[PET] [alerts at infosecnews.org: [ISN] Call for Chapter Proposals]

Adam Shostack adam at homeport.org
Mon Jun 28 16:43:21 BST 2010

----- Forwarded message from InfoSec News <alerts at infosecnews.org> -----

X-Spam-Status: No, score=0.5 required=2.5 tests=AWL,HOMEPORT_REV_20081230_01 
	autolearn=disabled version=3.1.7-deb3
Date: Mon, 28 Jun 2010 00:43:51 -0500 (CDT)
From: InfoSec News <alerts at infosecnews.org>
To: isn at infosecnews.org
Organization: InfoSec News - http://www.infosecnews.org/
Subject: [ISN] Call for Chapter Proposals 

Forwarded from: George Yee <gmyee (at) sce.carleton.ca>

Dear Colleague,

Greetings! I would like to invite you to submit a chapter proposal to a 
new book I am editing, entitled "Privacy Protection Measures and 
Technologies in Business Organizations: Aspects and Standards", if this 
topic lies within your area of work. Please see the Call for Chapter 
Proposals below. Thank you for your consideration, and I look forward to 
receiving your proposal.

George Yee, Ph.D., P.Eng., CSDP, CISSP
Adjunct Research Professor,
Dept. of Systems and Computer Engineering,
Carleton University,
Ottawa, Ontario, Canada K1S 5B6
gmyee (at) sce.carleton.ca



Proposal Submission Deadline: July 15, 2010

Privacy Protection Measures and Technologies in Business Organizations: 
Aspects and Standards

A book edited by Dr. George O.M. Yee, Carleton University, Canada


The recent rapid growth of the Internet, together with increases in 
computerization, has been accompanied by soaring deployments of 
client-related business applications. Since business ultimately depends 
on the consumption of people, this has led to more and more consumer 
personal information in the possession of business organizations. This 
in turn has led to concerns over potential violations of consumer 
privacy. In response, various governmental jurisdictions have enacted 
privacy legislation to protect the privacy of consumers. However, 
legislation alone is not enough. Protective foolproof measures must be 
in place to guard against potential invasions of privacy. For example, 
business communication and collaboration include content sharing and 
email. How can these be safeguarded against the leakage of consumer 
personal information? As another example, internal business systems 
comprise workflows that handle and process client personal information. 
What measures are needed to avoid inadvertently and illegally revealing 
this information? What standards can be followed to reduce this risk?

Objective of the Book

This book will aim to deliver a coherent collection of chapters that 
provide significant new insights from five areas of investigation, as 
follows: 1) the current legal framework concerning the protection of 
consumer privacy in business organizations, 2) the nature and 
identification of consumer private information, 3) the measures and 
standards that can be applied and integrated within business 
organizations to protect consumer privacy, 4) the integration of 
business structures and workflows with privacy protection measures, and 
5) the impacts of applying and integrating privacy protection measures 
on business operational and financial performance. Although theoretical 
and conceptual studies are equally welcome, the likely practical 
implications of your research should be emphasized in all contributions.

Target Audience

The target audience for this book will be composed of professionals and 
researchers working in the field of privacy protection in various 
disciplines, e.g. business sciences and management, information and 
communication sciences, library, education, sociology, computer science, 
computer engineering, and information technology. In addition, the book 
will provide insights and support executives concerned with the 
management of expertise, knowledge, information, and organizational 
development in different types of business organizations and 

Recommended topics include, but are not limited to, the following:

       Legal and compliance aspects of privacy protection in business 
       organizations, Privacy related business standards, The nature of 
       consumer private information in business organizations, 
       Approaches, methods, and tools for discovering or delimiting 
       private information, Requirements for privacy protection measures 
       in business organizations, Privacy protection measures / privacy 
       enhancing technologies applicable to business, Approaches, 
       methods, and tools to assist in complying with privacy laws and 
       regulations, Gauging the effectiveness of privacy protection 
       measures, Approaches, methods, and tools that can be used to 
       support the introduction of privacy protection measures, 
       Facilitators and inhibitors of the adoption of privacy protection 
       measures, The nature of business structures or workflows that can 
       integrate with privacy protection measures, Protecting consumer 
       privacy in the age of business cloud computing, Business 
       advantages / disadvantages from the adoption of privacy 
       protection measures, Customer responses to the introduction of 
       privacy protection measures, Case studies of privacy protection 
       initiatives on business performance, The impact of privacy 
       protection measures on organizational structure and behaviour

Submission Procedure

Researchers and practitioners are invited to submit on or before July 
15, 2010, a 2-3 page chapter proposal clearly explaining the mission and 
concerns of his or her proposed chapter. Please email submissions (Word 
document) to: gmyee (at) sce.carleton.ca. Authors of accepted proposals 
will be notified by August 1, 2010 about the status of their proposals 
and sent chapter guidelines. Full chapters are expected by October 31, 
2010. All submitted chapters will be reviewed between authors on a 
double-blind review basis.


This book is scheduled to be published by IGI Global (formerly Idea 
Group Inc.), publisher of the Information Science Reference (formerly 
Idea Group Reference), Medical Information Science Reference, Business 
Science Reference, and Engineering Science Reference imprints. For 
additional information regarding the publisher, please visit 
www.igi-global.com. This publication is anticipated to be released in 

Important Dates

July 15, 2010: Proposal Submission Deadline

August 1, 2010: Notification of Acceptance

October 31, 2010: Full Chapter Submission

January 15, 2011: Review Results Returned

February 15, 2011: Revised Chapter Submission

February 28, 2011: Final Acceptance Notification

March 15, 2011: Submission of Final Chapters


Attend Black Hat USA 2010, hosted at Caesars Palace in Las Vegas, Nevada
July 24-29th, offering over 60 training sessions and 11 tracks of Briefings
from security industry elite. To sign up visit http://www.blackhat.com

----- End forwarded message -----

More information about the PET mailing list