ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

ISSA 2013 - 12th International Information Security for South Africa Conference

Date2013-08-14 - 2013-08-16

Deadline2013-04-21

VenueJohannesburg, South Africa South Africa

Keywords

Websitehttp://www.infosecsa.co.za

Topics/Call fo Papers

The ISSA2013 Conference will provide an opportunity for key players to review sustainable practices that have been developed by South Africans in order to meet the challenges delivered by globalisation. Topics to be addressed by the conference include: research papers, case studies, lessons learned, current research, short tutorials and research in progress (student papers).
The field of information security is diverse, including technical, managerial, legal, social and even philosophical issues. Individuals alone cannot address these issues. Only the combined efforts of academia and industry can provide answers and solutions that will benefit all of society.
Topics include but are not limited to: (Main Topics in Bold)
Access Control
Authentication
Biometrics
Identification and Authentication
Identity Management
Smart Cards
Digital Forensics
Anti-Forensics
Forensic Auditing
Botnets
Data Carving
Malware
Anti-Virus
Security Management
Awareness and Training
Assessment of Information Security
Security Policy and Procedures
Security Education
Certification
Governance
Business Continuity Planning
Disaster Recovery Planning and Management
Privacy
E-mail Security
Cryptography Network and Communication
Firewalls
Networking Security
VPNS
Social Engineering
Intrusion Detection
Ethics
Economy and philosophy of information security
Hacking / cracking
Cloud Computing
Critical Infrastructure Protection
Database Security
Legislation
Risk Management
Service Orientated Architectures
Social Networks
Standards
VPNS
Application Security
Wireless Security
Mobile device security
Phishing
Trust
Vulnerability Assessments
Review process
ISSA uses a double blind peer-review process to ensure the quality of submissions before acceptance. Authors initially submit abstracts to determine if the paper meets the goals and fits into the theme of the conference. The ISSA Program Committee assesses each submission for relevance and fit. Authors are then notified whether their abstracts were accepted, and if so, invited to submit a full paper for peer review.
On the due date, authors submit full papers. Each paper goes through an administrative review to confirm that the paper conforms to the specifications. If a paper does not meet the requirements, the author is asked to resubmit the paper.
A Review Committee is invited to participate, consisting of both local and international experts in the field of Information Security. A process is followed by the Program Committee to allocate papers to reviewers based on their area of expertise. Reviewers are subject matter experts, of which over 50% are international. Reviewers usually have 5 or 6 categories that they are willing to review against. Each reviewer will establish the number of papers they can review in a specific time period and are allowed to bid on the papers they want to review. An automated process allocated papers to each reviewer according to their preferences.
Each paper is reviewed by a minimum of two reviewers in a double blind review process. Papers are reviewed and rated on a 10 point system with 1 being poor and 10 being excellent as follows:
? Originallity (1-10)
? Significance (1-10)
? Technical quality (1-10)
? Relevance (1-10)
? Presentation (1-10)
? Overall Rating (1-10)
Reviewers’ confidence in their own rating is also taken into account by the algorithm that calculates the final score. Reviewers are encouraged to make anonymous suggestions to the author(s) of the paper.
Based on the final score (1-10), a paper with 5 or below points can be recommended for a poster/research-in-progress session and a 9 to 10 point paper can be put in the “best paper” category. An acceptance rate of between 30% and 40% is expected for the conference.
Authors are notified of the outcome of the review process which includes the anonymous suggestions and recommendations of the reviewers. Authors then have to submit the final version of the paper that will then be included in the formal conference proceedings. The proceedings are published electronically in IEEE Explore as well as on a CD with an ISBN number. All proceedings from all previous ISSA conferences are also available http://www.infosecsa.co.za/past.html

Last modified: 2012-12-08 23:03:57