![]() |
| |||||||||||||||
IICFIP GFC 2014 : IICFIP Global Forensic Conference | |||||||||||||||
Link: http://globalconferences.iicfip.org | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
The International Institute of Certified Forensic Investigation Professionals (IICFIP) is a global body whose members are involved in forensic investigations in business, government and other civil groups that desire to fight the menace of white collar crimes, corruption, fraud and cybercrimes. Apart from plenary sessions, there will be paper presentations and discussions covering three parallel tracks – Corruption, Fraud and Cyber Crimes.
Papers are invited from professionals, academicians and students for review and acceptance for presentation in these three tracks. Papers discussing concepts, applications, focus areas and tools are invited for acceptance after blind review by the conference technical committee. All accepted papers will be published in the Conference Edition of the Journal of IICFIP. At least one of the authors of the accepted papers is encouraged to present the paper at the conference, in person. Papers are invited on a wide range of subjects covering the three theme tracks viz. Corruption, Fraud and Cyber Crimes. A sample of topics is given below but the papers need not be limited to these topics: Stream: Fraud Investigation 1. Fraud Taxonomy – the emergence of next generation frauds 2. Data analytics tools in fraud investigation 3. Identifying and dealing with red flags 4. Professional interviewing techniques in fraud investigation 5. Forensic Accounting and Fraud Investigation 6. Business Frauds – Detection and conducting investigations Stream: Fighting Corruption 7. Corruption Taxonomy – the merging of political and enterprise corruption 8. Corruption prevention – strategies and plans 9. Identifying and managing corruption risks – methodology and limitation 10. Creating business culture based on ethics 11. Whistle Blowing – process and perils 12. Cost of Corruption – the multiple impacts due to this menace Stream: Cyber Crime Management 13. Cyber Criminology – Foundations and Frontiers 14. Cyber Crime Management – the victim angle 15. Digital Forensic Tools – capabilities and limitations 16. Cyber Crime Management – technological perspectives 17. Intrusion into privacy – the cyber crime investigator’s dilemma 18. Who was at the Keyboard? Stylometry for cyber crime investigation 19. Sentencing Cyber Criminals – Challenges and Responses Please submit your papers on-line using the EasyChair conference management system: https://www.easychair.org/conferences/?conf=iicfipgfc2014 |
|