ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

CYBERLAWS 2013 - The Fourth International Conference on Technical and Legal Aspects of the e-Society

Date2013-02-24

Deadline2012-09-29

VenueNice, France France

Keywords

Websitehttp://www.iaria.org

Topics/Call fo Papers

All tracks/topics are open to both research and industry contributions.
Tracks:
ACCESSIBILITY: Digital Divide, e-Democracy and e-Government
Digital Divide and Accessibility: Loss of autonomy; Access barriers of age, race, wealth; Problems caused by lack of accessibility; Development of accessibility standards; Legislation related to accessibility
e-Democracy and e-Government: Open and Free access; Free postings; Freedom of speech; Freedom of expression on the Internet; Anywhere access; Legal versus illegal; e-Trust; e-Voting and Internet voting; e-Garbage collection of private records; e-Transparency; e-Government and e-Democracy for e-Citizens; e-Environment
PRIVACY: e-Anonymity and e-Identity
Privacy: Human rights; Privacy versus Security versus Convenience (ease of use); Legitimate purposes; e-Citizen behavior; Right to privacy; Legitimate purposes; e-Citizen behavior; Search engine behavior and policies; Regulating search engines;
e-Anonymity and e-Identity: Anonymity; Pseudonimity; Multiple identities; Multiple locations; Wrong by eliminating accountability; Anonymity and social identity; Identity change; Multiple identities; Identity substitution; Securing identity
FRAUD: WEB x.0 Impersonation, e-Harassment, e-Threats, e-Loss
WEB x.0 Impersonation, and e-Harassment and e-Threats: Social malware; Spam; Bullying; Stalkers; Blogs; Anonymous emails; Hoaxes; e-Rumor email lists; Newsgroup article; Web pages; Pamphlets; Computer hacking; Spam; Carding; Botnets; Phishing; Worms; Virii; Network dynamics attacks; On-line using various data sets; FaceBook; Twitter; YouTube; -AT-anything.com; Corporate e-Hassle; Individual e-Hassle; Role and responsibility substitution, Social networking
e-Loss: Personal damage; Economic damage; Promoting the damage by acting against it; e-Loss evaluation
PROTECTION: e-Fraud Prevention, e-Law, e-Punishment, e-International relations
e-Fraud Prevention: Technology and cyberlaws; Security enforcement; Trust referrals; Cryptography; Education; Law enforcement; Re-active and Pro-active actions; e-Law education
Technical Countermeasures: Detection of abusive traffic; Tools for interception and repression; Deep packet inspection; Communications interception; Communications wiretapping and records
e-Law: National laws protecting the anonymity; Responsibility for email messages; Lobbying for forbidding anonymity on the Internet; Lawfully regulate anonymity on the Internet; Prevent retaliation; Internet governance; Formal legislation; Soft laws; e-Trust national regulatory aspects
e-Punishment: Lawful interception; Propagation traces; Banning; Content blocking; Long-term exchange records; Security pitfalls of e-democracy; e-Trust national enforcement laws; e-Trust cross-digital police; Court warrants; Legal countermeasures
e-International relations: Conflict of laws; Extra-jurisdictional net (intellectual property, criminal enforcement); Lobbying for forbidding anonymity on the Internet; Lawfully regulate anonymity on the Internet; Prevent retaliation; Internet governance; Treaties and Conventions, e-Trust international regulatory context.

Last modified: 2012-06-21 22:39:00