↑ Return to Call for Participation

Submission types

Participation can be in the following categories (but not limited to):

Industry Participants. If you have an interesting story to share we welcome your participation. We can guarantee an engaging participation from the floor, where you can discuss and talk freely about what you have been thinking. We just require a title of your presentation, a few lines describing your topic area and a brief biographical note (about a 100 words). If you agree, we will video record your presentation and make it available for a wider audience. If you rather not be recorded, we understand. Requirement: Please submit via our submission system. On acceptance, you will be required to register for the conference.

Academic Participants. We encourage you to submit an abstract, a full paper, a research note, or a case study. There are two modes of submission. You can decide which one works best for you.

a) Traditional Peer Review Submissions. In this submission mode you are simply uploading you paper into our conference submission system. The length of the paper can be anywhere between 5-10,000 words. A double blind peer review will be performed (please use this Template). Publishing opportunity: All submissions are considered for possible fast tracking to the Journal of Information System Security. If your paper is not fast tracked, you can still publish in an edited book.

b) Abstract/Extended Abstract Submissions. If you are simply presenting an idea to generate some discussion and enter into a discourse, you can submit an abstract (100 words) or an extended abstract (unto 1000 words).

c) Case Studies. We particularly welcome cyber security case studies that document a breach. The length of the paper can be anywhere between 5-10,000 words.

Academic Participants. Formatting requirements. Please format the paper as per APA. http://www.apastyle.org