SAC-ISRA 2010  25th ACM Symposium on Applied Computing, Information  
Security Research and Applications Track, Sierre, Switzerland, March  
22-26, 2010. (Submissions due 8 September 2009)

As society becomes more reliant on information systems, networks, and  
mobile communication, we become more vulnerable to security incidents.  
Our critical infrastructures for energy, communication, and  
transportation are interconnected via the Internet, bringing with this  
the efficiencies and economies of scale and the risk associated with  
open networks.  It has turned out that economic and societal interests  
go beyond technical security, as they also relate to organizational  
and behavioral security facets. This track provides a venue for  
holistic security issues related to detecting, mitigating and  
preventing the threat of attacks against information and communication  
systems. It brings together security researchers from the areas of  
computer science, information systems and systems science who are  
otherwise spread over multiple conferences.

Papers that address improving the security of information system- 
reliant organizations from threats through technical, organizational,  
or behavioral change are encouraged. These may include simulation  
studies, case-based research, empirical studies, and other  
applications of quantitative and qualitative methods. Topics include,  
but are not limited to:

     * Internet security
     * Economics of information security
     * Identifying modes of misuse
     * Applications of access policies
     * Analysis of known and unknown modes of attack
     * Detecting and mitigating insider threats
     * Modeling risks and approaches to mitigation
     * Teaching and training security and business managers about  
       information security
     * Creating channels and techniques to share confidential  
       information
     * Modeling and theory building of security issues
     * Insider threats
     * Social and business security policy
     * Intrusion detection/prevention
     * Electronic commerce security and privacy
     * Secure software development
     * Electronic voting
     * Security metrics
     * Risk and fraud assessment
     * Trust
     * Process Control Systems / SCADA security

For more information, please see http://www.albany.edu/~er945/CfP_SAC2010_ISRA.html