|
Special Track on Information and Cyber Security:
Info/Cyber-Security 2025 |
|
"Cyber security risks pose some of the most serious economic and national security challenges of the 21st century" Barak Obama, quoted by Singer and Friedman, 2014, Cybersecurity and Cyberwar, pp. 2-3.
"When the financial crisis of 2008 hit, many shocked critics asked why markets, regulators, and financial experts failed to see it coming. Today, one might ask the same question about the global economy's vulnerability to cyber-attack. Indeed, the parallels between financial crises and the threat of cyber meltdowns are striking." Kenneth Rogoff, Harvard University professor and former chief economist at the International Monetary Fund. Quoted by Hamid Salim (2014) in "Cyber Safety: A Systems Thinking and Systems Theory Approach to Managing Cyber Security Risks" MIT Master Thesis.
|
As it is widely known Cybercrime has had a large impact in our society including individuals as well as business and governmental organizations. Simultaneously, an exponentially increasing number of businesses and government sectors are increasingly becoming information-centric and reliant on communication technologies and networking in the context of the cyber-space. Consequently, there is an increasing concern regarding information security vulnerabilities and cyber security resilience, especially with respect to cyber-espionage, cyber-attacks and cyber-wars, cyber-crimes, etc.
Complex security systems are (or should be) embedded within enterprise architectures and organizational systems, which, in turn are also complex systems. These internal and external complexities require multi-disciplinary teams with skills for inter-disciplinary communication in order address the emerging problems in information and cyber security. Since multi-disciplinary forums oriented to inter-disciplinary communication are a main purpose of the events organized by the International Institute of Informatics and Systemics (IIIS, www.iiis.org), then an Special Track on Information and Cyber Security: Info/Cyber-Security will be organized in the context of IIIS conferences.
On the other hand, Information and Cyber Security systems are both cause and effect of integrative processes of 1) academic activities (research, education, and real life problem solving) and 2) the academic with the private and public sectors. To contribute with these two kinds of integrations is also a main purpose of the IIIS and an important reason for the conferences organized by this institute.
Consequently, the purpose of the Info/Cyber-Security 2025 is to bring together researchers and professionals, from the academic, private and governmental sectors, to present and discuss advances, problems, solutions, reflections, and potential innovations in the areas of information and cyber security; from research, educational, commercial and governmental perspectives.
Some authors conceive Information Security as part of Cyber Security and others perceive Cyber Security as being part of Information Security. It depends on the meaning associated to each of the term. We prefer to consider that both areas intersect each other because we prefer to assign a more comprehensive meaning to each of the two phrases.
General Approaches and Methodologies
- Systems Approach, thinking and methodologies to managing the cyber-security risks
- Case studies or reports
- Case studies as research and educational methodologies
- Systems security and security systems
- Information and computer security: concepts, techniques, procedures and methodologies.
- Cyber Security Technologies and methodologies
- Network Communications Security
- Cyber security strategies and related Regulations
- Information forensics
- Cryptography
Organizational Security: Business and Government
- Security for critical infrastructures
- Cyber-Espionage
- Cyber-Wars
- Cyber-Attack
- Cyber-Crime
- Anti-cyber terrorism
- Computer Crime Prevention and Detection
- Web, e-commerce, m-commerce, and e-mail security
- Mobile security
- Computer and network forensic
- Intrusion detection and prevention
- Digital Forensics
- Cyber Security Education
- Industrial Espionage and Theft of Information
- Legal informatics
- Information security culture
- Enhancing risk perception
- Public understanding of security
- Impacts of standards, policies, compliance requirements
- Organizational governance for information assurance
- Risk Management and Risk Mitigation Strategies
- Insider Threat
Individual Security, Privacy and Human Aspects
- Human aspects of information security and assurance
- Management of information and cyber security risks
- Cyber-Anxiety
- Security and privacy in social networks
- Social, economic and policy issues of trust, security and privacy
- Security and privacy for big data
- Security and privacy in the Internet of Things
- Security and privacy in cloud computing and federated cloud
- Anonymization and privacy in communication systems
- Privacy in e-health systems
- Confidentiality Protection
- Information Content Security
- Information Ethics
- Awareness and education methods
- Psychological models of security
- User acceptance of security policies and technologies
- User-friendly authentication methods
- Social engineering and other human-related risks
- Privacy attitudes and practices
- Mobile privacy and security technologies
Specific Areas, Cases, and Technologies
- Secured software
- Security in mobile networks, computing and technologies
- Intelligent Access Control Models
- Adversarial Modeling
- Automated Vulnerability Assessment/ Penetration Testing
- Cloud Computing, Social Media Security, and Privacy
- Game-theoretic approaches to Security and Privacy
- Malware (Virus, Worms, Trojans, Backdoors)
- Multi-party/Multi-agent Access Control
- Resilience and Robustness
- Biometric technologies and impacts
- Visualization for cyber security
Virtual Sessions
Face-to-face sessions of all events will have associated virtual pre- and post-conference sessions where registered participants can comment each paper in a forum associated to it. Registered participant at any event will have a password to access any virtual session of any collocated event.
Organizational, Reviewing, and Selection of Best Papers Policies
Technical Keynote Speakers
Technical keynote speakers will be selected from early submissions because this selection requires an additional evaluation according to the quality of the paper, assessed by its reviewers, the authors' CV and the paper's topic.
Authors of accepted papers who registered in the conference can have access to the evaluations and possible feedback provided by the reviewers who recommended the acceptance of their papers/abstracts, so they can accordingly improve the final version of their papers. Non-registered authors will not have access to the reviews of their respective submissions.
Virtual Participation
Submissions for Face-to-Face or for Virtual Participation are both accepted. Both kinds of submissions will have the same reviewing process and the accepted papers will be included in the same proceedings.
Pre-Conference and Post-conference Virtual sessions (via electronic forums) will be held for each session included in the conference program, so that sessions papers can be read before the conference, and authors presenting at the same session can interact three days before and during the conference, as well as up to three weeks after the conference is over. Authors can also participate in peer-to-peer reviewing in virtual sessions.
Best Papers
Authors of the best 25%-30% of the papers presented at the conference (included those virtually presented) will be invited to adapt their papers for their publication in the Journal of Systemics, Cybernetics and Informatics.
One best paper of each session included in the program will be selected by the respective session’s co-chairs after consulting with the session’s audience. If there is a tie in a given session, the paper that will be selected as the best session’s paper will be the one which have had the highest quantitative evaluations average according to its double-blind and non-blind reviews.
The selection process of the best 25%-30%, to be also published in the Journal, will be based on the sessions' best papers and the quantitative evaluation average made by its anonymous and non-anonymous reviewers. The later will be applied to papers which acceptance was based on reviews made to draft papers. Reviews of abstracts and extended abstracts will not be valid for selecting best papers according to the quantitative evaluation of the respective submissions.
|