PRIVACY AND INFORMATION SECURITY CONFERENCE


Privacy and Information Security Conference is one of the leading research topics in the international research conference domain. Privacy and Information Security is a conference track under the Law Conference which aims to bring together leading academic scientists, researchers and research scholars to exchange and share their experiences and research results on all aspects of Law.

internationalconference.net provides a premier interdisciplinary platform for researchers, practitioners and educators to present and discuss the most recent innovations, trends, and concerns as well as practical challenges encountered and solutions adopted in the fields of (Law).

Privacy and Information Security is not just a call for academic papers on the topic; it can also include a conference, event, symposium, scientific meeting, academic, or workshop.

You are welcome to SUBMIT your research paper or manuscript to Privacy and Information Security Conference Track will be held at .

Privacy and Information Security is also a leading research topic on Google Scholar, Semantic Scholar, Zenedo, OpenAIRE, BASE, WorldCAT, Sherpa/RoMEO, Elsevier, Scopus, Web of Science.

FINISHED

I. INTERNATIONAL LAW CONFERENCE

MARCH 19 - 20, 2019
ISTANBUL, TURKEY

FINISHED

II. INTERNATIONAL LAW CONFERENCE

JUNE 26 - 27, 2019
PARIS, FRANCE

FINISHED

III. INTERNATIONAL LAW CONFERENCE

AUGUST 21 - 22, 2019
LONDON, UNITED KINGDOM

FINISHED

IV. INTERNATIONAL LAW CONFERENCE

OCTOBER 08 - 09, 2019
NEW YORK, UNITED STATES

FINISHED

V. INTERNATIONAL LAW CONFERENCE

DECEMBER 12 - 13, 2019
ROME, ITALY

FINISHED

VI. INTERNATIONAL LAW CONFERENCE

FEBRUARY 13 - 14, 2020
LONDON, UNITED KINGDOM

FINISHED

VII. INTERNATIONAL LAW CONFERENCE

APRIL 15 - 16, 2020
BARCELONA, SPAIN

FINISHED

VIII. INTERNATIONAL LAW CONFERENCE

MAY 11 - 12, 2020
ISTANBUL, TURKEY

FINISHED

IX. INTERNATIONAL LAW CONFERENCE

JUNE 05 - 06, 2020
SAN FRANCISCO, UNITED STATES

FINISHED

X. INTERNATIONAL LAW CONFERENCE

JULY 20 - 21, 2020
PARIS, FRANCE

FINISHED

XI. INTERNATIONAL LAW CONFERENCE

AUGUST 10 - 11, 2020
NEW YORK, UNITED STATES

FINISHED

XII. INTERNATIONAL LAW CONFERENCE

SEPTEMBER 10 - 11, 2020
TOKYO, JAPAN

FINISHED

XIII. INTERNATIONAL LAW CONFERENCE

SEPTEMBER 16 - 17, 2020
ZÜRICH, SWITZERLAND

FINISHED

XIV. INTERNATIONAL LAW CONFERENCE

OCTOBER 21 - 22, 2020
BARCELONA, SPAIN

FINISHED

XV. INTERNATIONAL LAW CONFERENCE

NOVEMBER 02 - 03, 2020
SAN FRANCISCO, UNITED STATES

FINISHED

XVI. INTERNATIONAL LAW CONFERENCE

NOVEMBER 12 - 13, 2020
ISTANBUL, TURKEY

FINISHED

XVII. INTERNATIONAL LAW CONFERENCE

NOVEMBER 19 - 20, 2020
SINGAPORE, SINGAPORE

FINISHED

XVIII. INTERNATIONAL LAW CONFERENCE

DECEMBER 15 - 16, 2020
BANGKOK, THAILAND

FINISHED

XIX. INTERNATIONAL LAW CONFERENCE

DECEMBER 28 - 29, 2020
PARIS, FRANCE

FINISHED

XX. INTERNATIONAL LAW CONFERENCE

FEBRUARY 13 - 14, 2021
LONDON, UNITED KINGDOM

FINISHED

XXI. INTERNATIONAL LAW CONFERENCE

APRIL 15 - 16, 2021
BARCELONA, SPAIN

FINISHED

XXII. INTERNATIONAL LAW CONFERENCE

MAY 11 - 12, 2021
ISTANBUL, TURKEY

FINISHED

XXIII. INTERNATIONAL LAW CONFERENCE

JUNE 05 - 06, 2021
SAN FRANCISCO, UNITED STATES

FINISHED

XXIV. INTERNATIONAL LAW CONFERENCE

JULY 20 - 21, 2021
PARIS, FRANCE

FINISHED

XXV. INTERNATIONAL LAW CONFERENCE

AUGUST 10 - 11, 2021
NEW YORK, UNITED STATES

FINISHED

XXVI. INTERNATIONAL LAW CONFERENCE

SEPTEMBER 10 - 11, 2021
TOKYO, JAPAN

FINISHED

XXVII. INTERNATIONAL LAW CONFERENCE

SEPTEMBER 16 - 17, 2021
ZÜRICH, SWITZERLAND

FINISHED

XXVIII. INTERNATIONAL LAW CONFERENCE

OCTOBER 21 - 22, 2021
BARCELONA, SPAIN

FINISHED

XXIX. INTERNATIONAL LAW CONFERENCE

NOVEMBER 02 - 03, 2021
SAN FRANCISCO, UNITED STATES

FINISHED

XXX. INTERNATIONAL LAW CONFERENCE

NOVEMBER 12 - 13, 2021
ISTANBUL, TURKEY

FINISHED

XXXI. INTERNATIONAL LAW CONFERENCE

NOVEMBER 19 - 20, 2021
SINGAPORE, SINGAPORE

FINISHED

XXXII. INTERNATIONAL LAW CONFERENCE

DECEMBER 15 - 16, 2021
BANGKOK, THAILAND

FINISHED

XXXIII. INTERNATIONAL LAW CONFERENCE

DECEMBER 28 - 29, 2021
PARIS, FRANCE

Law Conference Call For Papers are listed below:

Previously Published Papers on "Privacy and Information Security Conference"

  • Online Think–Pair–Share in a Third-Age ICT Course
    Authors: Daniele Traversaro, Keywords: Collaborative learning, information technology education, lifelong learning, older adult education, think-pair-share. DOI:10.5281/zenodo. Abstract: Problem: Senior citizens have been facing a challenging reality as a result of strict public health measures designed to protect people from the COVID-19 outbreak. These include the risk of social isolation due to the inability of the elderly to integrate with technology. Never before have Information and Communication Technology (ICT) skills become essential for their everyday life. Although third-age ICT education and lifelong learning are widely supported by universities and governments, there is a lack of literature on which teaching strategy/methodology to adopt in an entirely online ICT course aimed at third-age learners. This contribution aims to present an application of the Think-Pair-Share (TPS) learning method in an ICT third-age virtual classroom with an intergenerational approach to conducting online group labs and review activities. Research Question: Is collaborative learning suitable and effective, in terms of student engagement and learning outcomes, in an online ICT course for the elderly? Methods: In the TPS strategy a problem is posed by the teacher, students have time to think about it individually, and then they work in pairs (or small groups) to solve the problem and share their ideas with the entire class. We performed four experiments in the ICT course of the University of the Third Age of Genova (University of Genova, Italy) on the Microsoft Teams platform. The study cohort consisted of 26 students over the age of 45. Data were collected through online questionnaires. Two have been proposed, one at the end of the first activity and another at the end of the course. They consisted of five and three close-ended questions, respectively. The answers were on a Likert scale (from 1 to 4) except two questions (which asked the number of correct answers given individually and in groups) and the field for free comments/suggestions. Results: Groups achieve better results than individual students (with scores greater than one order of magnitude) and most students found TPS helpful to work in groups and interact with their peers. Insights: From these early results, it appears that TPS is suitable for an online third-age ICT classroom and useful for promoting discussion and active learning. Despite this, our work has several limitations. First of all, the results highlight the need for more data to be able to perform a statistical analysis in order to determine the effectiveness of this methodology in terms of student engagement and learning outcomes as future direction.
  • Domestic Violence against Children and Trafficking in Human Beings: Two Worrying Phenomena in Kosovo
    Authors: Adile Shaqiri, Arjeta Shaqiri Latifi, Keywords: Awareness, education, information, society, violence. DOI:10.5281/zenodo. Abstract: Domestic violence, trafficking with human beings especially violence against children, is a worldwide problem. Hence, it remains one of the most widespread forms of violence in Kosovo and which often continues to be described as a "closed door issue". Recognition, acceptance and prioritization of cases of domestic violence definitely require a much greater awareness of individuals in institutions for the risks, consequences and costs that the lack of such a well-coordinated response brings to the country. Considering that children are the future and the wealth of the country, violence and neglect against them should be treated as carefully as possible. The purpose of this paper is to identify steps towards prevention of the domestic violence and trafficking with human beings, so that the reflection of the consequences and the psychological flow do not reflect to a large extent in society. In this study is described: How is the phenomenon of domestic violence related to trafficking in human beings? The methods used are: historical, comparative, qualitative. Data derived from the relevant institutions were presented, i.e., by the actors who are the first reactors as well as the policy makers. Although these phenomena are present in all countries of the world, Kosovo is no exception and therefore comparisons of the development of child abuse have been made with other countries in the region as well. Since Kosovo is a country in transition, a country with a relatively high level of education, low economic development, high unemployment, political instability, dysfunctional legal infrastructure, it can be concluded that the potential for the development of negative phenomena is present and inevitable. Thus, during the research, the stages of development of these phenomena are analyzed, determining the causes and consequences which come from abuse, neglect of children and the impact on trafficking in human beings. The Kosovar family (parental responsibility), culture and religion, social services, the dignity of the abused child, etc. were analyzed. The review was also done on the legislation, educational institutions (curricula), governmental and non-governmental institutions their responsibilities and cooperation towards combating child abuse and trafficking. It is worth noting that during the work on paper, recommendations and conclusions have been drawn where it is concluded that we need an environment with educational reforms, stability in the political environment, economic development, a review of social policies, greater awareness of society, more adequate information through media, so that information and awareness could penetrate even in the most remote places of Kosovo society.
  • A Mixed Approach to Assess Information System Risk, Operational Risk, and Congolese Microfinance Institutions Performance
    Authors: Alfred Kamate Siviri, Angelus Mafikiri Tsongo, Jean Robert Kala Kamdjoug, Keywords: information system risk, operational risk, microfinance performance, DR Congo DOI:10.5281/zenodo. Abstract: Well organized digitalization and information systems have been selected as relevant measures to mitigate operational risks within organizations. Unfortunately, information system comes with new threats that can cause severe damage and quick organization lockout. This study aims to measure perceived information system risks and their effects on operational risks within the microfinance institution in D.R. Congo. Also, the factors influencing the operational risk are to be identified, and the link between operational risk with other risks and performance is to be assessed. The study proposes a research model drawn on the combination of Resources-Based-View, dynamic capabilities, the agency theory, the Information System Security Model, and social theories of risk. Therefore, we suggest adopting a mixed methods research with the sole aim of increasing the literature that already exists on perceived operational risk assessment and its link with other risk and performance, with a focus on information system risks.
  • Exploring the Effect of Accounting Information on Systematic Risk: An Empirical Evidence of Tehran Stock Exchange
    Authors: Mojtaba Rezaei, Elham Heydari, Keywords: Accounting information, market risk, systematic risk, efficient market hypothesis, EMH, Tehran Stock Exchange, TSE. DOI:10.5281/zenodo. Abstract: This paper highlights the empirical results of analyzing the correlation between accounting information and systematic risk. This association is analyzed among financial ratios and systematic risk by considering the financial statement of 39 companies listed on the Tehran Stock Exchange (TSE) for five years (2014-2018). Financial ratios have been categorized into four groups and to describe the special features, as representative of accounting information we selected: Return on Asset (ROA), Debt Ratio (Total Debt to Total Asset), Current Ratio (current assets to current debt), Asset Turnover (Net sales to Total assets), and Total Assets. The hypotheses were tested through simple and multiple linear regression and T-student test. The findings illustrate that there is no significant relationship between accounting information and market risk. This indicates that in the selected sample, historical accounting information does not fully reflect the price of stocks.
  • The Effects of Cross-Border Use of Drones in Nigerian National Security
    Authors: H. P. Kerry, Keywords: Armed drones, cross-border, drones, national security. DOI:10.5281/zenodo. Abstract: Drone technology has become a significant discourse in a nation’s national security, while this technology could constitute a danger to national security on the one hand, on the other hand, it is used in developed and developing countries for border security, and in some cases, for protection of security agents and migrants. In the case of Nigeria, drones are used by the military to monitor and tighten security around the borders. However, terrorist groups have devised a means to utilize the technology to their advantage. Therefore, the potential danger in the widespread proliferation of this technology has become a myriad of risks. The research on the effects of cross-border use of drones in Nigerian national security looks at the negative and positive consequences of using drone technology. The study employs the use of interviews and relevant documents to obtain data while the study applied the Just War theory to justify the reason why countries use force; it further buttresses the points with what the realist theory thinks about the use of force. In conclusion, the paper recommends that the Nigerian government through the National Assembly should pass a bill for the establishment of a law that will guide the use of armed and unarmed drones in Nigeria enforced by the Nigeria Civil Aviation Authority and the office of the National Security Adviser.
  • Privacy Protection Principles of Omnichannel Approach
    Authors: Renata Mekovec, Dijana Peras, Ruben Picek, Keywords: Personal data, privacy protection, omnichannel communication, retail. DOI:10.5281/zenodo. Abstract: The advent of the Internet, mobile devices and social media is revolutionizing the experience of retail customers by linking multiple sources through various channels. Omnichannel retailing is a retailing that combines multiple channels to allow customers to seamlessly leverage all the distribution information online and offline while shopping. Therefore, today data are an asset more critical than ever for all organizations. Nonetheless, because of its heterogeneity through platforms, developers are currently facing difficulties in dealing with personal data. Considering the possibilities of omnichannel communication, this paper presents channel categorization that could enhance the customer experience of omnichannel center called hyper center. The purpose of this paper is fundamentally to describe the connection between the omnichannel hyper center and the customer, with particular attention to privacy protection. The first phase was finding the most appropriate channels of communication for hyper center. Consequently, a selection of widely used communication channels has been identified and analyzed with regard to the effect requirements for optimizing user experience. The evaluation criteria are divided into 3 groups: general, user profile and channel options. For each criterion the weight of importance for omnichannel communication was defined. The most important thing was to consider how the hyper center can make user identification while respecting the privacy protection requirements. The study carried out also shows what customer experience across digital networks would look like, based on an omnichannel approach owing to privacy protection principles.
  • Judicial Review of Indonesia's Position as the First Archipelagic State to implement the Traffic Separation Scheme to Establish Maritime Safety and Security
    Authors: Rosmini Yanti, Safira Aviolita, Marsetio, Keywords: Archipelago State, maritime law, maritime security, traffic separation scheme. DOI:10.5281/zenodo. Abstract: Indonesia has several straits that are very important as a shipping lane, including the Sunda Strait and the Lombok Strait, which are the part of the Indonesian Archipelagic Sea Lane (IASL). An increase in traffic on the Marine Archipelago makes the task of monitoring sea routes increasingly difficult. Indonesia has proposed the establishment of a Traffic Separation Scheme (TSS) in the Sunda Strait and the Lombok Strait and the country now has the right to be able to conceptualize the TSS as well as the obligation to regulate it. Indonesia has the right to maintain national safety and sovereignty. In setting the TSS, Indonesia needs to issue national regulations that are in accordance with international law and the general provisions of the IMO (International Maritime Organization) can then be used as guidelines for maritime safety and security in the Sunda Strait and the Lombok Strait. The research method used is a qualitative method with the concept of linguistic and visual data collection. The source of the data is the analysis of documents and regulations. The results show that the determination of TSS was justified by International Law, in accordance with article 22, article 41, and article 53 of the United Nations Convention on the Law of the Sea (UNCLOS) 1982. The determination of TSS by the Indonesian government would be in accordance with COLREG (International Convention on Preventing Collisions at Sea) 10, which has been designed to follow IASL. Thus, TSS can provide a function as a safety and monitoring medium to minimize ship accidents or collisions, including the warship and aircraft of other countries that cross the IASL.
  • A Research on Determining the Viability of a Job Board Website for Refugees in Kenya
    Authors: Prince Mugoya, Collins Oduor Ondiek, Patrick Kanyi Wamuyu, Keywords: Information technology, refugee, skills, utilization, economy, jobs. DOI:10.5281/zenodo. Abstract: Refugee Job Board Website is a web-based application that provides a platform for organizations to post jobs specifically for refugees. Organizations upload job opportunities and refugees can view them on the website. The website also allows refugees to input their skills and qualifications. The methodology used to develop this system is a waterfall (traditional) methodology. Software development tools include Brackets which will be used to code the website and PhpMyAdmin to store all the data in a database.
  • Influence of Security on Fan Attendance during Nigeria Professional Football League Matches
    Authors: B. O. Diyaolu, Keywords: Adequate Security, fans attendance, football fans, football stadium, Nigeria Professional Football League. DOI:10.5281/zenodo. Abstract: The stadium transcends a field of play to cultural heritage of a club especially when there is security of life and property and a conducive environment with exciting media facilities, CCTV and adequate field of play. Football fans love watching their clubs’ matches especially when nothing discourages their presence in the stadium. This study investigated the influence of security on fans’ attendance during Nigeria Professional Football League matches. Descriptive survey research design was used and the population consists of all Nigeria Professional Football League fans. Simple random sampling technique was used to pick a state from the six geo-political zones. 600 respondents comprising male and female fans were sampled from the ten selected vendors’ stands in each selected state. A structured questionnaire on Security and Fan attendance scale (SFAS) was used. The instrument consists of two sections. Section A seeks information on demographic data of the respondents, while section B was used to elicit information on security and fans’ attendance. The modified instrument which consists of 20 items has a reliability coefficient of 0.73. The hypothesis was tested at 0.05 significance level. The completed questionnaire was collated, coded and analyzed using descriptive statistics of frequency counts and percentage and inferential statistics of chi-square (X2). Findings of this study revealed that adequate security significantly influences fan attendance during Nigeria Professional Football League matches. There is no sport that can develop if the facilities in use are inadequate. Improving the condition of the stadium in Nigeria is paramount to the development of the Nigeria Professional Football League. All stakeholders in the organization of the League must put into consideration the need to improve the standard of the stadium as it will help to increase the attendance of fans during matches. Only the standard ones should be used during matches.
  • The Fake News Impact on the Public Policy Cycle: A Systemic Analysis through Documentary Survey
    Authors: Aron Miranda Burgos, Ergon Cugler de Moraes Silva, Keywords: Firehosing of falsehood, governance, misinformation, post-truth. DOI:10.5281/zenodo. Abstract: In the present article, it is observed that the constant advancement of issues related to misinformation impacts the guarantee of the public policy cycle. Thus, it is found that the dissemination of false information has a direct influence on each of the component stages of this cycle. Therefore, in order to maintain scientific and theoretical credibility in the qualitative analysis process, it was necessary to logically interpose the concepts of firehosing of falsehood, fake news, public policy cycle, as well as using the epistemological and pragmatic mechanism at the intersection of such academic concepts, such as the scientific method. It was found, through the analysis of official documents and public notes, how the multiple theoretical perspectives evidence the commitment of the provision and elaboration of public policies, verifying the way in which the fake news impact each part of the process in this atmosphere.

Conferences by Location