ACM SIGCHI General Interest Announcements (Mailing List)


Options: Use Forum View

Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Reply To:
Mon, 24 Jan 2011 11:05:30 -0500
text/plain (111 lines)
Call for Papers
17th Americas Conference on Information Systems
August 4-7, 2011, Detroit, MI, USA

Track: Human Computer Interaction
Mini-Track: Design Considerations for IT Security and Privacy Management

The importance of security and privacy management has increased as witnessed
by the increasing number of security and privacy breach incidents that
organizations have encountered within the last few years. For instance, the
website details nearly two thousand data breaches made
public since 2005 that have compromised over a half million personal
records. Security and privacy management is especially challenging in that
users vary widely in level of motivation, knowledge, and perceptions of
threat severity. The decentralized computing environment in which end users
exercise some degree of autonomous control over IT resources further
complicates security management efforts. To address these complex issues, we
solicit research papers on the design and usability of tools and
technologies employed for all types of IT security management tasks,
including those utilized by both end users and IT administrators.

A fully functional IT environment requires a consolidated and convincing set
of privacy and security safeguards in place at various levels: system, user,
organizational, and sector. Therefore, design-based research efforts are
expected to bring system requirement, user controllable privacy and
security, organizational compliance, and legal requirements into better
alignment. This mini-track provides a forum for focused discussion and
exchange on design considerations for IT security and privacy management. We
welcome research papers that explore interesting questions related to the
design and usability aspects of security and privacy, such as:
- How should organizations design and implement tools and procedures that
help IT professionals, business leaders, and policy makers bring system
requirements, business strategies, and policies into better alignment?
- How should firms design and implement tools and practices for detection,
reporting, investigation of, and recovery from security incidents?

Example topics of interest include, but are not limited to, the following:
- Design and usability evaluations of privacy and security enhancing
- User mental models and behavioral dynamics
- Tools or applications that support security and privacy assurance
- Designs to improve IS security and IT policy compliance
- User interface design for security tools
- Deployment, integration, modification, and maintenance of organizational
security solutions
- Design of organizational security controls and procedures
- Information visualization for security analysis
- Integration of security tools with organizational security policies and
- Design of user security and privacy awareness and training modules

Deadline for paper submissions: February 17, 2011
Notification of Acceptance: March 24, 2011
Final Paper Due: April 21, 2011

A template for AMCIS 2011 submissions and camera-ready copy can be found at
the conference website:

Types of Submissions:
(i) Full Length Submissions
You may submit a full length paper that is not to exceed 12 pages including
all figures, tables, appendices, and references. The paper should be
original and previously unpublished.

(ii) Research-in-Progress Submissions
Research-in-progress papers typically describe work that is as yet
incomplete, but promising. You may submit a research-in-progress paper that
is not to exceed 6 pages including all figures, tables, appendices, and

Please do not include any author or affiliation identification on any page
of the paper, in headings/footers, or in the properties of the submitted
file. Author and affiliation information should be added in the camera ready
version of the paper only. Previously published work or work under review
elsewhere is not eligible for submission. Submitted papers will undergo a
double blind review by at least two reviewers. Accepted papers will appear
in the conference proceedings that are published in the AIS eLibrary.

Submit your paper using the manuscript central system at — by choosing the Mini-Track of
Design Considerations for IT Security and Privacy Management under the HCI

Heng Xu
Assistant Professor
College of Information Sciences and Technology
The Pennsylvania State University, University Park
Phone: (814) 867-0469
Email: [log in to unmask]

John D’Arcy
Assistant Professor
Department of Management
Mendoza College of Business
University of Notre Dame
Phone: (574) 631-1735
Email: [log in to unmask]

                To unsubscribe, send an empty email to
     mailto:[log in to unmask]
    For further details of CHI lists see