The Internet has made it easier to perpetrate traditional crimes by providing criminals an alternate avenue for launching attacks with relative anonymity. The increased complexity of the communication and networking infrastructure is making investigation of the crimes difficult. Clues of illegal activities are often buried in large volumes of data that needs to be sifted through in order to detect crimes and collect evidence. The field of digital forensics is becoming very important for law enforcement, network security, and information assurance. This is a multidisciplinary area that encompasses multiple fields, including: law, computer science, finance, networking, data mining, and criminal justice. The applications of this technology are far reaching including: law enforcement, disaster recovery, accounting frauds, homeland security, and information warfare. This conference brings together practitioners and researchers from diverse fields providing opportunities for business and intellectual engagement among attendees. The conference is organized by the School of Business at the University at Albany, State University of New York in collaboration with the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering (ICST). Authors are invited to submit original and unpublished papers to the International Conference on Digital Forensics. Accepted papers will appear in the conference proceedings and some papers will be selected for journal publication.
The following tracks are expected at the conference (Track chairs are listed within parentheses)
Financial Crimes (Money Laundering, Fraud, Identity Theft) - William F. Mosher Jr., NYS Police Financial Crimes Unit
Forensic Accounting (Accounting Fraud, Continuous Assurance, etc.) - Richard Hurley, University of Connecticut & Michael Alles, Rutgers University
Forensics Training & Education - Leonard Stokes, Siena College
Forensics & Law (e-Discovery & Litigation Support, Incident Response, Evidence Handling)- Steve Treglia, Nassau County District Attorney's Office
Cyber Crime Investigations - Angela Orebaugh, George Mason University
Cyber Security & Information Warfare - Michael Smith, Symantec
Computer/Handheld Device & Multimedia Forensics (Tools / Techniques) - Marc Rogers, Purdue University
Forensics Standardization & Accreditation - Carrie Whitcomb, University of Central Florida
Submission Guidelines
Submitted papers must not have been previously published, or currently under consideration for publication elsewhere, or have substantial overlap with papers the author has submitted elsewhere.
Submissions undergo a double-blind peer review process.
Papers selected for presentation will be published in formal proceedings.
Selected papers from the conference will be considered for publication in a special issue of the International Journal of Accounting Information Systems. Arrangements are also being made with other journals for publication of selected papers.
Papers in the topic areas discussed are preferred, although contributions outside those topics may also be of interest. Please feel free at any time to contact the symposium chair if you have questions regarding your submission.
Papers should be submitted via the ASSYST system in LNICST format (see Author's Kit) and should include the following:
Separate title page (in plain text) with title, name(s) of author(s), organizational affiliation(s), telephone and fax number(s), postal address(es), email address(es), and author to contact for correspondence about the paper.
Abstract (less than 250 words).
Paper including a brief biography of each author as appropriate at the end of the paper.
Submissions can be made in a number of categories: Completed research papers, research-in-progress papers, case studies, and panel proposals/round table discussions. Please follow the following guidelines in preparing your submission.
Completed Research Papers: Typically 5,000 words long (excluding abstract and references).
Research in Progress Papers: Typically 2,500 words (excluding abstract and references).
Case Studies: Typically between 3,000 and 5,000 words long.
Round Table Discussion: Typically a 1,000 word synopsis of the topic area.
Panel Proposals: Typically a 1,000 word description, identifying the panelists to be involved.
Workshop Proposals: Typically a 1,000 word description of topics, potential speakers, program length, and potential audience. Also, include proposer resume(s).