-------- Forwarded Message --------
CALL FOR PAPERS
ADFSL 2020 Conference on Digital Forensics, Security and Law
Venue: Las Vegas, Nevada USA
Dates: 27-28 May 2020
Conference Website:
http://www.digitalforensics-conference.org<http://www.digitalforensics-conference.org/>
Dear colleagues:
The ADFSL 2020 Conference on Digital Forensics, Security and Law
will be held on May 27-28, 2020 at the New York New York Hotel in
Las Vegas, Nevada, USA
The ADFSL Conference on Digital Forensics, Security and Law is a
unique and innovative event. It is managed by the Association of
Digital Forensics, Security and Law (ADFSL). The conference
focuses on the current and expanding role of digital forensics
within investigations and the courts as well as its important role
within cyber security - both national as well as corporate. Topics
not only include technology and evidence, but also are very much
focused on how to prepare students for careers in digital
forensics. Conference papers are double blind refereed and provide
a forum for high quality research, communication and debate on the
subject of digital forensics and directly related fields.
The conference is of particular interest to individuals who are
interested in developing curriculum and teaching methods as well
as conducting research related to the areas of digital forensics,
security, and law. This conference will be of value to both
academic and practitioner audiences.
Deadlines
The deadline for submissions is 11:59 p.m. EST, 31 January 2020.
Notifications will be sent by 11:59 p.m. EST, 1 March 2020.
The camera ready deadline for accepted submissions is 11:59 p.m.
EST, 31 April 2020
Submission Types
Short briefing papers: A technology or a management briefing on an
aspect of digital forensics, information security, and/or cyber
law. Such papers will be presented by the author in a round table
discussion format at the conference. These papers need not be
extensive. Typical length is about 1500-2000 words.
Research papers: A research question or an argument is posed and
subsequently conducted. Empirical work (quantitative or
qualitative) is necessary. Research papers will be presented by
the authors in a regular conference session. These papers should
be extensive. Typical length is about 5000-6000 words. All
research papers will be considered for publication in the Journal
of Digital Forensics, Security and Law (JDFSL).
Case Studies: Case studies are typically descriptions of a given
digital forensics situation. Names of organizations/actors can be
kept anonymous to maintain confidentiality. Case studies will be
presented by the authors at the conference. Typical length is
about 5000-6000 words. All case studies will be considered for
publication in the Journal of Digital Forensics, Security and Law
(JDFSL).
Student Scholar Track: Up to six student papers will be selected
for the Student Scholar Track. Of the six papers, one will be
selected for the Student Scholar Award. The primary author must be
present at the conference. To participate, the primary author of
the paper must be a student. The primary author must email the
conference chair and specify that they wish their submitted paper
to be considered for the Student Scholar track.
Panels: Panels and workshop proposals are welcome. Typical length
is about 1000 words long and covers a current technology or a
controversial issue.
Participants
The primary audience will include individuals who are interested
in developing curriculum and teaching methods as well as
conducting research related to the areas of digital forensics,
security, and law. This conference will be of value to both
academic and practitioner audiences.
Submissions
All research papers and case studies are double blind peer
reviewed.
Instructions for authors may be found at the following link:
http://www.digitalforensics-conference.org/call-for-papers/author-instructions
Best Papers
Selected papers from the conference will be considered for
inclusion in the following journal:
Journal of Digital Forensics, Security and Law
Suggested Topics
The conference committee is calling for papers and proposals in,
or related to, the following areas:
CURRICULUM
- Digital forensics curriculum
- Cyber law curriculum
- Information security curriculum
- Accounting digital forensics curriculum
TEACHING METHODS
- Digital forensics teaching methods
- Cyber law teaching methods
- Information security teaching methods
- Accounting digital forensics teaching methods
CASES
- Digital forensics case studies
- Cyber law case studies
- Information security case studies
- Accounting digital forensics case studies
INFORMATION TECHNOLOGY
- Digital forensics and information technology
- Cyber law and information technology
- Information security and information technology
- Accounting digital forensics information technology
NETWORKS AND THE INTERNET
- Digital forensics and the Internet
- Cyber law and the Internet
- Information security and Internet
- Digital forensics accounting and the Internet
ANTI-FORENSICS AND COUNTER ANTI-FORENSICS
- Steganography
- Stylometrics and author attribution
- Anonymity and proxies
- Encryption and decryption
INTERNATIONAL ISSUES
- International issues in digital forensics
- International issues in cyber law
- International issues in information security
- International issues in accounting digital forensics
THEORY
- Theory development in digital forensics
- Theory development in information security
- Methodologies for digital forensic research
- Analysis techniques for digital forensic and information
security research
PRIVACY ISSUES
- Privacy issues in digital forensics
- Privacy issues in information security
- Privacy issues in cyber law
SOFTWARE FORENSICS
- Software piracy investigation
- Software quality forensics
NATIONAL SECURITY AND CYBERCRIME
- Cyber culture
- Cyber terrorism
- Cyber war
- Cybercrime
Additional Information
ADDITIONAL INFORMATION FOR THE CONFERENCE CAN BE FOUND AT:
http://www.digitalforensics-conference.org<http://www.digitalforensics-conference.org/>
REGISTRATION INFORMATION IS POSTED AT:
http://www.digitalforensics-conference.org/registration.htm<https://www.digitalforensics-conference.org/registration.htm>
The Organizer of the conference is Dr. Glenn S. Dardick
glenn.dardick@erau.edu<mailto:gary.kessler@erau.edu>
Association for Digital Forensics, Security and Law
Website:
http://www.adfsl.org<http://www.adfsl.org/>
Journal of Digital Forensics, Security and Law
Website:
http://www.jdfsl.org<http://www.jdfsl.org/>
Editor-in-Chief
Dr. Marcus Rogers, CISSP, DFCP-F
765-560-3290
rogersmk@purdue.edu<mailto:rogersmk@purdue.edu>
v/r
Glenn S. Dardick
[
cid:image002.png@01D23FDC.F65E0EC0]
"Verum Vacuus Praeiudicio"
Glenn S. Dardick, Ph.D., CCE (ISFCE), CCFP (ISC2)
[cce-logo] [ccfp]
804-402-9239
gdardick@dardick.net<mailto:gdardick@dardick.net>
gdardick (Skype)
Associate Professor
Embry-Riddle Aeronautical University
Security Studies and International Affairs
[Description:
cid:3333950106_182562]
A National Center of Academic Excellence in
Cyber Defense Education
386-226-7585
College of Arts and Sciences
Building, Rm. 128.14
dardickg@erau.edu<mailto:dardickg@erau.edu>
Director
Association for Digital Forensics, Security and Law
[
cid:image006.png@01D23FDC.F65E0EC0][
cid:image007.png@01D23FDC.F65E0EC0]
Publisher of the Journal of Digital Forensics, Security and Law
gdardick@adfsl.org<mailto:gdardick@adfsl.org>
Adjunct Associate Professor
ECU Security Research Institute, Edith Cowan University, Australia
[
cid:image008.png@01D23FDC.F65E0EC0]
International Society of Forensic Computer Examiners
Infragard, Richmond, Virginia
LexConverge, University of Malta
Fellow, African Center for Cyberlaw and Cybercrime Prevention
(ACCP), Kampala Uganda
This electronic message is intended only for the use of the
individual or company named above. If the intended recipient is a
client, the information contained in this message is considered
confidential, proprietary, privileged, and may contain client
confidential information and work product. It may also contain
trade secrets protected by State and Federal law. If you are not
the addressee please do not copy or deliver this message to
anyone. You should immediately delete the message without reading
the contents and notify us by return email that the message was
misdirected. I apologize for the inconvenience. Any other use of
this information is strictly prohibited.