|
The Third International Conference on Technical and Legal Aspects of the e-Society
CYBERLAWS 2012
January 30 - February 4, 2012 - Valencia, Spain |
Technical Co-Sponsors and Logistics Supporters |
|
|
|
|
|
|
|
|
ARCHIVE |
printer friendly pdf version |
|
|
|
Submission (full paper) |
Sept. 5 September 20, 2011 |
Notification |
October 23 November 7, 2011 |
Registration |
Nov 7 November 22, 2011 |
Camera ready |
Nov 7 November 22, 2011 |
ISBN: 978-1-61208-182-3 |
|
All tracks/topics are open to both research and industry contributions.
Tracks:
ACCESSIBILITY: Digital Divide, e-Democracy and e-Government
Digital Divide and Accessibility: Loss of autonomy; Access barriers of age, race, wealth; Problems caused by lack of accessibility; Development of accessibility standards; Legislation related to accessibility
e-Democracy and e-Government: Open and Free access; Free postings; Freedom of speech; Freedom of expression on the Internet; Anywhere access; Legal versus illegal; e-Trust; e-Voting and Internet voting; e-Garbage collection of private records; e-Transparency; e-Government and e-Democracy for e-Citizens; e-Environment
PRIVACY: e-Anonymity and e-Identity
Privacy: Human rights; Privacy versus Security versus Convenience (ease of use); Legitimate purposes; e-Citizen behavior; Right to privacy; Legitimate purposes; e-Citizen behavior; Search engine behavior and policies; Regulating search engines;
e-Anonymity and e-Identity: Anonymity; Pseudonimity; Multiple identities; Multiple locations; Wrong by eliminating accountability; Anonymity and social identity; Identity change; Multiple identities; Identity substitution; Securing identity
FRAUD: WEB x.0 Impersonation, e-Harassment, e-Threats, e-Loss
WEB x.0 Impersonation, and e-Harassment and e-Threats: Social malware; Spam; Bullying; Stalkers; Blogs; Anonymous emails; Hoaxes; e-Rumor email lists; Newsgroup article; Web pages; Pamphlets; Computer hacking; Spam; Carding; Botnets; Phishing; Worms; Virii; Network dynamics attacks; On-line using various data sets; FaceBook; Twitter; YouTube; @anything.com; Corporate e-Hassle; Individual e-Hassle; Role and responsibility substitution, Social networking
e-Loss: Personal damage; Economic damage; Promoting the damage by acting against it; e-Loss evaluation
PROTECTION: e-Fraud Prevention, e-Law, e-Punishment, e-International relations
e-Fraud Prevention: Technology and cyberlaws; Security enforcement; Trust referrals; Cryptography; Education; Law enforcement; Re-active and Pro-active actions; e-Law education
Technical Countermeasures: Detection of abusive traffic; Tools for interception and repression; Deep packet inspection; Communications interception; Communications wiretapping and records
e-Law: National laws protecting the anonymity; Responsibility for email messages; Lobbying for forbidding anonymity on the Internet; Lawfully regulate anonymity on the Internet; Prevent retaliation; Internet governance; Formal legislation; Soft laws; e-Trust national regulatory aspects
e-Punishment: Lawful interception; Propagation traces; Banning; Content blocking; Long-term exchange records; Security pitfalls of e-democracy; e-Trust national enforcement laws; e-Trust cross-digital police; Court warrants; Legal countermeasures
e-International relations: Conflict of laws; Extra-jurisdictional net (intellectual property, criminal enforcement); Lobbying for forbidding anonymity on the Internet; Lawfully regulate anonymity on the Internet; Prevent retaliation; Internet governance; Treaties and Conventions, e-Trust international regulatory context.