Betreff: | [AISWorld] Digital Forensics, Security and Law - The 10th Annual ADFSL Conference |
---|---|
Datum: | Fri, 14 Nov 2014 04:42:19 +0000 |
Von: | Glenn S. Dardick <gdardick@dardick.net> |
Antwort an: | Glenn S. Dardick <gdardick@dardick.net> |
An: | aisworld@lists.aisnet.org <aisworld@lists.aisnet.org> |
|
|||
|
10th
ADFSL Conference on Digital Forensics, Security
and Law |
|
|
|
Venue:
Daytona Beach, Florida USA
Dates:
19-21 May 2015 Conference
Website:
|
||
|
|||
|
|||
Dear
colleagues:
The
ADFSL 2015 Conference on Digital Forensics, Security and Law
will be held on May 19-21, 2015. The venue for the
conference will be on the campus of Embry-Riddle
Aeronautical University in Daytona Beach, Florida.
The
ADFSL Conference on Digital Forensics, Security and Law is a
unique and innovative event. It is managed by the
Association of Digital Forensics, Security and Law (ADFSL).
The conference focuses on the current and expanding role of
digital forensics within investigations and the courts as
well as its important role within cyber security - both
national as well as corporate. Topics not only include
technology and evidence, but also are very much focused on
how to prepare students for careers in digital forensics.
Conference papers are double blind refereed and provide a
forum for high quality research, communication and debate on
the subject of digital forensics and directly related
fields.
The
conference is of particular interest to individuals who are
interested in developing curriculum and teaching methods as
well as conducting research related to the areas of digital
forensics, security, and law. This conference will be of
value to both academic and practitioner audiences.
Deadlines
The
deadline for submissions is 11:59 p.m. EST, 16 November
2014.
Notifications
will be sent by 11:59 p.m. EST, 16 December 2014.
The
camera ready deadline for accepted submissions is 11:59 p.m.
EST, 16 April 2015
Submission
Types
Research
papers:
A research question or an argument is posed and subsequently
conducted. Empirical work (quantitative or qualitative) is
necessary. Research papers will be presented by the authors
in a regular conference session. These papers should be
extensive. Typical length is about 5000-6000 words. All
research papers will be considered for publication in the
Journal of Digital Forensics, Security and Law (JDFSL).
Short
briefing papers:
A technology or a management briefing on an aspect of
digital forensics, information security, and/or cyber law.
Such papers will be presented by the author in a round table
discussion format at the conference. These papers need not
be extensive. Typical length is about 1500-2000 words.
Case
Studies:
Case studies are typically descriptions of a given digital
forensics situation. Names of organizations/actors can be
kept anonymous to maintain confidentiality. Case studies
will be presented by the authors at the conference. Typical
length is about 5000-6000 words. All case studies will be
considered for publication in the Journal of Digital
Forensics, Security and Law (JDFSL).
Student
Scholar Track:
Up to six student papers will be selected for the Student
Scholar Track. Of the six papers, one will be selected for
the Student Scholar Award. The primary author must be
present at the conference. To participate, the primary
author of the paper must be a student. The primary author
must email the conference chair and specify that they wish
their submitted paper to be considered for the Student
Scholar track.
Panels:
Panels and workshop proposals are welcome. Typical length is
about 1000 words long and covers a current technology or a
controversial issue.
Participants
The
primary audience will include individuals who are interested
in developing curriculum and teaching methods as well as
conducting research related to the areas of digital
forensics, security, and law. This conference will be of
value to both academic and practitioner audiences.
Submissions
All
research papers and case studies are double blind peer
reviewed.
Instructions
for authors may be found at the following link:
http://www.digitalforensics-conference.org/authorinstructions.htm
Best
Papers
Selected
papers from the conference will be considered for inclusion
in the following journal:
Journal of Digital Forensics, Security and Law
Suggested
Topics
The
conference committee is calling for papers and proposals in,
or related to, the following areas:
CURRICULUM
1)
Digital forensics curriculum
2)
Cyber law curriculum
3)
Information security curriculum
4)
Accounting digital forensics curriculum
TEACHING
METHODS
5)
Digital forensics teaching methods
6)
Cyber law teaching methods
7)
Information security teaching methods
8)
Accounting digital forensics teaching methods
CASES
9)
Digital forensics case studies
10)
Cyber law case studies
11)
Information security case studies
12)
Accounting digital forensics case studies
INFORMATION
TECHNOLOGY
13)
Digital forensics and information technology
14)
Cyber law and information technology
15)
Information security and information technology
16)
Accounting digital forensics information technology
NETWORKS
AND THE INTERNET
17)
Digital forensics and the Internet
18)
Cyber law and the Internet
19)
Information security and Internet
20)
Digital forensics accounting and the Internet
ANTI-FORENSICS
AND COUNTER ANTI-FORENSICS
21)
Steganography
22)
Stylometrics and author attribution
23)
Anonymity and proxies
24)
Encryption and decryption
INTERNATIONAL
ISSUES
25)
International issues in digital forensics
26)
International issues in cyber law
27)
International issues in information security
28)
International issues in accounting digital forensics
THEORY
29)
Theory development in digital forensics
30)
Theory development in information security
31)
Methodologies for digital forensic research
32)
Analysis techniques for digital forensic and information
security research
PRIVACY
ISSUES
33)
Privacy issues in digital forensics
34)
Privacy issues in information security
35)
Privacy issues in cyber law
SOFTWARE
FORENSICS
36)
Software piracy investigation
37)
Software quality forensics
NATIONAL
SECURITY AND CYBERCRIME
38)
Cyber culture and cyber terrorism
Additional
Information
ADDITIONAL
INFORMATION FOR THE CONFERENCE CAN BE FOUND AT:
http://www.digitalforensics-conference.org
REGISTRATION
INFORMATION IS POSTED AT:
http://www.digitalforensics-conference.org/registration.htm
The
Chair of the conference is Dr. Glenn S. Dardick
Association
for Digital Forensics, Security and Law
Website:
http://www.adfsl.org
Journal
of Digital Forensics, Security and Law
Website:
http://www.jdfsl.org
"Verum Vacuus
Proclivitas"
Glenn
S. Dardick, Ph.D., CCE (ISFCE), CCFP (ISC2)
804-402-9239
gdardick@dardick.net
gdardick (Skype)
Director
Association for Digital Forensics, Security and Law
Publisher of the
Journal of Digital Forensics, Security and Law
Adjunct
Associate Professor
ECU
Security Research Institute, Edith Cowan University,
Australia
International
Society of Forensic Computer Examiners
Infragard,
Richmond, Virginia
LexConverge,
University of Malta
Fellow,
African Center for Cyberlaw and Cybercrime Prevention
(ACCP), Kampala Uganda
Shipping/Postal
Address:
Glenn S. Dardick / ADFSL
1642 Horsepen Hills Road
Maidens, Virginia 23102
This
electronic message is intended only for the use of the
individual or company named above. If the intended recipient
is a client, the information contained in this message is
considered confidential, proprietary, privileged, and may
contain client confidential information and work product. It
may also contain trade secrets protected by State and
Federal law. If you are not the addressee please do not copy
or deliver this message to anyone. You should immediately
delete the message without reading the contents and notify
us by return email that the message was misdirected. I
apologize for the inconvenience. Any other use of this
information is strictly prohibited.