The Fourth International Workshop on Organizational Security Aspects (OSA 2012) (OSA 2012)

Venue: Prague

Location: Prague, Czech Republic

Event Date/Time: Aug 20, 2012 End Date/Time: Aug 24, 2012
Paper Submission Date: Mar 30, 2012
Report as Spam


To be held in conjunction with the 7th International Conference on Availability, Reliability and Security (ARES 2012 –

In today's global economy, where conditions change often and rapidly, the efficiency and effectiveness of the execution of business processes has become a central issue. As these processes depend on the assigned resources, a considerable optimization focus lies on the minimization of the resources' costs and simultaneously on the maximization of their returns. Another critical factor, which substantially influences the ability to compete, is the continuous operation of a company's business processes. The reasons why the execution of business processes may be interrupted are manifold and are addressed by several fields of research.
Exercising for instance strong computer security is a company’s crucial task in order to strengthen the resilience of IT systems against arising threats. However, the most sophisticated technical security techniques will fail, if there is no adequate organizational structure covering the appropriate planning, design and implementation of these techniques. Furthermore, processes within the companies have to be set up, lived and monitored to continuously improve the company’s ability to survive while simultaneously maximizing its returns.

The main objectives of this workshop are to bring together users and researchers (from industry and academy) to present their recent work, discuss and identify problems, synergize different views on methods and techniques, and brainstorm future research directions on various aspects of organizational security issues.

opics of interest comprise but are not limited to:

Business Continuity
Cost/Benefit Analysis
Disaster Recovery
Identity Management
Information Assurance
Information Security Management
Insider Threats
IT Governance
IT Service Continuity
Risk Management
Security Awareness
Security Culture
Security Requirements Engineering
Standards, Guidelines, Best Practices and Certification