[AISWorld] 6th Annual ADFSL Conference on Digital Forensics, Security and Law

Glenn Dardick gdardick at dardick.net
Fri Dec 31 11:35:43 EST 2010


ANNOUNCEMENT: Conference on Digital Forensics, Security and Law
================================================================
ADFSL 2011 Conference on Digital Forensics, Security and Law
Venue: Richmond, Virginia USA 
Dates: 25-27 May 2011
Conference Website: http://www.digitalforensics-conference.org 
================================================================

Dear colleagues: 

The ADFSL 2011 Conference on Digital Forensics, Security and Law will be
hosted by Longwood University and held in Richmond, Virginia on 25-27 of
May 2011. 

The conference committee is calling for papers and proposals in, or
related to, the following areas:

CURRICULUM 
1) Digital forensics curriculum 
2) Cyber law curriculum 
3) Information assurance curriculum 
4) Accounting digital forensics curriculum 

TEACHING METHODS 
5) Digital forensics teaching methods 
6) Cyber law teaching methods 
7) Information assurance teaching methods 
8) Accounting digital forensics teaching methods 

CASES 
9) Digital forensics case studies 
10) Cyber law case studies 
11) Information assurance case studies 
12) Accounting digital forensics case studies 

INFORMATION TECHNOLOGY 
13) Digital forensics and information technology 
14) Cyber law and information technology 
15) Information assurance and information technology 
16) Accounting digital forensics information technology 

NETWORKS AND THE INTERNET 
17) Digital forensics and the Internet 
18) Cyber law and the Internet 
19) Information assurance and Internet 
20) Digital forensics accounting and the Internet 

ANTI-FORENSICS AND COUNTER ANTI-FORENSICS 
21) Steganography 
22) Stylometrics and Author Attribution 
23) Anonymity and Proxies 
24) Encryption and Decryption 

INTERNATIONAL ISSUES 
25) International issues in digital forensics 
26) International issues in cyber law 
27) International issues in information assurance 
28) International issues in accounting digital forensics 

THEORY 
29) Theory development in digital forensics 
30) Theory development in information assurance 
31) Methodologies for digital forensic research 
32) Analysis techniques for digital forensic and information assurance
research

DIGITAL RIGHTS MANAGEMENT (DRM)
33) DRM issues in digital forensics
34) DRM issues in information technology
35) DRM issues in information assurance
36) DRM issues in cyber law

PRIVACY ISSUES
37) Privacy issues in digital forensics
38) Privacy issues in information assurance
39) Privacy issues in cyber law
40) Privacy issues in digital rights management

SOFTWARE FORENSICS
41) Software piracy investigation
42) Software quality forensics

OTHER TOPICS
43)Cyber culture and cyber terrorism

Deadlines

The deadline for submissions is midnight EST, 19 February 2011.

Submission Types

Short briefing papers: A technology or a management briefing on an
aspect of digital forensics, information assurance, and/or cyber law.
Such papers will be presented by the author in a round table discussion
format at the conference. These papers need not be extensive. Typical
length is about 1500-2000 words. 

Research papers: A research question or an argument is posed and
subsequently conducted. Empirical work (quantitative or qualitative) is
necessary. Research papers will be presented by the authors in a regular
conference session. These papers should be extensive. Typical length is
about 5000-6000 words. All research papers will be considered for
publication in the Journal of Digital Forensics, Security and Law
(JDFSL). 

Case Studies: Case studies are typically descriptions of a given digital
forensics situation. Names of organizations/actors can be kept anonymous
to maintain confidentiality. Case studies will be presented by the
authors at the conference. Typical length is about 5000-6000 words. All
case studies will be considered for publication in the Journal of
Digital Forensics, Security and Law (JDFSL). 

Panels: Panels and workshop proposals are welcome. Typical length is
about 1000 words long and covers a current technology or a controversial
issue.

Participants

The primary audience will include individuals who are interested in
developing curriculum and teaching methods as well as conducting
research related to the areas of digital forensics, security, and law.
This conference will be of value to both academic and practitioner
audiences. 

Submissions

All submissions are double blind peer reviewed. 

Instructions for authors may be found at the following link:
http://www.digitalforensics-conference.org/authorinstructions.htm

Best Papers

Selected papers from the conference will be considered for inclusion in
the following journal:
Journal of Digital Forensics, Security and Law
Additional Information

ADDITIONAL INFORMATION FOR THE CONFERENCE CAN BE FOUND AT: 
http://www.digitalforensics-conference.org  

REGISTRATION INFORMATION WILL BE POSTED AT: 
http://www.digitalforensics-conference.org/registration.htm  

The Chair of the conference is Dr. Glenn S. Dardick
(gdardick at dardick.net) 

Association for Digital Forensics, Security and Law 
Website: http://www.adfsl.org  

Journal of Digital Forensics, Security and Law 
Website: http://www.jdfsl.org   









More information about the AISWorld mailing list