risk – ICIS 2016 http://icis2016.aisnet.org Digital Innovation at the Crossroads Sun, 11 Dec 2016 11:29:27 +0000 en-GB hourly 1 https://wordpress.org/?v=4.9.1 93799029 Managing IS Projects and IS Development http://icis2016.aisnet.org/managing-is-projects-and-is-development/ Wed, 13 Jan 2016 15:47:45 +0000 http://icis2016.aisnet.org/?p=1114 Track Chairs Description Enabled by IS development (ISD), information systems projects and programs (ISP) are fuelling the transformation of organisations. From small-business initiatives to corporate, from the way governments deliver services to the way entire [read more]

The post Managing IS Projects and IS Development appeared first on ICIS 2016.

]]>
Track Chairs
Blaize Reich
Beedie School of Business, Simon Fraser University
Chris Sauer
Green Templeton College, University of Oxford
UK
Walter Fernandez
University of New South Wales
Australia

Description

Enabled by IS development (ISD), information systems projects and programs (ISP) are fuelling the transformation of organisations. From small-business initiatives to corporate, from the way governments deliver services to the way entire industries operate, ISP and ISD are critical to the continuous process of social and technical transformation. As the pace of change accelerates, and organisations are forced to move from being process-based to embrace projectization, we are witnessing the emergence of new processes, practices, and methods that promise improvements of effectiveness and efficiency in the delivery of ISD and ISP with consequential organizational and societal benefits. However, these promises are not always fulfilled and new approaches often present new challenges hence the need for new research.

Therefore, this track is concerned with a broad spectrum of methods and practices that have emerged to assist individuals, teams, and organizations to understand these challenges and to improve performance. These include, but are not limited to, agile and lean approaches, the role of IS projects and programs in the transformation of organisations and the evolution of industries and countries.

Topics of Interests

We welcome papers in the Managing IS Projects and IS Development track that improve our understanding of the diverse and complex nature of IS projects and programs, particularly with respect to IS development. Submissions could include, but are not limited to the following topics:

  • Managing issues in IS projects including estimation, risk, quality assurance, governance, and knowledge.
  • IS project management capabilities, competence and maturity.
  • Managing IS-enabled programs of organizational transformation, governance, coordination, politics, and complexities.
  • People-related issues in IS projects, including diversity, leadership and power
  • Managing distributed and virtual IS projects.
  • Sourcing of IS projects, including offshoring, outsourcing, nearshoring, crowdsourcing, inner sourcing or multi-sourcing.
  • Value enhancement of IS project management and benefit realization in IS programs and projects.
  • IS design and development in practice, including methods and tools such as agile and lean development, component-based processes, service-orientation, and open source.
  • Managing IS development and systems integration.
  • Managing large scale IS projects such as the deployment and implementation of enterprise systems and other packaged software applications, in a wide range of settings.
  • Issues in managing mobile apps development.
  • Socio-technical issues, including managing and developing in the cloud, complexity as a risk (positive and negative), impact of size, dealing with failure, effective governance, and ambidexterity, to name a few.

Associate Editors

  • David Arnott, Monash U.
  • Dirk Basten, U. in Cologne
  • Lan Cao, Old Dominion U.
  • Suranjan Chakraborty, Towson U.
  • Sharon Coyle, U. of Sydney
  • Michael Cuellar, Georgia Southern U.
  • Antonio Diaz Andrade, Auckland U. of Technology
  • Owen Eriksson, Uppsala U.
  • Andrew Gemino, Simon Fraser U.
  • Robert Gregory, IESE Business School, U. of Navarra
  • Riitta Hekkala, Aalto U.
  • Rashina Hoda, The U. of Auckland
  • Helena Holmström Olsson, Malmö U.
  • Lesley Land, U. of New South Wales
  • Lorraine Lee, U. of North Carolina at Wilmington
  • Alanah Mitchell, Drake U.
  • Maria Paasivaara, Aalto U.
  • Samuli Pekkola, Tampere U. of Technology
  • Sumantra Sarkar, Binghamton U.
  • John Trip, Baylor U.
  • John Tripp, Baylor U.
  • Richard Vidgen, U. of Hull
  • Radu Vlas, U. of Houston–Clear Lake
  • Xiaofeng Wang, Free U. of Bozen-Bolzano
  • Barbara Weber, U. of Innsbruck
  • Manuel Wiesche, Technische Universität München
  • Xiao Xiao, Copenhagen Business School

The post Managing IS Projects and IS Development appeared first on ICIS 2016.

]]>
1114
IS Security and Privacy http://icis2016.aisnet.org/is-security-and-privacy/ Wed, 13 Jan 2016 15:40:04 +0000 http://icis2016.aisnet.org/?p=1108 Track Chairs Description In today’s era of globally connected organizations, economies, and societies, the ubiquitous growth of the Internet and significant advances in communications, networking and data gathering and storage technologies have exacerbated the vulnerability [read more]

The post IS Security and Privacy appeared first on ICIS 2016.

]]>
Track Chairs
Tamara
Dinev
Florida Atlantic University, USA
Shih-Chieh “Jack” Hsu
National Sun Yat-sen University, Taiwan
Robert
Willison
Newcastle University,
UK

Description

In today’s era of globally connected organizations, economies, and societies, the ubiquitous growth of the Internet and significant advances in communications, networking and data gathering and storage technologies have exacerbated the vulnerability of information systems. The extent, frequency, seriousness, and diversity of external attacks to computer systems are unprecedented. Meanwhile, internal attacks and abuse of proprietary information assets account for at least half of the serious security and privacy incidents worldwide. Additionally, the personal data gathered and stored by companies is ever more frequently used for profiling and analysis, often without the knowledge or consent of the individuals or groups concerned. Mobile computing with location-aware capabilities has further exacerbated these concerns. It is, thus, imperative to better understand the laws, policies, strategies, technologies, and actions by societies, organizations, groups, and individuals that address security and privacy issues.

Accordingly, this track provides a forum for focused discussion and exchange on information security and privacy research. We seek to address important questions arising from the issues mentioned above, such as: How do online social networks or virtual worlds threaten the security and privacy of the individual participants? What are the underlying economics or societal implications of new security technologies? What are the social and ethical implications related to the uses of new security and privacy practices? How should governments get involved in the process of creating a more secure environment and in safeguarding information privacy? What are the benefits, costs, and implications of the latest security and privacy enhancing technologies? How should firms manage their businesses in view of possible security and privacy breaches? How should firms design and implement “best” security and privacy practices in their IT systems?

The track welcomes design science, empirical, economic, managerial, behavioral, and theoretical submissions across a diverse range of topics—from technical aspects to broader social and managerial issues at the individual, organizational, or societal levels. We invite theoretical perspectives from behavioral, organizational, cognitive, cultural, socio-technical, or other lenses for analysis of these issues.

Topics of Interests

Topics include, but are not limited to, the following aspects of IS security and privacy:

  • Adoption, use, and continuance of information security technologies and policies
  • Computer abuse and employee deviant behaviors
  • Corporate governance and compliance of security and privacy
  • Costs and benefits of information security and privacy
  • Cross-cultural issues in IS security and privacy
  • Cyberwarfare and cybersecurity
  • Deception and deception intention in the context of online trust and security
  • Design and development of information security and privacy enhancing technologies
  • Deterrence of security policy violations
  • Digital forensics
  • Electronic commerce security and privacy
  • Employee accountability
  • Employee security policy compliance and noncompliance
  • Forensic analysis of security breaches and computer crimes
  • Hacking and cracking, white hat and black hat research issues
  • Investigations of computer crime and security violations
  • IT audit and controls
  • Identity theft and risk assessment
  • Individual motivators and inhibitors of employee computer crime
  • Information breach management
  • Insider threat behaviors and antecedents
  • Intrusion detection/prevention
  • Legal, societal, and ethical issues in IS security and privacy
  • Mental welfare (e.g., stress) and mental capacities (e.g., remembering) with respect of security and privacy issues
  • Risk analysis and management, risk and fraud assessment
  • Security and privacy concerning social media and social networking
  • Security and privacy metrics
  • Security and privacy of mobile devices
  • Security and privacy issues related to big data
  • Security and privacy issues related to the Internet of things
  • Security and privacy strategies
  • Security, Education, Training, and Awareness (SETA) programs and campaigns
  • Social and business security and privacy policies
  • Socio-technical mechanisms for countering cyber threats
  • Spyware / malware
  • Theoretical and empirical analyses of information security behaviors
  • Trust in security and privacy enhancing systems

Associate Editors

  • Manish Agrawal, University of South Florida
  • Jeff Babb, West Texas A&M Western University
  • Burcu Bulgurcu, Boston College
  • Peter Buxmann, Professor of IS, Germany
  • Hasan Cavusoglu, University of British Columbia
  • Rob Crossler, Mississippi State University
  • John D’Arcy, University of Delaware
  • Marc J. Dupuis, University of Washington Tacoma
  • Alex Durcikova, University of Oklahoma
  • Sigi Goode, Australian National University
  • Tejaswini “Teju” Herath, Brock University
  • Shuyuan “Mary” Ho, Florida State University
  • Tabitha James, Virginia Tech
  • Allen Johnston, University of Alabama – Birmingham
  • Mark Keith, Brigham Young University
  • Jongwoo “Jonathan” Kim, UMass Boston
  • Hanna Krasnova, Universität Bern
  • Juhee Kwon, City University of Hong Kong
  • Yuzhu “Julia” Li, UMass Dartmouth
  • Xin “Robert” Luo, University of New Mexico
  • Seppo Pahnila, University of Oulu
  • Rachida Parks, University of Arkansas – Little Rock
  • Clay Posey, University of Alabama
  • Sam Ransbotham, Boston College
  • Tom Roberts, University of Texas at Tyler
  • Benjamin Shao, Arizona State University
  • Sheng-Pao Shih, Tamkang University
  • Anthony Vance, Brigham Young University
  • Mark Weiser, Oklahoma State University
  • Yu “Andy” Wu, University of North Texas
  • Wei Thoo Yue, City University of Hong Kong
  • Nan Zhang, University of Jyväskylä

The post IS Security and Privacy appeared first on ICIS 2016.

]]>
1108