Information Systems Security Risk

  • Olson D
  • Wu D
N/ACitations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This volume contains the papers presented at the 12th International Conference on Information Systems Security (ICISS 2016), held December 16–20, 2016, in Jaipur, India. The conference was started in 2005 to cater to cyber security research in India. Since then it has evolved into an attractive forum internationally for researchers in academia, industry, and government to disseminate their latest research results in information and systems security. ICISS 2016 continued that trend. This year, we received 196 submissions from 17 different countries on 30 different subtopics of interest in information security. The papers were reviewed by a Program Committee (PC) of 67 internationally renowned researchers. After a rigorous review process, during which each paper received multiple reviews, a total of 24 full papers and eight short papers were accepted. We thank the authors of the 196 papers for their contributions, without which this conference would not have been possible. We are very grateful to the PC members and external reviewers who put in enormous efforts in reviewing and selecting the papers. Without their hard work, this conference would not have been a success. One of the hallmarks of the ICISS conference series is the high-quality plenary/invited presentations. This year we were fortunate to have five eminent speakers give invited presentations: Patrick McDaniel (Pennsylvania State University), V.S. Subrahmanian (University of Maryland, College Park), Ahmad-Reza Sadeghi (Technische Universität Darmstadt), Rinku Dewri (University of Denver), and Jeremías Sauceda (EnSoft Corp). We are very thankful to the invited speakers, who agreed to present at the conference coming from far-off places in mid-December. The conference included several tutorials on various topics in cyber security, as well as short talks to facilitate discussions on emerging topics. We would like to thank the tutorial speakers for their time and efforts. We thank all the members of the Organizing Committee for making all the arrangements. We are grateful to MNIT, Jaipur, for all the support they provided. We would like to thank the architects of EasyChair for providing a highly configurable conference management system. The entire process of submission, refereeing, and e-meeting of the PC for the paper selection was done through the EasyChair system. Last but not least, we gratefully acknowledge Springer for sponsoring the ICISS Best Paper Awards starting with this year’s conference. A special thanks to Alfred Hofmann of Springer for not only readily agreeing to publish the conference pro- ceedings in the LNCS series, but also helping institute this award. Thanks go to his team and, in particular, Anna Kramer for preparing the proceedings meticulously and in time for the conference. December

Cite

CITATION STYLE

APA

Olson, D. L., & Wu, D. D. (2017). Information Systems Security Risk (pp. 145–160). https://doi.org/10.1007/978-3-662-53785-5_11

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free