Direkt zum Inhalt

Information Security & Privacy


In today’s digital age, we use IT in almost all areas of our lives: Social media to connect with family and friends; mobile apps for banking or shopping; cloud services to store and flexibly access huge amounts of media, pictures, and videos. So everyday, we leave millions of data traces, and the scale of user data available online is unprecedented. At the same time, recent data scandals showed how lax current privacy protections for user data are.

Likewise, the number of cyber-attacks in industry is growing. Organizations’ assets and critical resources increasingly become digital and thus more transferrable. It is therefore important to protect digital resources in organizations and reduce exposure to inadvertent modifications or information leakage. As a consequence, urgent public discussions at all levels raise concerns about information security and privacy.

This track seeks contributions that address these rising concerns. We especially encourage research that focuses on the management of information security and privacy across a variety of industries, such as, health, insurance, finance, mobility. All methodological approaches are welcome, including but not limited to conceptual, qualitative, quantitative, design science including engineering of novel protection mechanisms, and mixed-method approaches.

Covered areas include, but are not limited to:

  • Security and Privacy Threats and Challenges 
  • Behavioural Economics of Security and Privacy 
  • Legal Aspects and Regulations of Security and Privacy
  • Intercultural/Gender Perspectives on Security and Privacy  
  • Assessing the Value of Security and Privacy  
  • Security and Privacy in Applications Fields, including “Big Data” Systems, Blockchain Technology, Artificial Intelligence, Critical Information Infrastructures, E-Commerce, Internet of Things, Mobile and Cloud Computing, Social Media
  • Employee Information Security Policy Non-/Compliance
  • Security Monitoring, Audit, Certification, and Control
  • Advances in Usable Security
  • Cybercrime
  • Organizational Privacy (Processes, Policies, etc.)
  • Individual Privacy Attitudes, Perceptions, and Behaviour
  • Censorship and Fake News
  • Cyberbullying and Cybermobbing 
  • Privacy-Enhancing Technologies 
  • Privacy-Preserving Analytics
  • Privacy Engineering, Transparency, and Control 


Track Chairs

Steffi Haag

Steffi Haag

Friedrich-Alexander-Universität Erlangen-Nürnberg

Steffi Haag is an Assistant Professor of Information Systems at the Friedrich-Alexander University Erlangen-Nürnberg (FAU), Germany. Her research focuses on the use and value of shadow IT, behavioral information security, and digital innovation. Her research has been published in Information & Management, Business Information Systems Engineering, Communications of the AIS, the Journal of Business Economics, and in the proceedings of leading IS conferences, such as the International Conference on Information Systems.
Benjamin Fabian

Benjamin Fabian

Humboldt University Berlin & HfT Leipzig

Benjamin Fabian holds the chair for Business Intelligence and Data Science at the Applied University of Telecommunications Leipzig (HfTL) and is also a senior researcher in Information Systems at Humboldt University of Berlin (HU Berlin). His main research areas include information security, privacy, and data science, with emphasis on design-science methods in the intersection of those fields. Ben has published in several journals for information systems, computer science and operations research including BISE, CACM, Decision Support Systems, EJOR, IEEE Transactions on Industrial Informatics, Information Systems, and also many articles at conferences such as ICIS, ECIS, WI, ACM and IEEE.
Guido Schryen

Guido Schryen

Paderborn University

Guido Schryen holds a chair for Management Information Systems and Operations Research at Paderborn University. In his research, he develops, implements and evaluates quantitative methods and systems for solving hard optimization problems and supporting management decision making. A special focus is on computational research on decision problems using high performance computing. He has published more than 100 research articles in numerous journals and conference proceedings, including EJOR, OR Spectrum, EJIS, BISE, CACM, IEEE Transactions on Information Forensics & Security, ECIS, ICIS, ACM SAC. Guido Schryen has been a visiting researcher at Stanford, ICSI Berkeley, HEC Montréal, UNSW Sydney and QUT Brisbane.
Liste der Associate Editors
  • Rainer Böhme, Universität Innsbruck
  • Erik Buchmann, Hochschule für Telekommunikation Leipzig
  • Tatiana Ermakova, Zentralinstitut für die kassenärztliche Versorgung (Zi)
  • Hannes Federrath, Uni Hamburg
  • Jens Grossklags, TUM
  • Dominik Hermann, Uni Siegen
  • Antonia Köster, Universität Potsdam
  • Sebastian Pape, Goethe Uni Frankfurt/Uni Regensburg
  • Sören Preibusch, Google
  • Rolf Schillinger, Hochschule für Angewandte Wissenschaften Würzburg
  • Ali Sunyaev, KIT
  • Vasilis Ververis, Humboldt-Universität zu Berlin
  • Melanie Volkamer, KIT
  • Helena Wenninger, Lancaster University