-------- Original Message -------- Subject: [AISWorld] 6th Annual ADFSL Conference on Digital Forensics, Security and Law Date: Sun, 14 Nov 2010 17:05:19 -0500 From: Glenn Dardick gdardick@dardick.net To: aisworld@lists.aisnet.org
ANNOUNCEMENT: Conference on Digital Forensics, Security and Law ================================================================ ADFSL 2011 Conference on Digital Forensics, Security and Law Venue: Richmond, Virginia USA Dates: 25-27 May 2011 Conference Website: http://www.digitalforensics-conference.org ================================================================
Dear colleagues:
The ADFSL 2011 Conference on Digital Forensics, Security and Law will be hosted by Longwood University and held on 25-27 of May 2011.
The conference committee is calling for papers and proposals in, or related to, the following areas:
CURRICULUM 1) Digital forensics curriculum 2) Cyber law curriculum 3) Information assurance curriculum 4) Accounting digital forensics curriculum
TEACHING METHODS 5) Digital forensics teaching methods 6) Cyber law teaching methods 7) Information assurance teaching methods 8) Accounting digital forensics teaching methods
CASES 9) Digital forensics case studies 10) Cyber law case studies 11) Information assurance case studies 12) Accounting digital forensics case studies
INFORMATION TECHNOLOGY 13) Digital forensics and information technology 14) Cyber law and information technology 15) Information assurance and information technology 16) Accounting digital forensics information technology
NETWORKS AND THE INTERNET 17) Digital forensics and the Internet 18) Cyber law and the Internet 19) Information assurance and Internet 20) Digital forensics accounting and the Internet
ANTI-FORENSICS AND COUNTER ANTI-FORENSICS 21) Steganography 22) Stylometrics and Author Attribution 23) Anonymity and Proxies 24) Encryption and Decryption
INTERNATIONAL ISSUES 25) International issues in digital forensics 26) International issues in cyber law 27) International issues in information assurance 28) International issues in accounting digital forensics
THEORY 29) Theory development in digital forensics 30) Theory development in information assurance 31) Methodologies for digital forensic research 32) Analysis techniques for digital forensic and information assurance research
DIGITAL RIGHTS MANAGEMENT (DRM) 33) DRM issues in digital forensics 34) DRM issues in information technology 35) DRM issues in information assurance 36) DRM issues in cyber law
PRIVACY ISSUES 37) Privacy issues in digital forensics 38) Privacy issues in information assurance 39) Privacy issues in cyber law 40) Privacy issues in digital rights management
Deadlines
The deadline for submissions is midnight EST, 19 February 2011.
Submission Types
Short briefing papers: A technology or a management briefing on an aspect of digital forensics, information assurance, and/or cyber law. Such papers will be presented by the author in a round table discussion format at the conference. These papers need not be extensive. Typical length is about 1500-2000 words.
Research papers: A research question or an argument is posed and subsequently conducted. Empirical work (quantitative or qualitative) is necessary. Research papers will be presented by the authors in a regular conference session. These papers should be extensive. Typical length is about 5000-6000 words. All research papers will be considered for publication in the Journal of Digital Forensics, Security and Law (JDFSL).
Case Studies: Case studies are typically descriptions of a given digital forensics situation. Names of organizations/actors can be kept anonymous to maintain confidentiality. Case studies will be presented by the authors at the conference. Typical length is about 5000-6000 words. All case studies will be considered for publication in the Journal of Digital Forensics, Security and Law (JDFSL).
Panels: Panels and workshop proposals are welcome. Typical length is about 1000 words long and covers a current technology or a controversial issue.
Participants
The primary audience will include individuals who are interested in developing curriculum and teaching methods as well as conducting research related to the areas of digital forensics, security, and law. This conference will be of value to both academic and practitioner audiences.
Submissions
All submissions are double blind peer reviewed.
Instructions for authors may be found at the following link: Author Instructions
Best Papers
Selected papers from the conference will be considered for inclusion in the following journal: Journal of Digital Forensics, Security and Law Additional Information
ADDITIONAL INFORMATION FOR THE CONFERENCE CAN BE FOUND AT: http://www.digitalforensics-conference.org
REGISTRATION INFORMATION WILL BE POSTED AT: http://www.digitalforensics-conference.org/registration.htm
The Chair of the conference is Dr. Glenn S. Dardick (gdardick@dardick.net)
Association for Digital Forensics, Security and Law Website: http://www.adfsl.org
Journal of Digital Forensics, Security and Law Website: http://www.jdfsl.org
_______________________________________________ AISWorld mailing list AISWorld@lists.aisnet.org