[AISWorld] SUBMISSION DEADLINE EXTENDED: 7th Annual ADFSL Conference on Digital Forensics, Security and Law

Glenn Dardick gdardick at dardick.net
Tue Jan 31 17:51:57 EST 2012


ANNOUNCEMENT: Conference on Digital Forensics, Security and Law


Description: Description: Description: Description: Description:
Description: Description: Description: Description: Description:
Description: Description: Description: adfslgraphic.jpg

Venue: Richmond, Virginia USA 

Dates: 30-31 May 2012

Conference Website: 
http://www.digitalforensics-conference.org  

Submissions deadline is now 19 February 2012 (midnight EST)

 

Dear colleagues: 

 

The deadline for submissions to the ADFSL 2012 Conference on Digital
Forensics, Security and Law has been extended to 19 February. 

 

The ADFSL 2012 Conference on Digital Forensics, Security and Law will be at
the Hyatt House - Richmond West in Richmond, Virginia on 30-31 of May 2012. 

            

The ADFSL Conference on Digital Forensics, Security and Law is a unique and
innovative event.  It is managed by the Association of Digital Forensics,
Security and Law (ADFSL). The conference focuses on the current and
expanding role of digital forensics within investigations and the courts as
well as its important role within cyber security - both national as well as
corporate. Topics not only include technology and evidence, but also are
very much focused on how to prepare students for careers in digital
forensics. Conference papers are double blind refereed and provide a forum
for high quality research, communication and debate on the subject of
digital forensics and directly related fields. 

 

2012 KEYNOTE SPEAKERS

 

WEDNESDAY KEYNOTE SPEAKER: Mohamed Chawki

 

Topic:  IT and Regime Change

 

Mohamed Chawki holds a (Ph.D.) in law from the University of Lyon III in
France for a dissertation on French; British and American cybercrime legal
systems. He is senior judge at the Council of State, Egypt; former advisor
to the Chairman of the Capital Market Authority (CMA) ; the Chairman of the
Egyptian Financial Supervisory Authority (EFSA) and the Egyptian Minister of
Military Production. Dr. Chawki is also the Founder-Chairman of the
International Association of Cybercrime Prevention (AILCC) in Paris. An
association of international IT experts and legal scholars specializing in
cyber law, privacy and security and the founder and co - director of the
African Center for Cyberlaw, in Kampala (ACCP), founded in collaboration
with the United Nations (UN).

 

Dr. Chawki has extensive knowledge of High Tec criminality, cybercrime,
cyber terrorism and IT, including countermeasures and prevention. As a part
of his research, he carried out an internship at Interpol's Financial and
High Tec Crime Unit. Doctor Chawki is a Fellow of the Royal Society of Arts
in the United Kingdom (FRSA), a member of the International Scientific and
Professional Advisory Council of the United Nations Crime Prevention and
Criminal Justice Program (ISPAC), a member of the European Society of
Criminal Law, and a board member of Computer Crime Research Center (CCRC) in
Ukraine. He teaches law at private and public universities in Egypt and
holds a number of visiting posts abroad. His research interest covers
national security, cybercrime and data protection.

 

He has delivered over 60 conference papers on cybercrime and information
security and organized many national, regional and international conferences
on the same topics

 

THURSDAY KEYNOTE SPEAKER: Nigel Wilson

 

Topic: Digital Experts - Why is Effective Communication So Important to Both
the Admissibility and Persuasiveness of Expert Opinion?

 

Nigel Wilson is a Senior Lecturer at the University of Adelaide Law School
where he is the course co-ordinator of the undergraduate Evidence subject
and the postgraduate Technology, Law and Society and Insurance Law subjects.
Nigel has Law (First Class Honours) and Economics degrees from the
University of Adelaide and a Masters degree from the University of Oxford
and has practised as Barrister for nearly twenty years at Bar Chambers,
Adelaide. Nigel was the Chair of the International Workshop on e-Forensics
Law in 2009 and he is Special Counsel (Legal and Regulatory) to the
Convergent Communications Research Group at the University of Adelaide which
recently co-authored a report for the Australian Government on the privacy,
security and identity management implications of cloud computing.

           

Paraben Student Scholar Track

           

Up to six student papers will be selected for the Paraben Sponsored Student
Scholar Track. Of the six papers, one will be selected for the Paraben
Student Scholar Award. The primary author must be present at the conference.
To participate, the primary author of the paper must be a student. The
primary author must email the conference chair and specify that they wish
their submitted paper to be considered for the Paraben Student Scholar
track. The award will entitle the author to receive free registration fees
at the PFIC Conference.

 

Participants

           

The primary audience will include individuals who are interested in
developing curriculum and teaching methods as well as conducting research
related to the areas of digital forensics, security, and law. This
conference will be of value to both academic and practitioner audiences. 

 

Call-For-Papers and Proposals

 

The conference committee is calling for papers and proposals in, or related
to, the following areas:

 

CURRICULUM 

1) Digital forensics curriculum 

2) Cyber law curriculum 

3) Information assurance curriculum 

4) Accounting digital forensics curriculum 

 

TEACHING METHODS 

5) Digital forensics teaching methods 

6) Cyber law teaching methods 

7) Information assurance teaching methods 

8) Accounting digital forensics teaching methods 

 

CASES 

9) Digital forensics case studies 

10) Cyber law case studies 

11) Information assurance case studies 

12) Accounting digital forensics case studies 

 

INFORMATION TECHNOLOGY 

13) Digital forensics and information technology 

14) Cyber law and information technology 

15) Information assurance and information technology 

16) Accounting digital forensics information technology 

 

NETWORKS AND THE INTERNET 

17) Digital forensics and the Internet 

18) Cyber law and the Internet 

19) Information assurance and Internet 

20) Digital forensics accounting and the Internet 

 

ANTI-FORENSICS AND COUNTER ANTI-FORENSICS 

21) Steganography 

22) Stylometrics and Author Attribution 

23) Anonymity and Proxies 

24) Encryption and Decryption 

 

INTERNATIONAL ISSUES 

25) International issues in digital forensics 

26) International issues in cyber law 

27) International issues in information assurance 

28) International issues in accounting digital forensics 

 

THEORY 

29) Theory development in digital forensics 

30) Theory development in information assurance 

31) Methodologies for digital forensic research 

32) Analysis techniques for digital forensic and information assurance
research

 

DIGITAL RIGHTS MANAGEMENT (DRM)

33) DRM issues in digital forensics

34) DRM issues in information technology

35) DRM issues in information assurance

36) DRM issues in cyber law

 

PRIVACY ISSUES

37) Privacy issues in digital forensics

38) Privacy issues in information assurance

39) Privacy issues in cyber law

40) Privacy issues in digital rights management

 

SOFTWARE FORENSICS

41) Software piracy investigation

42) Software quality forensics

 

OTHER TOPICS

43) Cyber culture and cyber terrorism

 

Deadlines

 

The deadline for submissions is midnight EST, 19 February 2012.

 

Submission Types

 

Short briefing papers / Presentations: A technology or a management briefing
on an aspect of digital forensics, information assurance, and/or cyber law.
Such papers will be presented by the author in a presentation or round table
discussion format at the conference. These papers need not be extensive.
Typical length is about 1500-2000 words. 

 

Research papers: A research question or an argument is posed and
subsequently conducted. Empirical work (quantitative or qualitative) is
necessary. Research papers will be presented by the authors in a regular
conference session. These papers should be extensive. Typical length is
about 5000-6000 words. All research papers will be considered for
publication in the Journal of Digital Forensics, Security and Law (JDFSL). 

 

Case Studies: Case studies are typically descriptions of a given digital
forensics situation. Names of organizations/actors can be kept anonymous to
maintain confidentiality. Case studies will be presented by the authors at
the conference. Typical length is about 5000-6000 words. All case studies
will be considered for publication in the Journal of Digital Forensics,
Security and Law (JDFSL). 

 

Panels: Panels and workshop proposals are welcome. Typical length is about
1000 words long and covers a current technology or a controversial issue.

 

Participants

 

The primary audience will include individuals who are interested in
developing curriculum and teaching methods as well as conducting research
related to the areas of digital forensics, security, and law. This
conference will be of value to both academic and practitioner audiences. 

 

Submissions

 

All submissions are double blind peer reviewed. 

 

Instructions for authors may be found at the following link:

http://www.digitalforensics-conference.org/authorinstructions.htm 

 

            

Best Papers

 

Selected papers from the conference will be considered for inclusion in the
following journal:

Journal of Digital Forensics, Security and Law

http://www.jdfsl.org 

 

ADDITIONAL INFORMATION FOR THE CONFERENCE CAN BE FOUND AT: 

http://www.digitalforensics-conference.org   

 

REGISTRATION INFORMATION IS POSTED AT: 

http://www.digitalforensics-conference.org/registration.htm   

 

Association for Digital Forensics, Security and Law 

Website: http://www.adfsl.org   

 

Journal of Digital Forensics, Security and Law 

Website: http://www.jdfsl.org    

 

 

 

 

 

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20120131/36178c5b/attachment.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: image001.jpg
Type: image/jpeg
Size: 2741 bytes
Desc: not available
URL: <http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20120131/36178c5b/attachment.jpg>


More information about the AISWorld mailing list