{"id":2206,"date":"2017-01-23T10:01:48","date_gmt":"2017-01-23T00:01:48","guid":{"rendered":"https:\/\/blogs.qut.edu.au\/crime-and-justice-research-centre\/?p=2206"},"modified":"2017-01-25T16:21:06","modified_gmt":"2017-01-25T06:21:06","slug":"upcoming-event-2017-icccf-conference","status":"publish","type":"post","link":"https:\/\/blogs.qut.edu.au\/crime-and-justice-research-centre\/2017\/01\/23\/upcoming-event-2017-icccf-conference\/","title":{"rendered":"Upcoming Event: 2017 ICCCF Conference"},"content":{"rendered":"<h1 style=\"text-align: justify\"><a href=\"https:\/\/blogs.qut.edu.au\/crime-and-justice-research-centre\/files\/2017\/01\/icccf.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-2216 aligncenter\" src=\"https:\/\/blogs.qut.edu.au\/crime-and-justice-research-centre\/files\/2017\/01\/icccf-300x81.png\" alt=\"\" width=\"300\" height=\"81\" srcset=\"https:\/\/blogs.qut.edu.au\/crime-and-justice-research-centre\/files\/2017\/01\/icccf-300x81.png 300w, https:\/\/blogs.qut.edu.au\/crime-and-justice-research-centre\/files\/2017\/01\/icccf-768x207.png 768w, https:\/\/blogs.qut.edu.au\/crime-and-justice-research-centre\/files\/2017\/01\/icccf-1024x276.png 1024w, https:\/\/blogs.qut.edu.au\/crime-and-justice-research-centre\/files\/2017\/01\/icccf-500x135.png 500w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/h1>\n<h1 style=\"text-align: justify\">Abstracts are now open for the\u00a05th International Conference on Cybercrime and Computer Forensics (ICCCF).<\/h1>\n<p style=\"text-align: justify\">The theme of the 2017 conference is<strong><em> \u2018Cybercrime Research, Policy and Practice: The Collaboration Imperative\u2019.<\/em><\/strong><\/p>\n<p style=\"text-align: justify\">The massive increase in technological developments in personal computing, smart phone and wireless devices in recent years has created significant challenges in the Asia-Pacific region and beyond. This important conference will explore the expansion of technology-enabled crimes and how collaboration can inform technological, legal and policy responses internationally.<!--more--><\/p>\n<p style=\"text-align: justify\"><span style=\"text-decoration: underline\"><strong>Key dates<\/strong><\/span><\/p>\n<ul>\n<li>23 January &#8211; Abstract submissions open<\/li>\n<li>23 January &#8211; Registrations open<\/li>\n<li>17 March &#8211; Abstract submissions close<\/li>\n<li>30 May &#8211; \u00a0Early bird registration closes<\/li>\n<li>16 July &#8211; \u00a0Welcome reception<\/li>\n<li>17-18 July &#8211; ICCCF Conference<\/li>\n<\/ul>\n<p style=\"text-align: justify\">Abstracts can address any relevant questions within this broad theme and presenters should choose to present in one of two streams:<\/p>\n<ul style=\"text-align: justify\">\n<li>Research and policy<\/li>\n<li>Practice and technology<\/li>\n<\/ul>\n<p><strong>a) Research and policy &#8211; <\/strong>Examples of research issues within these streams include:<\/p>\n<p style=\"text-align: justify\">Results of cybercrime research and discussion of related policy issues, including:<\/p>\n<ul style=\"text-align: justify\">\n<li>Personal information, privacy and identity misuse<\/li>\n<li>Intellectual property regulation<\/li>\n<li>Illegal content in cyberspace<\/li>\n<li>Online dishonesty<\/li>\n<li>Regulating the internet of things<\/li>\n<li>Sentencing cyber criminals<\/li>\n<\/ul>\n<p><strong>b) Practice and technology <\/strong><br \/>\nPractical issues and technology affecting cybercrime and its prevention and regulation, such as:<\/p>\n<ul style=\"text-align: justify\">\n<li>Computer and mobile forensics<\/li>\n<li>Resource allocation within law enforcement<\/li>\n<li>Cyber intelligence sharing<\/li>\n<li>Data sharing across networks<\/li>\n<li>Cloud security<\/li>\n<li>Biometric authentication<\/li>\n<li>Cyber crime prevention software<\/li>\n<\/ul>\n<h1 style=\"text-align: justify\">Submission<\/h1>\n<p style=\"text-align: justify\">Abstracts must be submitted using the form available on <a href=\"http:\/\/www.icccf2017.com.au\" target=\"_blank\">www.icccf2017.com.au<\/a> \u00a0and should not exceed 300 words.<\/p>\n<p style=\"text-align: justify\">The abstract should outline the background, aims and content of the presentation. Abstracts related to research studies should include sections describing the methods, results and conclusions of the study.<\/p>\n<p style=\"text-align: justify\">For more information about the ICCCF visit <a href=\"http:\/\/www.icccf2017.com.au\" target=\"_blank\">www.icccf2017.com.au<\/a> or contact <a href=\"mailto:events@acic.gov.au\">events@acic.gov.au<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Abstracts are now open for the\u00a05th International Conference on Cybercrime and Computer Forensics (ICCCF). The theme of the 2017 conference is \u2018Cybercrime Research, Policy and Practice: The Collaboration Imperative\u2019. The massive increase in technological developments in personal computing, smart phone and wireless devices in recent years has created significant challenges in the Asia-Pacific region and<\/p>\n","protected":false},"author":372,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1,9697,3],"tags":[15270,9803,11660,15269],"class_list":{"0":"post-2206","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-uncategorized","7":"category-conferences","8":"category-news","9":"tag-apatas","10":"tag-conference","11":"tag-cybercrime","12":"tag-icccf"},"acf":[],"_links":{"self":[{"href":"https:\/\/blogs.qut.edu.au\/crime-and-justice-research-centre\/wp-json\/wp\/v2\/posts\/2206","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.qut.edu.au\/crime-and-justice-research-centre\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.qut.edu.au\/crime-and-justice-research-centre\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.qut.edu.au\/crime-and-justice-research-centre\/wp-json\/wp\/v2\/users\/372"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.qut.edu.au\/crime-and-justice-research-centre\/wp-json\/wp\/v2\/comments?post=2206"}],"version-history":[{"count":5,"href":"https:\/\/blogs.qut.edu.au\/crime-and-justice-research-centre\/wp-json\/wp\/v2\/posts\/2206\/revisions"}],"predecessor-version":[{"id":2218,"href":"https:\/\/blogs.qut.edu.au\/crime-and-justice-research-centre\/wp-json\/wp\/v2\/posts\/2206\/revisions\/2218"}],"wp:attachment":[{"href":"https:\/\/blogs.qut.edu.au\/crime-and-justice-research-centre\/wp-json\/wp\/v2\/media?parent=2206"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.qut.edu.au\/crime-and-justice-research-centre\/wp-json\/wp\/v2\/categories?post=2206"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.qut.edu.au\/crime-and-justice-research-centre\/wp-json\/wp\/v2\/tags?post=2206"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}