In recent years, the digital ecosystem has become an arena for hostile cyber activities on the part of states, terror organizations and independent or semi-independent hackers, affecting the interests of individuals, organizations and states. At the same, powerful public and private entities are able to exercise broad powers of surveillance, information collection and manipulation of software and hardware, and can utilize such powers for nefarious ends. This emerging scene, which is under-regulated, creates new threats to civil liberties and human rights. Can existing international law and domestic law instruments and institutions sufficiently address the new threats to civil liberties and human rights?
This conference aims to bring together an international group of established and young scholars who are studying cybersecurity and its ramifications for civil liberties and human rights. The conference will offer an opportunity to present cutting-edge research addressing these issues, to introduce new projects and thought-provoking initiatives, and to promote exchange among participants that will inform their ongoing research.
PAPER SUBMISSIONS: Scholars and researchers from all disciplines are invited to propose papers in the formats detailed below. We welcome submissions from various disciplines, using a variety of theoretical and methodological approaches. Proposals may be submitted for individual presentations, full sessions, round tables and posters related to the conference theme. We also invite proposals for art exhibitions.
SINGLE SESSION PROPOSALS should include title, presenter's name, institutional affiliation, keywords (ideally drawn from the list of topics below), and an abstract of up to 200 words. Abstracts should include a general description of the topic, as well as a description of methodology and research findings, if relevant at the present stage.
PANEL PROPOSALS should include the title, participants' names and institutional affiliations, keywords, a brief description of the panel, and a separate abstract for each presentation (up to 200 words each).
ROUND TABLE PROPOSALS are suitable for informal presentations of research in progress and ongoing collaborative projects. Proposals should include title, participants' names and institutional affiliations, keywords, and an abstract not exceeding 200 words describing the research, the research methodology, findings where applicable, and questions that are emerging from the research.
ARTISTIC EXHIBITION PROPOSALS should include the title, presenters' names and institutional affiliations, keywords, and an abstract not exceeding 200 words. The Committee will consider artistic projects that are related to the conference theme.
POSTER PROPOSALS should include title, presenter's name, institutional affiliation, keywords and an abstract not exceeding 200 words. Posters should present work in progress or initial findings.
TOPICS: Suggested topics (other topics are welcome):
- Application of international law norms included in the Tallinn Manual to cyber operations
- Cyber-specific treaties
- Cybersecurity in the Middle East region
- Predictive policing
- Surveillance, profiling and the use of data analytics in law enforcement
- Cyber terrorism and cyber-counter-terrorism
- The role of states and international organizations in cyber security crises
- Securing rights by design
- The role of non-state actors and corporations in shaping online enforcement
SUBMISSION PROCEDURE: Selected papers will be offered publication in a symposium issue of the Israel Law Review. Proposals should be submitted to the Academic Committee at firstname.lastname@example.org, with the applicant's name, affiliation, phone, and email information.
The deadline for submitting proposals is 1.5.2017.