Past Papers

Past papers have been archived and are available for download:

Year

Location

Link to access Papers

2001 Magaliesberg Conference Centre, South Africa Papers from ISSA 2001
2002 Misty Hills, Muldersdrift, South Africa Papers from ISSA 2002
2003 Sandton Convention Centre in Johannesburg, South Africa Papers from ISSA 2003
2004 Gallagher Estate, Midrand, South Africa Papers from ISSA 2004
2005 Balalaika Hotel, Sandton, South Africa Papers from ISSA 2005
2006 Balalaika Hotel, Sandton, South Africa Papers from ISSA 2006

2007

Sandton, South Africa Buy proceedings here
(ISSA 2007 was held in conjunction with IFIP SEC2007)
2008 Balalaika Hotel, Sandton, South Africa Papers from ISSA 2008
2009 School of Tourism & Hospitality,University of Johannesburg, South Africa Papers from ISSA 2009
2010 Sandton Convention Centre, Sandton, South Africa Papers from ISSA 2010
2011 Hayatt Regency Hotel, Rosebank, Johannesburg, South Africa Papers from ISSA 2011
2012 Balalaika Hotel, Sandton, South Africa Papers from ISSA 2012
2013 Radisson Blu Gautrain Hotel, Sandton, South Africa Papers from ISSA 2013
2014 Radisson Blu Gautrain Hotel, Sandton, South Africa Papers from ISSA 2014
2015 54 on Bath, Rosebank, Johannesburg, South Africa Papers from ISSA 2015
2016 54 on Bath, Rosebank, Johannesburg, South Africa Papers from ISSA 2016

 

Invited Speakers Presentations

Year

Speaker

Presentation

2015 Hettie Booysen Risk Management Myth Black Swan or Value Add
2015 Maeson Maherry Digital Identities on the National ID Card
2015 Christian Jensen Computer Security in 3D
2015 Christian Jensen Trust is the Foundations for Computer Security

 

Review Process

ISSA uses a double blind peer-review process to ensure the quality of submissions before acceptance. Authors initially submit abstracts to determine if the paper meets the goals and fits into the theme of the conference. The ISSA Program Committee assesses each submission for relevance and fit. Authors are then notified whether their abstracts were accepted, and if so, invited to submit a full paper for peer review.

 

On the due date, authors submit full papers, anonymised by the authors for the double blind review process. Each paper goes through an administrative review to confirm that the paper conforms to the specifications. If a paper does not meet the requirements, the author is asked to resubmit the paper.

 

A Review Committee (the list shown above) is invited to participate, consisting of both local and international experts in the field of Information Security. A process is followed by the Program Committee to allocate papers to reviewers based on their area of expertise. Reviewers are subject matter experts, of which over 50% are international. Reviewers usually have 5 or 6 categories that they are willing to review against. Each reviewer will establish the number of papers they can review in a specific time period and are allowed to bid on the papers they want to review. An automated process allocated papers to each reviewer according to their preferences.

 

Each paper is reviewed by a minimum of two reviewers in a double blind review process. Papers are reviewed and rated on a 10 point system with 1 being poor and 10 being excellent as follows:

  • Originallity (1-10)
  • Significance (1-10)
  • Technical quality (1-10)
  • Relevance (1-10)
  • Presentation (1-10)
  • Overall Rating (1-10)

 

Reviewers' confidence in their own rating is also taken into account by the algorithm that calculates the final score. Reviewers are encouraged to make anonymous suggestions to the author(s) of the paper.

 

Based on the final score (1-10), a paper with 5 or below points can be recommended for a poster/research-in-progress session and a 9 to 10 point paper can be put in the "best paper" category. An acceptance rate of between 30% and 40% is expected for the conference.

 

Authors are notified of the outcome of the review process which includes the anonymous suggestions and recommendations of the reviewers. Authors then have to submit the final version of the paper that will then be included in the formal conference proceedings. The proceedings are published electronically in IEEE Explore as well as on a CD with an ISBN number. All proceedings from all previous ISSA conferences are also available here.