Search Mailing List Archives


Limit search to: Subject & Body Subject Author
Sort by: Reverse Sort
Limit to: All This Week Last Week This Month Last Month
Select Date Range     through    

[liberationtech] CFP - Special Issue on Cyber-Security for Development

Yosem Companys companys at stanford.edu
Fri Jul 13 09:30:57 PDT 2012


Please consider submitting a paper to the Special Issue of the Journal of
Information Technology  for Development on *Cyber-Security for Development*
.

http://itd.ist.unomaha.edu/IT4D%20-%20Cyber-Security%20for%20Development%20-%20Call%20for%20Papers.pdf

________________________________________________________________________________________________________________________________________

* *

*Call for Papers: Special Issue on *

*Cyber-Security for Development*

Modern societies have become increasingly dependent on Information &
Communication Technologies (ICTs), technologies that offer both
opportunities & challenges with respect to improvements in the quality of
life of people and the communities in which they live. For although the use
of ICTs offer several potential benefits including improvements in
efficiency & reduction in costs, and wide-spread access to information and
services, they also expose individuals, organizations & nations to new
risks including those that result from Internet-related security breaches
and misuse of cyber-power. Inadequate understanding of the security
implications of ICT acquisition, implementation, maintenance & retirement
decisions can lead to significant negative impacts on individuals,
organizations, and nations. While the exploration of organizational-related
Cyber-Security issues has attracted the attention of researchers, less
attention has been paid to Cyber-Security and National Development
particularly within the context of developing countries. Thus there is the
need for rigorous research that provides guidance to individuals,
organization, planners and other government officials in developing
countries, particularly those with limited financial, technical and other
resources.

Cyber-security has been defined by the International Communications Union
(ITU) to mean *the collection of tools, policies, security concepts,
security safeguards, guidelines, risk management approaches, actions,
training, best practices, assurance and technologies that can be used to
protect the cyber environment and organization and user‘s assets*. It can
be considered to involve several major threats including: espionage,
cyber-crime, cyber-war, cyber-terrorism, and dis-information campaigns. For
example a Cyber-Security breach could involve remotely corrupting the
information/knowledge space of people and/or organizations or disrupting
the flow of data/information between people and/or organizations. Important
elements of a cyber-security culture include: awareness, responsibility,
response, ethics, democracy, risk assessment, security design and
implementation, security management, and reassessment.

In this special issue our focus is on Cyber-Security within the context of
Developing Countries. Of particular relevance are papers that offer
theoretical or design science contributions that relate to the concepts of
Cyber-Security within the context of National Development agendas. The
related concept of Cyber-Power (i.e. *the ability to use cyberspace to
create advantages and influence events within & outside of cyberspace*) is
also relevant to this special issue.


Topics of relevance to this special issue include but are not limited to
the following:

o   Norms for Cyber-Security in Developing Countries****

o   Cyber-Warfare & National Development;****

o   Cyber-Peace & National Development****

o   Cyber-Power & Destabilization****

o   National Security, Disinformation & National Development****

o   Cyber-Security and the Protection of Children****

o   Cyber-Security Impact Assessment for ICT****

** **

o   Cloud Computing & the Protection of Critical National Assets****

o   Trust and Data Security ****

o   Cyber-Security Infrastructure for Developing Countries****

o   Designing Effective & Efficient Cyber-Security Solutions for Developing
Countries****

o   Capacity Building for Cyber-Security for Developing Countries****

** **

o   Security, Trust and Privacy****

o   Best Practice Model for Cyber-Security for Development****

o   Effective E-Government & Cyber Security****

o   Social Media/Networks & Cyber Security****

o   Cellular and broadband wireless nets  ****

o   Laws & Regulations for Cyber Security****

o   Public Utilities & Cyber-Security****

o   Cyber-Security Readiness Index for Developing Countries ****

o   Internet  protocols and policies to thwart fraud****

o   Organizational security implementation****

o   Identification & Protection of Critical Information Infrastructures****

o   Knowledge Management & Cyber-Crimes****

o   Impact of Culture on Cyber-Security****

** **

** **

*Paper Submission Instructions*

** **

Authors are invited to submit original papers using the journal submission
and reviewing web site https://mc.manuscriptcentral.com/itd*. *The papers
should follow the authorħ instructions at the site and indicate ■i
style="mso-bidi-font-style:normal">Cyber Security for Development¨special
issue when uploading their papers. Submissions to the special issue should
be full research papers (maximum 21 pages or 9000 words) or practice papers
of about (4000 words). After initial screening, papers are reviewed by
selected members of the editorial board and peers from an international
pool for quality, consistency and research contribution. Authors are
welcome to nominate one of the special issue editors or preferred reviewers
when submitting their paper. Particular attention is paid to the use of the
chosen research method. Papers submitted to this journal must contain
original results and must not be submitted elsewhere while being evaluated
for the Journal of Information Technology for Development. Detailed
submission guidelines can be found at:
http://www.tandf.co.uk/journals/journal.asp?issn=0268-1102&linktype=44. ****

 ****

** **

*Guest Editors:*****

* *

** **

* *

Kweku-Muata Osei-Bryson****

Department of Information Systems ****

Virginia Commonwealth University****

Richmond, VA 23284, USA****

KMOsei at VCU.Edu****

Doug Vogel****

Department of Information Systems****

City University of Hong Kong****

Kowloon, Hong Kong****

isdoug at cityu.edu.hk****

* *

* *

* *

*Background of special issue editor(s)***

* *

* *

*Kweku-Muata Osei-Bryson*

*Doug Vogel***

Kweku-Muata Osei-Bryson is Professor of Information Systems at Virginia
Commonwealth University <http://www.vcu.edu/>, where he also served as the
Coordinator of the Ph.D. program in Information Systems during 2001-2003.
Previously he was Professor of Information Systems & Decision Sciences in
the School of Business at Howard University <http://www.howard.edu/>,
Washington, DC, U.S.A. He has also worked as an Information Systems
practitioner in both industry and government. He holds a Ph.D. in Applied
Mathematics (Management Science & Information Systems) from the University
of Maryland at College Park.****

His current research areas include: Data Mining, IS Security, Data
&Knowledge Management, Expert & Decision Support Systems, e-Commerce, IT
for Development. His papers have been published in various journals
including*: IT for Development, Decision Support Systems*, *IEEE Security*&
Privacy, *Information Systems Journal, European Journal of Information
Systems, Journal of the Association for Information Systems, Expert Systems
with Applications, Omega, Computers& Operations Research, European Journal
of Operational Research, Journal of the Operational Research Society*.
Currently he serves as Vice-Chair for Research of the AIS SIG on ICT in
Global Development, as an Associate Editor of the INFORMS Journal on
Computing <http://joc.pubs.informs.org/>, and on the Editorial Board
of the Computers
& Operations Research
journal<http://www.elsevier.com/homepage/sae/orms/cor/menu.htm>,
and the International Advisory Board of the Journal of the Operational
Research Society.****

Doug Vogel is Professor of Information Systems (IS) at the City University
of Hong Kong and Acting Management Department Head as well as an
Association for Information Systems (AIS) Fellow and AIS President-elect.
He received his M.S. in Computer Science from U.C.L.A. and his Ph.D. in
Management Information Systems from the University of Minnesota where he
was also research coordinator for the MIS Research Center.  In a ten-year
relationship with a Colorado electronics manufacturer he served in
virtually every technical and managerial capacity including Director of
Engineering, General Manager and member of the Board of Directors. ****

** **

Professor Vogel has published widely and been recognized as the most cited
IS author in Asia Pacific. His teaching and research interests bridge the
business and academic communities in addressing issues of information
system creation and impact on aspects of interpersonal communication, group
problem solving, cooperative learning, and multi-cultural team productivity
in security-enabled contexts. His interests reflect a concern for
encouraging efficient and effective utilization of computer systems in an
atmosphere conducive to enhancing the quality of life. He is especially
active in introducing group support technology into enterprises and
educational systems. His particular focus emphasizes security-sensitive
integration of audio, video, and data in interactive distributed group
support. Additional detail can be found at
http://www.is.cityu.edu.hk/staff/isdoug/cv/. ****

** **

** **

*Timeline and Review Guidelines*****

** **

Deadline for manuscripts:                          September 15, 2012
Preliminary notice to authors:                    December 15, 2012
Revision Due:                                                        February
15, 2013
Final Manuscript Due:                                 April 30, 2013****

** **

Each submitted paper will be peer-reviewed in the same manner as other
submissions to Journal of IT for Development. Relevance, Quality and
originality of the contribution are the major acceptance criteria for each
submission. Due to the tight deadline, papers for which the outcome is ■i
style="mso-bidi-font-style: normal">Major Revision¨will not be accepted for
this focused issue, but may be put into the journalħ regular review process
and, after revision is complete, be considered for a regular issue of the
journal

**
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mailman.stanford.edu/pipermail/liberationtech/attachments/20120713/3de956c0/attachment.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: IT4D - Cyber-Security for Development - Call for Papers.pdf
Type: application/pdf
Size: 155280 bytes
Desc: not available
URL: <http://mailman.stanford.edu/pipermail/liberationtech/attachments/20120713/3de956c0/attachment.pdf>


More information about the liberationtech mailing list