SAC-ISRA 2010 25th ACM Symposium on Applied Computing, Information Security Research and Applications Track, Sierre, Switzerland, March 22-26, 2010. (Submissions due 8 September 2009) As society becomes more reliant on information systems, networks, and mobile communication, we become more vulnerable to security incidents. Our critical infrastructures for energy, communication, and transportation are interconnected via the Internet, bringing with this the efficiencies and economies of scale and the risk associated with open networks. It has turned out that economic and societal interests go beyond technical security, as they also relate to organizational and behavioral security facets. This track provides a venue for holistic security issues related to detecting, mitigating and preventing the threat of attacks against information and communication systems. It brings together security researchers from the areas of computer science, information systems and systems science who are otherwise spread over multiple conferences. Papers that address improving the security of information system- reliant organizations from threats through technical, organizational, or behavioral change are encouraged. These may include simulation studies, case-based research, empirical studies, and other applications of quantitative and qualitative methods. Topics include, but are not limited to: * Internet security * Economics of information security * Identifying modes of misuse * Applications of access policies * Analysis of known and unknown modes of attack * Detecting and mitigating insider threats * Modeling risks and approaches to mitigation * Teaching and training security and business managers about information security * Creating channels and techniques to share confidential information * Modeling and theory building of security issues * Insider threats * Social and business security policy * Intrusion detection/prevention * Electronic commerce security and privacy * Secure software development * Electronic voting * Security metrics * Risk and fraud assessment * Trust * Process Control Systems / SCADA security For more information, please see http://www.albany.edu/~er945/CfP_SAC2010_ISRA.html