Past papers have been archived and are available for download:
Link to access Papers
|2001||Magaliesberg Conference Centre, South Africa||Papers from ISSA 2001|
|2002||Misty Hills, Muldersdrift, South Africa||Papers from ISSA 2002|
|2003||Sandton Convention Centre in Johannesburg, South Africa||Papers from ISSA 2003|
|2004||Gallagher Estate, Midrand, South Africa||Papers from ISSA 2004|
|2005||Balalaika Hotel, Sandton, South Africa||Papers from ISSA 2005|
|2006||Balalaika Hotel, Sandton, South Africa||Papers from ISSA 2006|
|Sandton, South Africa||Buy proceedings here|
|(ISSA 2007 was held in conjunction with IFIP SEC2007)|
|2008||Balalaika Hotel, Sandton, South Africa||Papers from ISSA 2008|
|2009||School of Tourism & Hospitality,University of Johannesburg, South Africa||Papers from ISSA 2009|
|2010||Sandton Convention Centre, Sandton, South Africa||Papers from ISSA 2010|
|2011||Hayatt Regency Hotel, Rosebank, Johannesburg, South Africa||Papers from ISSA 2011|
|2012||Balalaika Hotel, Sandton, South Africa||Papers from ISSA 2012|
|2013||Radisson Blu Gautrain Hotel, Sandton, South Africa||Papers from ISSA 2013|
|2014||Radisson Blu Gautrain Hotel, Sandton, South Africa||Papers from ISSA 2014|
|2015||54 on Bath, Rosebank, Johannesburg, South Africa||Papers from ISSA 2015|
|2016||54 on Bath, Rosebank, Johannesburg, South Africa||Papers from ISSA 2016|
Invited Speakers Presentations
|2015||Hettie Booysen||Risk Management Myth Black Swan or Value Add|
|2015||Maeson Maherry||Digital Identities on the National ID Card|
|2015||Christian Jensen||Computer Security in 3D|
|2015||Christian Jensen||Trust is the Foundations for Computer Security|
ISSA uses a double blind peer-review process to ensure the quality of submissions before acceptance. Authors initially submit abstracts to determine if the paper meets the goals and fits into the theme of the conference. The ISSA Program Committee assesses each submission for relevance and fit. Authors are then notified whether their abstracts were accepted, and if so, invited to submit a full paper for peer review.
On the due date, authors submit full papers, anonymised by the authors for the double blind review process. Each paper goes through an administrative review to confirm that the paper conforms to the specifications. If a paper does not meet the requirements, the author is asked to resubmit the paper.
A Review Committee (the list shown above) is invited to participate, consisting of both local and international experts in the field of Information Security. A process is followed by the Program Committee to allocate papers to reviewers based on their area of expertise. Reviewers are subject matter experts, of which over 50% are international. Reviewers usually have 5 or 6 categories that they are willing to review against. Each reviewer will establish the number of papers they can review in a specific time period and are allowed to bid on the papers they want to review. An automated process allocated papers to each reviewer according to their preferences.
Each paper is reviewed by a minimum of two reviewers in a double blind review process. Papers are reviewed and rated on a 10 point system with 1 being poor and 10 being excellent as follows:
- Originallity (1-10)
- Significance (1-10)
- Technical quality (1-10)
- Relevance (1-10)
- Presentation (1-10)
- Overall Rating (1-10)
Reviewers' confidence in their own rating is also taken into account by the algorithm that calculates the final score. Reviewers are encouraged to make anonymous suggestions to the author(s) of the paper.
Based on the final score (1-10), a paper with 5 or below points can be recommended for a poster/research-in-progress session and a 9 to 10 point paper can be put in the "best paper" category. An acceptance rate of between 30% and 40% is expected for the conference.
Authors are notified of the outcome of the review process which includes the anonymous suggestions and recommendations of the reviewers. Authors then have to submit the final version of the paper that will then be included in the formal conference proceedings. The proceedings are published electronically in IEEE Explore as well as on a CD with an ISBN number. All proceedings from all previous ISSA conferences are also available here.