AOH :: ISNQ6558.HTM

Call for Chapter Proposals




Call for Chapter Proposals
Call for Chapter Proposals



Forwarded from: George Yee 

Apologies for cross-posting.

Dear Colleague,

Greetings! I would like to invite you to submit a chapter proposal to a 
new book I am editing, entitled "Privacy Protection Measures and 
Technologies in Business Organizations: Aspects and Standards", assuming 
this topic lies within your work area. The due date for the proposal is 
August 15, 2010. For more details, please see the Call for Chapter 
Proposals at:

http://www.igi-global.com/AuthorsEditors/AuthorEditorResources/CallForBookChapters/CallForChapterDetails.aspx?CallForContentId=1039694b-2c68-4e3a-8a47-39c81d938c00 

Here are some excerpts from the above site:

Introduction
The recent rapid growth of the Internet, together with increases in 
computerization, has been accompanied by soaring deployments of 
client-related business applications. Since business ultimately depends 
on the consumption of people, this has led to more and more consumer 
personal information in the possession of business organizations. This 
in turn has led to concerns over potential violations of consumer 
privacy. In response, various governmental jurisdictions have enacted 
privacy legislation to protect the privacy of consumers. However, 
legislation alone is not enough. Protective foolproof measures must be 
in place to guard against potential invasions of privacy. For example, 
business communication and collaboration include content sharing and 
email. How can these be safeguarded against the leakage of consumer 
personal information? As another example, internal business systems 
comprise workflows that handle and process client personal information. 
What measures are needed to avoid inadvertently and illegally revealing 
this information? What standards can be followed to reduce this risk?

Objective of the Book

This book will aim to deliver a coherent collection of chapters that 
provide significant new insights from five areas of investigation, as 
follows: 1) the current legal framework concerning the protection of 
consumer privacy in business organizations, 2) the nature and 
identification of consumer private information, 3) the measures and 
standards that can be applied and integrated within business 
organizations to protect consumer privacy, 4) the integration of 
business structures and workflows with privacy protection measures, and 
5) the impacts of applying and integrating privacy protection measures 
on business operational and financial performance. Although theoretical 
and conceptual studies are equally welcome, the likely practical 
implications of your research should be emphasized in all contributions.

Recommended topics include, but are not limited to, the following:

       Legal and compliance aspects of privacy protection in business organizations,
       Privacy related business standards,
       The nature of consumer private information in business organizations,
       Approaches, methods, and tools for discovering or delimiting private information,
       Requirements for privacy protection measures in business organizations,
       Privacy protection measures / privacy enhancing technologies applicable to business,
       Software engineering approaches for privacy protection in business organizations (e.g. design of privacy sensitive software),
.       Approaches, methods, and tools to assist in complying with privacy laws and regulations,
       Gauging the effectiveness of privacy protection measures,
       Approaches, methods, and tools that can be used to support the introduction of privacy protection measures,
       Facilitators and inhibitors of the adoption of privacy protection measures,
       The nature of business structures or workflows that can integrate with privacy protection measures,
       Protecting consumer privacy in the age of business cloud computing,
       Business advantages / disadvantages from the adoption of privacy protection measures,
       Customer responses to the introduction of privacy protection measures,
       Case studies of privacy protection initiatives on business performance,
       The impact of privacy protection measures on organizational structure and behaviour
Submission Procedure

Researchers and practitioners are invited to submit on or before August 
15, 2010 (let me know if you need more time), a 2-3 page chapter 
proposal (outline) clearly explaining the mission and concerns of his or 
her proposed chapter. Please email submissions (Word document) to: gmyee 
(at) sce.carleton.ca. Authors of accepted proposals will be notified by 
September 1, 2010 about the status of their proposals and sent chapter 
guidelines. Full chapters are expected by November 30, 2010. All 
submitted chapters will be reviewed between authors on a double-blind 
review basis.

Thank you for your consideration, and I look forward to receiving your proposal.

Sincerely,
George
------
George Yee, Ph.D., P.Eng., CSDP, CISSP
Adjunct Research Professor,
Dept. of Systems and Computer Engineering,
Carleton University,
Ottawa, Ontario, Canada K1S 5B6
gmyee (at) sce.carleton.ca



_________________________________________________________________
Attend Black Hat USA 2010, hosted at Caesars Palace in Las Vegas, Nevada
July 24-29th, offering over 60 training sessions and 11 tracks of Briefings
from security industry elite. To sign up visit http://www.blackhat.com 

Site design & layout copyright © 1986-2014 CodeGods