-> CISIS 2009 conference

The First International Workshop on Organizational Security Aspects (OSA 2009)

To be held in conjunction with the Fourth International Conference on Availability, Reliability and Security (ARES 2009 – http://www.ares-conference.eu).

March 16th – 19th, 2009
Fukuoka Institute of Technology (FIT)
Fukuoka, Japan


In today's global economy, where conditions change often and rapidly, the efficiency and effectiveness of the execution of business processes has become a central issue. As these processes depend on the assigned resources, a considerable optimization focus lies on the minimization of the resources' costs and simultaneously on the maximization of their returns. Another critical factor, which substantially influences the ability to compete, is the continuous operation of a company's business processes. The reasons why the execution of business processes may be interrupted are manifold and are addressed by several fields of research.
Exercising for instance strong computer security is a company’s crucial task in order to strengthen the resilience of IT systems against arising threats. However, the most sophisticated technical security techniques will fail, if there is no adequate organizational structure covering the appropriate planning, design and implementation of these techniques. Furthermore, processes within the companies have to be set up, lived and monitored to continuously improve the company’s ability to survive while simultaneously maximizing its returns.

The main objectives of this workshop are to bring together users and researchers (from industry and academy) to present their recent work, discuss and identify problems, synergize different views on methods and techniques, and brainstorm future research directions on various aspects of organizational security issues.

Topics of interest comprise but are not limited to:

  • Auditing
  • Business Continuity
  • Cost/Benefit Analysis
  • Disaster Recovery
  • Identity Management
  • Information Assurance
  • Information Security Management
  • Insider Threats
  • IT Governance
  • IT Service Continuity
  • Risk Management
  • Security Awareness
  • Security Culture
  • Security Requirements Engineering
  • Standards, Guidelines, Best Practices and Certification

Important dates

Submission Deadline: November 1st, 2008
Author Notification: December 1st, 2008
Author Registration: December 15th, 2008
Proceedings Version: December 15th, 2008
Conference/Workshop: March 16th -19th, 2009

Submission Guidelines

Authors are invited to submit research and application papers following the IEEE Computer Society Proceedings Manuscripts style: two columns, single-spaced, including figures and references, using 10 fonts, and number each page. You can confirm the IEEE Computer Society Proceedings Author Guidelines at the following web page:

http://www.ieee.org/portal/pages/pubs/transactions/stylesheets.html

Workshop papers are classified into 1 categorizes representing original, previously unpublished work.
  • workshop paper (6 pages)


Submitted papers will be carefully evaluated based on originality, significance, technical soundness, and clarity of exposition. Before uploading your paper, please ensure to remove any explicit author information.

Contact author must provide the following information at the ARES web site: paper title, authors' names, affiliations, postal address, phone, fax, and e-mail address of the author(s), about 200-250 word abstract, and about five keywords.

Submission of a paper implies that should the paper be accepted, at least one of the authors will register and present the paper in the conference.

Accepted papers will be given guidelines in preparing and submitting the final manuscript(s) together with the notification of acceptance.

All accepted papers will be published as ISBN proceedings published by the IEEE Computer Society.

 

Workshop Chair

Gerald Quirchmayr

University of Vienna and University of South Australia

Gerald.Quirchmayr[at]univie.ac.at

 

Program Committee

Helen Armstrong, Curtin Univeristy of Technology, Australia
Chrsitophe Feltus, Centre de Recherche Public Henri Tudor, Luxembourg
Eduardo Fernandez, Florida Atlantic University, USA
Stefan Jakoubi, Secure Business Austria, Austria
Sokratis A. Katsikas, University of Piraeus, Greece
Günther Pernul, Univeristät Regensburg, Germany
Reijo Savola, VTT Research, Finland
Simon Tjoa, Secure Business Austria, Austria
Benjamin Turnbull, University of South Australia, Australia
Louise Yngström, Stockholm University, Sweden
Matthew Warren, Deakin University, Australia
Christopher C. Wills, Kingston University, UK
José L. Vivas, Universidad de Malaga, Spain
Yoshiaki Hori, Kyushu University, Japan
Jorma Kajava, Oulu University, Finland
Nandan Garg, Wayne State Univeristy, USA