General Links
Sponsorship Opportunities at ICDF2C 2010
Sign up for ICDF2C Updates
Call for Papers
Call for Presentations
Organizing Committee
Technical Program Committee
Authors / Presenters
Author's Kit
Submit Papers
Presenter Information
Keynote Speakers
Technical Program
Social Event
Visa Information
Hotel Reservation
Media Partners
Past Editions
2009 - Albany, NY
Important Dates
Paper Submission DeadlineJune 1, 2010
Notification of AcceptanceJuly 8, 2010
Camera-Ready Paper SubmissionAugust 1, 2010
Conference DatesOctober 4-6, 2010

The Internet has made it easier to perpetrate traditional crimes by providing criminals an alternate avenue for launching attacks with relative anonymity. The increased complexity of the communication and networking infrastructure is making investigation of the crimes difficult. Clues of illegal activities are often buried in large volumes of data that needs to be sifted through in order to detect crimes and collect evidence. The field of digital forensics is becoming very important for law enforcement, network security, and information assurance. This is a multidisciplinary area that encompasses multiple fields, including: law, computer science, finance, networking, data mining, and criminal justice. The applications of this technology are far reaching including: law enforcement, disaster recovery, accounting frauds, homeland security, and information warfare. This conference brings together practitioners and researchers from diverse fields providing opportunities for business and intellectual engagement among attendees. The conference is organized by the College of Information Technology at Zayed University with the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering (ICST). Authors are invited to submit original and unpublished papers to the International Conference on Digital Forensics. Accepted papers will appear in the conference proceedings and some papers will be selected for journal publication.

The following topics highlight the conference's theme:

  • Financial Crimes (Money Laundering, Fraud, Identity Theft)
  • Forensic Accounting (Accounting Fraud, Continuous Assurance, etc.)
  • Digital Forensics Training & Education
  • Digital Forensics Process and Procedures
  • Digital Forensics & Law (e-Discovery & Litigation Support, Incident Response, Evidence Handling)
  • Cyber Crime Investigations
  • Cyber Security & Information Warfare
  • Computer/Handheld Device & Multimedia Forensics (Tools / Techniques)
  • Forensics Standardization, Accreditation
  • Cyber Criminal Psychology and Profiling
  • Software piracy investigation
  • Cyber culture and cyber terrorism

Submission Guidelines

  1. Submitted papers must not have been previously published, or currently under consideration for publication elsewhere, or have substantial overlap with papers the author has submitted elsewhere.
  2. Submissions undergo a double-blind peer review process.
  3. Papers selected for presentation will be published in formal proceedings.
  4. Selected papers from the conference will be considered for publication in a special issue of the International Journal of Accounting Information Systems. Arrangements are also being made with other journals for publication of selected papers.
  5. Papers in the topic areas discussed are preferred, although contributions outside those topics may also be of interest. Please feel free at any time to contact the symposium chair if you have questions regarding your submission.
  6. Papers should be submitted via the ASSYST system in LNICST format (see Author's Kit)

ASSYST Submission Management System:

Submission Categories

Submissions can be made in a number of categories: Completed research papers, research-in-progress papers, case studies, and panel proposals/round table discussions. Please follow the following guidelines in preparing your submission.

  • Completed Research Papers: No longer than 16 pages (including abstract and references).
  • Research in Progress Papers: No longer than 8 pages (including abstract and references).
  • Case Studies: Between 8-16 pages long.
  • Round Table Discussion: Typically a 1,000 word synopsis of the topic area.
  • Panel Proposals: Typically a 1,000 word description, identifying the panelists to be involved.
  • Workshop Proposals: Typically a 1,000 word description of topics, potential speakers,
    program length, and potential audience. Also, include proposer resume(s).

Submission Guidelines to ASSYST

Important Dates
Paper Submission DeadlineJune 1, 2010
Notification of AcceptanceJuly 8, 2010
Camera-Ready Paper SubmissionAugust 1, 2010
Conference DatesOctober 4-6, 2010

© Copyright 2010 ICST - All rights reserved.