Call for Participation

Security, assurance and privacy challenges abound. Advances in information and communication technologies have brought many security problems to the fore. Such problems may be technical in nature or organizationally grounded. Whatever be the nature and scope of the security problems, there is a need to engage in discourses pertaining to security, assurance, and privacy. To that effect, we welcome participation in the 24th Annual Security Conference.

Themes 
The conference welcomes submissions from academia, industry, and government addressing both theoretical and practical aspects of cybersecurity. Indicative themes include:

Access control and authenticationLegal and regulatory aspects
Audit and risk analysisMobile device security
Awareness and education methodsNetwork security
Biometric technologies and impactsOrganizational issues and governance
Cloud and big data securityPolicy, standards and compliance
Cybercrime and misusePrivacy protection and practices
Digital forensicsPublic attitudes and understanding
Human aspects of securityTrust management

Deadlines

Paper submissions: January 31, 2025 (Template)
Author notification: On a rolling basis
Author registration: March 1, 2025

Submission types

Participation can be in the following categories:

Please use this template for all submission types

a) Full-paper submissions

In this submission mode you are uploading a full paper for double-blind, peer-review. Full papers must:

  • not exceed 10 pages (approx. 5,000 words, including figures, tables, references, and appendices)
  • use the APA formatting style (http://www.apastyle.org)

Full papers that are accepted following the double-blind, peer-review will be published, upon the agreement of the author(s), in the Scopus-indexed Journal of Information System Security (http://www.jissec.org)

b) Short submissions 

These submissions present research in progress or simply an idea that aims to generate some discussion on the conference floor. In this submission mode, you can submit an abstract (100 words), or extended abstract (up to 1000 words), with a view to potentially developing a full paper after the event. Extended abstracts will undergo a limited peer review, whereas abstracts will be reviewed by the conference chairs to ensure relevance and credibility. The author names and titles of accepted short papers will be included in the conference proceedings. 

Authors of accepted short submissions will have the opportunity to extend these to full papers, subject to further post-conference review by JISSec.  Abstracts and Extended Abstracts that are not developed into full papers will be published via the Information Institute’s open access online repository.

c) Case Studies. Case study papers document a cybersecurity breach. The length of the case study can be anywhere between 5-10,000 words. Case study submissions will be reviewed by the conference chairs to ensure relevance and credibility. The author names and titles of accepted case study papers will be included in the conference proceedings. 

Please use this template for all submission types


Submit paper

Submission system to open closer to the paper submission deadline.

Please make sure that you clearly indicate the type of submission (Full-paper Submission, Short Paper or Case Study) on the first page of your manuscript.