Forwarded from: George Yee <gmyee (at) sce.carleton.ca> Dear Colleague, Greetings! I would like to invite you to submit a chapter proposal to a new book I am editing, entitled "Privacy Protection Measures and Technologies in Business Organizations: Aspects and Standards", if this topic lies within your area of work. Please see the Call for Chapter Proposals below. Thank you for your consideration, and I look forward to receiving your proposal. Sincerely, George ------ George Yee, Ph.D., P.Eng., CSDP, CISSP Adjunct Research Professor, Dept. of Systems and Computer Engineering, Carleton University, Ottawa, Ontario, Canada K1S 5B6 gmyee (at) sce.carleton.ca http://www.sce.carleton.ca/faculty/yee.html --------------------------------------------------------------------------------------- CALL FOR CHAPTER PROPOSALS Proposal Submission Deadline: July 15, 2010 Privacy Protection Measures and Technologies in Business Organizations: Aspects and Standards A book edited by Dr. George O.M. Yee, Carleton University, Canada Introduction The recent rapid growth of the Internet, together with increases in computerization, has been accompanied by soaring deployments of client-related business applications. Since business ultimately depends on the consumption of people, this has led to more and more consumer personal information in the possession of business organizations. This in turn has led to concerns over potential violations of consumer privacy. In response, various governmental jurisdictions have enacted privacy legislation to protect the privacy of consumers. However, legislation alone is not enough. Protective foolproof measures must be in place to guard against potential invasions of privacy. For example, business communication and collaboration include content sharing and email. How can these be safeguarded against the leakage of consumer personal information? As another example, internal business systems comprise workflows that handle and process client personal information. What measures are needed to avoid inadvertently and illegally revealing this information? What standards can be followed to reduce this risk? Objective of the Book This book will aim to deliver a coherent collection of chapters that provide significant new insights from five areas of investigation, as follows: 1) the current legal framework concerning the protection of consumer privacy in business organizations, 2) the nature and identification of consumer private information, 3) the measures and standards that can be applied and integrated within business organizations to protect consumer privacy, 4) the integration of business structures and workflows with privacy protection measures, and 5) the impacts of applying and integrating privacy protection measures on business operational and financial performance. Although theoretical and conceptual studies are equally welcome, the likely practical implications of your research should be emphasized in all contributions. Target Audience The target audience for this book will be composed of professionals and researchers working in the field of privacy protection in various disciplines, e.g. business sciences and management, information and communication sciences, library, education, sociology, computer science, computer engineering, and information technology. In addition, the book will provide insights and support executives concerned with the management of expertise, knowledge, information, and organizational development in different types of business organizations and environments. Recommended topics include, but are not limited to, the following: Legal and compliance aspects of privacy protection in business organizations, Privacy related business standards, The nature of consumer private information in business organizations, Approaches, methods, and tools for discovering or delimiting private information, Requirements for privacy protection measures in business organizations, Privacy protection measures / privacy enhancing technologies applicable to business, Approaches, methods, and tools to assist in complying with privacy laws and regulations, Gauging the effectiveness of privacy protection measures, Approaches, methods, and tools that can be used to support the introduction of privacy protection measures, Facilitators and inhibitors of the adoption of privacy protection measures, The nature of business structures or workflows that can integrate with privacy protection measures, Protecting consumer privacy in the age of business cloud computing, Business advantages / disadvantages from the adoption of privacy protection measures, Customer responses to the introduction of privacy protection measures, Case studies of privacy protection initiatives on business performance, The impact of privacy protection measures on organizational structure and behaviour Submission Procedure Researchers and practitioners are invited to submit on or before July 15, 2010, a 2-3 page chapter proposal clearly explaining the mission and concerns of his or her proposed chapter. Please email submissions (Word document) to: gmyee (at) sce.carleton.ca. Authors of accepted proposals will be notified by August 1, 2010 about the status of their proposals and sent chapter guidelines. Full chapters are expected by October 31, 2010. All submitted chapters will be reviewed between authors on a double-blind review basis. Publisher This book is scheduled to be published by IGI Global (formerly Idea Group Inc.), publisher of the Information Science Reference (formerly Idea Group Reference), Medical Information Science Reference, Business Science Reference, and Engineering Science Reference imprints. For additional information regarding the publisher, please visit www.igi-global.com. This publication is anticipated to be released in 2011. Important Dates July 15, 2010: Proposal Submission Deadline August 1, 2010: Notification of Acceptance October 31, 2010: Full Chapter Submission January 15, 2011: Review Results Returned February 15, 2011: Revised Chapter Submission February 28, 2011: Final Acceptance Notification March 15, 2011: Submission of Final Chapters ----------------------------------------------------------------------------- _________________________________________________________________ Attend Black Hat USA 2010, hosted at Caesars Palace in Las Vegas, Nevada July 24-29th, offering over 60 training sessions and 11 tracks of Briefings from security industry elite. To sign up visit http://www.blackhat.comReceived on Sun Jun 27 2010 - 22:43:51 PDT
This archive was generated by hypermail 2.2.0 : Sun Jun 27 2010 - 22:52:51 PDT