Registration is Now Open, click here to register.
Preliminary Program is Now Available, click here to download.
October 4 - 6, 2010
The Internet has made it easier to perpetrate traditional crimes by providing criminals an alternate avenue for launching
attacks with relative anonymity. The increased complexity of the communication and networking infrastructure is making
investigation of the crimes difficult. Clues of illegal activities are often buried in large volumes of data that needs
to be sifted through in order to detect crimes and collect evidence. The field of digital forensics is becoming very important
for law enforcement, network security, and information assurance. This is a multidisciplinary area that encompasses multiple
fields, including: law, computer science, finance, networking, data mining, and criminal justice. The applications of this
technology are far reaching including: law enforcement, disaster recovery, accounting frauds, homeland security, and information warfare.
This conference brings together practitioners and researchers from diverse fields providing opportunities for business and
intellectual engagement among attendees. The conference is organized by the College of Information Technology at Zayed University
with the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (ICST). Authors are invited
to submit original and unpublished papers to the International Conference on Digital Forensics.
Accepted papers will appear in the conference proceedings and some papers will be selected for journal publication.
The following topics highlight the conference's theme:|
- Financial Crimes (Money Laundering, Fraud, Identity Theft)
- Forensic Accounting (Accounting Fraud, Continuous Assurance, etc.)
- Digital Forensics Training & Education
- Digital Forensics Process and Procedures
- Digital Forensics & Law (e-Discovery & Litigation Support, Incident Response, Evidence Handling)
- Cyber Crime Investigations
- Cyber Security & Information Warfare
- Computer/Handheld Device & Multimedia Forensics (Tools / Techniques)
- Forensics Standardization, Accreditation
- Cyber Criminal Psychology and Profiling
- Software piracy investigation
- Cyber culture and cyber terrorism
Who Should Attend?
Academic Researchers / Instructors |
Anti-Money Laundering Compliance Officers
Auditors / Internal Auditors
Compliance and Risk Management Officers
Financial Intelligence Officers
Information Technology Specialists|
Information Security Officers
Insurance Company Personnel and Agents
Lawyers / Prosecutors / District Attorneys
Money Laundering Reporting Officers
Computer Security Practitioners