Security, assurance and privacy challenges abound. Advances in information and communication technologies have brought many security problems to the fore. Such problems may be technical in nature or organizationally grounded. Whatever be the nature and scope of the security problems, there is a need to engage in discourses pertaining to security, assurance, and privacy. To that effect, we welcome participation in the 24th Annual Security Conference.
Themes
The conference welcomes submissions from academia, industry, and government addressing both theoretical and practical aspects of cybersecurity. Indicative themes include:
Access control and authentication | Legal and regulatory aspects |
Audit and risk analysis | Mobile device security |
Awareness and education methods | Network security |
Biometric technologies and impacts | Organizational issues and governance |
Cloud and big data security | Policy, standards and compliance |
Cybercrime and misuse | Privacy protection and practices |
Digital forensics | Public attitudes and understanding |
Human aspects of security | Trust management |
Paper submissions: January 31, 2025 (Template)
Author notification: On a rolling basis
Author registration: March 1, 2025
Participation can be in the following categories:
Please use this template for all submission types
a) Full-paper submissions
In this submission mode you are uploading a full paper for double-blind, peer-review. Full papers must:
Full papers that are accepted following the double-blind, peer-review will be published, upon the agreement of the author(s), in the Scopus-indexed Journal of Information System Security (http://www.jissec.org).
b) Short submissions
These submissions present research in progress or simply an idea that aims to generate some discussion on the conference floor. In this submission mode, you can submit an abstract (100 words), or extended abstract (up to 1000 words), with a view to potentially developing a full paper after the event. Extended abstracts will undergo a limited peer review, whereas abstracts will be reviewed by the conference chairs to ensure relevance and credibility. The author names and titles of accepted short papers will be included in the conference proceedings.
Authors of accepted short submissions will have the opportunity to extend these to full papers, subject to further post-conference review by JISSec. Abstracts and Extended Abstracts that are not developed into full papers will be published via the Information Institute’s open access online repository.
c) Case Studies. Case study papers document a cybersecurity breach. The length of the case study can be anywhere between 5-10,000 words. Case study submissions will be reviewed by the conference chairs to ensure relevance and credibility. The author names and titles of accepted case study papers will be included in the conference proceedings.
Please use this template for all submission types
Submission system to open closer to the paper submission deadline.
Please make sure that you clearly indicate the type of submission (Full-paper Submission, Short Paper or Case Study) on the first page of your manuscript.