CALL FOR PAPERS

FacebookTwitterGoogle+LinkedInGoogle GmailRediff MyPageShare

THE INTERNATIONAL JOURNAL ON CYBERLAW CYBERCRIME & CYBERSECURITY

ISBN: 978-93-5254-019-8

CALL FOR PAPERS

About the Conference

This conference is an opportunity for members of the cyber community to exchange ideas and discuss most recent issues focusing on Cyber law, Cyber crime and Cyber security. Bringing together leading experts and professionals from all over the world, the conference will explore comparative approaches to Cyberlaw, Cybercrime and Cyber security and varied connected issues which are inherent to cyberspace and technology.

The International Conference on Cyberlaw, Cybercrime and Cybersecurity will provide a forum where researchers, government representatives, international bodies, law enforcement organizations and special groups shall be able to present recent lessons learnt and set the priorities on problems and directions related to Cyberlaw, Cybercrime and Cybersecurity.

We welcome papers presenting research and practical results, position papers addressing the pros and cons of specific proposals, such as those being discussed in the standard fora or in industry consortia, papers addressing the key problems and solutions on any of the topics of the conference.

In the context of papers from industry stakeholders, we expect papers that express industry’s position and status. Papers on specific related topics and panels on challenging areas are encouraged.

The topics suggested by the conference can be discussed in term of concepts, state of the art, research, standards, implementations, running experiments, applications, and industry case studies. Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas.

  1. Cyber law 2015 & Beyond
  2. Newly Emerging Cyber crimes
  3. Trends for Cyber Security
  4. Surveillance, Interception & Sovereignty
  5. Intermediary Rights and Liability in a changed new Cyber World
  6. Dark Web – A New Blackhole
  7. Has Digital Privacy Evaporated Totally?
  8. Internet Jurisdiction – A Catch 2022 Situation
  9. Digital Defamation, Right To Be Forgotten & Connected Legalities
  10. Net Neutrality Developments Till Date
  11. Free Speech
  12. Internet Governance – Progress So Far & Challenges Ahead
  13. Cyber Terrorism, Cyber Fundamentalism & Cyber Extremism
  14. Mobile Crimes
  15. Developments in International Approaches on Regulating Cyber crimes The World Over
  16. Cyber war & Legalities
  17. Cyber Bullying, Cyber Harassment &  Social Media
  18. Cyber crime & Big Data Legalities
  19. Internet of Things, Cyber Security & Connected Maze of Legalities
  20. Mobile Security Challenges
  21. Mobile Apps & Cyber Security
  22. Data Protection- New Legal Manifestations
  23. Mobile Payments & Cyber Security
  24. Social Media, Societal Behaviour, Cyber Security & Cyber Safety
  25. Emerging legal challenges with Cryptocurrencies and  Digital Currencies
  26. Free Speech and Democracy in Cyberspace
  27. Cyber Safety and connected rights, duties and obligations
  28. Securing and safely ensuring electronic transactions
  29. Strategies for increasing public awareness of the consequences of cyber crime
  30. Protecting your data, intellectual property and brand in cyberspace
  31. Cyber Security Risk Management
  32. Cloud Data Storage Security, Threats and Legalities
  33. Cyber laws and regulations for enhancing e-commerce
  34. Data Breaches ,Emerging Legal Issues and Best Practices
  35. Digital Vellum and Legal, Policy Challenges
  36. Online threats and Human Rights
  37. Cyber Victimology
  38. Cyber Disaster Management
  39. Mobile OS ecosystem and Cybersecurity
  40. Cyber Sovereignty and its enforceability
  41. Domain Name Legal Issues
  42. Facial Recognition technologies and the need for legally protecting the face
  43. Electronic Interception as a Sovereign Right and Limitations
  44. Information Sharing
  45. Limiting Corporate  Cyber Liabilities- international best practices and Cyber Insurance

TYPES OF SUBMISSIONS

Research Paper

research paper is a full-length, original research document that reports results of major and archival value to the specific community of cyberspace entities that comprise the journal audience. Recommended Length: 9000 words

Expert View

An Expert View article is a brief overview of the most recent advances in a given area of CyberLaw, Cybercrime and Cybersecurity. Expert View articles undergo full peer review. The format for an Expert View is the same as a Research Paper. Recommended Length: 4500 words.

 

Technical Brief

technical brief reports results that are of significant and archival value to the cyber technology community; however, these works are more limited in scope and length than a research paper. A technical brief may contain any of the following:

  • preliminary report of a result not yet fully developed or interpreted
  • commentary on a technical issue of potential interest to readers

Technology Review

technology review is a brief, critical and unbiased evaluation of a current technology, application, or product determined to be of interest to the journal audience. Publication of a submitted technology review is at the discretion of the editor.

Short briefing papers

A legal, technology or a management briefing on aspects of cyber law. These papers need not be extensive. The length should be not more than 1000 words.

Case Studies 

Case studies are typically descriptions of a given situation in cyber law. Names of organizations/actors can be kept anonymous to maintain confidentiality. Typical length is about 2500 words.

 

 

 

 

ELIGIBILITY FOR PARTICIPATION

Only Post Graduates (or persons pursuing post graduation), industry professionals and academicians in the arena of cyberspace are eligible for participation.

 

HOW TO SUBMIT

  • Papers and abstracts for the conference should be submitted to the following email address: info@cyberlawcybercrime.com for the attention of Conference Director.
  • Your proposal will normally be reviewed within a few weeks.

 

Top of Form

Bottom of Form

IMPORTANT DATES:

  • Abstracts of no more than 250 words inclusive of keywords should be submitted by the date of 1st October,2015.
  • We encourage you to submit in good time & well before the submission deadline in order to benefit from Early Bird rates.
  • All accepted authors may have their full paper published in the THE INTERNATIONAL JOURNAL ON CYBERLAW CYBERCRIME & CYBERSECURITY JOURNAL. Deadline for submission of full papers is due by 20th October, 2015.

 

PUBLICATION AND COPYRIGHT ISSUES

 

Abstracts, research papers, articles, video footage, images, and other forms of print and digital media will be made available by THE INTERNATIONAL CONFERENCE ON CYBERLAW CYBERCRIME & CYBERSECURITY to the general public on an open access, online basis.  An author or creator is hereby granting THE INTERNATIONAL CONFERENCE ON CYBERLAW CYBERCRIME & CYBERSECURITY an exclusive license for the full period of copyright throughout the world, including the exclusive right to publish, distribute, or communicate, their original submitted work in any publication, whether in an online, electronic, technological or print format, be that in whole, partial or modified form. Authors retain originating copyright of their own work, but through the act of agreeing to transfer the license to THE INTERNATIONAL CONFERENCE ON CYBERLAW CYBERCRIME & CYBERSECURITY under Copyright Act in India allow THE INTERNATIONAL CONFERENCE ON CYBERLAW CYBERCRIME & CYBERSECURITY to take measures on behalf of authors against infringement, inappropriate use of an article, libel or plagiarism of any work, materials or content attributed under this license by other parties and further allow THE INTERNATIONAL CONFERENCE ON CYBERLAW CYBERCRIME & CYBERSECURITY to monitor, uphold and maintain the integrity of an abstract, paper or article.  All publications and digital media produced for the conference will be openly archived on the THE INTERNATIONAL CONFERENCE ON CYBERLAW CYBERCRIME & CYBERSECURITY research archive.

INSTRUCTION FOR THE AUTHORS

Papers should meet the following requirements:

General rules:
  • Paper should reveal knowledge in international law
  • Analysis of case law, comparative analysis of legislation of different countries, roles of international organizations and review of international acts should be reflected in the paper;
  • Paper should include contemporary trends in legal regulatory framework of Cyberlaw, Cybercrime and CyberSecurity;
  • Paper should be written in compliance with the writing rules;
  • Paper should be written in English.

Writing Rules:

 

  • Interval between lines: 1.0;
  • Font size: 12;
  • Font type: Times New Roman
  • Footnotes should be as per the Bluebook Citation
  • Acknowledgment of sources:
  1. Quotations: Any quotations, however small, must be placed in quotation marks or clearly indented beyond the regular margin and single-spaced in a double-spaced paper. Any quotation must be accompanied (either within the text or in a footnote) by a precise indication of the source - identifying the author, title, place and date of publication, and page numbers. Any sentence or phrase which is not the original work of the student must be acknowledged.
  2. Paraphrasing: Any material summarized or paraphrased from a source must be specifically acknowledged in a footnote or in the text, as would a direct quotation. A thorough rewording or rearrangement of an author's text does not relieve one of this responsibility. A writer should be diligent in taking adequate reading notes so that debts of phrasing may be acknowledged where they are due; it is not necessarily a sufficient or valid excuse to claim that the phrases or ideas of a text were unknowingly duplicated simply because of a time lapse between the reading of a source and the writing of a paper.
  3. Crediting Ideas and Facts: Any ideas or facts borrowed from a particular source should be specifically acknowledged in a footnote or in the text of the paper, even if the idea or fact has been further elaborated by the writer. Some widely known ideas, facts, formulae and other kinds of information are considered to be "common knowledge" and do not require citation. The criteria for "common knowledge" vary among disciplines; if doubt exists as to whether a citation is needed, a faculty member should be consulted. The requirements for citing the sources of ideas and facts apply to unpublished essays and notes, as well as published works. If such unpublished sources are used, the writer must state the fact and indicate clearly the nature and extent of his or her obligation.

CONTACT US

For additional information, please contact: Email Address: info@cyberlawcybercrime.com

Contact no: +91-11-46584441

 

FacebookTwitterGoogle+LinkedInGoogle GmailRediff MyPageShare