You Don't use NetScape or Internet Explorer IMCIC 2016
The 7th International Multi-Conference on
Complexity, Informatics and Cybernetics: IMCIC 2016
March 8 - 11, 2016 ~ Orlando, Florida, USA

International Symposium on Information and Cyber Security:
Info/Cyber-Security 2016

"Cyber security risks pose some of the most serious economic and national security challenges of the 21st century" Barak Obama, quoted by Singer and Friedman, 2014, Cybersecurity and Cyberwar, pp. 2-3.
"When the financial crisis of 2008 hit, many shocked critics asked why markets, regulators, and financial experts failed to see it coming. Today, one might ask the same question about the global economy's vulnerability to cyber-attack. Indeed, the parallels between financial crises and the threat of cyber meltdowns are striking." Kenneth Rogoff, Harvard University professor and former chief economist at the International Monetary Fund. Quoted by Hamid Salim (2014) in "Cyber Safety: A Systems Thinking and Systems Theory Approach to Managing Cyber Security Risks" MIT Master Thesis.

Co-chairs and/or Plenary Keynote Sepakers

Dr. William Simpson

Institute for Defense Analyses, USA
Project Leader

Design and implementation of large scale
distributed web systems with a focus on security.

Mr. Tom Hull

Florida Polytechnic University, USA
Vice President and Chief Information Officer

VP and CIO - Pace University
VP and CIO - Siena College
VP and CIO - Visions FCU
IBM Director and Executive Consultant.

Dr. Robert Cherinka

MITRE Corporation, USA
Senior Principal
Information Systems Engineer
Department Head for
Agile Engineering and Interoperability
Leading a Distributed Team
of IT professionals

Professor T. Grandon Gill

University of South Florida, USA
College of Business
Director of the Doctorate in Business
Editor-in-Chief of Informing Science
Editor of the Journal of IT Education
Founding Editor of Journal of Information Technology Education

Mr. Joseph Prezzama

MITRE Corporation, USA

Lead Communications Engineer
Leads the Program in Support of the Chief
Information Officer (CIO) for the United
States Special Operations Command

Dr. Harvey Hyman

Florida Polytechnic University, USA
College of Innovation & Technology
Big Data Analytics and
Cloud Virtualization

Prof. Michael O. Moorman

Saint Leo University, USA
Director, Culverhouse Computer
Instruction Center

Former Chair of the Computer
Information Systems Dept., and
the Business Administration Dept.

Mr. Joshua Adams

Saint Leo University, USA
School of Business,
Computer and Information Systems

Picture One Studio, USA

Dr. Karol Fabian

Univerzita Mateja Bela
Bansk Bystrica, Slovakia

Dept. of Security Studies
Center of Excellence
for Crisis Management

Professor Tomas Zelinka

Czech Technical University in Prague, Czech Republic
Faculty of Transportation Sciences, Vice-Dean

Among the present research interests:
Smart Cities & villages

Dr. Marwan Omar

Saint Leo University, USA
School of Business
Computer and Information Systems

Expert in Cyber Security
and Security Management

Dr. Van Nguyen

Saint Leo University, USA
School of Business

Center for Cyber Security

Dr. Mario Lamanna

Evoelectronics, Italy, and Selex-SI, USA
Senior Scientist

Program Manager of international cooperative projects
in the fields of Military, Aerospace and Security,
in Pisa, Rome, Europe and USA

Dr. Bryan Reagan

Saint Leo University, USA
School of Business

Dept. of Computer Science and
Information Systems
Center for Cybersecurity

Call for Reviewers

If you would like to participate supporting this event as a reviewer, please fill the form at providing us with the maximum number of articles you can review. Selection of reviewers will be done at random from the reviewers who indicated the area(s)/topic(s) in which they can make the respective review. If a reviewer receives an email asking him/her review an article not related to his/her expertise then he/she may decline to make the respective review, in less than 30 second, via the reviewing support system and the password they would be provided with. The names of the reviewers who reviewed at least one article will be included in the list of reviewers which will be published as part of the respective proceedings.

Call for Papers

You can submit your article to any of the following events in which context ICS 2016 is being organized. Best papers of both events will be published as special issue (s) of the Journal of Systemics, Cybernetics, and Informatics (JSCI) entitled “Information and Cyber Security”. Submissions for Face-to-Face or for Virtual Participation are both accepted (see below and the conference web site for more details regarding this issue).

  • The 7th International Multi-Conference on Complexity, Informatics and Cybernetics: IMCIC 2016, to be held on March 8 - 11, 2016 at Orlando, Florida, USA. Submissions to this event can be made by clicking the ”Authors” tab at the top of this page. These submissions may be abstract, extended abstract or draft papers, but in each case different kind of information might be required according to our two-tier reviewing methodology. A short description of this methodology can be found here.

  • The 20th World Multi-Conference on Systemics, Cybernetics and Informatics: WMSCI 2016, to be held on July 5 - 8, 2016 at Orlando, Florida, USA. Call for Papers The submissions web page will be shown in this call for papers by the end of October 2016.

Motives and Purposes

As it is widely known Cybercrime has had a large impact in our society including individuals as well as business and governmental organizations. Simultaneously, an exponentially increasing number of businesses and government sectors are increasingly becoming information-centric and reliant on communication technologies and networking in the context of the cyber-space. Consequently, there is an increasing concern regarding information security vulnerabilities and cyber security resilience, especially with respect to cyber-espionage, cyber-attacks and cyber-wars, cyber-crimes, etc.

Complex security systems are (or should be) embedded within enterprise architectures and organizational systems, which, in turn are also complex systems. These internal and external complexities require multi-disciplinary teams with skills for inter-disciplinary communication in order address the emerging problems in information and cyber security. Since multi-disciplinary forums oriented to inter-disciplinary communication are a main purpose of the events organized by the International Institute of Informatics and Systemics (IIIS,, then an International Symposium on Information and Cyber Security: Info/Cyber-Security will be organized in the context of IIIS conferences.

On the other hand, Information and Cyber Security systems are both cause and effect of integrative processes of 1) academic activities (research, education, and real life problem solving) and 2) the academic with the private and public sectors. To contribute with these two kinds of integrations is also a main purpose of the IIIS and an important reason for the conferences organized by this institute.

Consequently, the purpose of the Info/Cyber-Security 2016 is to bring together researchers and professionals, from the academic, private and governmental sectors, to present and discuss advances, problems, solutions, reflections, and potential innovations in the areas of information and cyber security; from research, educational, commercial and governmental perspectives.

Some authors conceive Information Security as part of Cyber Security and others perceive Cyber Security as being part of Information Security. It depends on the meaning associated to each of the term. We prefer to consider that both areas intersect each other because we prefer to assign a more comprehensive meaning to each of the two phrases.


General Approaches and Methodologies

  • Systems Approach, thinking and methodologies to managing the cyber-security risks
  • Case studies or reports
  • Case studies as research and educational methodologies
  • Systems security and security systems
  • Information and computer security: concepts, techniques, procedures and methodologies.
  • Cyber Security Technologies and methodologies
  • Network Communications Security
  • Cyber security strategies and related Regulations
  • Information forensics
  • Cryptography
Organizational Security: Business and Government
  • Security for critical infrastructures
  • Cyber-Espionage
  • Cyber-Wars
  • Cyber-Attack
  • Cyber-Crime
  • Anti-cyber terrorism
  • Computer Crime Prevention and Detection
  • Web, e-commerce, m-commerce, and e-mail security
  • Mobile security
  • Computer and network forensic
  • Intrusion detection and prevention
  • Digital Forensics
  • Cyber Security Education
  • Industrial Espionage and Theft of Information
  • Legal informatics
  • Information security culture
  • Enhancing risk perception
  • Public understanding of security
  • Impacts of standards, policies, compliance requirements
  • Organizational governance for information assurance
  • Risk Management and Risk Mitigation Strategies
  • Insider Threat
Individual Security, Privacy and Human Aspects
  • Human aspects of information security and assurance
  • Management of information and cyber security risks
  • Cyber-Anxiety
  • Security and privacy in social networks
  • Social, economic and policy issues of trust, security and privacy
  • Security and privacy for big data
  • Security and privacy in the Internet of Things
  • Security and privacy in cloud computing and federated cloud
  • Anonymization and privacy in communication systems
  • Privacy in e-health systems
  • Confidentiality Protection
  • Information Content Security
  • Information Ethics
  • Awareness and education methods
  • Psychological models of security
  • User acceptance of security policies and technologies
  • User-friendly authentication methods
  • Social engineering and other human-related risks
  • Privacy attitudes and practices
  • Mobile privacy and security technologies
Specific Areas, Cases, and Technologies
  • Secured software
  • Security in mobile networks, computing and technologies
  • Intelligent Access Control Models
  • Adversarial Modeling
  • Automated Vulnerability Assessment/ Penetration Testing
  • Cloud Computing, Social Media Security, and Privacy
  • Game-theoretic approaches to Security and Privacy
  • Malware (Virus, Worms, Trojans, Backdoors)
  • Multi-party/Multi-agent Access Control
  • Resilience and Robustness
  • Biometric technologies and impacts
  • Visualization for cyber security

A Special Track is being organized the department of Computer and Information Systems of the School of Business of Saint Leo University (Florida, USA). This track will have session on “Industry and Academic Case Studies,” “Cloud and Mobile Security,” and Cyber Security and emerging areas.” Its deadlines are different to the main symposium and the reviewing process will be handled by reviewers selected by the organizers of the track. This reviewing methodology may be different to the one used for the regular sessions of the Symposia. To submit your article to this special track use the link and to submit your article directly to the symposium and conference organizers go to the tab “authors” of this web page and then you choose one of the three option which most fit you discipline, practice, and research/professional/managerial interest.

Workshop: Developing and Using Cybersecurity Discussion Case Studies
NSF-SaTC Funded Workshop

Intended Participants: Conference participants, specifically 1) faculty and doctoral students interested in using the case method, developing discussion and research cases, and employing cybersecurity discussion cases in the classroom and online and 2) executives and managers who have an interest in participating in case development or in using case discussions in cybersecurity training.

The Case Method: The case method is an interactive teaching method that involves using a detailed description of a real world decision situation to stimulate an in-depth classroom discussion, typically lasting 75 to 90 minutes. The principal pedagogical objective of the approach, which was originally developed and refined at Harvard Business School, is to help students improve their judgment under conditions of considerable uncertainty and ambiguity. As such, the case studies developed to support these discussions rarely have a “right” answer and the actual outcome associated with a particular decision tends to be less important than the process through which the decision was reached.

Workshop Objectives: The workshop is intended to provide participants with an introductory look at the case method, with a particular emphasis on its application to cybersecurity situations. Topics to be covered will include:

  • Types of case studies and their application: The term “case study” means many things to different people. A framework for understanding the various types of case studies and their appropriate uses will be introduced.
  • Facilitating case discussions: Using cases as an instructional medium. Participants will be given the opportunity to engage in a discussion of an abbreviated case.
  • Developing discussion cases: The steps in the process of developing a discussion case will be examined, both from the case writer’s and organization’s perspective.
  • Publishing discussion cases: Outlets for publication of peer-reviewed discussion cases will be examined, as well as other outlets through which cases can be distributed. The existing collection of cybersecurity cases will be reviewed.

Acknowledgement: The materials developed for the workshop are being funded as part of a 2-year project that was funded by the Secure and Trustworthy Computing (SaTC) program of the U.S. National Science Foundation (NSF Award #1418711, “EDU: Developing Open Authentic Case Studies for a MS in Cybersecurity Capstone Course”) specifically intended to develop case studies for use in a cybersecurity curriculum. Any opinions, findings, and conclusions or recommendations expressed in this material provided or presented in the workshop are those of the facilitator(s) and do not necessarily reflect the views of the National Science Foundation.

About the Lead Facilitator: Grandon Gill holds an AB (cum laude) from Harvard College and an MBA (high distinction) and DBA from Harvard Business School. He teaches introductory and intermediate courses in programming for undergraduates and also teaches case method capstone courses in the MIS undergraduate, MS-MIS and Executive MBA programs. He has also taught a variety of IT courses during his tenure at USF, from computer systems concepts to doctoral case methods. He received USF’s Excellence in Undergraduate Teaching Award in 2007 and 2013.

Gill has published or edited more than 40 case studies, most recently for the Journal of IT Education: Discussion Cases. His recent book, Informing with the Case Method, has been the basis of workshops in the U.S. and around the globe. Thus far in 2013, venues have included the NSF TUES PI Conference in Washington D.C., RMIT: Vietnam in Ho Chi Minh City, the United Nations Staff College in Turin, Italy, and at the 3rd International Symposium on Integrating Research, Education, and Problem Solving (Special Track on Case Methodologies), Orlando Florida.

Gill is passionate about using technology as a teaching tool and has studied distance learning, strategy, and practice, alternative course designs, and tools for course development and delivery, all under the general heading of informing science. His research in this area has been published in many journals, including Informing Science, Decision Sciences Journal of Innovative Education, the Journal of Information Systems Education, eLearn, and the Journal of IT Education. He has also published multiple times in MIS Quarterly, the MIS discipline’s leading journal—his most recent article considering the MIS fields from an informing science perspective. His academic service includes stints on the editorial boards of six journals. He is currently Editor-in-Chief of Informing Science: the International Journal of the Emerging Transdiscipline and the Journal of IT Education: Discussion Cases. He serves as a Governor and Fellow of the Informing Science Institute.

Virtual Sessions

Face-to-face sessions of all events will have associated virtual pre- and post-conference sessions where registered participants can comment each paper in a forum associated to it. Registered participant at any event will have a password to access any virtual session of any collocated event.

Organizational, Reviewing, and Selection of Best Papers Policies

Technical Keynote Speakers

Technical keynote speakers will be selected from early submissions because this selection requires an additional evaluation according to the quality of the paper, assessed by its reviewers, the authors' CV and the paper's topic.

Authors of accepted papers who registered in the conference can have access to the evaluations and possible feedback provided by the reviewers who recommended the acceptance of their papers/abstracts, so they can accordingly improve the final version of their papers. Non-registered authors will not have access to the reviews of their respective submissions.

Virtual Participation

Submissions for Face-to-Face or for Virtual Participation are both accepted. Both kinds of submissions will have the same reviewing process and the accepted papers will be included in the same proceedings.

Pre-Conference and Post-conference Virtual sessions (via electronic forums) will be held for each session included in the conference program, so that sessions papers can be read before the conference, and authors presenting at the same session can interact during one week before and after the conference. Authors can also participate in peer-to-peer reviewing in virtual sessions.

Best Papers

Authors of the best 20%-25% of the papers presented at the conference (included those virtually presented) will be invited to adapt their papers for their publication in the Journal of Systemics, Cybernetics and Informatics.

One best paper of each session included in the program will be selected by the respective sessions co-chairs after consulting with the sessions audience. If there is a tie in a given session, the paper that will be selected as the best sessions paper will be the one which have had the highest quantitative evaluations average according to its double-blind and non-blind reviews.

The selection process of the best 20%-25% to be also published in the Journal, will be based on the sessions best papers and the quantitative evaluation average made by its anonymous and non-anonymous reviewers.

   Special Tracks

Contact Us  
2006-2016 International Institute of Informatics and Systemics. All rights reserved. 

About the Conference  |  Hotel Information  |  Ways of Participation  |  Submission Format  |  Program Committee  |  Organizing Committee  |  Major Themes/Areas  |  Participation Form  |  Papers/Abstracts Submission  |  How to Organize an Invited Session  |  Invited Sessions Organizers