ICIW 2009 4th International Conference on Information Warfare and Security Breakwater Lodge, Cape Town, South Africa 26-27 March 2009 Conference Chair: Johannes Vorster, Council for Scientific and Industrial Research, Pretoria, South Africa Programme Chair: Edwin Leigh Armistead, Edith Cowan University, Australia Keynote Speakers: TBD Information warfare and security are at the forefront of modern defence strategies. Strong strands of research and interest are developing in the area, including the understanding of threats and risks to information systems, the development of a strong security culture, as well as incident detection and post incident investigation. The International Conference on Information Warfare and Security (ICIW) offers an opportunity for academics, practitioners and consultants from the US, North America and elsewhere who are involved in the study, management, development and implementation of systems and concepts related to information warfare or are interested in ways to improve information systems security, to come together and exchange ideas. This conference is continuing to establish itself as a key event for individuals working in the field from around the world. The advisory group for the conference invites submissions of papers on both the theory and practice of all aspects of Information Warfare and Security. The conference in March 2009 is seeking qualitative, experience-based and quantitative papers as well as case studies and reports of work in progress from academics, information systems practitioners, consultants and government departments. Topics may include, but are not limited to: Adversarial Learning and planning Anonymous Routing Anti-Forensics Biometrics Botnets Business continuity planning Coordination Theory Corporate defence mechanisms Cryptography Cyber-terrorism Damage Assessment Deception, Reactive and Proactive Denial of Service Differential Power Analysis (DPA) Attacks Disaster recovery e-Intelligence/counter-intelligence Electro-magnetic pulse weapons Ethical, Political and Social Issues relating to Information Warfare Geospatial Security Hacking Homeland Security Honeynet countermeasures Information Assurance Information Operations Information warfare and security education Information warfare policy Information warfare techniques Information warfare theory Information, computer and network security Infra-structure warfare Intrusion Detection Insider Threat IS027001 ISM3 Security Management Maturity Legal issues concerned with information warfare and e-Crime Malware National security policy OODA Loop Petri Nets Perception management Physical security Proliferation Security Initiative (PSI) Risk analysis and assessment Security Education Security for small to medium enterprises Security policy Vulnerability assessments. Publication Opportunity Selected papers from the Conference will be considered for publication in a special issue of the Journal of Information Warfare: http://www.jinfowar.com Purchase previous conference proceedings The proceedings for this conference are listed on the Index to Scientific and Technical Proceedings (ISTP/ISI Proceedings), the Index to Social Sciences & Humanities Proceedings (ISSHP) and the Index to Social Sciences & Humanities Proceedings (ISSHP/ISI Proceedings). Submission details Abstract details: The Abstract should be a minimum of 300 and no more than 500 words including up to five keywords and keyphrases to be received by 4 September 2008. Please read the abstract guidelines Submission: Via the online submission form. Please ensure that you complete all relevant sections of the form, including the conference track the abstract is intended for, the proposed title for the paper, the full names (first name and surname, not initials) and email addresses of all authors and a postal address and telephone number for at least one contact author. Please indicate clearly if the contact author is not the lead author. Full paper: Only required when the abstract has been selected and not to be more than 5,000 words including abstract, keywords and references (the Harvard referencing rules need to be followed). Submission date will be no later than 23 October 2008. Papers should be submitted as .doc or .rtf file attachments by email to the conference manager, Elaine Hayne. Important information * The selection panel of the conference committee will consider all abstracts received by the submission deadline to ensure that the proposed paper is relevant to the Conference. * The authors of abstracts that describe a relevant paper will receive a notification of abstract selection. * All full papers will be double-blind reviewed by members of the conference committee to ensure an adequate standard, that the proposed subject of their abstract has been followed, that the paper is of a suitable length, the standard of English is adequate and the paper is appropriately referenced. * For authors whose first language is not English we request that you have your work proof read prior to submission by a native English speaker (or at least a fluent English speaker). Papers can be rejected due to a poor standard of English. * Papers that are accepted will be published in the conference proceedings providing at least one author registers and presents the work at the Conference (see the registration section of the conference website for more information about registration). * Due to the large number of papers expected for this conference, the committee only allows an author to present one paper. Therefore if multiple papers are accepted for presentation different co-authors need to present each paper. Author registrations must be completed by 19 February 2009. Important Dates Abstract submission deadline: 4 September 2008 Notification of abstract acceptance: 11 September 2008 Full paper due for review: 23 October 2008 Notification of paper acceptance(with any requested changes): 4 January 2009 Earlybird registration closes, 18 January 2009 Final paper due: 29 January 2009 Final author registration date, 19 February 2009