posted by user: CCDCOE || 2537 views || tracked by 2 users: [display]

CyCon 2015 : International Conference on Cyber Conflict

FacebookTwitterLinkedInGoogle

Link: http://ccdcoe.org/cycon/call-papers.html
 
When May 25, 2015 - May 29, 2015
Where Tallinn, Estonia
Submission Deadline Oct 1, 2014
Notification Due Oct 31, 2014
Final Version Due May 1, 2015
Categories    cyber   virtualisation   standards   conflict
 

Call For Papers

The 7th International Conference on Cyber Conflict (CyCon 2015) will focus on the construction of the Internet and its potential future development. 40 years ago, the main principles and foundations for the Internet were laid, and they have been used ever since. The “net” has been a tremendous success story and today it is much more than just a commodity. Looking at the figures (2.5 billion users today, 50 billion devices connected in 2020), one would think of the overwhelming influence that these technologies have and that we are only looking at the beginning of a revolution.
Can the structures that we rely upon support the increasing demand and the different ways in which we want to use it? Human behaviours have changed, international politics has changed and our relationship to machines has changed. Therefore, this year’s topic, “Architectures in Cyberspace,” aims to approach what cyberspace is and will
be in the coming years and to identify its unifying and coherent traits.

Does it promise a shining future?

This Call for Papers lists just a few of the pressing issues that will be within the scope of the conference. We intend to grasp these topics from a technical, legal, political, ethical, sociological and economic standpoint:

Technical challenges/requirements
Cryptographic dogma? (e.g. key security, strength of algorithms, etc.)
Future Connectivity and the Internet of Things (e.g. net neutrality, future backbone, new network technologies, etc.)
Big data (e.g. big data management, interpretation and evaluation, etc.)
Technical protocols (e.g. IPv6, 5G, WWW 3.0, etc.)
Operating systems (e.g. multi-core / virtual-core, distributed OS, etc.)
Development and engagement of cyber assets (e.g. enforcement, military capacities, research and education, etc.)
Doctrine and strategies (e.g. state actors in cyberspace, cyber policy, etc.)
Prevention (e.g. early warning, confidence building measures, etc.)
Crisis management (e.g. contingency planning, resilience, etc.)
Arms race (e.g. cyber arms complex, “code war”, etc.)

Regulation – standards
Privacy and personal data protection (e.g. profiling, “right to be forgotten”, etc.)
Security strategies (e.g. implementation frameworks, metrics, etc.)
Technical implementation standards (e.g. RFCs, IEEE, ISO, etc.)
Intellectual property (e.g. copyright and digital rights management, etc.)
Legal developments (e.g. public international law, “Tallinn Manual 2.0”, “cyber crime act”, etc.)

Virtualisation
Social networks and Online Communities (e.g. social network merging, “blog wars”, etc.)
Digital economy (e.g. E-Commerce, automated trade, etc.)
Identities (e.g. “virtual me”, E-IDs, avatars, etc.)
Health (e.g. quantified self, etc.)
Politics (e.g. citizenship, revolutions, democracy, etc.)
Knowledge – culture (e.g. contents vs container, creative industries, education (MOOCs), etc.)
Technical aspects of virtualisation (e.g. cloud computing, VM security, etc.)

International cooperation – International relations
Norms development (international treaties, legal framework, etc.)
Governance (e.g. the role of states, IOs, NGOs, technical boards, ISPs, etc.)
Borders in cyberspace (e.g. territoriality, sovereignty, technical implementation of borders and boundaries, etc.)
Cyber world order (e.g. virtual multilateralism, new communities, etc.)

Important Dates for CyCon 2015:
Abstract submission: 1 October, 2014
Notification of Abstract Acceptance: 31 October, 2014
Full paper: 5 January, 2015
Notification of Authors: 16 February, 2015
Final Paper: 16 March, 2015

Publication
Authors are first required to submit an abstract of the planned paper, which should describe the topic and lay out the main aspects and structure of the research (300-500 words). After a preliminary review and the acceptance of the abstract, the respective authors will be requested to submit original and unpublished papers meeting high
academic research standards (up to 6000 words, incl. footnotes and references). Submitted papers will be subject to a double-blind peer review.

Submission details, author guidance, the copyright transfer form and other practical information are available on our website at http://ccdcoe.org/cycon/call-papers.html. The abstracts and manuscripts must be uploaded electronically to https://www.easychair.org/conferences/?conf=cycon2015 after creating an account.
Authors of papers accepted for publishing in the conference proceedings are requested to make a corresponding presentation at the conference. Speakers will be offered travel (booked by NATO CCD COE), transfer to and from the airport, accommodation and lunches for the duration of the conference, an ice-breaker, a conference dinner and a guided tour in Tallinn (early notification of interest required).

Related Resources

Religion and Conflict 2017   Religion and Culture in Conflict and Peace
MISC.conf 2017   MISC.conf Security Conference
SI: Cyber Forensics&Threat Intelligence 2017   IEEE Transactions on Sustainable Computing SI on Sustainable Cyber Forensics and Threat Intelligence
SSR 2017   Security Standardisation Research 2017
PCRC 2017   Peace and Conflict Resolution Conference 2017
IGK 2017   Istanbul Security Conference 2017
DMCS 2017   DMCS - Data Mining for Cyber Security 2017 (collocated with IEEE ICDM'17)
BDA4CID 2017   2017 International Workshop on Big Data Analytics for Cyber Intelligence and Defense
eCrime 2018   13th Symposium on Electronic Crime Research
Tutu Centre Conference 2017   CfP Reminder: Restoring peace: building post-conflict societies