[DFSci] Final Call for Chapter Proposals: "Managing Security Issues and the Hidden Dangers of Wearable Technologies"

Andrew Marrington Andrew.Marrington at zu.ac.ae
Fri Aug 7 03:51:59 PDT 2015


Dear Colleagues,

Apologies for re-posting - we are in our final round of calls for chapter
proposals for our upcoming IGI Global book about the security issues of
wearable technologies. We are very interested in chapters about digital
forensics of these devices - if you have recently done some work with
wearable devices (e.g. Apple Watch, Google Glass, Fitbit, etc) then please
consider submitting a chapter proposal.

Kind regards,
Andrew Marrington


CALL FOR CHAPTER PROPOSALS
Proposal Submission Deadline: August 30, 2015
Managing Security Issues and the Hidden Dangers of Wearable Technologies

A book edited by
Andrew Marrington, Zayed University, United Arab Emirates
Don Kerr, University of the Sunshine Coast, Australia
John Gammack, Zayed University, United Arab Emirates

To be published by IGI Global: http://bit.ly/1EQ7rOm

For release in Advances in Information Security, Privacy, and Ethics
(AISPE) book series.

ISSN: 1948-9730

==================
Series Description
==================
The Advances in Information Security, Privacy, & Ethics (AISPE) Book
Series provides cutting-edge research on the protection and misuse of
information and technology across various industries and settings.
Comprised of scholarly research on topics such as identity management,
cryptography, system security, authentication, and data protection, this
book series is ideal for reference by IT professionals, academicians, and
upper-level students.

============
Introduction
============
Wearable technologies are mobile computing devices which further close the
gap between humans and information technologies by virtue of their
intimate physical proximity and their non-traditional user interfaces. The
emergence of these wearable devices together with the ease of
photographing and distributing private of confidential information has
significant implications for our society and our businesses. The narrowed
physical gap between person and technology implies the presence and
potential use of wearable technologies during almost every human activity,
including both intimate and illicit activities and everything between. The
near-universal reach of modern smartphones has already ushered in an era
of ubiquitous computing and a new culture of photo sharing, leading to
security and privacy concerns both for individuals and for businesses. As
wearable technologies accelerate these developments, law, policy and
individual behaviors must adapt. The security and privacy implications
(positive and negative) of wearable technologies will be explored both
conceptually and empirically, and the implications for government, law
enforcement, industry and individuals are discussed.

=====================
Objective of the Book
=====================
This book will explore the security issues with emerging wearable digital
devices and their deployment. It will illustrate a conceptual and
pragmatic basis of direct use to managers, policymakers and law
enforcement, even as wearable technologies continue to evolve. It will
provide empirical research findings and conceptual frameworks for
professionals and researchers who are interested in the security and
privacy implications of wearable technologies, both for individuals and
for large organizations.

===============
Target Audience
===============
The target audience of this book will be composed of professionals,
security managers, policy makers, and researchers in the fields of
emerging technologies and security. Every chapter will include specific
recommendations and thought provokers for consideration by practitioners,
and questions and discussion topics for advanced undergraduate students.

==================================================================
Recommended topics include, but are not limited to, the following:
==================================================================
Chapters are sought after on every security and privacy dimension of
wearable technologies, including but not limited to the following:
-Security management of BYOD wearable technology
-Digital forensics of wearable devices
-Privacy concerns arising from wearable technology
-Security of wearable devices
-Cultural implications of wearable devices
-The impact of wearable technologies on risk for individuals and
organizations

Chapters discussing empirical results relating to the security, privacy
and investigation dimensions of wearable technologies, including but not
limited to the following, are also sought:
-Google Glass
-Smart watches (e.g. Apple Watch)
-Android Wear
-Fitbit
-Samsung Gear VR

Since smartphones are in many cases the device which enables communication
between the wearable devices and the broader world, and since they have
many overlapping security and privacy issues with wearable devices,
chapters based on work with smartphones which is applicable to wearable
technologies are also sought after.

====================
Submission Procedure
====================
Researchers and practitioners are invited to submit on or before June 30,
2015, a chapter proposal of 500 to 1,000 words clearly explaining the
mission and concerns of his or her proposed chapter. Authors will be
notified by July 15, 2015 about the status of their proposals and sent
chapter guidelines. Full chapters are expected to be submitted by October
30, 2015, and all interested authors must consult the guidelines for
manuscript submissions at
http://www.igi-global.com/publish/contributor-resources/before-you-write/
prior to submission. All submitted chapters will be reviewed on a
double-blind review basis. Contributors may also be requested to serve as
reviewers for this project.
Note: There are no submission or acceptance fees for manuscripts submitted
to this book publication, Managing Security Issues and the Hidden Dangers
of Wearable Technologies. All manuscripts are accepted based on a
double-blind peer review editorial process.

Full chapters may be submitted to this book here:
http://www.igi-global.com/publish/call-for-papers/call-details/1830

All proposals should be submitted through the E-Editorial Discovery(TM)
online submission manager.

=========
Publisher
=========
This book is scheduled to be published by IGI Global (formerly Idea Group
Inc.), an international academic publisher of the "Information Science
Reference" (formerly Idea Group Reference), "Medical Information Science
Reference," "Business Science Reference," and "Engineering Science
Reference" imprints. IGI Global specializes in publishing reference books,
scholarly journals, and electronic databases featuring academic research
on a variety of innovative topic areas including, but not limited to,
education, social science, medicine and healthcare, business and
management, information science and technology, engineering, public
administration, library and information science, media and communication
studies, and environmental science. For additional information regarding
the publisher, please visit www.igi-global.com. This publication is
anticipated to be released in 2016.

===============
Important Dates
===============
Full chapter submission: October 30, 2015
Review Process: October 30 - December 15, 2015
Review Results to Authors: January 15, 2016
Revised Chapter Submission: February 15, 2016
Final Acceptance Notification: February 28, 2016
Final Chapter Submission to Editors: March 15, 2016

=========
Inquiries
=========
We encourage inquiries to the editorial team via Dr Andrew Marrington,
marrington at computer.org





Andrew Marrington       أندرو مارينجتون
Assistant Professor     أستاذ مساعد
College of Technological Innovation     كلية الإبتكار التقني

P.O. Box 19282 Dubai, U.A.E | T:+971 4 402 1199 | M:
w w w . z u . a c . a e

Accredited by Middle States Commission on Higher Education

Disclaimer:This e-mail and the files(s) attached to it are confidential and belong to the intended receiver (unit) only.In case you are not the intended receiver of this letter, or if you have received it by mistake, please advise the sender and delete it along with its attached file(s) from your system immediately. You do not have the right to copy, print or distribute this e-mail or any part thereof, or to release its contents to any other party whatsoever, except with prior approval from the sender.If you violate the above, you will be legally accountable.



More information about the DFSci mailing list