Track Description

The emerging digital technologies such as artificial intelligence (AI), the internet of things (IoT), and blockchain technology are rapidly reshaping and transforming the evolving nature of our daily lives, business, and society. While these emerging technologies are getting popular, we are also witnessing many unexpected negative consequences related to the use and adoption of these technologies. From an information security perspective, the proliferation of digital technologies intensifies the concerns of data breaches. Cyber attackers are finding new ways online to conduct different attacks such as phishing, online fraud, identity theft, and so on. Moreover, cyber attackers are increasingly targeting human vulnerabilities with the use of various information systems in organizations. And the consequences of a successful cyberattack can have long-lasting effects on organizations.

One of the common ways to reduce and mitigate damages resulting from cyberattacks is through information security risk management. As a result, organizations are actively seeking solutions to conduct risk assessments, develop information security policies, and address cybersecurity related issues in an effective and efficient manner. This would be helpful for the resilience of individuals, business, and society during unexpected disruptions (e.g., COVID-19).

Track Chairs

Marko Niemimaa, University of Agder, Norway
Shang Gao, Örebro University, Sweden

Subscribe to RSS Feed (Opens in New Window)

Papers

A Mapping Tool for Normative Requirements

João Cruz, Universidade de Lisboa - Instituto Superior Técnico & INOV Inesc Inovação, Lisboa, Portugal
André Fernandes, Universidade de Lisboa - Instituto Superior Técnico & INOV Inesc Inovação, Lisboa, Portugal
Miguel Mira da Silva, Universidade de Lisboa - Instituto Superior Técnico & INOV Inesc Inovação, Lisboa, Portugal
Rúben Pereira, ISCTE - Instituto Universitário de Lisboa, Lisboa, Portugal

Decentralized ID and Self-Sovereign Identity Solutions Using Blockchain: A Systematic Literature Review

Irene Priscila Cedillo Orellana, Department of Computer Sciences/Universidad de Cuenca, Cuenca, Ecuador
Andrea Paulina Rodriguez Zuñiga, Department of Computer Sciences/Universidad de Cuenca, Cuenca, Ecuador
Alberto Carlo Soriano Eusebio, Department of Computer Sciences/Universidad de Cuenca, Cuenca, Ecuador
Elizabeth Viviana Cabrera Avila, Department of Computer Sciences/Universidad de Cuenca, Cuenca, Ecuador
Paúl Esteban Cárdenas Delgado, Department of Computer Sciences/Universidad de Cuenca, Cuenca, Ecuador

Digital Resilience in Critical Infrastructures: A Systematic Literature Review

André Fernandes, Universidade de Lisboa - Instituto Superior Técnico & INOV Inesc Inovação, Lisboa, Portugal
Miguel Mira da Silva, Universidade de Lisboa - Instituto Superior Técnico & INOV Inesc Inovação, Lisboa, Portugal
Rúben Pereira, ISCTE Instituto Universitário de Lisboa, Lisboa, Portugal

Empowering Information Security Managers: Tailored Information Security Policy Design with POLCO Software

Elham Rostami, CERIS, Informatics, Örebro University Örebro, Sweden

Strengths And Weaknesses of Deep, Convolutional and Recurrent Neural Networks in Network Intrusion Detection Deployments

Marek Pawlicki, ITTI Sp. z o.o., Poznan, Poland