Skip to main content

Call for Papers

Following the success of the first seven Information Systems Security Research Workshops (University of Cape Town, May 2009; Bentley University, October 2010; Virginia Tech, September, 2011; Brigham Young University, September, 2012; University at Buffalo, October, 2013; Newcastle University Business School, June 2014 and University of Delaware, Aug. 2015), the eighth workshop will continue the efforts to advance the discipline of information systems security through the creation, dissemination, and preservation of well-formed research. Through the active discussion in the workshop, participants will receive specific feedback on their research and provide feedback to others.

As in the previous seven years, the Dewald Roode Workshop places a premium on research with highly reliable and validated theories, empirical data, and quantitative/qualitative social scientific methodologies. The workshop is intended to nurture individual papers for submission to a wide variety of top quality research journals. (See for past DRW papers which have been published in journals.)

Selection for the workshop is competitive, and only authors of the accepted papers and the active working group members will be invited to participate.

Anchoring the workshop to information systems means that the research will attend to and extend the social, organizational, and managerial literature in the focal area. Note that this is not an appropriate venue for papers with a purely technical, design-science, or economic approach.

While we assume an effective foundation in information security technology, we regard information systems risk broadly, for example, computer crime, employee misconduct, cyber warfare, cyber terrorism, human error and/or accident, natural events, etc. We also address information systems security broadly, for example, policies and policy compliance, diverse security behaviors, privacy, awareness, strategy, audit, planning and control. These and related research topics will be the focus of this workshop. Topics may include (but are not limited to):

  • Theoretical and empirical analyses of information security behavior
  • Adoption, use, and continuance of information security technologies and policies
  • Compliance with information security and privacy policies, procedures, and regulations
  • Investigations of computer crime and security violations
  • Motivators and inhibitors of employee computer crime
  • Forensic analysis of security breaches and computer crimes
  • Individual, organizational, and group information privacy concerns and behaviors
  • Legal, societal, and ethical issues in information security
  • Neurosecurity—NeuroIS investigations of information security behavior

Submission Information

Manuscripts will be prescreened by the program chairs to ensure that all papers sent to reviewers are reasonably complete, well-formed, and appropriate to the scope and mission of the workshop. Double blind reviews will follow for prescreened papers. Authors can submit the manuscripts as "early stage" or "completed papers." Manuscripts must be anonymous for the review process.

In recognition that the review process greatly relies upon a scarce resource of the services of reviewers, authors, by the act of submission, are implicitly promising to serve as a reviewer on one to two conference papers, if requested. For general questions about the workshop, please contact Robert Luo at For questions about the program, please contact Manish Agrawal at; Rachida Parks at or Jeff Jenkins at .