[AISWorld] 8th Annual ADFSL Conference on Digital Forensics, Security and Law

Glenn S. Dardick gdardick at dardick.net
Tue Feb 19 23:10:44 EST 2013


ANNOUNCEMENT: Conference on Digital Forensics, Security and Law


[Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: adfslgraphic.jpg]


Venue: Richmond, Virginia USA

Dates: 10-12 June 2013

Conference Website:
http://www.digitalforensics-conference.org




Dear colleagues:



The ADFSL 2013 Conference on Digital Forensics, Security and Law will be held on June 10-12, 2013. A conference committee will be formed in the next few months and more details will be announced at that time.



The conference committee will be calling for papers and proposals in, or related to, the following areas:



CURRICULUM

1) Digital forensics curriculum

2) Cyber law curriculum

3) Information assurance curriculum

4) Accounting digital forensics curriculum



TEACHING METHODS

5) Digital forensics teaching methods

6) Cyber law teaching methods

7) Information assurance teaching methods

8) Accounting digital forensics teaching methods



CASES

9) Digital forensics case studies

10) Cyber law case studies

11) Information assurance case studies

12) Accounting digital forensics case studies



INFORMATION TECHNOLOGY

13) Digital forensics and information technology

14) Cyber law and information technology

15) Information assurance and information technology

16) Accounting digital forensics information technology



NETWORKS AND THE INTERNET

17) Digital forensics and the Internet

18) Cyber law and the Internet

19) Information assurance and Internet

20) Digital forensics accounting and the Internet



ANTI-FORENSICS AND COUNTER ANTI-FORENSICS

21) Steganography

22) Stylometrics and Author Attribution

23) Anonymity and Proxies

24) Encryption and Decryption



INTERNATIONAL ISSUES

25) International issues in digital forensics

26) International issues in cyber law

27) International issues in information assurance

28) International issues in accounting digital forensics



THEORY

29) Theory development in digital forensics

30) Theory development in information assurance

31) Methodologies for digital forensic research

32) Analysis techniques for digital forensic and information assurance research



PRIVACY ISSUES

33) Privacy issues in digital forensics

34) Privacy issues in information assurance

35) Privacy issues in cyber law

36) Privacy issues in digital rights management



SOFTWARE FORENSICS

37) Software piracy investigation

38) Software quality forensics



NATIONAL SECURITY AND CYBERCRIME

39) Cyber culture and cyber terrorism



Deadlines



The deadline for submissions will be midnight EST, 28 February 2013.



The submission system will be available starting in January.



Submission Types



Short briefing papers: A technology or a management briefing on an aspect of digital forensics, information assurance, and/or cyber law. Such papers will be presented by the author in a round table discussion format at the conference. These papers need not be extensive. Typical length is about 1500-2000 words.



Research papers: A research question or an argument is posed and subsequently conducted. Empirical work (quantitative or qualitative) is necessary. Research papers will be presented by the authors in a regular conference session. These papers should be extensive. Typical length is about 5000-6000 words. All research papers will be considered for publication in the Journal of Digital Forensics, Security and Law (JDFSL).



Case Studies: Case studies are typically descriptions of a given digital forensics situation. Names of organizations/actors can be kept anonymous to maintain confidentiality. Case studies will be presented by the authors at the conference. Typical length is about 5000-6000 words. All case studies will be considered for publication in the Journal of Digital Forensics, Security and Law (JDFSL).



Student Scholar Track: Up to six student papers will be selected for the Paraben Sponsored Student Scholar Track. Of the six papers, one will be selected for the Paraben Student Scholar Award. The primary author must be present at the conference. To participate, the primary author of the paper must be a student. The primary author must email the conference chair and specify that they wish their submitted paper to be considered for the Student Scholar track.



Panels: Panels and workshop proposals are welcome. Typical length is about 1000 words long and covers a current technology or a controversial issue.



Participants



The primary audience will include individuals who are interested in developing curriculum and teaching methods as well as conducting research related to the areas of digital forensics, security, and law. This conference will be of value to both academic and practitioner audiences.



Submissions



All submissions are double blind peer reviewed.



Best Papers



Selected papers from the conference will be considered for inclusion in the following journal:

Journal of Digital Forensics, Security and Law

http://www.jdfsl.org



ADDITIONAL INFORMATION FOR THE CONFERENCE CAN BE FOUND AT:

http://www.digitalforensics-conference.org



REGISTRATION INFORMATION IS POSTED AT:

http://www.digitalforensics-conference.org/registration.htm



Association for Digital Forensics, Security and Law

Website: http://www.adfsl.org



Journal of Digital Forensics, Security and Law

Website: http://www.jdfsl.org











-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20130220/2d2d5a51/attachment.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: image001.jpg
Type: image/jpeg
Size: 2741 bytes
Desc: image001.jpg
URL: <http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20130220/2d2d5a51/attachment.jpg>


More information about the AISWorld mailing list