posted by user: jod999 || 4055 views || tracked by 3 users: [display]

CYBERLAWS 2013 : International Conference on Technical and Legal Aspects of the e-Society

FacebookTwitterLinkedInGoogle

Link: http://www.iaria.org/conferences2013/CfPCYBERLAWS13.html
 
When Feb 24, 2013 - Mar 1, 2013
Where Nice, France
Submission Deadline Sep 29, 2012
Notification Due Nov 17, 2012
Final Version Due Dec 1, 2012
Categories    privacy   accessibility   fraud   protection
 

Call For Papers

CYBERLAWS 2013, The Fourth International Conference on Technical and Legal Aspects of the e-Society follows the multiplications of the cybercrime acts concerning privacy and anonymity in the information society. In accordance with the principle of freedom of expression and the right to privacy, the use of anonymity is legal. Users can access data and browse anonymously so that their personal details cannot be recorded and used without their knowledge by any other entity, including another user. As there are situations were content/information providers might wish to remain anonymous for legitimate purposes, they should not be required to justify anonymous use. The dangerous side of the legal anonymity is the shadow for illegal, damaging, and not easily to sue individuals and actions. Corporate and individual hassle, corporate and individual frauds, threats, and impersonations are only a few of these actions. While privacy, anonymity and freedom of speech are achieved rights, there is a vacuum on education, punishments, and laws that can be easily applied at the same velocity with which a cybercrime propagates. Applying the Civil Court legislation is tedious and naturally, too late to timely repair the damage and prevent its quick propagation. There is a need for special laws to either prevent or quickly reprimand. In this case, the identity must be legally and undoubtedly validated. In this case, the identity must be legally and undoubtedly validated. There is a need of internationally adopted guidelines to be applied by victims. There is a need for harmonization between national laws for a new era of eDemocracy.

CYBERLAWS 2013 will provide a forum where researchers, government representatives, international bodies, law enforcement organisms and special groups shall be able to present recent lessons learned, use cases, and set the priorities on problems and directions related to the anonymity, privacy, identity, and laws that should or are governing their legal use.

We solicit both academic, research, and industrial contributions. We welcome technical papers presenting research and practical results, position papers addressing the pros and cons of specific proposals, such as those being discussed in the standard fora or in industry consortia, survey papers addressing the key problems and solutions on any of the above topics short papers on work in progress, and panel proposals.

Industrial presentations are not subject to the format and content constraints of regular submissions. We expect short and long presentations that express industrial position and status.

Tutorials on specific related topics and panels on challenging areas are encouraged.

The topics suggested by the conference can be discussed in term of concepts, state of the art, research, standards, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas.

All topics and submission formats are open to both research and industry contributions.

ACCESSIBILITY: Digital Divide, e-Democracy and e-Government

Digital Divide and Accessibility
Loss of autonomy
Access barriers of age, race, wealth
Problems caused by lack of accessibility
Development of accessibility standards
Legislation related to accessibility
e-Democracy and e-Government
Open and Free access
Free postings
Freedom of speech
Freedom of expression on the Internet
Anywhere access
Legal versus illegal
e-Trust; e-Voting and Internet voting
e-Garbage collection of private records
e-Transparency
e-Government and e-Democracy for e-Citizens
e-Environment

PRIVACY: e-Anonymity and e-Identity

Privacy
Human rights
Privacy versus Security versus Convenience (ease of use)
Legitimate purposes
e-Citizen behavior
Right to privacy
Legitimate purposes
e-Citizen behavior
Search engine behavior and policies
Regulating search engines;
e-Anonymity and e-Identity
Anonymity
Pseudonimity
Multiple identities
Multiple locations
Wrong by eliminating accountability
Anonymity and social identity
Identity change
Multiple identities
Identity substitution
Securing identity

FRAUD: WEB x.0 Impersonation, e-Harassment, e-Threats, e-Loss

WEB x.0 Impersonation, and e-Harassment and e-Threats
Social malware
Spam
Bullying
Stalkers
Blogs
Anonymous emails
Hoaxes
e-Rumor email lists
Newsgroup article
Web pages
Pamphlets
Computer hacking
Spam
Carding
Botnets
Phishing
Worms
Virii
Network dynamics attacks
On-line using various data sets
FaceBook
Twitter
YouTube
@anything.com
Corporate e-Hassle
Individual e-Hassle
Role and responsibility substitution
Social networking
e-Loss
Personal damage
Economic damage
Promoting the damage by acting against it
e-Loss evaluation

PROTECTION: e-Fraud Prevention, e-Law, e-Punishment, e-International relations

e-Fraud Prevention
Technology and cyberlaws
Security enforcement
Trust referrals
Cryptography
Education
Law enforcement
Re-active and Pro-active actions
e-Law education
Technical Countermeasures
Detection of abusive traffic
Tools for interception and repression
Deep packet inspection
Communications interception
Communications wiretapping and records
e-Law
National laws protecting the anonymity
Responsibility for email messages
Lobbying for forbidding anonymity on the Internet
Lawfully regulate anonymity on the Internet
Prevent retaliation
Internet governance
Formal legislation
Soft laws
e-Trust national regulatory aspects
e-Punishment
Lawful interception
Propagation traces
Banning
Content blocking
Long-term exchange records
Security pitfalls of e-democracy
e-Trust national enforcement laws
e-Trust cross-digital police
Court warrants
Legal countermeasures
e-International relations
Conflict of laws
Extra-jurisdictional net (intellectual property, criminal enforcement)
Lobbying for forbidding anonymity on the Internet
Lawfully regulate anonymity on the Internet
Prevent retaliation
Internet governance
Treaties and Conventions, e-Trust international regulatory context.

Related Resources

SOCIETY TRENDS 2025   International Conference on Technical Advances and Human Consequences
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
I3E 2025   The 24th IFIP Conference e-Business, e-Services, and e-Society
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
Springer ICSLT 2025   Springer--2025 11th International Conference on e-Society, e-Learning and e-Technologies (ICSLT 2025)
IJMPICT 2024   International Journal of Managing Public Sector Information and Communication Technologies
ICSLT 2025   Springer--2025 11th International Conference on e-Society, e-Learning and e-Technologies (ICSLT 2025)
MATHCS 2024   2nd International Conference on Mathematics, Computer Science & Engineering
ICTKS 2025   21st International Conference on Technology, Knowledge, and Society
CSP 2025   2025 9th International Conference on Cryptography, Security and Privacy (CSP 2025)