Submit a Paper

Propose a Workshop

The Fourth International Conference on Technical and Legal Aspects of the e-Society

CYBERLAWS 2013

February 24 - March 1, 2013 - Nice, France


Call for Papers

CYBERLAWS 2013, The Fourth International Conference on Technical and Legal Aspects of the e-Society follows the multiplications of the cybercrime acts concerning privacy and anonymity in the information society. In accordance with the principle of freedom of expression and the right to privacy, the use of anonymity is legal. Users can access data and browse anonymously so that their personal details cannot be recorded and used without their knowledge by any other entity, including another user. As there are situations were content/information providers might wish to remain anonymous for legitimate purposes, they should not be required to justify anonymous use. The dangerous side of the legal anonymity is the shadow for illegal, damaging, and not easily to sue individuals and actions. Corporate and individual hassle, corporate and individual frauds, threats, and impersonations are only a few of these actions. While privacy, anonymity and freedom of speech are achieved rights, there is a vacuum on education, punishments, and laws that can be easily applied at the same velocity with which a cybercrime propagates. Applying the Civil Court legislation is tedious and naturally, too late to timely repair the damage and prevent its quick propagation. There is a need for special laws to either prevent or quickly reprimand. In this case, the identity must be legally and undoubtedly validated. In this case, the identity must be legally and undoubtedly validated. There is a need of internationally adopted guidelines to be applied by victims. There is a need for harmonization between national laws for a new era of eDemocracy.

CYBERLAWS 2013 will provide a forum where researchers, government representatives, international bodies, law enforcement organisms and special groups shall be able to present recent lessons learned, use cases, and set the priorities on problems and directions related to the anonymity, privacy, identity, and laws that should or are governing their legal use.

We solicit both academic, research, and industrial contributions. We welcome technical papers presenting research and practical results, position papers addressing the pros and cons of specific proposals, such as those being discussed in the standard fora or in industry consortia, survey papers addressing the key problems and solutions on any of the above topics short papers on work in progress, and panel proposals.

Industrial presentations are not subject to the format and content constraints of regular submissions. We expect short and long presentations that express industrial position and status.

Tutorials on specific related topics and panels on challenging areas are encouraged.

The topics suggested by the conference can be discussed in term of concepts, state of the art, research, standards, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas.

All topics and submission formats are open to both research and industry contributions.

ACCESSIBILITY: Digital Divide, e-Democracy and e-Government

  • Digital Divide and Accessibility
    • Loss of autonomy
    • Access barriers of age, race, wealth
    • Problems caused by lack of accessibility
    • Development of accessibility standards
    • Legislation related to accessibility
  • e-Democracy and e-Government
    • Open and Free access
    • Free postings
    • Freedom of speech
    • Freedom of expression on the Internet
    • Anywhere access
    • Legal versus illegal
    • e-Trust; e-Voting and Internet voting
    • e-Garbage collection of private records
    • e-Transparency
    • e-Government and e-Democracy for e-Citizens
    • e-Environment

PRIVACY: e-Anonymity and e-Identity

  • Privacy
    • Human rights
    • Privacy versus Security versus Convenience (ease of use)
    • Legitimate purposes
    • e-Citizen behavior
    • Right to privacy
    • Legitimate purposes
    • e-Citizen behavior
    • Search engine behavior and policies
    • Regulating search engines;
  • e-Anonymity and e-Identity
    • Anonymity
    • Pseudonimity
    • Multiple identities
    • Multiple locations
    • Wrong by eliminating accountability
    • Anonymity and social identity
    • Identity change
    • Multiple identities
    • Identity substitution
    • Securing identity

FRAUD: WEB x.0 Impersonation, e-Harassment, e-Threats, e-Loss

  • WEB x.0 Impersonation, and e-Harassment and e-Threats
    • Social malware
    • Spam
    • Bullying
    • Stalkers
    • Blogs
    • Anonymous emails
    • Hoaxes
    • e-Rumor email lists
    • Newsgroup article
    • Web pages
    • Pamphlets
    • Computer hacking
    • Spam
    • Carding
    • Botnets
    • Phishing
    • Worms
    • Virii
    • Network dynamics attacks
    • On-line using various data sets
    • FaceBook
    • Twitter
    • YouTube
    • @anything.com
    • Corporate e-Hassle
    • Individual e-Hassle
    • Role and responsibility substitution
    • Social networking
  • e-Loss
    • Personal damage
    • Economic damage
    • Promoting the damage by acting against it
    • e-Loss evaluation

PROTECTION:  e-Fraud Prevention, e-Law, e-Punishment, e-International relations

  • e-Fraud Prevention
    • Technology and cyberlaws
    • Security enforcement
    • Trust referrals
    • Cryptography
    • Education
    • Law enforcement
    • Re-active and Pro-active actions
    • e-Law education
  • Technical Countermeasures
    • Detection of abusive traffic
    • Tools for interception and repression
    • Deep packet inspection
    • Communications interception
    • Communications wiretapping and records
  • e-Law
    • National laws protecting the anonymity
    • Responsibility for email messages
    • Lobbying for forbidding anonymity on the Internet
    • Lawfully regulate anonymity on the Internet
    • Prevent retaliation
    • Internet governance
    • Formal legislation
    • Soft laws
    • e-Trust national regulatory aspects
  • e-Punishment
    • Lawful interception
    • Propagation traces
    • Banning
    • Content blocking
    • Long-term exchange records
    • Security pitfalls of e-democracy
    • e-Trust national enforcement laws
    • e-Trust cross-digital police
    • Court warrants
    • Legal countermeasures
  • e-International relations
    • Conflict of laws
    • Extra-jurisdictional net (intellectual property, criminal enforcement)
    • Lobbying for forbidding anonymity on the Internet
    • Lawfully regulate anonymity on the Internet
    • Prevent retaliation
    • Internet governance
    • Treaties and Conventions, e-Trust international regulatory context.

 

INSTRUCTION FOR THE AUTHORS

Authors of selected papers will be invited to submit extended versions to one of the IARIA Journals.

Publisher: XPS (Xpert Publishing Services)
Archived: ThinkMindTM Digital Library (free access)
Prints available at Curran Associates, Inc.
Articles will be submitted to appropriate indexes.

Important deadlines:

Submission (full paper) September 29, 2012 October 23, 2012
Notification November 24 November 29, 2012
Registration December 7 December 13, 2012
Camera ready December 22 December 25, 2012

Only .pdf or .doc files will be accepted for paper submission. All received submissions will be acknowledged via an automated system.

Regular Papers (up to 6-10 page article)

Final author manuscripts will be 8.5" x 11", not exceeding 6 pages; max 4 extra pages allowed at additional cost. The formatting instructions can be found on the Instructions page. Helpful information for paper formatting can be found on the here.

Your paper should also comply with the additional editorial rules.

Once you receive the notification of paper acceptance, you will be provided by the publisher an online author kit with all the steps an author needs to follow to submit the final version. The author kits URL will be included in the letter of acceptance.

We would recommend that you not use too many extra pages, even if you can afford the extra fees. No more than 2 papers per event are recommended, as each paper must be separately registered and paid for. At least one author of each accepted paper must register to ensure that the paper will be included in the conference proceedings.

Work in Progress (short paper up to 4 pages long)

Work-in-progress contributions are welcome. Please submit the contributions following the instructions for the regular submissions using the "Submit a Paper" button and selecting the contribution type as work in progress.  Authors should submit a four-page (maximum) text manuscript in IEEE double-column format including the authors' names, affiliations, email contacts. Contributors must follow the conference deadlines, describing early research and novel skeleton ideas in the areas of the conference topics. The work will be published in the conference proceedings.

For more details, see the Work in Progress explanation page

Posters (poster or collection of 6 to 8 slides)

Posters are intended for ongoing research projects, concrete realizations, or industrial applications/projects presentations. Acceptance will be decided based on a 1-2 page abstract and/or 6-8 .pdf slide deck submitted through the conference submission website. The poster may be presented during sessions reserved for posters, or mixed with presentation of articles of similar topic. The slides must have comprehensive comments. One big Poster and/or the associated slides should be used for discussions, once on the conference site.

For more details, see the Posters explanation page.

Ideas (2 page proposal of novel idea)

This category is dedicated to new ideas in their early stage. Contributions might refer to PhD dissertation, testing new approaches, provocative and innovative ideas, out-of-the-box, and out-of-the-book thinking, etc. Acceptance will be decided based on a maximum 2 page submission through the conference submission website. The contributions for Ideas will be presented in special sessions, where more debate is intended. The Idea contribution must be comprehensive, focused, very well supported (details might miss, obviously). A 6-8 slide deck should be used for discussions, once on the conference site.

For more details, see the Ideas explanation page.

Technical marketing/industrial/business/positioning presentations

The conference initiates a series of business, technical marketing, and positioning presentations on the same topics. Speakers must submit a 10-12 slide deck presentations with substantial notes accompanying the slides, in the .ppt format (.pdf-ed). The slide deck will not be published in the conference’s CD Proceedings. Presentations' slide decks will be posted on the IARIA's site. Please send your presentations to [email protected].

Tutorials

Tutorials provide overviews of current high interest topics. Proposals should be for three hour tutorials. Proposals must contain the title, the summary of the content, and the biography of the presenter(s). The tutorials' slide decks will be posted on the IARIA's site. Please send your proposals to [email protected]

Panel proposals

The organizers encourage scientists and industry leaders to organize dedicated panels dealing with controversial and challenging topics and paradigms. Panel moderators are asked to identify their guests and manage that their appropriate talk supports timely reach our deadlines. Moderators must specifically submit an official proposal, indicating their background, panelist names, their affiliation, the topic of the panel, as well as short biographies. The panel's slide deck will be posted on the IARIA's site.

For more information, [email protected]

Workshop proposals

We welcome workshop proposals on issues complementary to the topics of this conference. Your requests should be forwarded to [email protected].

 
 

Copyright (c) 2006-2013, IARIA