Submit a Paper

Propose a Workshop

The Third International Conference on Technical and Legal Aspects of the e-Society

CYBERLAWS 2012

January 30 - February 4, 2012 - Valencia, Spain


Technical Co-Sponsors and Logistics Supporters
   
ARCHIVE
printer friendly
pdf version
printer friendly

Details:

Submission (full paper) Sept. 5 September 20, 2011
Notification October 23 November 7, 2011
Registration Nov 7 November 22, 2011
Camera ready Nov 7 November 22, 2011

ISBN: 978-1-61208-182-3

Published by IARIA XPS Press

Archived in the free access ThinkMindTM Digital Library
Authors of selected papers will be invited to submit extended versions to a IARIA Journal
Articles will be submitted to appropriate indexes.

All tracks/topics are open to both research and industry contributions.

Tracks:

ACCESSIBILITY: Digital Divide, e-Democracy and e-Government

Digital Divide and Accessibility: Loss of autonomy; Access barriers of age, race, wealth; Problems caused by lack of accessibility; Development of accessibility standards; Legislation related to accessibility

e-Democracy and e-Government: Open and Free access; Free postings; Freedom of speech; Freedom of expression on the Internet; Anywhere access; Legal versus illegal; e-Trust; e-Voting and Internet voting; e-Garbage collection of private records; e-Transparency; e-Government and e-Democracy for e-Citizens; e-Environment

PRIVACY: e-Anonymity and e-Identity

Privacy: Human rights; Privacy versus Security versus Convenience (ease of use); Legitimate purposes; e-Citizen behavior; Right to privacy; Legitimate purposes; e-Citizen behavior; Search engine behavior and policies; Regulating search engines;

e-Anonymity and e-Identity: Anonymity; Pseudonimity; Multiple identities; Multiple locations; Wrong by eliminating accountability; Anonymity and social identity; Identity change; Multiple identities; Identity substitution; Securing identity

FRAUD: WEB x.0 Impersonation, e-Harassment, e-Threats, e-Loss

WEB x.0 Impersonation, and e-Harassment and e-Threats: Social malware; Spam; Bullying; Stalkers; Blogs; Anonymous emails; Hoaxes; e-Rumor email lists; Newsgroup article; Web pages; Pamphlets; Computer hacking; Spam; Carding; Botnets; Phishing; Worms; Virii; Network dynamics attacks; On-line using various data sets; FaceBook; Twitter; YouTube; @anything.com; Corporate e-Hassle; Individual e-Hassle; Role and responsibility substitution, Social networking

e-Loss: Personal damage; Economic damage; Promoting the damage by acting against it; e-Loss evaluation

PROTECTION:  e-Fraud Prevention, e-Law, e-Punishment, e-International relations

e-Fraud Prevention: Technology and cyberlaws; Security enforcement; Trust referrals; Cryptography; Education; Law enforcement; Re-active and Pro-active actions; e-Law education

Technical Countermeasures: Detection of abusive traffic; Tools for interception and repression; Deep packet inspection; Communications interception; Communications wiretapping and records

e-Law: National laws protecting the anonymity; Responsibility for email messages; Lobbying for forbidding anonymity on the Internet; Lawfully regulate anonymity on the Internet; Prevent retaliation; Internet governance; Formal legislation; Soft laws;  e-Trust national regulatory aspects

e-Punishment: Lawful interception; Propagation traces; Banning; Content blocking; Long-term exchange records; Security pitfalls of e-democracy; e-Trust national enforcement laws;  e-Trust cross-digital police; Court warrants; Legal countermeasures

e-International relations: Conflict of laws; Extra-jurisdictional net (intellectual property, criminal enforcement); Lobbying for forbidding anonymity on the Internet; Lawfully regulate anonymity on the Internet; Prevent retaliation; Internet governance; Treaties and Conventions, e-Trust international regulatory context.

 
 

Copyright (c) 2006-2012, IARIA