| |||||||||||||||
CyCon 2015 : International Conference on Cyber Conflict | |||||||||||||||
Link: http://ccdcoe.org/cycon/call-papers.html | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
The 7th International Conference on Cyber Conflict (CyCon 2015) will focus on the construction of the Internet and its potential future development. 40 years ago, the main principles and foundations for the Internet were laid, and they have been used ever since. The “net” has been a tremendous success story and today it is much more than just a commodity. Looking at the figures (2.5 billion users today, 50 billion devices connected in 2020), one would think of the overwhelming influence that these technologies have and that we are only looking at the beginning of a revolution.
Can the structures that we rely upon support the increasing demand and the different ways in which we want to use it? Human behaviours have changed, international politics has changed and our relationship to machines has changed. Therefore, this year’s topic, “Architectures in Cyberspace,” aims to approach what cyberspace is and will be in the coming years and to identify its unifying and coherent traits. Does it promise a shining future? This Call for Papers lists just a few of the pressing issues that will be within the scope of the conference. We intend to grasp these topics from a technical, legal, political, ethical, sociological and economic standpoint: Technical challenges/requirements Cryptographic dogma? (e.g. key security, strength of algorithms, etc.) Future Connectivity and the Internet of Things (e.g. net neutrality, future backbone, new network technologies, etc.) Big data (e.g. big data management, interpretation and evaluation, etc.) Technical protocols (e.g. IPv6, 5G, WWW 3.0, etc.) Operating systems (e.g. multi-core / virtual-core, distributed OS, etc.) Development and engagement of cyber assets (e.g. enforcement, military capacities, research and education, etc.) Doctrine and strategies (e.g. state actors in cyberspace, cyber policy, etc.) Prevention (e.g. early warning, confidence building measures, etc.) Crisis management (e.g. contingency planning, resilience, etc.) Arms race (e.g. cyber arms complex, “code war”, etc.) Regulation – standards Privacy and personal data protection (e.g. profiling, “right to be forgotten”, etc.) Security strategies (e.g. implementation frameworks, metrics, etc.) Technical implementation standards (e.g. RFCs, IEEE, ISO, etc.) Intellectual property (e.g. copyright and digital rights management, etc.) Legal developments (e.g. public international law, “Tallinn Manual 2.0”, “cyber crime act”, etc.) Virtualisation Social networks and Online Communities (e.g. social network merging, “blog wars”, etc.) Digital economy (e.g. E-Commerce, automated trade, etc.) Identities (e.g. “virtual me”, E-IDs, avatars, etc.) Health (e.g. quantified self, etc.) Politics (e.g. citizenship, revolutions, democracy, etc.) Knowledge – culture (e.g. contents vs container, creative industries, education (MOOCs), etc.) Technical aspects of virtualisation (e.g. cloud computing, VM security, etc.) International cooperation – International relations Norms development (international treaties, legal framework, etc.) Governance (e.g. the role of states, IOs, NGOs, technical boards, ISPs, etc.) Borders in cyberspace (e.g. territoriality, sovereignty, technical implementation of borders and boundaries, etc.) Cyber world order (e.g. virtual multilateralism, new communities, etc.) Important Dates for CyCon 2015: Abstract submission: 1 October, 2014 Notification of Abstract Acceptance: 31 October, 2014 Full paper: 5 January, 2015 Notification of Authors: 16 February, 2015 Final Paper: 16 March, 2015 Publication Authors are first required to submit an abstract of the planned paper, which should describe the topic and lay out the main aspects and structure of the research (300-500 words). After a preliminary review and the acceptance of the abstract, the respective authors will be requested to submit original and unpublished papers meeting high academic research standards (up to 6000 words, incl. footnotes and references). Submitted papers will be subject to a double-blind peer review. Submission details, author guidance, the copyright transfer form and other practical information are available on our website at http://ccdcoe.org/cycon/call-papers.html. The abstracts and manuscripts must be uploaded electronically to https://www.easychair.org/conferences/?conf=cycon2015 after creating an account. Authors of papers accepted for publishing in the conference proceedings are requested to make a corresponding presentation at the conference. Speakers will be offered travel (booked by NATO CCD COE), transfer to and from the airport, accommodation and lunches for the duration of the conference, an ice-breaker, a conference dinner and a guided tour in Tallinn (early notification of interest required). |
|