The aim of the working group is the creation, dissemination, and preservation of well-formed research about information systems security. While relevant for advanced practical development, our primary audience consists of researchers in this area. We value research products with highly reliable and validated theory, empirical data, or quantitative/qualitative social scientific methodology. The group's activities will be workshop-based, and intended to nurture individual journal articles for submission to a wide variety of journals. Our workshops will produce notebooks that consist of formative working papers. We mainly target final publication venues in the management research journal communication system.
Topics may include (but are not limited to):
Theoretical and empirical analyses of information security behavior
Adoption, use, and continuance of information security technologies and policies
Compliance with information security and privacy policies, procedures, and regulations
Investigations of computer crime and security violations
Motivators and inhibitors of employee computer crime
Forensic analysis of security breaches and computer crimes
Individual, organizational, and group information privacy concerns and behaviors
Legal, societal, and ethical issues in information security
Neurosecurity—NeuroIS investigations of information security behavior
10月07日
2016
10月08日
2016
注册截止日期
留言