elsewhere or is submitted in parallel to
a conference or workshop with proceedings. In case of re-use of previous
research or data, the language included in the chapter submissions must be original. Possible topics may include
(but are not limited to):
-
Phishing and Pharming -
Trojan horses and Rat-ting -
Trends and advances in attack types -
Security Usability -
Response and detection -
Technical, procedural and administrative countermeasures -
Impersonation and psychological persuasion -
Information disclosure: Internet and web site search -
Organizational memory, learning and information diffusion -
Social engineering attack channels -
Viruses and worms -
Awareness, communications and training issues |
-
Social Network theory -
Employee monitoring and surveillance -
Insider and workplace threats -
Threat and protection modeling and security economics -
Organizational security culture -
SE vulnerability assessments -
Case studies -
Reverse social engineering -
Corporate espionage and information warfare -
Personnel and organizational knowledge management -
Privacy and anonymity issues |
SUBMISSION
PROCEDURE
Researchers and practitioners
are invited to submit on or before December 15, 2006, a 2
to 5 page manuscript proposal clearly explaining the mission and concerns of
the proposed chapter. Authors of accepted proposals will be notified by January
31, 2007 about the status of their proposals and sent chapter
organizational guidelines. Full chapters (7000- 9000 words) are expected to be submitted by April
30, 2007. All submitted chapters will be reviewed by at least two
reviewers on a blind review basis. The book is scheduled to be published by
Idea Group, Inc., http://www.idea-group.com,
publisher of the Idea Group Publishing, Information Science Publishing, IRM
Press, CyberTech Publishing and Idea Group Reference imprints.
Please e-mail all inquiries
and proposal submissions to mgupta@mandtbank.com
or mgupta3@buffalo.edu
Call for chapters at
publisher’s site
Editors
Manish Gupta, CISSP, CISM, CISA, PMP
Executive, Information Security, M&T Bank Corp
PhD Candidate, State University of New York at Buffalo
465 Main Street, Suite 800, Buffalo, NY, 14203
Phone: 716-5101676 / 716-8485579
Fax: 716-8485060
Email: mgupta@mandtbank.com / mgupta3@buffalo.edu
Dr. Raj Sharman
Asst. Professor, MSS, School of Management
State University of New York
Buffalo, NY, 14260, USA
Phone: 716-6452081
Fax: 716-6456117
Email: rsharman@buffalo.edu