ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

CYBERLAWS 2012 - The Third International Conference on Technical and Legal Aspects of the e-Society CYBERLAWS 2012

Date2012-01-30

Deadline2011-09-05

VenueValencia, Spain Spain

Keywords

Websitehttps://www.iaria.org/conferences2012

Topics/Call fo Papers

All tracks/topics are open to both research and industry contributions.

Tracks:

ACCESSIBILITY: Digital Divide, e-Democracy and e-Government

Digital Divide and Accessibility: Loss of autonomy; Access barriers of age, race, wealth; Problems caused by lack of accessibility; Development of accessibility standards; Legislation related to accessibility

e-Democracy and e-Government: Open and Free access; Free postings; Freedom of speech; Freedom of expression on the Internet; Anywhere access; Legal versus illegal; e-Trust; e-Voting and Internet voting; e-Garbage collection of private records; e-Transparency; e-Government and e-Democracy for e-Citizens; e-Environment

PRIVACY: e-Anonymity and e-Identity

Privacy: Human rights; Privacy versus Security versus Convenience (ease of use); Legitimate purposes; e-Citizen behavior; Right to privacy; Legitimate purposes; e-Citizen behavior; Search engine behavior and policies; Regulating search engines;

e-Anonymity and e-Identity: Anonymity; Pseudonimity; Multiple identities; Multiple locations; Wrong by eliminating accountability; Anonymity and social identity; Identity change; Multiple identities; Identity substitution; Securing identity

FRAUD: WEB x.0 Impersonation, e-Harassment, e-Threats, e-Loss

WEB x.0 Impersonation, and e-Harassment and e-Threats: Social malware; Spam; Bullying; Stalkers; Blogs; Anonymous emails; Hoaxes; e-Rumor email lists; Newsgroup article; Web pages; Pamphlets; Computer hacking; Spam; Carding; Botnets; Phishing; Worms; Virii; Network dynamics attacks; On-line using various data sets; FaceBook; Twitter; YouTube; -AT-anything.com; Corporate e-Hassle; Individual e-Hassle; Role and responsibility substitution, Social networking

e-Loss: Personal damage; Economic damage; Promoting the damage by acting against it; e-Loss evaluation

PROTECTION: e-Fraud Prevention, e-Law, e-Punishment, e-International relations

e-Fraud Prevention: Technology and cyberlaws; Security enforcement; Trust referrals; Cryptography; Education; Law enforcement; Re-active and Pro-active actions; e-Law education

Technical Countermeasures: Detection of abusive traffic; Tools for interception and repression; Deep packet inspection; Communications interception; Communications wiretapping and records

e-Law: National laws protecting the anonymity; Responsibility for email messages; Lobbying for forbidding anonymity on the Internet; Lawfully regulate anonymity on the Internet; Prevent retaliation; Internet governance; Formal legislation; Soft laws; e-Trust national regulatory aspects

e-Punishment: Lawful interception; Propagation traces; Banning; Content blocking; Long-term exchange records; Security pitfalls of e-democracy; e-Trust national enforcement laws; e-Trust cross-digital police; Court warrants; Legal countermeasures

e-International relations: Conflict of laws; Extra-jurisdictional net (intellectual property, criminal enforcement); Lobbying for forbidding anonymity on the Internet; Lawfully regulate anonymity on the Internet; Prevent retaliation; Internet governance; Treaties and Conventions, e-Trust international regulatory context.

Last modified: 2011-05-20 22:59:28