----------------------------Original message---------------------------- CALL FOR PARTICIPATION INFORMATION PRIVACY, INTEGRITY, AND DATA SECURITY ASIS 1997 Mid-Year Conference Radisson Resort Scottsdale, Arizona; June 2-4, 1997 Audience: Professionals and scholars interested in social and technical issues for all aspects of information privacy, integrity and security. The infrastructure for data security, electronic communication and information privacy is built on an uncertain foundation. The commercial demands for secure electronic transfers involving digital cash, personnel records, product information, and virtually every type of information found in commerce has to date yielded techniques which fall short of their goals. In the late-1990's, there are almost no standards for electronic data exchange, scholarly publishing, or electronic communication which offer data security and integrity. Organizations of every type rely on electronic data, yet these data are not secure from compromise. Most importantly, the potential impact of false or altered data on individuals can be profound. The legal basis for dealing with data privacy, accountability for error, and remuneration for damages as a result of electronic transactions has not been established. Acceptable norms for conduct and ethical organizational and individual behavior are still emerging. Policy makers and business people, technologists and social scientists, researchers and practitioners have not benefited greatly by sharing their expertise due to pressures to develop working systems on short order. This has resulted in a long string of horror stories, and also a potentially unsound basis on which to develop the foundation of electronic communication and commerce for the 21st century. The fast pace of development for computing and networking technology has surpassed the social norms and ethics needed to deal with technologies and their uses. Individuals may feel uncertain or disempowered and be unwilling to participate; organizations are pressured to implement technological solutions, but without a clear notion of the problem; social institutions are stressed by demands to incorporate technologies into their services, yet without an adequate infrastructure to support their expansion. In all these cases, the potential benefits of technology for data transfer are featured, but the risks and uncertainties are downplayed. Who owns data? How can we verify accuracy of data, and verify that data are obtained from an authenticated source? What can you do when data about you is incorrect or has been misappropriated? What sorts of liability need to be associated with data misuse and/or misappropriation, and how should the value of data be assessed for liability purposes? What sorts of values for privacy, data sharing, and ethical responsibility will we need? The 1997 ASIS Mid-Year meeting will convene experts on different approaches to these issues: * information policy and legal issues * social and organization change * privacy and ethical norms * civil rights, empowerment, and equality * users, user studies, and methodologies * data transfer, encryption, and verification * electronic cataloging and retrieval * products and services * electronic publishing (provenance, copyright enforcement, etc.) THE CONFERENCE PROGRAM AND SUBMISSION GUIDELINES: a. Contributed papers are invited from scholars and practitioners in every field of interest. Contributed papers will be published in the conference proceedings; abstracts will be made available in electronic proceedings. Contributed papers should be approximately 2500-5000 words in length. b. Panels and Technical Sessions. Individuals, organizations and ASIS Special Interest Groups are invited to submit proposals on topics related to the conference theme. Panel and technical sessions typically bring together expert panelists to present findings or debate. We invited innovative approaches to panel or technical sessions or activities. SIGs are also encouraged to consider working with other SIGs and with other professional, scholarly, or technical societies to develop sessions. SIG session abstracts will be included in the conference proceedings. c. Poster Sessions. The conference will include poster sessions for late-breaking or preliminary results from research, policy, or product developments. d. Exhibition. Vendors of products related to the conference theme are invited to present a display in the Exhibition Hall. TOPICS: Contributed paper and Panel or Technical session topics may include, but are not limited to: * historical interpretation * future trends * software or hardware evaluation * user studies or methodologies * norms and ethics * equity and empowerment * policy analysis * international issues * corporate or government policy * data privacy * data ownership * case studies * standards for encryption and verification * standards for description of electronic data * effects of the European Union, Society break-up, democratization, and other political changes on policy DEADLINES Contributed Papers: Full papers (no abstracts) to be submitted by November 1, 1996. Guidelines for submission will be available on the Internet on the Mid Year '97 homepage: http://www.asis.org/midyear97/. Four printed copies of papers are required for refereeing. Authors are urged to consult the submission guidelines for information about preparation for the electronic proceedings and style guides for the print proceedings. Panel, Technical and SIG Sessions: An abstract with sponsoring SIG(s) if any and participant list is to be submitted by November 1, 1996. The format for proposals is described in the submission guidelines at the conference WWW page. Poster Sessions: Poster sessions proposals are due January 20, 1997. Electronic submission to the conference co-chairs is the only format for poster session proposals. Guidelines are available at the conference WWW page. Questions may be addressed to the meeting co-chairs/proceedings editors and Panel Session Coordinator: Gregory B. Newby, Co-Chair GSLIS/UIUC 501 E. Daniel St. Champaign, IL, 61820 Tel: (217) 244-7365 Fax: (217) 244-3302 Email: [log in to unmask] Mark H. Needleman, Co chair UCOP 300 Lakeside Drive 8th Floor Oakland CA, 94612-3550 Tel: (510) 987-0530 Fax: (510) 839-3573 Email: [log in to unmask] Karla Petersen, Panel Sessions Cudahy Library, Loyola University of Chicago 6525 N. Sheriday Road Chicago, IL 60625 Tel: (312) 508-2657 FAX: (312) 508-8691 Email: [log in to unmask] Richard Hill Executive Director, American Society for Information Science 8720 Georgia Avenue, Suite 501 Silver Spring, MD 20910 FAX: (301) 495-0810 Voice: (301) 495-0900 [log in to unmask] http://www.asis.org