-------- Original-Nachricht --------
Betreff: [AISWorld] Digital Forensics, Security and Law - The 10th Annual ADFSL Conference
Datum: Fri, 14 Nov 2014 04:42:19 +0000
Von: Glenn S. Dardick <gdardick@dardick.net>
Antwort an: Glenn S. Dardick <gdardick@dardick.net>
An: aisworld@lists.aisnet.org <aisworld@lists.aisnet.org>


 

 

10th ADFSL Conference on Digital Forensics, Security and Law

 

Description: Description: Description:
                    Description: Description: Description: Description:
                    Description: Description: Description: Description:
                    Description: Description: Description: Description:
                    adfslgraphic.jpg

Venue: Daytona Beach, Florida USA

Dates: 19-21 May 2015

Conference Website:
http://www.digitalforensics-conference.org  


 





 

Dear colleagues:

 

The ADFSL 2015 Conference on Digital Forensics, Security and Law will be held on May 19-21, 2015.  The venue for the conference will be on the campus of Embry-Riddle Aeronautical University in Daytona Beach, Florida.

 

The ADFSL Conference on Digital Forensics, Security and Law is a unique and innovative event.  It is managed by the Association of Digital Forensics, Security and Law (ADFSL). The conference focuses on the current and expanding role of digital forensics within investigations and the courts as well as its important role within cyber security - both national as well as corporate. Topics not only include technology and evidence, but also are very much focused on how to prepare students for careers in digital forensics. Conference papers are double blind refereed and provide a forum for high quality research, communication and debate on the subject of digital forensics and directly related fields.

 

The conference is of particular interest to individuals who are interested in developing curriculum and teaching methods as well as conducting research related to the areas of digital forensics, security, and law. This conference will be of value to both academic and practitioner audiences.

 

Deadlines

 

The deadline for submissions is 11:59 p.m. EST, 16 November 2014.        

 

Notifications will be sent by 11:59 p.m. EST, 16 December 2014.                       

 

The camera ready deadline for accepted submissions is 11:59 p.m. EST, 16 April 2015     

 

Submission Types

 

Research papers: A research question or an argument is posed and subsequently conducted. Empirical work (quantitative or qualitative) is necessary. Research papers will be presented by the authors in a regular conference session. These papers should be extensive. Typical length is about 5000-6000 words. All research papers will be considered for publication in the Journal of Digital Forensics, Security and Law (JDFSL).  

 

Short briefing papers: A technology or a management briefing on an aspect of digital forensics, information security, and/or cyber law. Such papers will be presented by the author in a round table discussion format at the conference. These papers need not be extensive. Typical length is about 1500-2000 words.              

 

Case Studies: Case studies are typically descriptions of a given digital forensics situation. Names of organizations/actors can be kept anonymous to maintain confidentiality. Case studies will be presented by the authors at the conference. Typical length is about 5000-6000 words. All case studies will be considered for publication in the Journal of Digital Forensics, Security and Law (JDFSL).          

 

Student Scholar Track: Up to six student papers will be selected for the Student Scholar Track. Of the six papers, one will be selected for the Student Scholar Award. The primary author must be present at the conference. To participate, the primary author of the paper must be a student. The primary author must email the conference chair and specify that they wish their submitted paper to be considered for the Student Scholar track.                        

 

Panels: Panels and workshop proposals are welcome. Typical length is about 1000 words long and covers a current technology or a controversial issue.

 

Participants

 

The primary audience will include individuals who are interested in developing curriculum and teaching methods as well as conducting research related to the areas of digital forensics, security, and law. This conference will be of value to both academic and practitioner audiences.

 

Submissions

 

All research papers and case studies are double blind peer reviewed.

 

Instructions for authors may be found at the following link:

 

http://www.digitalforensics-conference.org/authorinstructions.htm              

 

Best Papers

 

Selected papers from the conference will be considered for inclusion in the following journal:

 

    Journal of Digital Forensics, Security and Law

 

Suggested Topics

 

The conference committee is calling for papers and proposals in, or related to, the following areas:

 

CURRICULUM

1) Digital forensics curriculum

2) Cyber law curriculum

3) Information security curriculum

4) Accounting digital forensics curriculum

 

TEACHING METHODS

5) Digital forensics teaching methods

6) Cyber law teaching methods

7) Information security teaching methods

8) Accounting digital forensics teaching methods

 

CASES

9) Digital forensics case studies

10) Cyber law case studies

11) Information security case studies

12) Accounting digital forensics case studies

 

INFORMATION TECHNOLOGY

13) Digital forensics and information technology

14) Cyber law and information technology

15) Information security and information technology

16) Accounting digital forensics information technology

 

NETWORKS AND THE INTERNET

17) Digital forensics and the Internet

18) Cyber law and the Internet

19) Information security and Internet

20) Digital forensics accounting and the Internet

 

ANTI-FORENSICS AND COUNTER ANTI-FORENSICS

21) Steganography

22) Stylometrics and author attribution

23) Anonymity and proxies

24) Encryption and decryption

 

INTERNATIONAL ISSUES

25) International issues in digital forensics

26) International issues in cyber law

27) International issues in information security

28) International issues in accounting digital forensics

 

THEORY

29) Theory development in digital forensics

30) Theory development in information security

31) Methodologies for digital forensic research

32) Analysis techniques for digital forensic and information security research

 

PRIVACY ISSUES

33) Privacy issues in digital forensics

34) Privacy issues in information security

35) Privacy issues in cyber law

 

SOFTWARE FORENSICS

36) Software piracy investigation

37) Software quality forensics

 

NATIONAL SECURITY AND CYBERCRIME

38) Cyber culture and cyber terrorism

 

Additional Information

 

ADDITIONAL INFORMATION FOR THE CONFERENCE CAN BE FOUND AT:

http://www.digitalforensics-conference.org           

 

REGISTRATION INFORMATION IS POSTED AT:

http://www.digitalforensics-conference.org/registration.htm          

 

The Chair of the conference is Dr. Glenn S. Dardick

(gdardick@dardick.net)              

 

Association for Digital Forensics, Security and Law

Website: http://www.adfsl.org     

 

Journal of Digital Forensics, Security and Law

Website: http://www.jdfsl.org      

 

imap://neumann@mohegan.wu-wien.ac.at:993/fetch%3EUID%3E/INBOX%3E567961?part=1.1.3&filename=image002.png

"Verum Vacuus Proclivitas"

 

Glenn S. Dardick, Ph.D., CCE (ISFCE), CCFP (ISC2)

cce-logo   ccfp 
804-402-9239
gdardick@dardick.net
gdardick (Skype)

 

Director
Association for Digital Forensics, Security and Law 
imap://neumann@mohegan.wu-wien.ac.at:993/fetch%3EUID%3E/INBOX%3E567961?part=1.1.6&filename=image006.pngimap://neumann@mohegan.wu-wien.ac.at:993/fetch%3EUID%3E/INBOX%3E567961?part=1.1.7&filename=image007.png

Publisher of the Journal of Digital Forensics, Security and Law

gdardick@adfsl.org

 

Adjunct Associate Professor

ECU Security Research Institute, Edith Cowan University, Australia

 imap://neumann@mohegan.wu-wien.ac.at:993/fetch%3EUID%3E/INBOX%3E567961?part=1.1.8&filename=image008.png

International Society of Forensic Computer Examiners

Infragard, Richmond, Virginia 

LexConverge, University of Malta

Fellow, African Center for Cyberlaw and Cybercrime Prevention (ACCP), Kampala Uganda

 

Shipping/Postal Address:
Glenn S. Dardick / ADFSL
1642 Horsepen Hills Road
Maidens, Virginia 23102

This electronic message is intended only for the use of the individual or company named above. If the intended recipient is a client, the information contained in this message is considered confidential, proprietary, privileged, and may contain client confidential information and work product. It may also contain trade secrets protected by State and Federal law. If you are not the addressee please do not copy or deliver this message to anyone. You should immediately delete the message without reading the contents and notify us by return email that the message was misdirected. I apologize for the inconvenience. Any other use of this information is strictly prohibited.