[AISWorld] 6th Annual ADFSL Conference on Digital Forensics, Security and Law
Glenn Dardick
gdardick at dardick.net
Thu Jan 27 07:44:42 EST 2011
ANNOUNCEMENT: Conference on Digital Forensics, Security and Law
================================================================
ADFSL 2011 Conference on Digital Forensics, Security and Law
Venue: Richmond, Virginia USA
Dates: 25-27 May 2011
Conference Website: http://www.digitalforensics-conference.org
Submission Deadline: February 19
Early Registration Fee Deadline: January 31
================================================================
Dear colleagues:
The ADFSL 2011 Conference on Digital Forensics, Security and Law will be
hosted by Longwood University and held in Richmond, Virginia on 25-27 of
May 2011.
Opening Remarks
This year's opening remarks will be delivered by Longwood University's
new president, Brigadier General Patrick Finnegan. Brigadier General
Finnegan was previously at West Point having been confirmed by the
United States Senate as its 12th Dean of the Academic Board. Brigadier
General Finnegan was selected as Longwood University's 25th president in
March 2010 and assumed his duties in that position on July 1, 2010.
Brigadier General Finnegan was born in Fukuoka, Japan, on September
20th, 1949, and was appointed to the United States Military Academy in
1967. As a cadet, he was the Chairman of the Honor Committee and Head
Manager of the Army Football Team. After graduating from West Point and
being commissioned a second lieutenant in 1971, he attended the Kennedy
School of Government at Harvard University and earned a Master of Public
Administration degree in 1973.
Keynote Speaker
This year our Keynote Speaker will be Brian Snow. Brian Snow was
previously with the NSA is now a Security Consultant and Ethics Advisor.
Brian's years at NSA were the model for what it means to be a senior
Technical Director at NSA (similar to a Chief Scientist or Senior
Technical Fellow in industry); he served in that capacity in three major
mission components: The Research Directorate (1994-1995), The
Information Assurance Directorate (1996-2002), and The Directorate for
Education and Training - NSA's Corporate University (2003-2006). He was
the first Technical Director appointed at the "Key Component" level at
NSA, and the only "techie" at NSA to serve in such a role across three
different Directorates.
Call-For-Papers and Proposals
The conference committee is calling for papers and proposals in, or
related to, the following areas:
CURRICULUM
1) Digital forensics curriculum
2) Cyber law curriculum
3) Information assurance curriculum
4) Accounting digital forensics curriculum
TEACHING METHODS
5) Digital forensics teaching methods
6) Cyber law teaching methods
7) Information assurance teaching methods
8) Accounting digital forensics teaching methods
CASES
9) Digital forensics case studies
10) Cyber law case studies
11) Information assurance case studies
12) Accounting digital forensics case studies
INFORMATION TECHNOLOGY
13) Digital forensics and information technology
14) Cyber law and information technology
15) Information assurance and information technology
16) Accounting digital forensics information technology
NETWORKS AND THE INTERNET
17) Digital forensics and the Internet
18) Cyber law and the Internet
19) Information assurance and Internet
20) Digital forensics accounting and the Internet
ANTI-FORENSICS AND COUNTER ANTI-FORENSICS
21) Steganography
22) Stylometrics and Author Attribution
23) Anonymity and Proxies
24) Encryption and Decryption
INTERNATIONAL ISSUES
25) International issues in digital forensics
26) International issues in cyber law
27) International issues in information assurance
28) International issues in accounting digital forensics
THEORY
29) Theory development in digital forensics
30) Theory development in information assurance
31) Methodologies for digital forensic research
32) Analysis techniques for digital forensic and information assurance
research
DIGITAL RIGHTS MANAGEMENT (DRM)
33) DRM issues in digital forensics
34) DRM issues in information technology
35) DRM issues in information assurance
36) DRM issues in cyber law
PRIVACY ISSUES
37) Privacy issues in digital forensics
38) Privacy issues in information assurance
39) Privacy issues in cyber law
40) Privacy issues in digital rights management
SOFTWARE FORENSICS
41) Software piracy investigation
42) Software quality forensics
OTHER TOPICS
43)Cyber culture and cyber terrorism
Deadlines
The deadline for submissions is midnight EST, 19 February 2011.
Submission Types
Short briefing papers: A technology or a management briefing on an
aspect of digital forensics, information assurance, and/or cyber law.
Such papers will be presented by the author in a round table discussion
format at the conference. These papers need not be extensive. Typical
length is about 1500-2000 words.
Research papers: A research question or an argument is posed and
subsequently conducted. Empirical work (quantitative or qualitative) is
necessary. Research papers will be presented by the authors in a regular
conference session. These papers should be extensive. Typical length is
about 5000-6000 words. All research papers will be considered for
publication in the Journal of Digital Forensics, Security and Law
(JDFSL).
Case Studies: Case studies are typically descriptions of a given digital
forensics situation. Names of organizations/actors can be kept anonymous
to maintain confidentiality. Case studies will be presented by the
authors at the conference. Typical length is about 5000-6000 words. All
case studies will be considered for publication in the Journal of
Digital Forensics, Security and Law (JDFSL).
Panels: Panels and workshop proposals are welcome. Typical length is
about 1000 words long and covers a current technology or a controversial
issue.
Participants
The primary audience will include individuals who are interested in
developing curriculum and teaching methods as well as conducting
research related to the areas of digital forensics, security, and law.
This conference will be of value to both academic and practitioner
audiences.
Submissions
All submissions are double blind peer reviewed.
Instructions for authors may be found at the following link:
http://www.digitalforensics-conference.org/authorinstructions.htm
Best Papers
Selected papers from the conference will be considered for inclusion in
the following journal:
Journal of Digital Forensics, Security and Law
http://www.jdfsl.org
ADDITIONAL INFORMATION FOR THE CONFERENCE CAN BE FOUND AT:
http://www.digitalforensics-conference.org
REGISTRATION INFORMATION WILL BE POSTED AT:
http://www.digitalforensics-conference.org/registration.htm
The Chair of the conference is Dr. Glenn S. Dardick
(gdardick at dardick.net)
Association for Digital Forensics, Security and Law
Website: http://www.adfsl.org
Journal of Digital Forensics, Security and Law
Website: http://www.jdfsl.org
More information about the AISWorld
mailing list