Paper submission deadline: April 16, 2023
Notification of acceptance: April 30, 2023
Workshop date: June 13, 2023
Infrastructures are key to the functioning of any contemporary society and organization, but they are also key for the protection of those societies and organizations. While some infrastructures are more critical than others, they all are inherently vulnerable and exposed to cyberattacks. Further, while some of the infrastructures are built for functionality and effectiveness, some of them are built specifically for security.
Information systems has a long history of infrastructure studies (e.g., Star & Ruhleder, 1996). What has largely been missed from these discussions is security. For instance, in a research agenda for infrastructure studies, security is hardly mentioned (Tilson et al., 2010). Are concerns of security and privacy so indifferent for the development and evolution of infrastructures that they deserve to fade in the background? Clearly not. One can hardly understand the development of Internet and its current materialization without reference to security. The once ideological goal of an open space for unbounded sharing of information has become a fragmented space of isolated small islands surrounded by firewalls and intrusion prevention systems to keep the “enemy at the gates” (Whitman, 2003). Further, advancements in security technologies have contributed importantly to the development of new forms of infrastructures such as decentralized marketplaces.
Some infrastructures are built for security. These security infrastructures are socio-technical and material assemblages that seek to protect and control individuals, organizations, and societies, e.g., as materialized in collectives of organizational policies, technological fabric, and normative structures. Thus, they are not merely technological but also social which is crucial as “overly technological accounts of infrastructure fail to highlight the consequences of technology for data privacy and security” (Parmiggiani & Grisot, 2019). These infrastructures are often reifications of standardized “best practices” that prescribe measures as components of the infrastructures they constitute, and that inscribe behaviour within these infrastructures (Hanseth & Monteiro, 1997). The wide adoption of the standardized practices has meant that those who are touched and controlled by the security infrastructures are many. Consequently, their development, implementation, and evolution concern a much broader audience than the rather marginal groups of niche experts responsible for their implementation. Further, the same technologies that afford security infrastructures can also be exploited for malicious purposes, e.g., to sell illegal goods (Spagnoletti et al 2021), to create massive-scale botnets for coordinated and targeted attacks against individuals, organizations, and even some of the most powerful societies. They empower individuals and groups with unprecedented force to cause havoc on a large scale.
Several prominent Norwegian IS scholars have spearheaded discussions and research, especially on information infrastructures (e.g., Hanseth, Monteiro, Aanestad). Given the Norwegian context of this year’s ECIS, we invite scholars to engage with the intersection of information infrastructures and cybersecurity to provide empirical and conceptual accounts that develop fresh ideas, new perspectives, concepts, and theories that can progress our understanding of cybersecurity, privacy, and infrastructures. In addition, we welcome other related studies dealing with more traditional IS security (e.g, security behaviour, policy compliance) and privacy topics.
The topics for the workshop include but are not limited to:
Prospective authors are requested to submit their work directly to the workshop chairs via email to firstname.lastname@example.org. All submissions will be evaluated by the workshop chairs for their topical relevance and quality. Authors attending to the workshop are expected to serve as discussants for other research (more information will follow acceptance).
We invite the following types of submissions:
Workshop registration is handled through ECIS online registration system. Please, see ECIS 2023 website for more information (https://ecis2023.no/). We welcome both authors and others interested in the topic to join the workshop.
This workshop is a paper/idea development workshop. The workshop will include keynotes and roundtable discussions. The discussions will be organized around thematically grouped roundtables. Authors who have submitted their work to the workshop are expected to act as discussants for other participants in the same roundtable. Each paper will get 45min time for discussion.
Keynotes will be announced later.
Should you have any questions related to the workshop, please, contact the chairs (email@example.com).
The workshop will be organized as a full day event on June 13, 2023 in Kristiansand, Norway. Detailed schedule and exact location will be made available prior to the workshop.