ADFSL 2011 Conference on Digital Forensics, Security and Law

http://www.digitalforensics-conference.org

The conference committee is calling for papers and proposals in, or related to,
the following areas:

CURRICULUM
1) Digital forensics curriculum
2) Cyber law curriculum
3) Information assurance curriculum
4) Accounting digital forensics curriculum

TEACHING METHODS
5) Digital forensics teaching methods
6) Cyber law teaching methods
7) Information assurance teaching methods
8 ) Accounting digital forensics teaching methods

CASES
9) Digital forensics case studies
10) Cyber law case studies
11) Information assurance case studies
12) Accounting digital forensics case studies

INFORMATION TECHNOLOGY
13) Digital forensics and information technology
14) Cyber law and information technology
15) Information assurance and information technology
16) Accounting digital forensics information technology

NETWORKS AND THE INTERNET
17) Digital forensics and the Internet
18) Cyber law and the Internet
19) Information assurance and Internet
20) Digital forensics accounting and the Internet

ANTI-FORENSICS AND COUNTER ANTI-FORENSICS
21) Steganography
22) Stylometrics and Author Attribution

23) Anonymity and Proxies
24) Encryption and Decryption

INTERNATIONAL ISSUES
25) International issues in digital forensics
26) International issues in cyber law
27) International issues in information assurance
28) International issues in accounting digital forensics

THEORY
29) Theory development in digital forensics
30) Theory development in information assurance
31) Methodologies for digital forensic research
32) Analysis techniques for digital forensic and information assurance research

DIGITAL RIGHTS MANAGEMENT (DRM)
33) DRM issues in digital forensics
34) DRM issues in information technology
35) DRM issues in information assurance
36) DRM issues in cyber law

PRIVACY ISSUES
37) Privacy issues in digital forensics
38) Privacy issues in information assurance
39) Privacy issues in cyber law
40) Privacy issues in digital rights management

SOFTWARE FORENSICS
41) Software piracy investigation
42) Software quality forensics

OTHER TOPICS
43)Cyber culture and cyber terrorism

Deadlines
The deadline for submissions is midnight EST, 19 February 2011.

Leave a Reply

You must be logged in to post a comment.


Copyright © 2017 Information Security and Incident Response Research Unit. All Rights Reserved.
No computers were harmed in the 0.338 seconds it took to produce this page.

Designed/Developed by Lloyd Armbrust & hot, fresh, coffee.