Authors are
invited to send their abstract to the secretariat prior to July 10, 2013. The
abstracts should not exceed 500 words. An abstract is indicative of the final
paper quality and, therefore, authors are urged to prepare concise, clear and
informative abstracts describing their work with emphasis on objectives and
results. Accepted abstracts will be published by an internationally well known
publishing company in a special volume, so special attention should be paid to
its presentation.
The conference
will include keynote addresses, tutorials, panels, workshops, special, regular
and poster sessions. All papers will be peer reviewed. Acceptance will be based
on quality, relevance and originality. Accepted papers will be published in the
conference proceedings and selected papers will be invited to participate
(after the necessary enhancements) to the evaluation process for inclusion in
special issues of peer reviewed journals.
Topics will include, but are not limited to,
the following:
- E-Democracy and E-Participation
- E-Campaigning, E-Politics;
- E-voting and Decision – making;
- Information and Consultation Platforms;
- Collaborative e-Democracy;
- E-Government, Security, Privacy and Trust;
- E-business, Security, Privacy and Trust;
- Ethics in Digital Societies;
- Surveillance Technologies and Legal Implications;
- Freedom of Expression and Privacy;
- Freedom of Information and Privacy;
- The proposed Data Protection Package in EU;
- Social Media and Privacy;
- Open and Big Data;
- Open Science;
- Digital Divide;
- Internet Addiction;
- Cloud Computing, Security and Privacy;
- Identity Cards, Identity Theft and Trust Management;
- Information Audit and Trust;
- Digital Rights Management;
- Trust and Reputation in Digital Environments;
- Cyber Crime, Detection, Prevention;
- Internet Fraud, Cyber War;
- Computer Forensics and Anti-forensics;
- Cryptographic Technologies;
- Privacy Preserving Publishing;
- Anonymisation Methodologies and Best Practices;
- Privacy by Design and Default Methodologies;
- Tracking Technologies and Do-Not-Track Systems;
- Transparency and Accountability in Data Protection;
- Privacy Impact Assessment Methodologies;
- Privacy Enhancing Location and Mobility Management;
- Security and Privacy Audit, Risk and Governance;
- Security and Data Protection Education;
More
information: