Print

Print


----------------------------Original message----------------------------
CALL FOR PARTICIPATION

INFORMATION  PRIVACY,  INTEGRITY,  AND DATA  SECURITY

ASIS 1997 Mid-Year Conference
Radisson Resort Scottsdale, Arizona; June 2-4, 1997

Audience:       Professionals and scholars interested in social and
          technical issues for all aspects of information privacy,
          integrity and security.

        The infrastructure for data security, electronic communication
and information privacy is built on an uncertain foundation.  The
commercial demands for secure electronic transfers involving digital
cash, personnel records, product information, and virtually every
type of information found in commerce has to date yielded techniques
which fall short of their goals.  In the late-1990's, there are
almost no standards for electronic data exchange, scholarly
publishing,  or electronic communication which offer data security
and integrity.
        Organizations of every type rely on electronic data, yet these
data are not secure from compromise.  Most importantly, the potential
impact of false or altered data on individuals can be profound.  The
legal basis for dealing with data privacy, accountability for error,
and remuneration for damages as a result of electronic transactions
has not been established.  Acceptable norms for conduct and ethical
organizational and individual behavior are still emerging.
        Policy makers and business people, technologists and social
scientists, researchers and practitioners have not benefited greatly
by sharing their expertise due to pressures to develop working
systems on short order.  This has resulted in a long string of horror
stories, and also a potentially unsound basis on which to develop the
foundation of electronic communication and commerce for the 21st
century.
        The fast pace of development for computing and networking
technology has surpassed the social norms and ethics needed to deal
with technologies and their uses.  Individuals may feel uncertain or
disempowered and be unwilling to participate; organizations are
pressured to implement technological solutions, but without a clear
notion of the problem; social institutions are stressed by demands to
incorporate technologies into their services, yet without an adequate
infrastructure to support their expansion.  In all these cases, the
potential benefits of technology for data transfer are featured, but
the risks and uncertainties are downplayed.
        Who owns data?  How can we verify accuracy of data, and verify
that data are obtained from an authenticated source?  What can you do when
data about you is incorrect or has been misappropriated?  What
sorts of liability need to be associated with data misuse and/or
misappropriation, and how should the value of data be assessed for
liability purposes?  What sorts of values for privacy, data sharing,
and ethical responsibility will we need?
        The 1997 ASIS Mid-Year meeting will convene experts on different
approaches to these issues:
* information policy and legal issues
* social and organization change
* privacy and ethical norms
* civil rights, empowerment, and equality
* users, user studies, and methodologies
* data transfer, encryption, and verification
* electronic cataloging and retrieval
* products and services
* electronic publishing (provenance, copyright enforcement, etc.)

THE CONFERENCE PROGRAM AND SUBMISSION GUIDELINES:

a.  Contributed papers are invited from scholars and practitioners in
every field of interest.  Contributed papers will be published in the
conference proceedings; abstracts will be made available in
electronic proceedings.  Contributed papers should be approximately
2500-5000
words in length.

b.  Panels and Technical Sessions.  Individuals, organizations and
ASIS Special Interest Groups are invited to submit proposals on
topics related to the conference theme.  Panel and technical sessions
typically bring together expert panelists to present findings or
debate.  We invited innovative  approaches to panel or technical
sessions or activities.  SIGs are also encouraged to consider working
with other SIGs and with other professional, scholarly, or technical
societies to develop sessions.  SIG session abstracts will be
included in the conference proceedings.

c. Poster Sessions.  The conference will include poster sessions for
late-breaking or preliminary results from research, policy, or
product developments.

d.  Exhibition.  Vendors of products related to the conference theme
are invited to present a display in the Exhibition Hall.

TOPICS: Contributed paper and Panel or Technical session topics may
include, but are not limited to:
* historical interpretation
* future trends
* software or hardware evaluation
* user studies or methodologies
* norms and ethics
* equity and empowerment
* policy analysis
* international issues
* corporate or government policy

* data privacy
* data ownership
* case studies
* standards for encryption and verification
* standards for description of electronic data
* effects of the European Union, Society break-up, democratization,
and other political changes on policy

DEADLINES
Contributed Papers:
Full papers (no abstracts) to be submitted by November 1, 1996.
Guidelines for submission will be available on the Internet on the
Mid Year '97 homepage: http://www.asis.org/midyear97/.  Four printed
copies of papers are required for refereeing.  Authors are urged to
consult the submission guidelines for information about preparation
for the electronic proceedings and style guides for the print
proceedings.

Panel, Technical and SIG Sessions:
An abstract with sponsoring SIG(s) if any and participant list is to
be submitted by November 1, 1996.  The format for proposals is
described in the submission guidelines at the conference WWW page.

Poster Sessions:
Poster sessions proposals are due January 20, 1997.  Electronic
submission to the conference co-chairs is the only format for poster
session proposals.  Guidelines are available at the conference WWW
page.

Questions may be addressed to the meeting co-chairs/proceedings
editors and Panel Session Coordinator:

Gregory B. Newby, Co-Chair
GSLIS/UIUC
501 E. Daniel St.
Champaign, IL, 61820
Tel: (217) 244-7365
Fax: (217) 244-3302
Email: [log in to unmask]

Mark H. Needleman, Co chair
UCOP
300 Lakeside Drive 8th Floor
Oakland CA, 94612-3550
Tel: (510) 987-0530
Fax: (510) 839-3573
Email: [log in to unmask]

Karla Petersen, Panel  Sessions
Cudahy Library,
Loyola University of Chicago
6525 N. Sheriday Road
Chicago, IL  60625
Tel: (312) 508-2657
FAX: (312) 508-8691
Email: [log in to unmask]
Richard Hill
Executive Director, American Society for Information Science
8720 Georgia Avenue, Suite 501
Silver Spring, MD  20910
FAX: (301) 495-0810
Voice: (301) 495-0900
[log in to unmask]
http://www.asis.org