Submit a Paper

The First International Conference on Technical and Legal Aspects of the e-Society

CYBERLAWS 2010

February 10-16, 2010 - St. Maarten, Netherlands Antilles


Technical Co-Sponsors and Logistics Supporters
   
 
printer friendly
pdf version
printer friendly

Details:

Submission (full paper) Oct 5, 2009 October 12, 2009
Notification Nov 10, November 12, 2009
Registration December 1, 2009
Camera ready December 6, 2009
Published by:

All CPS Publications are included in the IEEE Xplore

All CPS Publications are archived in IEEE Computer Society Digital Library (CSDL)

Authors of selected papers will be invited to submit extended article versions to one of the following journals:

International Journal of Private Law
(Available  at Ingenta, listed in Cabell, A-ranking)

Journal of International Commercial Law and Technology
(Available at EBSCOHOST, v-lex. lex-opus,google scholar)

One of the IARIA Journals

All tracks/topics are open to contributions on the Technical, Legal, Social, and Corporate aspects and their interactions.

Tracks:

ACCESSIBILITY: Digital Divide, e-Democracy and e-Government

Digital Divide and Accessibility: Loss of autonomy; Access barriers of age, race, wealth; Problems caused by lack of accessibility; Development of accessibility standards; Legislation related to accessibility

e-Democracy and e-Government: Open and Free access; Free postings; Freedom of speech; Freedom of expression on the Internet; Anywhere access; Legal versus illegal; e-Trust; e-Voting and Internet voting; e-Garbage collection of private records; e-Transparency; e-Government and e-Democracy for e-Citizens; e-Environment

PRIVACY: e-Anonymity and e-Identity

Privacy: Human rights; Privacy versus Security versus Convenience (ease of use); Legitimate purposes; e-Citizen behavior; Right to privacy; Legitimate purposes; e-Citizen behavior; Search engine behavior and policies; Regulating search engines;

e-Anonymity and e-Identity: Anonymity; Pseudonimity; Multiple identities; Multiple locations; Wrong by eliminating accountability; Anonymity and social identity; Identity change; Multiple identities; Identity substitution; Securing identity

FRAUD: WEB x.0 Impersonation, e-Harassment, e-Threats, e-Loss

WEB x.0 Impersonation, and e-Harassment and e-Threats: Social malware; Spam; Bullying; Stalkers; Blogs; Anonymous emails; Hoaxes; e-Rumor email lists; Newsgroup article; Web pages; Pamphlets; Computer hacking; Spam; Carding; Botnets; Phishing; Worms; Virii; Network dynamics attacks; On-line using various data sets; FaceBook; Twitter; YouTube; @anything.com; Corporate e-Hassle; Individual e-Hassle; Role and responsibility substitution, Social networking

e-Loss: Personal damage; Economic damage; Promoting the damage by acting against it; e-Loss evaluation

PROTECTION:  e-Fraud Prevention, e-Law, e-Punishment, e-International relations

e-Fraud Prevention: Technology and cyberlaws; Security enforcement; Trust referrals; Cryptography; Education; Law enforcement; Re-active and Pro-active actions; e-Law education

Technical Countermeasures: Detection of abusive traffic; Tools for interception and repression; Deep packet inspection; Communications interception; Communications wiretapping and records

e-Law: National laws protecting the anonymity; Responsibility for email messages; Lobbying for forbidding anonymity on the Internet; Lawfully regulate anonymity on the Internet; Prevent retaliation; Internet governance; Formal legislation; Soft laws;  e-Trust national regulatory aspects

e-Punishment: Lawful interception; Propagation traces; Banning; Content blocking; Long-term exchange records; Security pitfalls of e-democracy; e-Trust national enforcement laws;  e-Trust cross-digital police; Court warrants; Legal countermeasures

e-International relations: Conflict of laws; Extra-jurisdictional net (intellectual property, criminal enforcement); Lobbying for forbidding anonymity on the Internet; Lawfully regulate anonymity on the Internet; Prevent retaliation; Internet governance; Treaties and Conventions, e-Trust international regulatory context.

 
 

Copyright (c) 2006-2010, IARIA