CYBER SECURITY AND INTELLIGENCE CONFERENCE


Cyber Security and Intelligence Conference is one of the leading research topics in the international research conference domain. Cyber Security and Intelligence is a conference track under the Law Conference which aims to bring together leading academic scientists, researchers and research scholars to exchange and share their experiences and research results on all aspects of Law.

internationalconference.net provides a premier interdisciplinary platform for researchers, practitioners and educators to present and discuss the most recent innovations, trends, and concerns as well as practical challenges encountered and solutions adopted in the fields of (Law).

Cyber Security and Intelligence is not just a call for academic papers on the topic; it can also include a conference, event, symposium, scientific meeting, academic, or workshop.

You are welcome to SUBMIT your research paper or manuscript to Cyber Security and Intelligence Conference Track will be held at “Law Conference in Rome, Italy in December 2019” - “Law Conference in London, United Kingdom in February 2020” - “Law Conference in Barcelona, Spain in April 2020” - “Law Conference in Istanbul, Turkey in May 2020” - “Law Conference in San Francisco, United States in June 2020” - “Law Conference in Paris, France in July 2020” - “Law Conference in New York, United States in August 2020” - “Law Conference in Tokyo, Japan in September 2020” - “Law Conference in Zürich, Switzerland in September 2020” - “Law Conference in Barcelona, Spain in October 2020” - “Law Conference in San Francisco, United States in November 2020” - “Law Conference in Istanbul, Turkey in November 2020” - “Law Conference in Singapore, Singapore in November 2020” - “Law Conference in Bangkok, Thailand in December 2020” - “Law Conference in Paris, France in December 2020” .

Cyber Security and Intelligence is also a leading research topic on Google Scholar, Semantic Scholar, Zenedo, OpenAIRE, BASE, WorldCAT, Sherpa/RoMEO, Elsevier, Scopus, Web of Science.

V. INTERNATIONAL LAW CONFERENCE

DECEMBER 12 - 13, 2019
ROME, ITALY

VI. INTERNATIONAL LAW CONFERENCE

FEBRUARY 13 - 14, 2020
LONDON, UNITED KINGDOM

VII. INTERNATIONAL LAW CONFERENCE

APRIL 15 - 16, 2020
BARCELONA, SPAIN

VIII. INTERNATIONAL LAW CONFERENCE

MAY 11 - 12, 2020
ISTANBUL, TURKEY

  • Abstracts/Full-Text Paper Submission Deadline October 31, 2019
  • Notification of Acceptance/Rejection Deadline November 15, 2019
  • Final Paper and Early Bird Registration Deadline April 01, 2020
  • CONFERENCE CODE: 20LC05TR
  • One Time Submission Deadline Reminder

IX. INTERNATIONAL LAW CONFERENCE

JUNE 04 - 05, 2020
SAN FRANCISCO, UNITED STATES

  • Abstracts/Full-Text Paper Submission Deadline October 31, 2019
  • Notification of Acceptance/Rejection Deadline November 15, 2019
  • Final Paper and Early Bird Registration Deadline May 06, 2020
  • CONFERENCE CODE: 20LC06US
  • One Time Submission Deadline Reminder

X. INTERNATIONAL LAW CONFERENCE

JULY 20 - 21, 2020
PARIS, FRANCE

  • Abstracts/Full-Text Paper Submission Deadline October 31, 2019
  • Notification of Acceptance/Rejection Deadline November 15, 2019
  • Final Paper and Early Bird Registration Deadline June 19, 2020
  • CONFERENCE CODE: 20LC07FR
  • One Time Submission Deadline Reminder

XI. INTERNATIONAL LAW CONFERENCE

AUGUST 10 - 11, 2020
NEW YORK, UNITED STATES

  • Abstracts/Full-Text Paper Submission Deadline October 31, 2019
  • Notification of Acceptance/Rejection Deadline November 15, 2019
  • Final Paper and Early Bird Registration Deadline July 10, 2020
  • CONFERENCE CODE: 20LC08US
  • One Time Submission Deadline Reminder

XII. INTERNATIONAL LAW CONFERENCE

SEPTEMBER 10 - 11, 2020
TOKYO, JAPAN

  • Abstracts/Full-Text Paper Submission Deadline October 31, 2019
  • Notification of Acceptance/Rejection Deadline November 15, 2019
  • Final Paper and Early Bird Registration Deadline August 10, 2020
  • CONFERENCE CODE: 20LC09JP
  • One Time Submission Deadline Reminder

XIII. INTERNATIONAL LAW CONFERENCE

SEPTEMBER 17 - 18, 2020
ZÜRICH, SWITZERLAND

  • Abstracts/Full-Text Paper Submission Deadline October 31, 2019
  • Notification of Acceptance/Rejection Deadline November 15, 2019
  • Final Paper and Early Bird Registration Deadline August 17, 2020
  • CONFERENCE CODE: 20LC09CH
  • One Time Submission Deadline Reminder

XIV. INTERNATIONAL LAW CONFERENCE

OCTOBER 22 - 23, 2020
BARCELONA, SPAIN

  • Abstracts/Full-Text Paper Submission Deadline October 31, 2019
  • Notification of Acceptance/Rejection Deadline November 15, 2019
  • Final Paper and Early Bird Registration Deadline September 22, 2020
  • CONFERENCE CODE: 20LC10ES
  • One Time Submission Deadline Reminder

XV. INTERNATIONAL LAW CONFERENCE

NOVEMBER 05 - 06, 2020
SAN FRANCISCO, UNITED STATES

  • Abstracts/Full-Text Paper Submission Deadline October 31, 2019
  • Notification of Acceptance/Rejection Deadline November 15, 2019
  • Final Paper and Early Bird Registration Deadline October 05, 2020
  • CONFERENCE CODE: 20LC11US
  • One Time Submission Deadline Reminder

XVI. INTERNATIONAL LAW CONFERENCE

NOVEMBER 05 - 06, 2020
ISTANBUL, TURKEY

  • Abstracts/Full-Text Paper Submission Deadline October 31, 2019
  • Notification of Acceptance/Rejection Deadline November 15, 2019
  • Final Paper and Early Bird Registration Deadline October 05, 2020
  • CONFERENCE CODE: 20LC11TR
  • One Time Submission Deadline Reminder

XVII. INTERNATIONAL LAW CONFERENCE

NOVEMBER 19 - 20, 2020
SINGAPORE, SINGAPORE

  • Abstracts/Full-Text Paper Submission Deadline October 31, 2019
  • Notification of Acceptance/Rejection Deadline November 15, 2019
  • Final Paper and Early Bird Registration Deadline October 19, 2020
  • CONFERENCE CODE: 20LC11SG
  • One Time Submission Deadline Reminder

XVIII. INTERNATIONAL LAW CONFERENCE

DECEMBER 17 - 18, 2020
BANGKOK, THAILAND

  • Abstracts/Full-Text Paper Submission Deadline October 31, 2019
  • Notification of Acceptance/Rejection Deadline November 15, 2019
  • Final Paper and Early Bird Registration Deadline November 17, 2020
  • CONFERENCE CODE: 20LC12TH
  • One Time Submission Deadline Reminder

XIX. INTERNATIONAL LAW CONFERENCE

DECEMBER 28 - 29, 2020
PARIS, FRANCE

  • Abstracts/Full-Text Paper Submission Deadline October 31, 2019
  • Notification of Acceptance/Rejection Deadline November 15, 2019
  • Final Paper and Early Bird Registration Deadline November 26, 2020
  • CONFERENCE CODE: 20LC12FR
  • One Time Submission Deadline Reminder
FINISHED

I. INTERNATIONAL LAW CONFERENCE

MARCH 19 - 20, 2019
ISTANBUL, TURKEY

FINISHED

II. INTERNATIONAL LAW CONFERENCE

JUNE 26 - 27, 2019
PARIS, FRANCE

FINISHED

III. INTERNATIONAL LAW CONFERENCE

AUGUST 21 - 22, 2019
LONDON, UNITED KINGDOM

FINISHED

IV. INTERNATIONAL LAW CONFERENCE

OCTOBER 08 - 09, 2019
NEW YORK, UNITED STATES

Law Conference Call For Papers are listed below:

Previously Published Papers on "Cyber Security and Intelligence Conference"

  • The U.S. Missile Defense Shield and Global Security Destabilization: An Inconclusive Link
    Authors: Michael A. Unbehauen, Gregory D. Sloan, Alberto J. Squatrito, Keywords: Arms control, arms race, global security, GMD, ICBM, missile defense, proliferation. DOI:10.5281/zenodo.3299365 Abstract: Missile proliferation and global stability are intrinsically linked. Missile threats continually appear at the forefront of global security issues. North Korea’s recently demonstrated nuclear and intercontinental ballistic missile (ICBM) capabilities, for the first time since the Cold War, renewed public interest in strategic missile defense capabilities. To protect from limited ICBM attacks from so-called rogue actors, the United States developed the Ground-based Midcourse Defense (GMD) system. This study examines if the GMD missile defense shield has contributed to a safer world or triggered a new arms race. Based upon increased missile-related developments and the lack of adherence to international missile treaties, it is generally perceived that the GMD system is a destabilizing factor for global security. By examining the current state of arms control treaties as well as existing missile arsenals and ongoing efforts in technologies to overcome U.S. missile defenses, this study seeks to analyze the contribution of GMD to global stability. A thorough investigation cannot ignore that, through the establishment of this limited capability, the U.S. violated longstanding, successful weapons treaties and caused concern among states that possess ICBMs. GMD capability contributes to the perception that ICBM arsenals could become ineffective, creating an imbalance in favor of the United States, leading to increased global instability and tension. While blame for the deterioration of global stability and non-adherence to arms control treaties is often placed on U.S. missile defense, the facts do not necessarily support this view. The notion of a renewed arms race due to GMD is supported neither by current missile arsenals nor by the inevitable development of new and enhanced missile technology, to include multiple independently targeted reentry vehicles (MIRVs), maneuverable reentry vehicles (MaRVs), and hypersonic glide vehicles (HGVs). The methodology in this study encapsulates a period of time, pre- and post-GMD introduction, while analyzing international treaty adherence, missile counts and types, and research in new missile technologies. The decline in international treaty adherence, coupled with a measurable increase in the number and types of missiles or research in new missile technologies during the period after the introduction of GMD, could be perceived as a clear indicator of GMD contributing to global instability. However, research into improved technology (MIRV, MaRV and HGV) prior to GMD, as well as a decline of various global missile inventories and testing of systems during this same period, would seem to invalidate this theory. U.S. adversaries have exploited the perception of the U.S. missile defense shield as a destabilizing factor as a pretext to strengthen and modernize their militaries and justify their policies. As a result, it can be concluded that global stability has not significantly decreased due to GMD; but rather, the natural progression of technological and missile development would inherently include innovative and dynamic approaches to target engagement, deterrence, and national defense.
  • Technology, Organizational and Environmental Determinants of Business Intelligence Systems Adoption in Croatian SME: A Case Study of Medium-Sized Enterprise
    Authors: Ana-Marija Stjepić, Luka Sušac, Dalia Suša Vugec, Keywords: Adoption, business intelligence, business intelligence systems, case study, TOE framework. DOI:10.5281/zenodo.3298898 Abstract: In the last few years, examples from scientific literature and business practices show that the adoption of technological innovations increases enterprises' performance. Recently, when it comes to the field of information technology innovation, business intelligence systems (BISs) have drawn a significant amount of attention of the scientific circles. BISs can be understood as a form of technological innovation which can bring certain benefits to the organizations that are adopting it. Therefore, the aim of this paper is twofold: (1) to define determinants of successful BISs adoption in small and medium enterprises and thus contribute to this neglected research area and (2) to present the current state of BISs adoption in small and medium-sized companies. In order to do so, determinants are defined and classified into three dimensions, according to the Technology – Organization – Environment (TOE) theoretical framework that describes the impact of each dimension on technological innovations adoption. Moreover, paper brings a case study presenting the adoption of BISs in practice within an organization from tertiary (service) industry sector. Based on the results of the study, guidelines for more efficient, faster and easier BISs adoption are presented.
  • High Speed Rail vs. Other Factors Affecting the Tourism Market in Italy
    Authors: F. Pagliara, F. Mauriello, Keywords: Tourists, overnights, high speed rail, attractions, security. DOI:10.5281/zenodo.3298641 Abstract: The objective of this paper is to investigate the relationship between the increase of accessibility brought by high speed rail (HSR) systems and the tourism market in Italy. The impacts of HSR projects on tourism can be quantified in different ways. In this manuscript, an empirical analysis has been carried out with the aid of a dataset containing information both on tourism and transport for 99 Italian provinces during the 2006-2016 period. Panel data regression models have been considered, since they allow modelling a wide variety of correlation patterns. Results show that HSR has an impact on the choice of a given destination for Italian tourists while the presence of a second level hub mainly affects foreign tourists. Attraction variables are also significant for both categories and the variables concerning security, such as number of crimes registered in a given destination, have a negative impact on the choice of a destination.
  • Analyzing Environmental Emotive Triggers in Terrorist Propaganda
    Authors: Travis Morris, Keywords: Emotive triggers, environmental security, natural language processing, propaganda analysis. DOI:10.5281/zenodo. Abstract: The purpose of this study is to measure the intersection of environmental security entities in terrorist propaganda. To the best of author’s knowledge, this is the first study of its kind to examine this intersection within terrorist propaganda. Rosoka, natural language processing software and frame analysis are used to advance our understanding of how environmental frames function as emotive triggers. Violent jihadi demagogues use frames to suggest violent and non-violent solutions to their grievances. Emotive triggers are framed in a way to leverage individual and collective attitudes in psychological warfare. A comparative research design is used because of the differences and similarities that exist between two variants of violent jihadi propaganda that target western audiences. Analysis is based on salience and network text analysis, which generates violent jihadi semantic networks. Findings indicate that environmental frames are used as emotive triggers across both data sets, but also as tactical and information data points. A significant finding is that certain core environmental emotive triggers like “water,” “soil,” and “trees” are significantly salient at the aggregate level across both data sets. All environmental entities can be classified into two categories, symbolic and literal. Importantly, this research illustrates how demagogues use environmental emotive triggers in cyber space from a subcultural perspective to mobilize target audiences to their ideology and praxis. Understanding the anatomy of propaganda construction is necessary in order to generate effective counter narratives in information operations. This research advances an additional method to inform practitioners and policy makers of how environmental security and propaganda intersect.
  • The Two Layers of Food Safety and GMOs in the Hungarian Agricultural Law
    Authors: Gergely Horváth, Keywords: Food law, food safety, food security, GMO, agri-environmental measures. DOI:10.5281/zenodo. Abstract: The study presents the complexity of food safety dividing it into two layers. Beyond the basic layer of requirements, there is a more demanding higher level linked with quality and purity aspects. It would be important to give special prominence to both layers, given that massive illnesses are caused by foods even though officially licensed. Then the study discusses an exciting safety challenge stemming from the risks of genetically modified organisms (GMOs). Furthermore, it features legal case examples that illustrate how certain liability questions are solved or not yet decided in connection with the production of genetically modified crops. In addition, a special kind of land grabbing, more precisely land grabbing from non-GMO farming systems can also be noticed as well as a new phenomenon eroding food sovereignty. Coexistence, the state where organic, conventional, and GM farming systems are standing alongside each other is an unsuitable experiment that cannot be successful, because of biophysical reasons (such as cross-pollination). Agricultural and environmental lawyers both try to find the optimal solution. Agri-environmental measures are introduced as a special subfield of law maintaining also food safety. The important steps of agri-environmental legislation are aiming at the protection of natural values, the environmental media and strengthening food safety as well, practically the quality of agricultural products intended for human consumption. The major findings of the study focus on searching for the appropriate approach capable of solving the security and safety problems of food production. The most interesting concepts of the Hungarian national and EU food law legislation are analyzed in more detail with descriptive, analytic and comparative methods.
  • Using Business Intelligence Capabilities to Improve the Quality of Decision-Making: A Case Study of Mellat Bank
    Authors: Jalal Haghighat Monfared, Zahra Akbari, Keywords: Business intelligence, business intelligence capability, decision making, decision quality. DOI:10.5281/zenodo.2571904 Abstract: Today, business executives need to have useful information to make better decisions. Banks have also been using information tools so that they can direct the decision-making process in order to achieve their desired goals by rapidly extracting information from sources with the help of business intelligence. The research seeks to investigate whether there is a relationship between the quality of decision making and the business intelligence capabilities of Mellat Bank. Each of the factors studied is divided into several components, and these and their relationships are measured by a questionnaire. The statistical population of this study consists of all managers and experts of Mellat Bank's General Departments (including 190 people) who use commercial intelligence reports. The sample size of this study was 123 randomly determined by statistical method. In this research, relevant statistical inference has been used for data analysis and hypothesis testing. In the first stage, using the Kolmogorov-Smirnov test, the normalization of the data was investigated and in the next stage, the construct validity of both variables and their resulting indexes were verified using confirmatory factor analysis. Finally, using the structural equation modeling and Pearson's correlation coefficient, the research hypotheses were tested. The results confirmed the existence of a positive relationship between decision quality and business intelligence capabilities in Mellat Bank. Among the various capabilities, including data quality, correlation with other systems, user access, flexibility and risk management support, the flexibility of the business intelligence system was the most correlated with the dependent variable of the present research. This shows that it is necessary for Mellat Bank to pay more attention to choose the required business intelligence systems with high flexibility in terms of the ability to submit custom formatted reports. Subsequently, the quality of data on business intelligence systems showed the strongest relationship with quality of decision making. Therefore, improving the quality of data, including the source of data internally or externally, the type of data in quantitative or qualitative terms, the credibility of the data and perceptions of who uses the business intelligence system, improves the quality of decision making in Mellat Bank.
  • Open Science Philosophy and Paradigm of Scientific Research
    Authors: C. Ardil, Keywords: Open science, open data, open access, cyberscience , cybertechnology. DOI:10.5281/zenodo.2571795 Abstract: This paper presents the open science philosophy and paradigm of scientific research on how to transform classical research and innovation approaches. Open science is the practice of providing free and unrestricted online access to the products of scholarly research. Open science advocates for the immediate and unrestricted online access to published, peer-reviewed research in digital format. Open science research is made available for free in perpetuity and includes guidelines and/or licenses that communicate how researchers and readers can share and re-use the digital content. The emergence of open science has changed the scholarly research and publishing landscape, making research more broadly accessible to academic and non-academic audiences alike. Consequently, open science philosophy and its practice are discussed to cover all aspects of cyberscience in the context of research and innovation excellence for the benefit of global society.
  • Teaching Translation in Brazilian Universities: A Study about the Possible Impacts of Translators’ Comments on the Cyberspace about Translator Education
    Authors: Erica Lima, Keywords: Cyberspace, teaching translation, translator education, university. DOI:10.5281/zenodo.2022061 Abstract: The objective of this paper is to discuss relevant points about teaching translation in Brazilian universities and the possible impacts of blogs and social networks to translator education today. It is intended to analyze the curricula of Brazilian translation courses, contrasting them to information obtained from two social networking groups of great visibility in the area concerning essential characteristics to become a successful profession. Therefore, research has, as its main corpus, a few undergraduate translation programs’ syllabuses, as well as a few postings on social networks groups that specifically share professional opinions regarding the necessity for a translator to obtain a degree in translation to practice the profession. To a certain extent, such comments and their corresponding responses lead to the propagation of discourses which influence the ideas that aspiring translators and recent graduates end up having towards themselves and their undergraduate courses. The postings also show that many professionals do not have a clear position regarding the translator education; while refuting it, they also encourage “free” courses. It is thus observed that cyberspace constitutes, on the one hand, a place of mobilization of people in defense of similar ideas. However, on the other hand, it embodies a place of tension and conflict, in view of the fact that there are many participants and, as in any other situation of interlocution, disagreements may arise. From the postings, aspects related to professionalism were analyzed (including discussions about regulation), as well as questions about the classic dichotomies: theory/practice; art/technique; self-education/academic training. As partial result, the common interest regarding the valorization of the profession could be mentioned, although there is no consensus on the essential characteristics to be a good translator. It was also possible to observe that the set of socially constructed representations in the group reflects characteristics of the world situation of the translation courses (especially in some European countries and in the United States), which, in the first instance, does not accurately reflect the Brazilian idiosyncrasies of the area.
  • SeCloudBPMN: A Lightweight Extension for BPMN Considering Security Threats in the Cloud
    Authors: Somayeh Sobati Moghadam, Keywords: BPMN, security threats, cloud computing, graphical representation. DOI:10.5281/zenodo.1474423 Abstract: Business processes are crucial for organizations and help businesses to evaluate and optimize their performance and processes against current and future-state business goals. Outsourcing business processes to the cloud becomes popular due to a wide varsity of benefits and cost-saving. However, cloud outsourcing raises enterprise data security concerns, which must be incorporated in Business Process Model and Notation (BPMN). This paper, presents SeCloudBPMN, a lightweight extension for BPMN which extends the BPMN to explicitly support the security threats in the cloud as an outsourcing environment. SeCloudBPMN helps business’s security experts to outsource business processes to the cloud considering different threats from inside and outside the cloud. In this way, appropriate security countermeasures could be considered to preserve data security in business processes outsourcing to the cloud.
  • Promoting Community Food Security and Empowerment among Somali Bantu Refugees: A Case for Community Kitchen Gardens
    Authors: Michelle D. Hand, Michelle L. Kaiser, Keywords: Community kitchen gardens, food insecurity, refugees, Somali Bantu. DOI:10.5281/zenodo.1474281 Abstract: African refugees are among the fastest-growing populations in the United States and nearly half of these refugees come from Somalia, many of whom are Somali Bantus, the most marginalized group in Somali society. Yet limited research is available on Somali Bantu refugees. In this paper, Empowerment Theory is used to guide an in-depth exploration of the potential benefits of using community kitchen gardens to increase community food security among Somali Bantu refugees. In addition, recommendations for future research, policy and practice are offered following existing scholarly and grey source literature guidelines as informed by an Empowerment perspective to best meet the needs of this under-researched and underserved yet growing population.