<html>
<head>
<meta http-equiv="content-type" content="text/html; charset=ISO-8859-1">
</head>
<body text="#000000" bgcolor="#FFFFFF">
<br>
<div class="moz-forward-container"><br>
<meta http-equiv="Content-Type" content="text/html;
charset=ISO-8859-1">
<meta name="Generator" content="Microsoft Word 12 (filtered
medium)">
<style><!--
/* Font Definitions */
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
{font-family:"Arial Unicode MS";
panose-1:2 11 6 4 2 2 2 2 2 4;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
{font-family:Tahoma;
panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
{font-family:"MV Boli";
panose-1:2 0 5 0 3 2 0 9 0 0;}
@font-face
{font-family:"\@Arial Unicode MS";
panose-1:2 11 6 4 2 2 2 2 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin:0in;
margin-bottom:.0001pt;
font-size:12.0pt;
font-family:"Times New Roman","serif";}
h1
{mso-style-priority:9;
mso-style-link:"Heading 1 Char";
margin:0in;
margin-bottom:.0001pt;
text-align:center;
page-break-after:avoid;
font-size:18.0pt;
font-family:"Times New Roman","serif";}
p.MsoHeader, li.MsoHeader, div.MsoHeader
{mso-style-link:"Header Char";
margin:0in;
margin-bottom:.0001pt;
font-size:12.0pt;
font-family:"Times New Roman","serif";}
p.MsoBodyText, li.MsoBodyText, div.MsoBodyText
{mso-style-link:"Body Text Char";
margin:0in;
margin-bottom:.0001pt;
font-size:14.0pt;
font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:blue;
text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
{mso-style-priority:99;
color:purple;
text-decoration:underline;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
{mso-style-priority:99;
mso-style-link:"Balloon Text Char";
margin:0in;
margin-bottom:.0001pt;
font-size:8.0pt;
font-family:"Tahoma","sans-serif";}
span.EmailStyle17
{mso-style-type:personal-compose;
font-family:"Calibri","sans-serif";
color:windowtext;}
span.BalloonTextChar
{mso-style-name:"Balloon Text Char";
mso-style-priority:99;
mso-style-link:"Balloon Text";
font-family:"Tahoma","sans-serif";}
span.Heading1Char
{mso-style-name:"Heading 1 Char";
mso-style-priority:9;
mso-style-link:"Heading 1";
font-family:"Times New Roman","serif";
font-weight:bold;}
span.HeaderChar
{mso-style-name:"Header Char";
mso-style-link:Header;
font-family:"Times New Roman","serif";}
span.BodyTextChar
{mso-style-name:"Body Text Char";
mso-style-link:"Body Text";
font-family:"Times New Roman","serif";}
p.HTMLBody, li.HTMLBody, div.HTMLBody
{mso-style-name:"HTML Body";
margin:0in;
margin-bottom:.0001pt;
text-autospace:none;
font-size:10.0pt;
font-family:"Arial","sans-serif";}
.MsoChpDefault
{mso-style-type:export-only;}
@page WordSection1
{size:8.5in 11.0in;
margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
{page:WordSection1;}
/* List Definitions */
@list l0
{mso-list-id:210464826;
mso-list-type:hybrid;
mso-list-template-ids:1441037864 67698689 67698691 67698693 67698689 67698691 67698693 67698689 67698691 67698693;}
@list l0:level1
{mso-level-number-format:bullet;
mso-level-text:\F0B7;
mso-level-tab-stop:none;
mso-level-number-position:left;
margin-left:53.05pt;
text-indent:-.25in;
font-family:Symbol;}
@list l0:level2
{mso-level-tab-stop:1.0in;
mso-level-number-position:left;
text-indent:-.25in;}
@list l0:level3
{mso-level-tab-stop:1.5in;
mso-level-number-position:left;
text-indent:-.25in;}
@list l0:level4
{mso-level-tab-stop:2.0in;
mso-level-number-position:left;
text-indent:-.25in;}
@list l0:level5
{mso-level-tab-stop:2.5in;
mso-level-number-position:left;
text-indent:-.25in;}
@list l0:level6
{mso-level-tab-stop:3.0in;
mso-level-number-position:left;
text-indent:-.25in;}
@list l0:level7
{mso-level-tab-stop:3.5in;
mso-level-number-position:left;
text-indent:-.25in;}
@list l0:level8
{mso-level-tab-stop:4.0in;
mso-level-number-position:left;
text-indent:-.25in;}
@list l0:level9
{mso-level-tab-stop:4.5in;
mso-level-number-position:left;
text-indent:-.25in;}
@list l1
{mso-list-id:364595333;
mso-list-type:hybrid;
mso-list-template-ids:-1084742576 67698689 67698691 67698693 67698689 67698691 67698693 67698689 67698691 67698693;}
@list l1:level1
{mso-level-number-format:bullet;
mso-level-text:\F0B7;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:Symbol;}
@list l1:level2
{mso-level-tab-stop:1.0in;
mso-level-number-position:left;
text-indent:-.25in;}
@list l1:level3
{mso-level-tab-stop:1.5in;
mso-level-number-position:left;
text-indent:-.25in;}
@list l1:level4
{mso-level-tab-stop:2.0in;
mso-level-number-position:left;
text-indent:-.25in;}
@list l1:level5
{mso-level-tab-stop:2.5in;
mso-level-number-position:left;
text-indent:-.25in;}
@list l1:level6
{mso-level-tab-stop:3.0in;
mso-level-number-position:left;
text-indent:-.25in;}
@list l1:level7
{mso-level-tab-stop:3.5in;
mso-level-number-position:left;
text-indent:-.25in;}
@list l1:level8
{mso-level-tab-stop:4.0in;
mso-level-number-position:left;
text-indent:-.25in;}
@list l1:level9
{mso-level-tab-stop:4.5in;
mso-level-number-position:left;
text-indent:-.25in;}
@list l2
{mso-list-id:760951812;
mso-list-type:hybrid;
mso-list-template-ids:1654807180 67698689 67698691 67698693 67698689 67698691 67698693 67698689 67698691 67698693;}
@list l2:level1
{mso-level-number-format:bullet;
mso-level-text:\F0B7;
mso-level-tab-stop:none;
mso-level-number-position:left;
margin-left:53.05pt;
text-indent:-.25in;
font-family:Symbol;}
@list l2:level2
{mso-level-tab-stop:1.0in;
mso-level-number-position:left;
text-indent:-.25in;}
@list l2:level3
{mso-level-tab-stop:1.5in;
mso-level-number-position:left;
text-indent:-.25in;}
@list l2:level4
{mso-level-tab-stop:2.0in;
mso-level-number-position:left;
text-indent:-.25in;}
@list l2:level5
{mso-level-tab-stop:2.5in;
mso-level-number-position:left;
text-indent:-.25in;}
@list l2:level6
{mso-level-tab-stop:3.0in;
mso-level-number-position:left;
text-indent:-.25in;}
@list l2:level7
{mso-level-tab-stop:3.5in;
mso-level-number-position:left;
text-indent:-.25in;}
@list l2:level8
{mso-level-tab-stop:4.0in;
mso-level-number-position:left;
text-indent:-.25in;}
@list l2:level9
{mso-level-tab-stop:4.5in;
mso-level-number-position:left;
text-indent:-.25in;}
ol
{margin-bottom:0in;}
ul
{margin-bottom:0in;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]-->
<div class="WordSection1">
<p class="HTMLBody" style="text-align:center" align="center"><b><span
style="font-size:11.0pt;font-family:"Calibri","sans-serif"">CALL
FOR CHAPTER PROPOSALS (2nd call)<o:p></o:p></span></b></p>
<p class="HTMLBody" style="text-align:center" align="center"><b><span
style="font-size:11.0pt;font-family:"Calibri","sans-serif"">Proposal
Submission Deadline: July 20</span></b><b><span
style="font-size:11.0pt;font-family:"Calibri","sans-serif"">,
2013<o:p></o:p></span></b></p>
<p class="MsoNormal"
style="text-align:center;text-autospace:none" align="center">
<b><i><span
style="font-size:11.0pt;font-family:"Calibri","sans-serif"">Handbook
of Research on Digital Crime, Cyberspace Security, and
Information Assurance<o:p></o:p></span></i></b></p>
<p class="MsoNormal"
style="text-align:center;text-autospace:none" align="center">
<span
style="font-size:11.0pt;font-family:"Calibri","sans-serif"">A
book edited by Maria Manuela Cruz Cunha (School of
Technology in the Polytechnic Institute of Cavado and Ave,
Portugal)<o:p></o:p></span></p>
<p class="HTMLBody" style="text-align:center" align="center"><span
style="font-size:11.0pt;font-family:"Calibri","sans-serif""><o:p> </o:p></span></p>
<p class="HTMLBody" style="text-align:center" align="center"><span
style="font-size:11.0pt;font-family:"Calibri","sans-serif"">To
be published by IGI Global:
</span><a moz-do-not-send="true"
href="http://www.igi-global.com/publish/call-for-papers/call-details/1010"><span
style="font-size:11.0pt;font-family:"Calibri","sans-serif"">http://www.igi-global.com/publish/call-for-papers/call-details/1010</span></a><span
style="font-size:11.0pt;font-family:"Calibri","sans-serif""><o:p></o:p></span></p>
<p class="HTMLBody" style="text-align:center" align="center"><span
style="font-size:11.0pt;font-family:"Calibri","sans-serif""><o:p> </o:p></span></p>
<p class="HTMLBody" style="text-align:center" align="center"><span
style="font-size:11.0pt;font-family:"Calibri","sans-serif"">For
release in the
<b>Advances in Digital Crime, Forensics, and Cyber Terrorism
(ADCFCT) Book Series
</b></span><a moz-do-not-send="true"
href="http://www.igi-global.com/book-series/advances-digital-crime-forensics-cyber/73676"><span
style="font-size:11.0pt;font-family:"Calibri","sans-serif"">http://www.igi-global.com/book-series/advances-digital-crime-forensics-cyber/73676</span></a><span
style="font-size:11.0pt;font-family:"Calibri","sans-serif""><o:p></o:p></span></p>
<p class="HTMLBody" style="text-align:center" align="center"><span
style="font-size:11.0pt;font-family:"Calibri","sans-serif""><o:p> </o:p></span></p>
<p class="MsoNormal"><b><span
style="font-size:14.0pt;font-family:"Calibri","sans-serif"">Introduction<o:p></o:p></span></b></p>
<p class="MsoNormal" style="text-align:justify"><span
style="font-size:14.0pt;font-family:"Calibri","sans-serif";color:black"><o:p> </o:p></span></p>
<p class="MsoHeader"><span
style="font-size:11.0pt;font-family:"Calibri","sans-serif""
lang="EN-GB">Digital crime is prevailing in all sectors of
activity in our dynamic world and is assuming a threatening
dimension to people, to society, and to organizations. The
combat to this form of crime is increasing awareness towards
fast developments in the area of computer science forensics,
investigation methods, technologies and tools, and appealing
to the global information security and assurance and ICT Law
fields and its applications.<o:p></o:p></span></p>
<p class="MsoNormal"><span
style="font-family:"Calibri","sans-serif""><o:p> </o:p></span></p>
<p class="HTMLBody"><b><span
style="font-size:14.0pt;font-family:"Calibri","sans-serif"">Objective
of the Book<o:p></o:p></span></b></p>
<p class="MsoNormal"><span
style="font-family:"Calibri","sans-serif""><o:p> </o:p></span></p>
<p class="MsoHeader"><span
style="font-size:11.0pt;font-family:"Calibri","sans-serif""
lang="EN-GB">The book intends to collect the most recent
discoveries in cyber-crimes approaches, developments,
practical examples and case studies, together with the
counterpart of cyberspace security developments, personal
and global privacy, information assurance, protection and
ICT law, in all the embraced dimensions.<o:p></o:p></span></p>
<p class="MsoHeader"><span
style="font-size:11.0pt;font-family:"Calibri","sans-serif""
lang="EN-GB"><o:p> </o:p></span></p>
<p class="MsoHeader"><span
style="font-size:11.0pt;font-family:"Calibri","sans-serif""
lang="EN-GB">The overall objectives are:<o:p></o:p></span></p>
<p class="MsoHeader"
style="margin-left:53.05pt;text-indent:-.25in;mso-list:l0
level1 lfo1">
<!--[if !supportLists]--><span
style="font-size:11.0pt;font-family:Symbol" lang="EN-GB"><span
style="mso-list:Ignore">·<span style="font:7.0pt
"Times New Roman"">
</span></span></span><!--[endif]--><span
style="font-size:11.0pt;font-family:"Calibri","sans-serif""
lang="EN-GB">To discuss the impact of this emerging domain
in its wide range of applications;<o:p></o:p></span></p>
<p class="MsoHeader"
style="margin-left:53.05pt;text-indent:-.25in;mso-list:l0
level1 lfo1">
<!--[if !supportLists]--><span
style="font-size:11.0pt;font-family:Symbol" lang="EN-GB"><span
style="mso-list:Ignore">·<span style="font:7.0pt
"Times New Roman"">
</span></span></span><!--[endif]--><span
style="font-size:11.0pt;font-family:"Calibri","sans-serif""
lang="EN-GB">To present and discuss the new technological
developments;<o:p></o:p></span></p>
<p class="MsoHeader"
style="margin-left:53.05pt;text-indent:-.25in;mso-list:l0
level1 lfo1">
<!--[if !supportLists]--><span
style="font-size:11.0pt;font-family:Symbol" lang="EN-GB"><span
style="mso-list:Ignore">·<span style="font:7.0pt
"Times New Roman"">
</span></span></span><!--[endif]--><span
style="font-size:11.0pt;font-family:"Calibri","sans-serif""
lang="EN-GB">To present practical solutions and recent
developments;<o:p></o:p></span></p>
<p class="MsoHeader"
style="margin-left:53.05pt;text-indent:-.25in;mso-list:l0
level1 lfo1">
<!--[if !supportLists]--><span
style="font-size:11.0pt;font-family:Symbol" lang="EN-GB"><span
style="mso-list:Ignore">·<span style="font:7.0pt
"Times New Roman"">
</span></span></span><!--[endif]--><span
style="font-size:11.0pt;font-family:"Calibri","sans-serif""
lang="EN-GB">To introduce the state-of-the-art technologies;<o:p></o:p></span></p>
<p class="MsoHeader"
style="margin-left:53.05pt;text-indent:-.25in;mso-list:l0
level1 lfo1">
<!--[if !supportLists]--><span
style="font-size:11.0pt;font-family:Symbol" lang="EN-GB"><span
style="mso-list:Ignore">·<span style="font:7.0pt
"Times New Roman"">
</span></span></span><!--[endif]--><span
style="font-size:11.0pt;font-family:"Calibri","sans-serif""
lang="EN-GB">To discuss business, social and individual
impact;<o:p></o:p></span></p>
<p class="MsoHeader"
style="margin-left:53.05pt;text-indent:-.25in;mso-list:l0
level1 lfo1">
<!--[if !supportLists]--><span
style="font-size:11.0pt;font-family:Symbol" lang="EN-GB"><span
style="mso-list:Ignore">·<span style="font:7.0pt
"Times New Roman"">
</span></span></span><!--[endif]--><span
style="font-size:11.0pt;font-family:"Calibri","sans-serif""
lang="EN-GB">To provide guidance for further research and
development;<o:p></o:p></span></p>
<p class="MsoHeader"
style="margin-left:53.05pt;text-indent:-.25in;mso-list:l0
level1 lfo1">
<!--[if !supportLists]--><span
style="font-size:11.0pt;font-family:Symbol" lang="EN-GB"><span
style="mso-list:Ignore">·<span style="font:7.0pt
"Times New Roman"">
</span></span></span><!--[endif]--><span
style="font-size:11.0pt;font-family:"Calibri","sans-serif""
lang="EN-GB">To bridge research and practice.<o:p></o:p></span></p>
<p class="MsoNormal"><span
style="font-family:"Calibri","sans-serif""><o:p> </o:p></span></p>
<p class="HTMLBody"><b><span
style="font-size:14.0pt;font-family:"Calibri","sans-serif"">Target
Audience<o:p></o:p></span></b></p>
<p class="HTMLBody"><span
style="font-size:12.0pt;font-family:"Calibri","sans-serif""><o:p> </o:p></span></p>
<p class="MsoHeader"><span
style="font-size:11.0pt;font-family:"Calibri","sans-serif""
lang="EN-GB">The handbook of research is intended to support
a professional audience of investigators, practitioners of
computer forensics, security, and experts in ICT law, and
also to an academic audience (teachers, researchers, and
students, mainly of post-graduate studies).<o:p></o:p></span></p>
<p class="HTMLBody" style="text-align:justify"><span
style="font-size:12.0pt;font-family:"Calibri","sans-serif""><o:p> </o:p></span></p>
<p class="HTMLBody" style="text-align:justify"><b><span
style="font-size:14.0pt;font-family:"Calibri","sans-serif"">Recommended
topics include, but are not limited to, the following:</span></b><i><span
style="font-size:14.0pt;font-family:"Calibri","sans-serif""
lang="EN-GB"><o:p></o:p></span></i></p>
<p class="MsoNormal" style="text-align:justify"><span
style="font-family:"Calibri","sans-serif""><o:p> </o:p></span></p>
<p class="MsoHeader"
style="margin-left:53.05pt;text-indent:-.25in;mso-list:l2
level1 lfo2">
<!--[if !supportLists]--><span
style="font-size:11.0pt;font-family:Symbol" lang="EN-GB"><span
style="mso-list:Ignore">·<span style="font:7.0pt
"Times New Roman"">
</span></span></span><!--[endif]--><span
style="font-size:11.0pt;font-family:"Calibri","sans-serif""
lang="EN-GB">Technologies and approaches in cyber-crimes;<o:p></o:p></span></p>
<p class="MsoHeader"
style="margin-left:53.05pt;text-indent:-.25in;mso-list:l2
level1 lfo2">
<!--[if !supportLists]--><span
style="font-size:11.0pt;font-family:Symbol" lang="EN-GB"><span
style="mso-list:Ignore">·<span style="font:7.0pt
"Times New Roman"">
</span></span></span><!--[endif]--><span
style="font-size:11.0pt;font-family:"Calibri","sans-serif""
lang="EN-GB">Risks and threats (malware, spyware, phishing,
viruses…);<o:p></o:p></span></p>
<p class="MsoHeader"
style="margin-left:53.05pt;text-indent:-.25in;mso-list:l2
level1 lfo2">
<!--[if !supportLists]--><span
style="font-size:11.0pt;font-family:Symbol" lang="EN-GB"><span
style="mso-list:Ignore">·<span style="font:7.0pt
"Times New Roman"">
</span></span></span><!--[endif]--><span
style="font-size:11.0pt;font-family:"Calibri","sans-serif""
lang="EN-GB">Psychological approaches;<o:p></o:p></span></p>
<p class="MsoHeader"
style="margin-left:53.05pt;text-indent:-.25in;mso-list:l2
level1 lfo2">
<!--[if !supportLists]--><span
style="font-size:11.0pt;font-family:Symbol" lang="EN-GB"><span
style="mso-list:Ignore">·<span style="font:7.0pt
"Times New Roman"">
</span></span></span><!--[endif]--><span
style="font-size:11.0pt;font-family:"Calibri","sans-serif""
lang="EN-GB">Multidisciplinary developments in investigation
technologies and cyber security developments;<o:p></o:p></span></p>
<p class="MsoHeader"
style="margin-left:53.05pt;text-indent:-.25in;mso-list:l2
level1 lfo2">
<!--[if !supportLists]--><span
style="font-size:11.0pt;font-family:Symbol" lang="EN-GB"><span
style="mso-list:Ignore">·<span style="font:7.0pt
"Times New Roman"">
</span></span></span><!--[endif]--><span
style="font-size:11.0pt;font-family:"Calibri","sans-serif""
lang="EN-GB">Crime detection, prevention and investigation;
security aspects; combat of abuses;<o:p></o:p></span></p>
<p class="MsoHeader"
style="margin-left:53.05pt;text-indent:-.25in;mso-list:l2
level1 lfo2">
<!--[if !supportLists]--><span
style="font-size:11.0pt;font-family:Symbol" lang="EN-GB"><span
style="mso-list:Ignore">·<span style="font:7.0pt
"Times New Roman"">
</span></span></span><!--[endif]--><span
style="font-size:11.0pt;font-family:"Calibri","sans-serif""
lang="EN-GB">Protection against leakage of
information/knowledge;<o:p></o:p></span></p>
<p class="MsoHeader"
style="margin-left:53.05pt;text-indent:-.25in;mso-list:l2
level1 lfo2">
<!--[if !supportLists]--><span
style="font-size:11.0pt;font-family:Symbol" lang="EN-GB"><span
style="mso-list:Ignore">·<span style="font:7.0pt
"Times New Roman"">
</span></span></span><!--[endif]--><span
style="font-size:11.0pt;font-family:"Calibri","sans-serif""
lang="EN-GB">Surveillance techniques and technology;<o:p></o:p></span></p>
<p class="MsoHeader"
style="margin-left:53.05pt;text-indent:-.25in;mso-list:l2
level1 lfo2">
<!--[if !supportLists]--><span
style="font-size:11.0pt;font-family:Symbol" lang="EN-GB"><span
style="mso-list:Ignore">·<span style="font:7.0pt
"Times New Roman"">
</span></span></span><!--[endif]--><span
style="font-size:11.0pt;font-family:"Calibri","sans-serif""
lang="EN-GB">Legal issues and trends in information security
regulation;<o:p></o:p></span></p>
<p class="MsoHeader"
style="margin-left:53.05pt;text-indent:-.25in;mso-list:l2
level1 lfo2">
<!--[if !supportLists]--><span
style="font-size:11.0pt;font-family:Symbol" lang="EN-GB"><span
style="mso-list:Ignore">·<span style="font:7.0pt
"Times New Roman"">
</span></span></span><!--[endif]--><span
style="font-size:11.0pt;font-family:"Calibri","sans-serif""
lang="EN-GB">Human, social and organizational privacy and
information protection;<o:p></o:p></span></p>
<p class="MsoHeader"
style="margin-left:53.05pt;text-indent:-.25in;mso-list:l2
level1 lfo2">
<!--[if !supportLists]--><span
style="font-size:11.0pt;font-family:Symbol" lang="EN-GB"><span
style="mso-list:Ignore">·<span style="font:7.0pt
"Times New Roman"">
</span></span></span><!--[endif]--><span
style="font-size:11.0pt;font-family:"Calibri","sans-serif""
lang="EN-GB">New threats (social networks);<o:p></o:p></span></p>
<p class="MsoHeader"
style="margin-left:53.05pt;text-indent:-.25in;mso-list:l2
level1 lfo2">
<!--[if !supportLists]--><span
style="font-size:11.0pt;font-family:Symbol" lang="EN-GB"><span
style="mso-list:Ignore">·<span style="font:7.0pt
"Times New Roman"">
</span></span></span><!--[endif]--><span
style="font-size:11.0pt;font-family:"Calibri","sans-serif""
lang="EN-GB">Examples and case studies;<o:p></o:p></span></p>
<p class="MsoHeader"><span
style="font-size:11.0pt;font-family:"Calibri","sans-serif""
lang="EN-GB"><o:p> </o:p></span></p>
<p class="MsoHeader"><span
style="font-size:11.0pt;font-family:"Calibri","sans-serif""
lang="EN-GB">Organized in the following sections:<o:p></o:p></span></p>
<p class="MsoHeader"
style="margin-left:.5in;text-indent:-.25in;mso-list:l1 level1
lfo3">
<!--[if !supportLists]--><span
style="font-size:11.0pt;font-family:Symbol" lang="EN-GB"><span
style="mso-list:Ignore">·<span style="font:7.0pt
"Times New Roman"">
</span></span></span><!--[endif]--><span
style="font-size:11.0pt;font-family:"Calibri","sans-serif""
lang="EN-GB">I Cybercrimes examples, risks and threats<o:p></o:p></span></p>
<p class="MsoHeader"
style="margin-left:.5in;text-indent:-.25in;mso-list:l1 level1
lfo3">
<!--[if !supportLists]--><span
style="font-size:11.0pt;font-family:Symbol" lang="EN-GB"><span
style="mso-list:Ignore">·<span style="font:7.0pt
"Times New Roman"">
</span></span></span><!--[endif]--><span
style="font-size:11.0pt;font-family:"Calibri","sans-serif""
lang="EN-GB">II Cybercrimes technologies and approaches<o:p></o:p></span></p>
<p class="MsoHeader"
style="margin-left:.5in;text-indent:-.25in;mso-list:l1 level1
lfo3">
<!--[if !supportLists]--><span
style="font-size:11.0pt;font-family:Symbol" lang="EN-GB"><span
style="mso-list:Ignore">·<span style="font:7.0pt
"Times New Roman"">
</span></span></span><!--[endif]--><span
style="font-size:11.0pt;font-family:"Calibri","sans-serif""
lang="EN-GB">III Cyber security approaches and developments<o:p></o:p></span></p>
<p class="MsoHeader"
style="margin-left:.5in;text-indent:-.25in;mso-list:l1 level1
lfo3">
<!--[if !supportLists]--><span
style="font-size:11.0pt;font-family:Symbol" lang="EN-GB"><span
style="mso-list:Ignore">·<span style="font:7.0pt
"Times New Roman"">
</span></span></span><!--[endif]--><span
style="font-size:11.0pt;font-family:"Calibri","sans-serif""
lang="EN-GB">IV Legal aspects and ICT law
<o:p></o:p></span></p>
<p class="MsoHeader"
style="margin-left:.5in;text-indent:-.25in;mso-list:l1 level1
lfo3">
<!--[if !supportLists]--><span
style="font-size:11.0pt;font-family:Symbol" lang="EN-GB"><span
style="mso-list:Ignore">·<span style="font:7.0pt
"Times New Roman"">
</span></span></span><!--[endif]--><span
style="font-size:11.0pt;font-family:"Calibri","sans-serif""
lang="EN-GB">V The human aspects<o:p></o:p></span></p>
<p class="MsoHeader"
style="margin-left:.5in;text-indent:-.25in;mso-list:l1 level1
lfo3">
<!--[if !supportLists]--><span
style="font-size:11.0pt;font-family:Symbol" lang="EN-GB"><span
style="mso-list:Ignore">·<span style="font:7.0pt
"Times New Roman"">
</span></span></span><!--[endif]--><span
style="font-size:11.0pt;font-family:"Calibri","sans-serif""
lang="EN-GB">VI Case studies<o:p></o:p></span></p>
<p class="HTMLBody"><span
style="font-size:13.0pt;font-family:"Calibri","sans-serif""><o:p> </o:p></span></p>
<h1 style="text-align:left" align="left"><span
style="font-size:14.0pt;font-family:"Calibri","sans-serif"">Submission
Procedure<o:p></o:p></span></h1>
<p class="MsoNormal"><span
style="font-family:"Calibri","sans-serif""><o:p> </o:p></span></p>
<p class="MsoHeader"><span
style="font-size:11.0pt;font-family:"Calibri","sans-serif""
lang="EN-GB">Researchers and practitioners are invited to
submit on or before
<i><b>July </b></i><b><i>20, 2013</i></b>, a 1-2 page
proposal clearly explaining the mission and concerns of the
proposed chapter. Authors will be notified by
<b><i>August 1, 2013</i></b> about the status of their
proposals. Authors of accepted proposals will be sent
guidelines to prepare the full chapter (7,000 – 10,000 words
length) to be submitted by
<b><i>November 15, 2013</i></b>. All submitted chapters will
be reviewed on a double-blind review basis by two or three
reviewers. Contributors may also be requested to serve as
reviewers for this project.<o:p></o:p></span></p>
<p class="MsoBodyText"><span
style="font-size:12.0pt;font-family:"Calibri","sans-serif""><o:p> </o:p></span></p>
<p class="MsoBodyText"><b><span
style="font-family:"Calibri","sans-serif"">Publisher<o:p></o:p></span></b></p>
<p class="MsoBodyText"><span
style="font-size:11.0pt;font-family:"Calibri","sans-serif""><o:p> </o:p></span></p>
<p class="MsoHeader"><span
style="font-size:11.0pt;font-family:"Calibri","sans-serif""
lang="EN-GB">This book is scheduled to be published by IGI
Global (formerly Idea Group Inc.), publisher of the
“Information Science Reference” (formerly Idea Group
Reference), “Medical Information Science Reference,”
“Business Science Reference,” and “Engineering Science
Reference” imprints. For additional information regarding
the publisher, please visit
</span><a moz-do-not-send="true"
href="http://www.igi-global.com"><span
style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:windowtext;text-decoration:none"
lang="EN-GB">www.igi-global.com</span></a><span
style="font-size:11.0pt;font-family:"Calibri","sans-serif""
lang="EN-GB">. This book is anticipated to be released in
2014.<o:p></o:p></span></p>
<p class="MsoBodyText"><b><span
style="font-family:"Calibri","sans-serif""><o:p> </o:p></span></b></p>
<p class="MsoBodyText"><b><span
style="font-family:"Calibri","sans-serif"">Important
Dates<o:p></o:p></span></b></p>
<p class="MsoBodyText"><b><span
style="font-size:12.0pt;font-family:"Calibri","sans-serif""><o:p> </o:p></span></b></p>
<p class="MsoBodyText"><b><span
style="font-size:11.0pt;font-family:"Calibri","sans-serif"">July20,
2013:
</span></b><span
style="font-size:11.0pt;font-family:"Calibri","sans-serif"">Proposal
Submission Deadline<o:p></o:p></span></p>
<p class="MsoBodyText"><b><span
style="font-size:11.0pt;font-family:"Calibri","sans-serif"">August
1, 2013:
</span></b><span
style="font-size:11.0pt;font-family:"Calibri","sans-serif"">Notification
of Acceptance<b><o:p></o:p></b></span></p>
<p class="MsoBodyText"><b><span
style="font-size:11.0pt;font-family:"Calibri","sans-serif"">November
15, 2013:
</span></b><span
style="font-size:11.0pt;font-family:"Calibri","sans-serif"">Full
Chapter Submission<b><o:p></o:p></b></span></p>
<p class="MsoBodyText"><b><span
style="font-size:11.0pt;font-family:"Calibri","sans-serif"">December
30, 2013:
</span></b><span
style="font-size:11.0pt;font-family:"Calibri","sans-serif"">Review
Results Returned<b><o:p></o:p></b></span></p>
<p class="MsoBodyText"><b><span
style="font-size:11.0pt;font-family:"Calibri","sans-serif"">January
31, 2014:
</span></b><span
style="font-size:11.0pt;font-family:"Calibri","sans-serif"">Final
Chapter Submission<o:p></o:p></span></p>
<p class="MsoBodyText"><b><span
style="font-size:11.0pt;font-family:"Calibri","sans-serif""><o:p> </o:p></span></b></p>
<p class="MsoBodyText" style="text-align:center" align="center"><i><span
style="font-size:12.0pt;font-family:"Calibri","sans-serif""><o:p> </o:p></span></i></p>
<p class="MsoBodyText" style="text-align:center" align="center"><i><span
style="font-size:11.0pt;font-family:"Calibri","sans-serif"">Inquiries
and submissions can be forwarded
<b>electronically</b> to:<o:p></o:p></span></i></p>
<p class="MsoNormal" style="text-align:center" align="center"><span
style="font-size:11.0pt;font-family:"Calibri","sans-serif""
lang="IT">Maria Manuela Cruz Cunha<o:p></o:p></span></p>
<p class="MsoNormal" style="text-align:center" align="center"><span
style="font-size:11.0pt;font-family:"Calibri","sans-serif""
lang="IT">E-Mail: <a class="moz-txt-link-abbreviated" href="mailto:mcunha@ipca.pt">mcunha@ipca.pt</a><o:p></o:p></span></p>
<p class="MsoNormal" style="text-align:center" align="center"><span
style="font-size:11.0pt;font-family:"Calibri","sans-serif""
lang="IT"><o:p> </o:p></span></p>
<p class="MsoNormal"><span
style="font-size:11.0pt;font-family:"Calibri","sans-serif""
lang="IT">For more information on the:<o:p></o:p></span></p>
<p class="MsoNormal"><b><span
style="font-size:11.0pt;font-family:"Calibri","sans-serif"">Advances
in Digital Crime, Forensics, and Cyber Terrorism (ADCFCT)
Book Series<o:p></o:p></span></b></p>
<p class="MsoNormal"><span
style="font-size:11.0pt;font-family:"Calibri","sans-serif"">Please
visit:
</span><a moz-do-not-send="true"
href="http://www.igi-global.com/book-series/advances-digital-crime-forensics-cyber/73676"><span
style="font-size:11.0pt;font-family:"Calibri","sans-serif"">http://www.igi-global.com/book-series/advances-digital-crime-forensics-cyber/73676</span></a><span
style="font-size:11.0pt;font-family:"Calibri","sans-serif""
lang="IT"><o:p></o:p></span></p>
<p class="MsoNormal"
style="text-align:center;text-autospace:none" align="center">
<b><span
style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:red"><o:p> </o:p></span></b></p>
<p class="MsoNormal"><span
style="font-size:11.0pt;font-family:"Calibri","sans-serif""><o:p> </o:p></span></p>
</div>
<br>
</div>
<br>
</body>
</html>