Cybersecurity Incident Response in Organizations
in Special Issue Posted on October 26, 2020Information for the Special Issue
Submission Deadline: | Sat 01 May 2021 |
Journal Impact Factor : | 2.849 |
Journal Name : | Computers and Security |
Journal Publisher: |
![]() |
Website for the Special Issue: | https://www.journals.elsevier.com/computers-and-security/call-for-papers/special-issue-on-cybersecurity-incident-response-in-organiza |
Journal & Submission Website: | https://www.journals.elsevier.com/computers-and-security |
Special Issue Call for Papers:
The evolving cyber-threat landscape has given rise to new and increasingly potent attacks against organizations. Human attackers use sophisticated tools and techniques to disrupt and destroy cyber infrastructures, deny organizations access to IT services, and steal sensitive information including Intellectual Property, trade secrets and customer data.
Incident response takes place under considerable time pressure in a dynamic and rapidly changing environment with high levels of information load, information diversity and task uncertainty. Effective response requires command, control and coordination of diverse teams of organizational stakeholders as they develop situation awareness, adapt to the rapidly evolving situation, raise the necessary resources, and respond to threats.
The practice of incident response is a relatively under-studied area of research. The purpose of this special issue is to collect and disseminate the latest advances in this area for a broad audience. We seek submissions that study the real-world problem of incident response and contribute sound practical advice to industry. Papers could employ qualitative, quantitative, mixed-methods and design science techniques. Exploratory case studies and action research are welcome.
Topics of interest include (but are not limited to):
- In-depth and revelatory case studies of incident response practice in organizations
- Maturity models of incident response
- Novel conceptualizations of the practice of incident response (e.g. response agility, communication and coordination, organizational learning, knowledge sharing, sense-making, situation awareness, process improvement)
- Management of the incident response function (e.g. strategy, policy, risk, training)
- Adoption of novel technologies for incident response (e.g. data-fusion and real-time analytics)
Submission Format
The submitted papers must be written in English and describe original research which is not published nor currently under review by other journals or conferences. Author guidelines for preparation of manuscript can be found at https://www.journals.elsevier.com/computers-and-security/.
Submission Guidelines
All manuscripts and any supplementary material should be submitted through the Elsevier journal Computers & Security submission system at https://ees.elsevier.com/cose/. The authors must select VSI:Incident Response when they reach the journal type selection.
List of Guest Editors
Atif Ahmad, University of Melbourne, Australia atif@unimelb.edu.au
Sean Maynard, University of Melbourne, Australia seanbm@unimelb.edu.au.
Richard Baskerville, Georgia State University, USA baskerville@acm.org
Important Dates
Submission Deadline: May 1, 2021
First Round of Reviews: Aug 1, 2021
Second Round of Reviews: Feb 1, 2022
Final Decision: May 1, 2022
References
Ahmad, A., Desouza, K. C., Maynard, S. B., Naseer, H., & Baskerville, R. L. (2020). How integration of cyber security management and incident response enables organizational learning. Journal of the Association for Information Science and Technology, 71(8), 939-953.
Ahmad, A., Webb, J., Desouza, K.C., and Boorman, J. (2019). “Strategically-Motivated Advanced Persistent Threat: Definition, Process, Tactics and a Disinformation Model of Counterattack,” Computers & Security. Vol 86, pp. 402-418.
Ahmad, A., Maynard, S.B., & Shanks, G. (2015). A Case Analysis of Information Systems and Security Incident Responses. International Journal of Information Management. 35(6), (pp. 717 -723). (Impact Factor 8.210)
Baskerville, R., Spagnoletti, P., & Kim, J. (2014). Incident-centered Information Security: Managing a Strategic Balance between Prevention and Response. Information & Management, 51(1), 138-151.
Webb, J., Ahmad, A., Maynard, S.B., & Shanks, G. (2014). A Situation Awareness Model for Information Security Risk Management. Computers & Security. 44, (pp. 1-15).
Ahmad, A., Hadjkiss, J., & Ruighaver, A.B. (2012). Incident Response Teams – Challenges in Supporting the Organizational Security Function. Computers & Security. 31(5), (pp. 643–652).
Other Special Issues on this journal
![]() |
|
Zero-trust security in cloud computing environments (CCE)Computers and Security |
Mon 01 Feb 2021 |
Closed Special Issues
![]() |
|
A Multidisciplinary Approach to Internet of Things Cybersecurity and Risk ManagementComputers and Security |
Mon 30 Mar 2020 |
![]() |
|
Security and Privacy in Smart Cyber-physical Systems- Computers & Security, ElsevierComputers and Security |
Fri 30 Nov 2018 |
![]() |
|
“Blockchain and Cryptocurrency”Computers and Security |
Fri 30 Nov 2018 |
![]() |
|
Security and Privacy for Edge Computing: Current Progress and Future ChallengeComputers and Security |
Sun 31 Dec 2017 |
![]() |
|
Celebrating Anniversaries of CERIAS/COAST At Purdue UniversityComputers and Security |
Sun 01 Oct 2017 |
![]() |
|
Security and Privacy Protection vs Sustainable DevelopmentComputers and Security |
Fri 01 Sep 2017 |