{"id":1224,"date":"2020-10-11T12:21:58","date_gmt":"2020-10-11T12:21:58","guid":{"rendered":"http:\/\/ieomsociety.org\/harare2020\/?page_id=1224"},"modified":"2020-10-18T17:51:37","modified_gmt":"2020-10-18T17:51:37","slug":"cybersecurity","status":"publish","type":"page","link":"http:\/\/ieomsociety.org\/harare2020\/cybersecurity\/","title":{"rendered":"Cybersecurity"},"content":{"rendered":"<h1 style=\"text-align: center;\"><span style=\"color: #993300;\"><strong>Call for Papers: <\/strong><strong>Cyber Security Track<\/strong><\/span><\/h1>\n<h3 style=\"text-align: center;\"><span style=\"color: #000000;\"><strong><span style=\"color: #ff00ff;\">Theme<\/span>: Cyber Security in the era of the COVID 19 pandemic<\/strong><\/span><\/h3>\n<p style=\"text-align: center;\"><strong>Paper Submission deadline: <span style=\"color: #ff0000;\">October 30, 2020<\/span><\/strong><\/p>\n<hr \/>\n<p>The Covid 19 pandemic has accelerated and broadened the use of ICTs by both practitioners and academics. Many businesses, schools and universities have resorted to working from home during the lockdown in compliance with COVID 19 regulations, dubbed as the NEW NORMAL.<\/p>\n<p>Against this background of increased online activity and ever-growing cyber threats, many organisation and individuals became victims of cyber-crime after being caught unprepared to conduct online business securely.<\/p>\n<p>To address security challenges posed by the new normal of a mobile workforce, learners ,educators ,bring-your-own-device policies and today\u2019s blended cloud and on-premises environments , industry and academic players need to put in place measures that empower employees, partners , contractors and learners to do more remotely without compromising security or convenience.<\/p>\n<p>This track welcomes full papers and research in progress on empirical studies that examine Cyber Security in the era of COVID 19 pandemic.<\/p>\n<hr \/>\n<p style=\"text-align: center;\"><span style=\"color: #ff0000;\"><strong>Submission Link:<\/strong><\/span>\u00a0<a href=\"https:\/\/www.xcdsystem.com\/IEOM\/abstract\/index.cfm?ID=ITx8cpK\">https:\/\/www.xcdsystem.com\/IEOM\/abstract\/index.cfm?ID=ITx8cpK<\/a><\/p>\n<p style=\"text-align: center;\">Paper Template\u00a0<a href=\"http:\/\/ieomsociety.org\/paper-harare2020.docx\">WORD (*.docx)<\/a><\/p>\n<p style=\"text-align: center;\">Abstract Template\u00a0<a href=\"http:\/\/ieomsociety.org\/abstract-harare2020.docx\">WORD (*.docx)<\/a><\/p>\n<hr \/>\n<p><strong>Topics and research areas<\/strong> include but are not limited to:<\/p>\n<ul>\n<li>Secure Remote Access<\/li>\n<li>Identity Access Management<\/li>\n<li>Access Management<\/li>\n<li>Identity Governance and life cycle<\/li>\n<li>Privileged Identity Management<\/li>\n<li>Application Security<\/li>\n<li>Data Security<\/li>\n<li>Content Security<\/li>\n<li>Transaction protection<\/li>\n<li>Fraud Protection<\/li>\n<li>Criminal Detection<\/li>\n<li>Attacks on Virtualized Systems<\/li>\n<li>Attacks on Hardware<\/li>\n<li>Cloud Security<\/li>\n<li>Cloud Access Security<\/li>\n<li>Cognitive Security<\/li>\n<li>Countermeasures and Security threats<\/li>\n<li>Cyber Physical System (CPS) security<\/li>\n<li>Cyber Security and Blockchain Technology<\/li>\n<li>Database and System Security<\/li>\n<li>Data Center Network Control, Security and Optimization<\/li>\n<li>Security Standards ,Frameworks and Policies Designing a Security Policy<\/li>\n<li>E-mail Security, Spam, Phishing, E-mail fraud<\/li>\n<li>Internet of Things (IoT) Security<\/li>\n<li>Internet Security, Applications Security &amp; Network Management<\/li>\n<li>Intrusion Detection and Prevention<\/li>\n<li>Network and Wireless Network Security<\/li>\n<li>Peer-to-Peer Network Security<\/li>\n<li>Performance Evaluations of Protocols &amp; Security Applications<\/li>\n<li>Security of Virtual Machines<\/li>\n<li>Phishing, Scams etc,)<\/li>\n<li>Security, trust and privacy challenges<\/li>\n<li>Smart City Security<\/li>\n<li>Smart Grid security<\/li>\n<li>Ubiquitous Computing Security<\/li>\n<li>Virus, Worms, Trojan Protection<\/li>\n<li>Incident Response<strong>\u00a0<\/strong><\/li>\n<\/ul>\n<p><strong>Accepted papers will be <\/strong><\/p>\n<ul>\n<li>Published and indexed in Scopus<\/li>\n<li>Published in proceedings that have ISBN and ISSN numbers<\/li>\n<\/ul>\n<p><strong>Important Dates<\/strong><\/p>\n<ul>\n<li>Paper Submission deadline: October 30, 2020<\/li>\n<li>Review Feedback: November 10, 2020<\/li>\n<li>Final Paper: November 15, 2020<\/li>\n<li>Conference: December 8-10, 2020<\/li>\n<\/ul>\n<p><strong>Registration<\/strong><\/p>\n<p>There will be registration fee waiver for the first 10 students and early career academics from Developing Countries whose papers are accepted.<\/p>\n<p><strong>Contact Track Chairs:<\/strong><\/p>\n<ul>\n<li>Dr. Sam Takavarasha Jr. Women\u2019s University in Africa; <a href=\"mailto:stjnr1@gmail.com\">stjnr1@gmail.com<\/a>; <a href=\"mailto:stakavarasha@ufh.ac.za\">stakavarasha@wua.ac.zw<\/a><\/li>\n<li>Dr. Alfred Musarurwa CIO Nedbank, Zimbabwe; <a href=\"mailto:drmusarurwa@icloud.com\">drmusarurwa@icloud.com<\/a><\/li>\n<\/ul>\n<p>More Information: <a href=\"http:\/\/ieomsociety.org\/harare2020\/\">http:\/\/ieomsociety.org\/harare2020\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Call for Papers: Cyber Security Track Theme: Cyber Security in the era of the COVID 19 pandemic Paper Submission deadline: October 30, 2020 The Covid 19 pandemic has accelerated and broadened the use of ICTs by both practitioners and academics. Many businesses, schools and universities have resorted to working from home during the lockdown in [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1224","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"http:\/\/ieomsociety.org\/harare2020\/wp-json\/wp\/v2\/pages\/1224"}],"collection":[{"href":"http:\/\/ieomsociety.org\/harare2020\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/ieomsociety.org\/harare2020\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/ieomsociety.org\/harare2020\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/ieomsociety.org\/harare2020\/wp-json\/wp\/v2\/comments?post=1224"}],"version-history":[{"count":3,"href":"http:\/\/ieomsociety.org\/harare2020\/wp-json\/wp\/v2\/pages\/1224\/revisions"}],"predecessor-version":[{"id":1248,"href":"http:\/\/ieomsociety.org\/harare2020\/wp-json\/wp\/v2\/pages\/1224\/revisions\/1248"}],"wp:attachment":[{"href":"http:\/\/ieomsociety.org\/harare2020\/wp-json\/wp\/v2\/media?parent=1224"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}