Participation can be in the following categories:
a) Traditional Peer Review Submissions.
In this submission mode you are uploading a full paper for double-blind, peer-review. Full papers must:
- not exceed 10 pages (approx. 5,000 words, including figures, tables, references, and appendices)
- use the APA formatting style (http://www.apastyle.org), and
- use this Template.
Full papers that are accepted following the double-blind, peer-review will be published in their entirety in the conference proceedings. Publishing opportunity: All submissions are considered for possible fast-tracking to the Journal of Information System Security (http://www.jissec.org). If your paper is not fast -racked, it will still be published in the peer-reviewed section of the conference proceedings.
b) Short Papers. Short papers present research in progress or simply an idea that aims to generate some discussion on the conference floor. In this submission mode, you can submit an abstract (100 words), or extended abstract (up to 1000 words), with a view to potentially developing a full paper after the event. Short paper submissions will be reviewed by the conference chairs to ensure relevance and credibility. The author names and titles of accepted short papers will be included in the conference proceedings.
c) Case Studies. Case study papers document a cybersecurity breach. The length of the case study can be anywhere between 5-10,000 words. Case study submissions will be reviewed by the conference chairs to ensure relevance and credibility. The author names and titles of accepted case study papers will be included in the conference proceedings.