InfoSecCD 2013 - 2013 Information Security Curriculum Development Conference
Topics/Call fo Papers
InfoSecCD seeks to provide academics, researchers, and practitioners with an opportunity to share their perspectives with others interested in the various aspects of Information Security Curriculum Development. Papers offering novel research contributions in any aspect of information security education are solicited for submission to the 2013 InfoSecCD Conference.
The primary focus is on high-quality, original, unpublished research, case studies, and implementation experiences. Papers should have practical relevance to the design, development, implementation, and best-practices in information security education or for best-practices in the design, implementation, and management of information security or digital forensics.
Theoretical papers must make convincing argument for the practical significance of the results. Theory must be justified by supporting literature and compelling examples illustrating its application. The primary criterion for appropriateness is demonstrated practical relevance. The conference will include three tracks: pedagogy, practice, and student. Note that work in progress papers can be accepted if substantial progress has already been made and completion is expected by the conference date.
Important Dates
July 1, 2013: Submission of Papers extended to July 15, 2013
August 15, 2013: Reviews and acceptances to authors
September 15, 2013: Camera-ready copies and ACM copyright agreements submitted (Authors for Accepted Papers must also preregister for the conference by September 15.
Pedagogy and Practice Tracks
Contributions are solicited for InfoSec areas including, but not limited to pedagogical issues and best practices in the instruction of or practice of: information security foundations, risk management, network security technology (firewalls, IDPS, etc.), digital forensics, access control, biometrics, and cryptography. Also included are general pedagogical issues in InfoSec instruction, configuration of InfoSec labs, computer law and ethics, and other related areas. Papers should be at most 15 pages excluding the bibliography and well-marked appendices. Reviewers are not required to read the appendices, and so the paper should be intelligible without them. Author names and affiliations must be blinded for review. If accepted, names and affiliations should only appear on the first page.
Authors may submit up to 3 papers; however no more than 2 papers from any one author will be accepted for publication.
Student Track
Graduate and undergraduate students are encouraged to submit papers. Papers should be clearly noted as student submissions both in the Title of the paper and by submission to the student track. Papers submitted without designation in the title or to the proper track will be considered as Pedagogy and Practice papers. Students may author papers on various aspects of learning or practicing information security. Papers should be at most 10 pages excluding the bibliography and well-marked appendices. Reviewers are not required to read the appendices, and so the paper should be intelligible without them. Author names and affiliations must be blinded for review. If accepted, names and affiliations should only appear on the first page.
In order to be eligible for the student best paper recognition, the paper must be written exclusively by student authors.
All submissions are via the conference paper management site (provided by Microsoft Research)
available at https://cmt.research.microsoft.com/INFOSECCD2013.
The primary focus is on high-quality, original, unpublished research, case studies, and implementation experiences. Papers should have practical relevance to the design, development, implementation, and best-practices in information security education or for best-practices in the design, implementation, and management of information security or digital forensics.
Theoretical papers must make convincing argument for the practical significance of the results. Theory must be justified by supporting literature and compelling examples illustrating its application. The primary criterion for appropriateness is demonstrated practical relevance. The conference will include three tracks: pedagogy, practice, and student. Note that work in progress papers can be accepted if substantial progress has already been made and completion is expected by the conference date.
Important Dates
July 1, 2013: Submission of Papers extended to July 15, 2013
August 15, 2013: Reviews and acceptances to authors
September 15, 2013: Camera-ready copies and ACM copyright agreements submitted (Authors for Accepted Papers must also preregister for the conference by September 15.
Pedagogy and Practice Tracks
Contributions are solicited for InfoSec areas including, but not limited to pedagogical issues and best practices in the instruction of or practice of: information security foundations, risk management, network security technology (firewalls, IDPS, etc.), digital forensics, access control, biometrics, and cryptography. Also included are general pedagogical issues in InfoSec instruction, configuration of InfoSec labs, computer law and ethics, and other related areas. Papers should be at most 15 pages excluding the bibliography and well-marked appendices. Reviewers are not required to read the appendices, and so the paper should be intelligible without them. Author names and affiliations must be blinded for review. If accepted, names and affiliations should only appear on the first page.
Authors may submit up to 3 papers; however no more than 2 papers from any one author will be accepted for publication.
Student Track
Graduate and undergraduate students are encouraged to submit papers. Papers should be clearly noted as student submissions both in the Title of the paper and by submission to the student track. Papers submitted without designation in the title or to the proper track will be considered as Pedagogy and Practice papers. Students may author papers on various aspects of learning or practicing information security. Papers should be at most 10 pages excluding the bibliography and well-marked appendices. Reviewers are not required to read the appendices, and so the paper should be intelligible without them. Author names and affiliations must be blinded for review. If accepted, names and affiliations should only appear on the first page.
In order to be eligible for the student best paper recognition, the paper must be written exclusively by student authors.
All submissions are via the conference paper management site (provided by Microsoft Research)
available at https://cmt.research.microsoft.com/INFOSECCD2013.
Other CFPs
Last modified: 2013-09-03 21:59:54