INVITATION: ================= Please consider to contribute to and/or forward to the appropriate groups the following opportunity to submit and publish original scientific results to CYBERLAWS 2012. The submission deadline is set to September 5, 2011. In addition, authors of selected papers will be invited to submit extended article versions to one of the IARIA Journals: http://www.iariajournals.org ================= ============== CYBERLAWS 2012 | Call for Papers =============== CALL FOR PAPERS, TUTORIALS, PANELS CYBERLAWS 2012: The Third International Conference on Technical and Legal Aspects of the e-Society January 30 - February 4, 2012 - Valencia, Spain General page: http://www.iaria.org/conferences2012/CYBERLAWS12.html Call for Papers: http://www.iaria.org/conferences2012/CfPCYBERLAWS12.html - regular papers - short papers (work in progress) - posters - ideas Submission page: http://www.iaria.org/conferences2011/SubmitCYBERLAWS12.html Submission deadline: September 5, 2011 Sponsored by IARIA, www.iaria.org Extended versions of selected papers will be published in IARIA Journals: http://www.iariajournals.org Please note the Poster Forum and Work in Progress options. The topics suggested by the conference can be discussed in term of concepts, state of the art, research, standards, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas. All tracks are open to both research and industry contributions, in terms of Regular papers, Posters, Work in progress, Technical/marketing/business presentations, Demos, Tutorials, and Panels. Before submission, please check and conform with the Editorial rules: http://www.iaria.org/editorialrules.html CYBERLAWS 2012 Topics (topics and submission details: see CfP on the site) ACCESSIBILITY: Digital Divide, e-Democracy and e-Government Digital Divide and Accessibility: Loss of autonomy; Access barriers of age, race, wealth; Problems caused by lack of accessibility; Development of accessibility standards; Legislation related to accessibility e-Democracy and e-Government: Open and Free access; Free postings; Freedom of speech; Freedom of expression on the Internet; Anywhere access; Legal versus illegal; e-Trust; e-Voting and Internet voting; e-Garbage collection of private records; e-Transparency; e-Government and e-Democracy for e-Citizens; e-Environment PRIVACY: e-Anonymity and e-Identity Privacy: Human rights; Privacy versus Security versus Convenience (ease of use); Legitimate purposes; e-Citizen behavior; Right to privacy; Legitimate purposes; e-Citizen behavior; Search engine behavior and policies; Regulating search engines; e-Anonymity and e-Identity: Anonymity; Pseudonimity; Multiple identities; Multiple locations; Wrong by eliminating accountability; Anonymity and social identity; Identity change; Multiple identities; Identity substitution; Securing identity FRAUD: WEB x.0 Impersonation, e-Harassment, e-Threats, e-Loss WEB x.0 Impersonation, and e-Harassment and e-Threats: Social malware; Spam; Bullying; Stalkers; Blogs; Anonymous emails; Hoaxes; e-Rumor email lists; Newsgroup article; Web pages; Pamphlets; Computer hacking; Spam; Carding; Botnets; Phishing; Worms; Virii; Network dynamics attacks; On-line using various data sets; FaceBook; Twitter; YouTube; @anything.com; Corporate e-Hassle; Individual e-Hassle; Role and responsibility substitution, Social networking e-Loss: Personal damage; Economic damage; Promoting the damage by acting against it; e-Loss evaluation PROTECTION: e-Fraud Prevention, e-Law, e-Punishment, e-International relations e-Fraud Prevention: Technology and cyberlaws; Security enforcement; Trust referrals; Cryptography; Education; Law enforcement; Re-active and Pro-active actions; e-Law education Technical Countermeasures: Detection of abusive traffic; Tools for interception and repression; Deep packet inspection; Communications interception; Communications wiretapping and records e-Law: National laws protecting the anonymity; Responsibility for email messages; Lobbying for forbidding anonymity on the Internet; Lawfully regulate anonymity on the Internet; Prevent retaliation; Internet governance; Formal legislation; Soft laws; e-Trust national regulatory aspects e-Punishment: Lawful interception; Propagation traces; Banning; Content blocking; Long-term exchange records; Security pitfalls of e-democracy; e-Trust national enforcement laws; e-Trust cross-digital police; Court warrants; Legal countermeasures e-International relations: Conflict of laws; Extra-jurisdictional net (intellectual property, criminal enforcement); Lobbying for forbidding anonymity on the Internet; Lawfully regulate anonymity on the Internet; Prevent retaliation; Internet governance; Treaties and Conventions, e-Trust international regulatory context. Committee: http://www.iaria.org/conferences2012/ComCYBERLAWS12.html ====================