posted by user: CCDCOE || 2450 views || tracked by 2 users: [display]

CyCon 2015 : International Conference on Cyber Conflict


When May 25, 2015 - May 29, 2015
Where Tallinn, Estonia
Submission Deadline Oct 1, 2014
Notification Due Oct 31, 2014
Final Version Due May 1, 2015
Categories    cyber   virtualisation   standards   conflict

Call For Papers

The 7th International Conference on Cyber Conflict (CyCon 2015) will focus on the construction of the Internet and its potential future development. 40 years ago, the main principles and foundations for the Internet were laid, and they have been used ever since. The “net” has been a tremendous success story and today it is much more than just a commodity. Looking at the figures (2.5 billion users today, 50 billion devices connected in 2020), one would think of the overwhelming influence that these technologies have and that we are only looking at the beginning of a revolution.
Can the structures that we rely upon support the increasing demand and the different ways in which we want to use it? Human behaviours have changed, international politics has changed and our relationship to machines has changed. Therefore, this year’s topic, “Architectures in Cyberspace,” aims to approach what cyberspace is and will
be in the coming years and to identify its unifying and coherent traits.

Does it promise a shining future?

This Call for Papers lists just a few of the pressing issues that will be within the scope of the conference. We intend to grasp these topics from a technical, legal, political, ethical, sociological and economic standpoint:

Technical challenges/requirements
Cryptographic dogma? (e.g. key security, strength of algorithms, etc.)
Future Connectivity and the Internet of Things (e.g. net neutrality, future backbone, new network technologies, etc.)
Big data (e.g. big data management, interpretation and evaluation, etc.)
Technical protocols (e.g. IPv6, 5G, WWW 3.0, etc.)
Operating systems (e.g. multi-core / virtual-core, distributed OS, etc.)
Development and engagement of cyber assets (e.g. enforcement, military capacities, research and education, etc.)
Doctrine and strategies (e.g. state actors in cyberspace, cyber policy, etc.)
Prevention (e.g. early warning, confidence building measures, etc.)
Crisis management (e.g. contingency planning, resilience, etc.)
Arms race (e.g. cyber arms complex, “code war”, etc.)

Regulation – standards
Privacy and personal data protection (e.g. profiling, “right to be forgotten”, etc.)
Security strategies (e.g. implementation frameworks, metrics, etc.)
Technical implementation standards (e.g. RFCs, IEEE, ISO, etc.)
Intellectual property (e.g. copyright and digital rights management, etc.)
Legal developments (e.g. public international law, “Tallinn Manual 2.0”, “cyber crime act”, etc.)

Social networks and Online Communities (e.g. social network merging, “blog wars”, etc.)
Digital economy (e.g. E-Commerce, automated trade, etc.)
Identities (e.g. “virtual me”, E-IDs, avatars, etc.)
Health (e.g. quantified self, etc.)
Politics (e.g. citizenship, revolutions, democracy, etc.)
Knowledge – culture (e.g. contents vs container, creative industries, education (MOOCs), etc.)
Technical aspects of virtualisation (e.g. cloud computing, VM security, etc.)

International cooperation – International relations
Norms development (international treaties, legal framework, etc.)
Governance (e.g. the role of states, IOs, NGOs, technical boards, ISPs, etc.)
Borders in cyberspace (e.g. territoriality, sovereignty, technical implementation of borders and boundaries, etc.)
Cyber world order (e.g. virtual multilateralism, new communities, etc.)

Important Dates for CyCon 2015:
Abstract submission: 1 October, 2014
Notification of Abstract Acceptance: 31 October, 2014
Full paper: 5 January, 2015
Notification of Authors: 16 February, 2015
Final Paper: 16 March, 2015

Authors are first required to submit an abstract of the planned paper, which should describe the topic and lay out the main aspects and structure of the research (300-500 words). After a preliminary review and the acceptance of the abstract, the respective authors will be requested to submit original and unpublished papers meeting high
academic research standards (up to 6000 words, incl. footnotes and references). Submitted papers will be subject to a double-blind peer review.

Submission details, author guidance, the copyright transfer form and other practical information are available on our website at The abstracts and manuscripts must be uploaded electronically to after creating an account.
Authors of papers accepted for publishing in the conference proceedings are requested to make a corresponding presentation at the conference. Speakers will be offered travel (booked by NATO CCD COE), transfer to and from the airport, accommodation and lunches for the duration of the conference, an ice-breaker, a conference dinner and a guided tour in Tallinn (early notification of interest required).

Related Resources

Religion and Conflict 2017   Religion and Culture in Conflict and Peace
MISC.conf 2017   MISC.conf Security Conference
CTI 2017   Cyber Threat Intelligence - Springer Book Chapter
PJSA 2017   Peace & Justice Studies Association: “Moving... From Civil Rights to Human Rights”
Tutu Centre Conference 2017   CfP Reminder: Restoring peace: building post-conflict societies
SI: Cyber Forensics&Threat Intelligence 2017   IEEE Transactions on Sustainable Computing SI on Sustainable Cyber Forensics and Threat Intelligence
COREDEMA 2017   3rd International Workshop on Conflict Resolution in Decision Making
CCOE - CFP 2017   Cyber Center of Excellence (CCOE) Call For Research Papers
MWAIS 2018   13th Annual Conference of the Midwest Association for Information Systems
SCPE_CCNCPS 2017   Special issue on Communication, Computing, and Networking in Cyber-Physical Systems