ethics – ICIS 2016 http://icis2016.aisnet.org Digital Innovation at the Crossroads Sun, 11 Dec 2016 11:29:27 +0000 en-GB hourly 1 https://wordpress.org/?v=4.9.1 93799029 Sustainability and Societal Impacts of IS http://icis2016.aisnet.org/sustainability-and-societal-impacts-of-is/ Wed, 13 Jan 2016 15:56:48 +0000 http://icis2016.aisnet.org/?p=1125 Track Chairs Description This track welcomes theoretical and empirical perspectives on societal impacts of information systems (IS). These impacts can be actual or potential, intended or unintended, and positive, negative or diverse in effect. The [read more]

The post Sustainability and Societal Impacts of IS appeared first on ICIS 2016.

]]>
Track Chairs
Steve Elliot
University of Sydney, Australia
Daniel Veit
Augsburg University, Germany
Jane Webster
Queen’s University, Canada

Description

This track welcomes theoretical and empirical perspectives on societal impacts of information systems (IS). These impacts can be actual or potential, intended or unintended, and positive, negative or diverse in effect. The relationship of these impacts to the longer term sustainability of society itself is integral to IS research and concern.

The consequences of IS, whether they revolve around environmental, social, or ethical issues, can translate into degradation or betterment of the natural environment, better or worse quality of life and work, social inclusion/exclusion, (non)discrimination, and (un)employment. For example, IS can contribute to climate change through increasing carbon footprints, but can also provide a means for managing that carbon footprint.

The IS community is uniquely positioned to address these issues of sustainability and societal impacts, given its encompassing knowledge of both technical and social dimensions, along with its solution-oriented focus that has been developed over four decades.

We invite innovative, rigorous and relevant IS studies addressing these issues and employing a wide variety of methods. Empirical (qualitative and quantitative) studies as well as design-oriented research and conceptual papers on theory development will be considered. Due to the broad and inclusive nature of the topic, we encourage the submission of studies that address a variety of different units of analysis, including individual, group, process, organization, government, and society at large. The research questions may be derived from a broad spectrum of disciplines including information systems and business, engineering, management, operations management, applied computer science, environmental science, marketing, economics, psychology, sociology, etc.

Topics of Interests

  • Green IS
  • Sustainable design in IS
  • Sustainable business practices and processes
  • IS for greener supply chains
  • Energy informatics
  • Environmental and societal IS planning and governance
  • Societal consequences of emerging technologies
  • Theoretical perspectives on (un)intended consequences of IS
  • Changing nature of work and life in information society
  • Side effects of IS, such as work stress, addiction, victimization, surveillance, etc.
  • IS-related unemployment and deskilling, especially in knowledge work
  • The role of IS in social protest and economic or educational (in)equality
  • Responsible societal innovations using IS
  • Ethical approaches to IT system investment and IT system design
  • Ethical computing
  • The role of IS in supporting and empowering marginalized groups in society
  • Bottom-of the-pyramid issues relating to IS
  • Sharing Economy
  • Methods for assessing social, ethical, and environmental impacts of IS
  • Societal issues related to the ICIS 2016 theme, Digital Innovation at the Crossroads

Associate Editors

  • Adela Chen, Colorado State U., USA
  • Vanessa Cooper, RMIT U., Australia
  • Jacqueline Corbett, Laval U., Canada
  • Viet Dao, Shippensburg U. of Pennsylvania, USA
  • Jason Dedrick, Syracuse U., USA
  • Gilbert Fridgen, U. of Bayreuth, Germany
  • Uri Gal, U. of Sydney, Australia
  • Henner Gimpel, U. of Augsburg, Germany
  • Petri Hallikainen, The U. of Sydney, Australia
  • Catherine Hardy, The U. of Sydney, Australia
  • Sora Kang, Hoseo U., Korea
  • Wolf Ketter, Erasmus U. Rotterdam, Netherlands
  • Lutz Kolbe, U. of Göttingen, Germany
  • Johann Kranz, U. of Göttingen, Germany
  • Ho Geun Lee, Yonsei U., Korea
  • Jungwoo Lee, Yonsei U., Korea
  • Byungtae Lee, KAIST, Korea
  • Seth Li, Clemson U., USA
  • De Liu, U. of Minnesota, USA
  • Peter Loos, Saarland U., Germany
  • Rony Medaglia, Copenhagen Business School
  • Nigel Melville, U. of Michigan, USA
  • Alemayehu Molla, RMIT U., Australia
  • Jacqueline Pike, Duquesne U., USA
  • Israr Qureshi, Hong Kong Polytechnic U., Hong Kong
  • Saonee Sarker, U. of Virginia, USA
  • Sarah Spiekermann, Vienna U. of Economics and Business, Austria
  • Manuel Trenz, University of Augsburg, Germany
  • Rick Watson, U. of Georgia, USA
  • Mary Beth Watson-Manheim, U. of Illinois at Chicago, USA

The post Sustainability and Societal Impacts of IS appeared first on ICIS 2016.

]]>
1125
IS Security and Privacy http://icis2016.aisnet.org/is-security-and-privacy/ Wed, 13 Jan 2016 15:40:04 +0000 http://icis2016.aisnet.org/?p=1108 Track Chairs Description In today’s era of globally connected organizations, economies, and societies, the ubiquitous growth of the Internet and significant advances in communications, networking and data gathering and storage technologies have exacerbated the vulnerability [read more]

The post IS Security and Privacy appeared first on ICIS 2016.

]]>
Track Chairs
Tamara
Dinev
Florida Atlantic University, USA
Shih-Chieh “Jack” Hsu
National Sun Yat-sen University, Taiwan
Robert
Willison
Newcastle University,
UK

Description

In today’s era of globally connected organizations, economies, and societies, the ubiquitous growth of the Internet and significant advances in communications, networking and data gathering and storage technologies have exacerbated the vulnerability of information systems. The extent, frequency, seriousness, and diversity of external attacks to computer systems are unprecedented. Meanwhile, internal attacks and abuse of proprietary information assets account for at least half of the serious security and privacy incidents worldwide. Additionally, the personal data gathered and stored by companies is ever more frequently used for profiling and analysis, often without the knowledge or consent of the individuals or groups concerned. Mobile computing with location-aware capabilities has further exacerbated these concerns. It is, thus, imperative to better understand the laws, policies, strategies, technologies, and actions by societies, organizations, groups, and individuals that address security and privacy issues.

Accordingly, this track provides a forum for focused discussion and exchange on information security and privacy research. We seek to address important questions arising from the issues mentioned above, such as: How do online social networks or virtual worlds threaten the security and privacy of the individual participants? What are the underlying economics or societal implications of new security technologies? What are the social and ethical implications related to the uses of new security and privacy practices? How should governments get involved in the process of creating a more secure environment and in safeguarding information privacy? What are the benefits, costs, and implications of the latest security and privacy enhancing technologies? How should firms manage their businesses in view of possible security and privacy breaches? How should firms design and implement “best” security and privacy practices in their IT systems?

The track welcomes design science, empirical, economic, managerial, behavioral, and theoretical submissions across a diverse range of topics—from technical aspects to broader social and managerial issues at the individual, organizational, or societal levels. We invite theoretical perspectives from behavioral, organizational, cognitive, cultural, socio-technical, or other lenses for analysis of these issues.

Topics of Interests

Topics include, but are not limited to, the following aspects of IS security and privacy:

  • Adoption, use, and continuance of information security technologies and policies
  • Computer abuse and employee deviant behaviors
  • Corporate governance and compliance of security and privacy
  • Costs and benefits of information security and privacy
  • Cross-cultural issues in IS security and privacy
  • Cyberwarfare and cybersecurity
  • Deception and deception intention in the context of online trust and security
  • Design and development of information security and privacy enhancing technologies
  • Deterrence of security policy violations
  • Digital forensics
  • Electronic commerce security and privacy
  • Employee accountability
  • Employee security policy compliance and noncompliance
  • Forensic analysis of security breaches and computer crimes
  • Hacking and cracking, white hat and black hat research issues
  • Investigations of computer crime and security violations
  • IT audit and controls
  • Identity theft and risk assessment
  • Individual motivators and inhibitors of employee computer crime
  • Information breach management
  • Insider threat behaviors and antecedents
  • Intrusion detection/prevention
  • Legal, societal, and ethical issues in IS security and privacy
  • Mental welfare (e.g., stress) and mental capacities (e.g., remembering) with respect of security and privacy issues
  • Risk analysis and management, risk and fraud assessment
  • Security and privacy concerning social media and social networking
  • Security and privacy metrics
  • Security and privacy of mobile devices
  • Security and privacy issues related to big data
  • Security and privacy issues related to the Internet of things
  • Security and privacy strategies
  • Security, Education, Training, and Awareness (SETA) programs and campaigns
  • Social and business security and privacy policies
  • Socio-technical mechanisms for countering cyber threats
  • Spyware / malware
  • Theoretical and empirical analyses of information security behaviors
  • Trust in security and privacy enhancing systems

Associate Editors

  • Manish Agrawal, University of South Florida
  • Jeff Babb, West Texas A&M Western University
  • Burcu Bulgurcu, Boston College
  • Peter Buxmann, Professor of IS, Germany
  • Hasan Cavusoglu, University of British Columbia
  • Rob Crossler, Mississippi State University
  • John D’Arcy, University of Delaware
  • Marc J. Dupuis, University of Washington Tacoma
  • Alex Durcikova, University of Oklahoma
  • Sigi Goode, Australian National University
  • Tejaswini “Teju” Herath, Brock University
  • Shuyuan “Mary” Ho, Florida State University
  • Tabitha James, Virginia Tech
  • Allen Johnston, University of Alabama – Birmingham
  • Mark Keith, Brigham Young University
  • Jongwoo “Jonathan” Kim, UMass Boston
  • Hanna Krasnova, Universität Bern
  • Juhee Kwon, City University of Hong Kong
  • Yuzhu “Julia” Li, UMass Dartmouth
  • Xin “Robert” Luo, University of New Mexico
  • Seppo Pahnila, University of Oulu
  • Rachida Parks, University of Arkansas – Little Rock
  • Clay Posey, University of Alabama
  • Sam Ransbotham, Boston College
  • Tom Roberts, University of Texas at Tyler
  • Benjamin Shao, Arizona State University
  • Sheng-Pao Shih, Tamkang University
  • Anthony Vance, Brigham Young University
  • Mark Weiser, Oklahoma State University
  • Yu “Andy” Wu, University of North Texas
  • Wei Thoo Yue, City University of Hong Kong
  • Nan Zhang, University of Jyväskylä

The post IS Security and Privacy appeared first on ICIS 2016.

]]>
1108