Print Page   |   Contact Us   |   Report Abuse   |   Sign In   |   Register
Intelligence Studies: Security Operations Workshop
View Registrations Tell a Friend About This EventTell a Friend

4/26/2011 to 4/27/2011
When: 1/20/2011
Where: EKU Perkins Conference Center
Richmond, Kentucky 
United States
« Go to Upcoming Event List  

Bluegrass State Intelligence Studies Consortium
Eastern Kentucky University
Kentucky State University
Morehead State University 

Invites you to submit paper proposals and to attend an  
Intelligence Studies:  Security Operations Workshop  
April 26-27, 2011
EKU Perkins Conference Center, Richmond, Kentucky

  Call for Papers  

We invite interested students, scholars and professionals to submit paper proposals for an Intelligence Studies—Security Operations Workshop.  We welcome paper proposals on topics related to all aspects of Intelligence Studies, but are specifically looking for proposals in the Security Operations discipline.  Security Operations, a new degree program sponsored by the Office of the Director of National Intelligence Special Security Center, is designed to educate future government security managers or private sector security mangers working in a classified government environment.  Security Operations includes topics in Physical/Technical Security, Personnel Security, Information & Cyber Security, Program Security, Counterintelligence, Investigations and Security Management.  Paper proposals on the following Security Operations topics are strongly encouraged: 

Physical and Technical Security – what is the best employment of physical and technical countermeasures for protecting classified material?

Personnel Assessment in Security Clearances
– how can complete and accurate personal information be obtained to support security clearance decisions?

Internet Behavior
– does an individual’s behavior on the Internet (e.g., blog comments, pictures posted, etc.) reflect their behavior in the non-cyber world, and if so how and to what degree?

Social Media and Personnel Security
– how can publicly-available data generated by social media (Facebook, Twitter, blogs, etc.) support individual security clearance decisions while ensuring individual privacy rights?

Personal Behavior and Security Clearances
– what personal behaviors should be considered in approving or denying security clearances?

Educating the Next Generation
– how do we educate the next generation about personal behaviors that could deny them opportunities to work in positions of trust in the public and private sectors?
Information Technology and Security Clearances – how can existing and emerging IT capabilities contribute to processing individual security clearances?

Organizational Behavior and Security
– how do organizational procedures, cultures, atmospheres, etc., affect security practices?

Personnel Security Risk Management
– after a person receives their initial security clearance, what personal attributes or behaviors should be monitored and considered in decisions for continued access to classified material?

Balancing Security Costs
– how does an agency balance spending for security functions in comparison to the costs of not having a good security posture?

Oversight of the Security Industry
– what measures are needed to identify security scams?

Security and the People’s Right to Know
– how should we balance the Constitutional, legal and moral limits on keeping state secrets with the people’s right to know in a democracy?

Security versus Civil Liberties – how should we balance the legal and moral factors in maintaining a good national security posture with civil liberties in a democratic society?

The intent of this workshop is to give students, scholars and professionals opportunities to present papers on topics of general Intelligence Studies interest or specifically on Security Operations.  There will be cash awards for papers presented by undergraduate and graduate students ($500-1st, $300-2nd, $200-3rd).  Students winning cash awards will be expected to present their papers at the workshop. 

 <> Paper proposals are due no later than March 1, 2011, and must contain the following:
 ·         Name of Presenter(s)
 ·         Affiliation(s)/Institutions(s)
 ·         Contact Information (e-mail and phone number)
 ·         Paper Title
 ·         Paper Abstract:  A brief (100-150 words) overview of the paper.
 ·         Students should indicate if they desire to present their paper at the workshop, even if not a cash award winner. 

Persons submitting paper proposals selected for workshop presentation will be notified approximately March 15, 2011.  Students submitting papers for the cash award competition must submit final papers for evaluation no later than April 1, 2011.   Paper proposals and final papers should be submitted by e-mail to

Additional information on the workshop, workshop registration and expanded descriptions of the above Security Operations paper topics is available at the workshop web site at  

Please send all questions to

Sign In