<div dir="ltr"><div><span style="font-size:16px;color:rgb(0,0,0);font-family:Aptos"><b>The 24th Annual Security Conference</b></span><br style="font-size:16px;color:rgb(0,0,0);font-family:Aptos"><span style="font-size:16px;color:rgb(0,0,0);font-family:Aptos">Cybersecurity Discourses in the AI-Enabled World.</span><br style="font-size:16px;color:rgb(0,0,0);font-family:Aptos"></div><div><span style="font-size:16px;color:rgb(0,0,0);font-family:Aptos"><br></span></div><span style="font-size:16px;color:rgb(0,0,0);font-family:Aptos">April 29-30, 2025</span><br style="font-size:16px;color:rgb(0,0,0);font-family:Aptos"><span style="font-size:16px;color:rgb(0,0,0);font-family:Aptos">The Tuscany</span><br style="font-size:16px;color:rgb(0,0,0);font-family:Aptos"><span style="font-size:16px;color:rgb(0,0,0);font-family:Aptos">Las Vegas, Nevada, USA</span><br style="font-size:16px;color:rgb(0,0,0);font-family:Aptos"><a href="https://eur02.safelinks.protection.outlook.com/?url=http%3A%2F%2Fwww.security-conference.org%2F&data=05%7C02%7CD.Demetis%40hull.ac.uk%7C293f23308e0a40699c2708dd6b2ce52a%7C490a81977b834f1089b983189be3835e%7C0%7C0%7C638784563163958708%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=7U2wwsR3nDf%2Fo6M8x28bjBdEsYjCcEBT6rLOQ54lkeY%3D&reserved=0" target="_blank" title="https://eur02.safelinks.protection.outlook.com/?url=http%3A%2F%2Fwww.security-conference.org%2F&data=05%7C02%7CD.Demetis%40hull.ac.uk%7C293f23308e0a40699c2708dd6b2ce52a%7C490a81977b834f1089b983189be3835e%7C0%7C0%7C638784563163958708%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=7U2wwsR3nDf%2Fo6M8x28bjBdEsYjCcEBT6rLOQ54lkeY%3D&reserved=0" style="font-size:16px;color:rgb(0,134,240);font-family:Aptos">www.security-conference.org</a><br style="font-size:16px;color:rgb(0,0,0);font-family:Aptos"><br style="font-size:16px;color:rgb(0,0,0);font-family:Aptos"><p style="margin:0px;font-stretch:normal;font-size:15px;line-height:normal;font-family:system-ui;font-size-adjust:none;font-kerning:auto;font-variant-alternates:normal;font-variant-ligatures:normal;font-variant-numeric:normal;font-variant-east-asian:normal;font-feature-settings:normal"><i>Currently accepting submissions for Short Presentations and Extended Abstracts*. </i><br></p><p style="margin:0px;font-stretch:normal;font-size:15px;line-height:normal;font-family:system-ui;font-size-adjust:none;font-kerning:auto;font-variant-alternates:normal;font-variant-ligatures:normal;font-variant-numeric:normal;font-variant-east-asian:normal;font-feature-settings:normal"><span style="color:rgb(0,0,0);font-family:Aptos;font-size:16px">*(as the submission date for full papers has passed, contact one of the Co-Chairs if you are still working towards one)<span class="gmail-Apple-converted-space"> </span></span><i><br></i></p><br style="font-size:16px;color:rgb(0,0,0);font-family:Aptos"><span style="font-size:16px;color:rgb(0,0,0);font-family:Aptos">The nature and scope of the Information Security field have evolved over the past several years. No longer are we just concerned with protecting the technical edifice. Our emphasis has become more holistic, and we tend to consider all aspects of information protection as central to the field of security. The Annual Security Conference provides a forum for discourses in Security, Assurance, and Privacy that will define the moment and provide a useful basis for nurturing further dialogues.</span><br style="font-size:16px;color:rgb(0,0,0);font-family:Aptos"><br style="font-size:16px;color:rgb(0,0,0);font-family:Aptos"><span style="font-size:16px;color:rgb(0,0,0);font-family:Aptos">Contributions in the form of research papers, panel proposals, and case studies are invited. All submissions are peer-reviewed and considered for publication in the Journal of Information System Security (</span><a href="https://eur02.safelinks.protection.outlook.com/?url=http%3A%2F%2Fwww.jissec.org%2F&data=05%7C02%7CD.Demetis%40hull.ac.uk%7C293f23308e0a40699c2708dd6b2ce52a%7C490a81977b834f1089b983189be3835e%7C0%7C0%7C638784563163974242%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=LFKALlGqpm78ytY2UAeRE3F1QJ6kl2B4IApypSSIuOo%3D&reserved=0" target="_blank" title="https://eur02.safelinks.protection.outlook.com/?url=http%3A%2F%2Fwww.jissec.org%2F&data=05%7C02%7CD.Demetis%40hull.ac.uk%7C293f23308e0a40699c2708dd6b2ce52a%7C490a81977b834f1089b983189be3835e%7C0%7C0%7C638784563163974242%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=LFKALlGqpm78ytY2UAeRE3F1QJ6kl2B4IApypSSIuOo%3D&reserved=0" style="font-size:16px;color:rgb(0,134,240);font-family:Aptos">http://www.jissec.org</a><span style="font-size:16px;color:rgb(0,0,0);font-family:Aptos">), European Journal of Management Studies, and Information and Computer Security.</span><br style="font-size:16px;color:rgb(0,0,0);font-family:Aptos"><br style="font-size:16px;color:rgb(0,0,0);font-family:Aptos"><span style="font-size:16px;color:rgb(0,0,0);font-family:Aptos">Further details and submission instructions can be found at:</span><br style="font-size:16px;color:rgb(0,0,0);font-family:Aptos"><a href="https://eur02.safelinks.protection.outlook.com/?url=http%3A%2F%2Fwww.security-conference.org%2F&data=05%7C02%7CD.Demetis%40hull.ac.uk%7C293f23308e0a40699c2708dd6b2ce52a%7C490a81977b834f1089b983189be3835e%7C0%7C0%7C638784563163983399%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=cxK24tPZBHKmHR6xnxg4rd0u3uQUS%2BuHkbn7LbU19uk%3D&reserved=0" target="_blank" title="https://eur02.safelinks.protection.outlook.com/?url=http%3A%2F%2Fwww.security-conference.org%2F&data=05%7C02%7CD.Demetis%40hull.ac.uk%7C293f23308e0a40699c2708dd6b2ce52a%7C490a81977b834f1089b983189be3835e%7C0%7C0%7C638784563163983399%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=cxK24tPZBHKmHR6xnxg4rd0u3uQUS%2BuHkbn7LbU19uk%3D&reserved=0" style="font-size:16px;color:rgb(0,134,240);font-family:Aptos">www.security-conference.org</a><br style="font-size:16px;color:rgb(0,0,0);font-family:Aptos"><br style="font-size:16px;color:rgb(0,0,0);font-family:Aptos"><br style="font-size:16px;color:rgb(0,0,0);font-family:Aptos"><span style="font-size:16px;color:rgb(0,0,0);font-family:Aptos">General Chair</span><br style="font-size:16px;color:rgb(0,0,0);font-family:Aptos"><span style="font-size:16px;color:rgb(0,0,0);font-family:Aptos">   Gurpreet<span class="gmail-Apple-converted-space"> </span></span><span class="gmail-outlook-search-highlight" style="font-size:16px;color:rgb(0,0,0);font-family:Aptos"><span class="gmail-outlook-search-highlight">Dhillon</span></span><span style="font-size:16px;color:rgb(0,0,0);font-family:Aptos">, University of North Texas, USA</span><br style="font-size:16px;color:rgb(0,0,0);font-family:Aptos"><br style="font-size:16px;color:rgb(0,0,0);font-family:Aptos"><span style="font-size:16px;color:rgb(0,0,0);font-family:Aptos">Co-Conference Chairs</span><br style="font-size:16px;color:rgb(0,0,0);font-family:Aptos"><span style="font-size:16px;color:rgb(0,0,0);font-family:Aptos">   Dionysios Demetis, University of Hull, UK</span><br style="font-size:16px;color:rgb(0,0,0);font-family:Aptos"><span style="font-size:16px;color:rgb(0,0,0);font-family:Aptos">   Steve Furnell, University of Nottingham, UK</span><br style="font-size:16px;color:rgb(0,0,0);font-family:Aptos"><br style="font-size:16px;color:rgb(0,0,0);font-family:Aptos"><span style="font-size:16px;color:rgb(0,0,0);font-family:Aptos">Program Chairs</span><br style="font-size:16px;color:rgb(0,0,0);font-family:Aptos"><span style="font-size:16px;color:rgb(0,0,0);font-family:Aptos">   Mark Harris, Augusta University Cyber Institute, USA</span><br style="font-size:16px;color:rgb(0,0,0);font-family:Aptos"><span style="font-size:16px;color:rgb(0,0,0);font-family:Aptos">   Mark Schmidt, St. Cloud State University, USA</span><br style="font-size:16px;color:rgb(0,0,0);font-family:Aptos"><span style="font-size:16px;color:rgb(0,0,0);font-family:Aptos">   Smriti Srivastava, Western Michigan University, USA</span><br style="font-size:16px;color:rgb(0,0,0);font-family:Aptos"><br style="font-size:16px;color:rgb(0,0,0);font-family:Aptos"><span style="font-size:16px;color:rgb(0,0,0);font-family:Aptos">Organizing Chairs</span><br style="font-size:16px;color:rgb(0,0,0);font-family:Aptos"><span style="font-size:16px;color:rgb(0,0,0);font-family:Aptos">   Kane Smith, University of North Texas, USA</span><br style="font-size:16px;color:rgb(0,0,0);font-family:Aptos"><span style="font-size:16px;color:rgb(0,0,0);font-family:Aptos">   Joti Kaur, University of North Texas, USA</span><br></div>