what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Cyberlaws 2012 Call For Papers

Cyberlaws 2012 Call For Papers
Posted Jul 23, 2011
Site iaria.org

CYBERLAWS 2012, the third international conference on technical and legal aspects of the e-society, has announced its call for papers. The conference will take place from January 30th through February 4th, 2012 in Valencia, Spain.

tags | paper, conference
SHA-256 | 591827d9a9fb82094fa01c6598601c7e741224617f553345bc1e67655d54c7cc

Cyberlaws 2012 Call For Papers

Change Mirror Download

INVITATION:

=================
Please consider to contribute to and/or forward to the appropriate
groups the following opportunity to submit and publish original
scientific results to CYBERLAWS 2012.
The submission deadline is set to September 5, 2011.
In addition, authors of selected papers will be invited to submit
extended article versions to one of the IARIA Journals:
http://www.iariajournals.org
=================


============== CYBERLAWS 2012 | Call for Papers ===============

CALL FOR PAPERS, TUTORIALS, PANELS

CYBERLAWS 2012: The Third International Conference on Technical and
Legal Aspects of the e-Society

January 30 - February 4, 2012 - Valencia, Spain


General page: http://www.iaria.org/conferences2012/CYBERLAWS12.html

Call for Papers: http://www.iaria.org/conferences2012/CfPCYBERLAWS12.html

- regular papers
- short papers (work in progress)
- posters
- ideas

Submission page: http://www.iaria.org/conferences2011/SubmitCYBERLAWS12.html

Submission deadline: September 5, 2011

Sponsored by IARIA, www.iaria.org

Extended versions of selected papers will be published in IARIA
Journals: http://www.iariajournals.org

Please note the Poster Forum and Work in Progress options.

The topics suggested by the conference can be discussed in term of
concepts, state of the art, research, standards, implementations,
running experiments, applications, and industrial case studies. Authors
are invited to submit complete unpublished papers, which are not under
review in any other conference or journal in the following, but not
limited to, topic areas.

All tracks are open to both research and industry contributions, in
terms of Regular papers, Posters, Work in progress,
Technical/marketing/business presentations, Demos, Tutorials, and Panels.

Before submission, please check and conform with the Editorial rules:
http://www.iaria.org/editorialrules.html


CYBERLAWS 2012 Topics (topics and submission details: see CfP on the site)


ACCESSIBILITY: Digital Divide, e-Democracy and e-Government

Digital Divide and Accessibility: Loss of autonomy; Access barriers of
age, race, wealth; Problems caused by lack of accessibility; Development
of accessibility standards; Legislation related to accessibility

e-Democracy and e-Government: Open and Free access; Free postings;
Freedom of speech; Freedom of expression on the Internet; Anywhere
access; Legal versus illegal; e-Trust; e-Voting and Internet voting;
e-Garbage collection of private records; e-Transparency; e-Government
and e-Democracy for e-Citizens; e-Environment


PRIVACY: e-Anonymity and e-Identity

Privacy: Human rights; Privacy versus Security versus Convenience (ease
of use); Legitimate purposes; e-Citizen behavior; Right to privacy;
Legitimate purposes; e-Citizen behavior; Search engine behavior and
policies; Regulating search engines;

e-Anonymity and e-Identity: Anonymity; Pseudonimity; Multiple
identities; Multiple locations; Wrong by eliminating accountability;
Anonymity and social identity; Identity change; Multiple identities;
Identity substitution; Securing identity


FRAUD: WEB x.0 Impersonation, e-Harassment, e-Threats, e-Loss

WEB x.0 Impersonation, and e-Harassment and e-Threats: Social malware;
Spam; Bullying; Stalkers; Blogs; Anonymous emails; Hoaxes; e-Rumor email
lists; Newsgroup article; Web pages; Pamphlets; Computer hacking; Spam;
Carding; Botnets; Phishing; Worms; Virii; Network dynamics attacks;
On-line using various data sets; FaceBook; Twitter; YouTube;
@anything.com; Corporate e-Hassle; Individual e-Hassle; Role and
responsibility substitution, Social networking

e-Loss: Personal damage; Economic damage; Promoting the damage by acting
against it; e-Loss evaluation


PROTECTION: e-Fraud Prevention, e-Law, e-Punishment, e-International
relations

e-Fraud Prevention: Technology and cyberlaws; Security enforcement;
Trust referrals; Cryptography; Education; Law enforcement; Re-active and
Pro-active actions; e-Law education

Technical Countermeasures: Detection of abusive traffic; Tools for
interception and repression; Deep packet inspection; Communications
interception; Communications wiretapping and records

e-Law: National laws protecting the anonymity; Responsibility for email
messages; Lobbying for forbidding anonymity on the Internet; Lawfully
regulate anonymity on the Internet; Prevent retaliation; Internet
governance; Formal legislation; Soft laws; e-Trust national regulatory
aspects

e-Punishment: Lawful interception; Propagation traces; Banning; Content
blocking; Long-term exchange records; Security pitfalls of e-democracy;
e-Trust national enforcement laws; e-Trust cross-digital police; Court
warrants; Legal countermeasures

e-International relations: Conflict of laws; Extra-jurisdictional net
(intellectual property, criminal enforcement); Lobbying for forbidding
anonymity on the Internet; Lawfully regulate anonymity on the Internet;
Prevent retaliation; Internet governance; Treaties and Conventions,
e-Trust international regulatory context.

Committee:
http://www.iaria.org/conferences2012/ComCYBERLAWS12.html
====================
Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    0 Files
  • 10
    May 10th
    0 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close