Abstract
As we come to press with this fifth issue of the year, we have an exciting development. It is a special case, this issue; we normally have issues 1 through 4 for each volume, but we chose this year to issue number "SI" in addition to issues 1,2,3, and 4, in order to accommodate something very special. The grand joy of editing a journal is the ability to do something unusual and innovative occasionally. With Stacie's concurrence, that is what we did this time around. As you may know, I am a member of the Behavioral Information Security society that styles itself through the highly prestigious "IFIP Working Group 8.11/11.13 Dewald Roode Behavioral Information Security Workshop." This special workshop is an event that takes place each year among the most visible and prolific information security scholars in the world. And, having gained admittance to their august company not so long ago, I sought an opportunity for The DATA BASE for Advances in Information Systems to support and promote behavioral information security research through its presence at the meetings (by virtue of my membership, as an Editor). A couple of meetings ago, when the call for papers went out for the annual research competition that provides the manuscripts for the meeting, I sought permission to issue a joint call for papers on behavior for a special issue of The DATA BASE dedicated to "Theoretical Advances in Behavioral Information Security Research." To my vast delight, the colleagues assented, indicating they thought it was a good idea. (Caveat: what follows will gore several oxen. My apologies in advance, but what needs to be said will inevitably cross lines of mild political sensibility, in the greater service of Theoretical Advancement.)
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: ACM SIGMIS Database: the DATABASE for Advances in Information Systems
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.