A ACM S SIGMIS a

C
Call for Papers
P
A
ACM SIGMIS
S
S Comp
puters
a
and Pe
eople Resear
R
rch 201
15
http:///www.sigmis.o
org ber Securrity Workfforce in the
t Globa
al Contex
xt
Cyb
L
Location: Newport Beach, California USA
U
JJune 4-6, 2015
C
Conferenc
ce website
e: http://w
www.sigmiis.org/sigccpr2015
S
Submissio
on website
e: https://e
easychairr.org/confe
erences/?
?conf=acm
msigmiscp
pr2015
NT DATES
IMPORTAN
P
Paper submisssion
N
Notification of
o acceptancee
C
Camera-readyy papers
netw
worked assetss from attacck by hackerrs, insider
threa
ats, and unkn
nown adversa
aries. Often, managing
riskss means b
balancing security and privacy
conccerns. The recent revvelations by Edward
Snow
wden, an IT contractor w
working for th
he United
State
es National Security A
Agency, high
hlight this
tens ion between
n security an
nd privacy. Important
omputers and
d people” researchers
quesstions for “co
(CPR
R) include: how are cybersecurity proffessionals
man aging this tension? a
are they a
adequately
pared to do so? are futture members of the
prep
cybe
ersecurity wo
orkforce being
g adequately prepared
to ta
ake on the p
privacy and ssecurity challlenges of
tomo
orrow? Answ
wers to these
e questions a
are being
conssidered throug
gh efforts succh as the 2013 United
State
es National Research Co
ouncil investtigation of
profe
essionalizatio
on in buildin
ng the cyb
bersecurity
workkforce. It sseeks to sh
hed light o
on which
profe
essionalizatio
on activities (e.g., ce
ertification,
licen
nsure, codess of ethics, continuing education
requ
uirements) miight positivelyy impact ourr ability to
crea
ate a workfo
orce capable
e of addresssing the
erging threat. W
We believe th
hat the “CPR”” research
eme
nswers.
com munity can also provide an
addition to the cyber security topics listed
In a
here
eunder, autho
ors are invite
ed to submitt work on
topiccs related to Computers and People research
and practice traditionally prese
M SIGMIS
ented at ACM
R.
CPR
Dec. 199, 2014
Februaary 20, 2015
March 29, 2015
C
Conference
e Theme
T
The theme of
o this conferrence is time
ely given the
e
g
global deman
nd for a cy
ybersecurity workforce off
ssufficient scop
pe and capab
bility to meet ever-growing
g
ccybersecurity threats.
T
The 2013 (ISC)2 Glob
bal Informatiion Security
y
W
Workforce Sttudy revealed
d that even with double-d
digit growth in recent years, and
d significantt
in
nvestments in
n the develop
pment of the cybersecurity
y
w
workforce fro
om national governments
s and otherr
sstakeholders across the globe, the demand forr
ccybersecurity
nals
still
significantly
y
profession
o
outpaces the
e supply. Se
ecurity profe
essionals are
e
ccritical to the successful im
mplementation of strategic
c
ccybersecurity initiatives, technical cybersecurity
y
p
products, an
nd security awareness
s programs.
A
Accordingly, the vitality
y of the cybersecurity
y
w
workforce, an
nd the vulne
erability to ou
ur networked
d
in
nfrastructure and data sto
ores posed by
b a shortage
e
o
of qualified prrofessionals, is an urgent priority
p
facing
g
the global ec
conomy. The
e National Association
A
off
S
State Chief Information
I
Officers
O
(NAS
SCIO) in the
e
U
United States
s ranked sec
curity as the number one
e
sstrategic management prio
ority in 2014. This concern
n
iss shared by individuals,
i
organizations,
o
and national
sstate governm
ments alike. The
T
increasin
ngly complex
x
g
global environment in
n which cybersecurity
y
p
professionals
must
op
perate
includes
rapid
d
a
advancements in technolo
ogy artifacts (e.g., mobile
e
d
devices) and evolving in
nfrastructures (e.g., cloud
d
ccomputing, so
ocial media) that supportt changes in
n
u
user behaviorr.
A
As the (ISC)2 report indic
cates, these professionals
s
m
must manage
e a dynamic set of risks wh
hile defending
g
The DATA BASE for Advances in Information Systems
Con
nference L
Location
The conference will be held
d in Newport Beach,
Califfornia. Hotel information and logisticcs will be
anno
ounced in upccoming weekss.
Listt of Releva
ant Topics
ACM
M SIGMIS CPR 2015 we
elcomes rese
earch and
pracctice submissions that add
dress issues ccongruent
with the conference theme. Th
hese topics include, but
not limited to:
are n
72
Volume 45, Number 4, November 2014





















consortium should submit a 10-page research
proposal (including all text, figures, and references)
to be reviewed by a panel of highly qualified senior
faculty mentors. The 3-5 students selected to
participate in the doctoral consortium will receive two
rounds of written feedback on their proposal. At the
conference, each student will have 40-60 minutes to
present their research ideas and receive feedback
in-person from six-to-eight experienced CPR
researchers. Additional information, including
submission
deadlines,
can
be
found
at
http://www.sigmis.org/sigcpr2015.
Cyber security professionals (attraction,
retention and development)
Recruitment and retention of IT and IT security
related “majors”
Workplace security policies: compliance
implications for managers and employees
Managers’ beliefs and attitudes toward
information privacy and security
IT personnel perspectives on IT and information
security and privacy
Financial factors and “Return on Investment” in
hiring and retaining IT security personnel
Making a business case for organizational
investment in IT security personnel
Staffing models for IT security personnel
Role of IT personnel in organizational response
to data security breaches
Employee monitoring, surveillance and privacy
Information security technologies, operations,
controls and human behavioral controls
Implications of privacy, security and
confidentiality laws and regulations on IT
professionals
The role of IT personnel in workplace monitoring
and surveillance
Education and preparation programs for cyber
security IT professionals
Personnel implications of cyber warfare, cybercrimes, and cyber terrorism
Knowledge, skills, and abilities required to
become an IT security professional in the
coming decade
Challenges of maintenance and securing of
electronic records in the workplace
IT security personnel work satisfaction and
turnover in the workplace
The impact of social media and open culture on
confidentiality, privacy and security
Diversity in the cyber security workforce
Professionalization of the cyber security
workforce
Student Research Competition
Students’ posters and demo submissions will be
entered into the ACM Student Research
Competition. Qualified entrants must have current
ACM student membership, have graduate or
undergraduate student status at the time of
submission, and be the only student working on the
project. While not mandatory, entrants are
encouraged to submit a letter from their advisor
describing the specific contributions made by the
student. High School, Undergraduate and Graduate
students will be treated in separate divisions
(students starting their first year of graduate school
at the time of the conference will be considered as
undergraduates).
Format of Submissions
ACM SIGMIS CPR 2015 welcomes completed
research papers, research-in-progress papers,
industry case studies, or proposals for panel
discussions or tutorials. All papers must be original,
unpublished elsewhere, and in the style of MIS
Quarterly. All reviewing will be double-blind.
● Completed research papers must not exceed
5000 words or 28 double-spaced pages
including all text, figures, and tables. The cover
page, abstract, keywords, and references are
excluded from this page count.
● Research-in-progress papers must not exceed
2000 words or 12 double-spaced pages
including all text, figures, and tables. The cover
page, abstract, keywords, and references are
excluded from this page count.
● Panel and tutorial proposals must include the
names and affiliations of panelists who have
agreed to participate and a 1-2 page summary
of the topic, including a description of how the
session will be structured.
● Industry case studies may report specific
strategies
being
employed
or
under
development to address CPR issues and should
be no longer than 3500 words or 21 doublespaced pages including all text, figures, and
Doctoral Consortium
A doctoral consortium will take place on the day
prior to the conference. This doctoral consortium is
targeted for students who are at an early stage of
writing their dissertation proposal (typically in the
2nd or 3rd year in a doctoral program), and who are
conducting research on a CPR topic. The purpose of
the consortium is two-fold: 1) provide feedback and
guidance to students on their proposal while at a
stage where feedback can be considered for future
dissertation work, and 2) provide mentoring and
networking opportunities to students who wish to
pursue careers as CPR researchers. Doctoral
students must be nominated to the consortium by a
faculty sponsor. Students nominated for the
The DATA BASE for Advances in Information Systems
73
Volume 45, Number 4, November 2014
●
tables. The cover page, abstract, keywords, and
references are excluded from this page count.
Posters/demo sessions provide an opportunity
to showcase work-in-progress in an informal
setting. Authors should submit a two-page
abstract in PDF format describing what the
poster would present. The abstract should
clearly state: (a) the problem being addressed;
(b) what makes this problem interesting,
important, and difficult; (c) your approach to the
problem; and (d) the key contribution. In the final
version of the abstract, you should include a
URL that provides additional information about
your work. We strongly encourage doctoral,
masters, undergraduate, community college and
high school research student submissions. The
SIGMIS 2015 Poster and Demo committee will
review all posters and demo proposals. Authors
of accepted posters must present student
posters at the conference and have a printed
version of the abstract or poster to handout to
attendees.
all previous CPR conferences are available in the
ACM Digital Library at http://portal.acm.org/dl.cfm.
Conference Committee
Conference Co-Chairs
Diana Burley, The George Washington University,
USA ([email protected])
Indira Guzman, Trident University International, USA
([email protected])
Program Co-Chairs
Daniel P. Manson, California State Polytechnic
University, Pomona, USA
([email protected])
Leigh Ellen Potter, Griffith University, Australia
([email protected])
Local Arrangements Co-Chairs
Conrad Shayo, Cal State San Bernardino, USA
([email protected])
Treasurer
Poster Requirements
Susan Yager, Southern Illinois University
Edwardsville, USA ([email protected])
A poster is A0 paper size in portrait mode (841 ×
1189mm), to which you can affix visually appealing
material that describes your research. Alternatively,
you can use the space as a continuum. You should
prepare the best material (visually appealing and
succinct) that effectively communicates your
research problem, techniques, results, and what is
novel/important about the work.
Publicity Co-Chairs
Americas Region:
Joon Park, Syracuse University, USA
([email protected])
Conrad Shayo, Cal State San Bernardino, USA
([email protected])
European Region:
Proceedings
Andreas Eckhardt, Goethe University Frankfurt,
Germany ([email protected])
Accepted papers will be published by ACM in the
refereed conference proceedings, which will be
distributed at the conference. Completed research
and case study papers will be published in their
entirety. Extended abstracts will be published for
panel discussions and research-in-progress papers.
All presented papers will be considered for the
Magid Igbaria Outstanding Conference Paper of the
Year Award. The Magid Igbaria Outstanding
Conference Paper and other exemplar papers will
be invited for publication in the DATA BASE for
Advances in Information Systems – the quarterly
journal publication of ACM SIG-MIS. Proceedings of
Austral-Asia-Pacific Region:
Rajendra Bandi, Indian Institute of Management
Bangalore, India ([email protected])
Doctoral Consortium Co-Chairs
Lorne Olfman, Claremont Graduate University, USA
([email protected])
Damien Joseph, Nanyang Technological University,
Singapore ([email protected])
Submission Website:
https://easychair.org/conferences/?conf=acmsigmiscpr2015
The DATA BASE for Advances in Information Systems
74
Volume 45, Number 4, November 2014