Information Privacy & Security Risks:  In an era of big data, the internet of everything, electronic health records, industrial competition, and the increasing need to be digitally connected, privacy and security risks continue to evolve. Significant resources are invested into protecting information. How do we evaluate the effectiveness of policies, operational and technical security controls? Metrics, analytics, models, or other decision-enhancing tools are needed to assess policy effectiveness and efficiency. This track invites papers that examine emerging threats, technologies, metrics, models, and behavior in security and privacy risk management. The track welcomes empirical, theoretical, and design submissions. Panel proposals are also welcomed. Before choosing a certain topic of your research, first analyze in detail the previously published scientific works in the same field. So you can avoid repetitions and get acquainted with the main trends in which direction modern companies or individual projects are moving. Of course, it takes a lot of time to process several author's works, so we encourage you to buy analytical essay and quickly get meaningful and relevant information without unnecessary deadlines and lyrical digressions.

Possible topics include:

  • Emerging security and privacy trends and technologies
  • Securing big data
  • Privacy issues with big data and data analytics
  • Security in the cloud
  • Privacy in social media
  • Consumer privacy measures, such as anonymity-seeking and identity protective behavior
  • Security and privacy policy design
  • Security policy effects on operational workflow
  • Analytics for privacy and security evaluation and decision-making
  • Metrics for assessing security control effectiveness
  • Modeling security and privacy risk in business processes
  • Effects of security policy and controls on organizational workflow
  • International issues in information security and privacy
  • Privacy enhancing technologies in browsers, web sites, mobile and GPS-enabled devices
  • Health information security and privacy
  • Mobile device security and privacy
  • Online behavioral tracking and privacy
  • Integrating security requirements into systems analysis and design
  • Applications of and outcomes from security and privacy law
  • Security and privacy needs not addressed by regulatory requirements (e.g., HIPAA vs big data; trade secrets, etc.)
  • Extending current effective privacy and security measures
  • Cyber espionage