FAIS 2018 - 10th Conference on the Future of Adversarial and Inquisitorial Systems
Topics/Call fo Papers
In this 10th annual Conference on the Future of Adversarial and Inquisitorial Systems, we have invited scholars from across Europe, the United States and Australia to explore criminal laws and procedures designed to combat sophisticated means of committing crime in the sphere of information and communication technology (ICT). These crimes can be broadly categorized as offences against the confidentiality, integrity and availability of computer data and systems and include the offences of illegal access (hacking, cracking); illegal data acquisition (computer or data espionage); illegal interception of data; data interference; attacks on the systems themselves; and technology-facilitated sexual violence, including image-based sexual abuse (commonly referred to as “revenge pornography”).
Crimes involving digital data and computer systems typically sit at the intersection of property and privacy law, which raises important questions for the criminal law. Criminal justice systems are tasked with protecting privacy and restoring property, while respecting the privacy rights of victims, and ensuring systemic security. These goals often align, but may also conflict. For example, respecting the privacy interests of victims, or protecting their trade secrets, may run counter to the goals of publicly punishing those who illegally accessed their data, and deterring others who would like to do the same to future victims. Together we will explore the systemic effects and trade-offs that a data security and privacy regime must navigate. How individual states define substantive crimes, and where and to whom they grant the power to control prosecutions, matters in individual cases. Practically, we need to understand the differences in systemic approaches to cybercrime and cybersecurity because crimes committed in one jurisdiction may have an impact or cause harm in another jurisdiction. Those choices also reveal much about the underlying structure of the criminal justice systems that made them.
Organized by
Sabine Gless, Dario Stagno
Crimes involving digital data and computer systems typically sit at the intersection of property and privacy law, which raises important questions for the criminal law. Criminal justice systems are tasked with protecting privacy and restoring property, while respecting the privacy rights of victims, and ensuring systemic security. These goals often align, but may also conflict. For example, respecting the privacy interests of victims, or protecting their trade secrets, may run counter to the goals of publicly punishing those who illegally accessed their data, and deterring others who would like to do the same to future victims. Together we will explore the systemic effects and trade-offs that a data security and privacy regime must navigate. How individual states define substantive crimes, and where and to whom they grant the power to control prosecutions, matters in individual cases. Practically, we need to understand the differences in systemic approaches to cybercrime and cybersecurity because crimes committed in one jurisdiction may have an impact or cause harm in another jurisdiction. Those choices also reveal much about the underlying structure of the criminal justice systems that made them.
Organized by
Sabine Gless, Dario Stagno
Other CFPs
- The 2nd Workshop on Advances in IoT Architecture and Systems
- 11th International Conference on Endocrinology and Diabetology
- What’s Behind Generational Differences In The Workplace?
- 2018 4th International Conference on Industrial and Business Engineering (ICIBE 2018)--EI Compendex and Scopus
- 2018 8th International Conference on Education, Research and Innovation (ICERI 2018)
Last modified: 2018-01-29 20:55:09