[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Fwd: IFIP WG 9.6/11.7 conference on "Security & Control of IT in Society" - SCITS-II - Draft conference programme
- To: debate@fitug.de
- Subject: Fwd: IFIP WG 9.6/11.7 conference on "Security & Control of IT in Society" - SCITS-II - Draft conference programme
- From: Wolfgang Bartsch <bartsch@pp.rmc.de>
- Date: Wed, 18 Apr 2001 00:09:18 +0200
- Comment: This message comes from the debate mailing list.
- Organization: --private--
- Sender: owner-debate@fitug.de
Draft Programme of the
IFIP WG 9.6/11.7 Working Conference on
Security and Control of IT in Society-II
SCITS-II
Hotel Tatra, Bratislava, Slovakia
15 -16 June 2001
http://www.conference.sk/ifip/
Friday, 15 June 2001:
8.30 Registration
9.00 Welcome
SESSION I: High Tech Crime Investigation and Prevention
9.15-10.00 Invited talk: Daniel Martin (OECD): "Cybercrime needs Answers"
10.00-10.30 Caroline Allinson (Information Management Division, Queensland
Police/ Australia):“Information Systems Audit Trails in Australian
Commonwealth and State Government Departments”
10.30-10.50 Coffee Break
SESSION II: Digital Signature Regulation and Use
10.50-11.20 Rita Rossi, Anna Vaccarelli (Institute for Telematic
Applications , Italian National Research Council / Italy):“Digital
Signature in the Italian Registration Authority”
11.20-11.50 Arun K. Singh (E-Commerce Labs., Infosys Technologies Limited /
India): “Regulations for Digital Signatures: Indian Perspective”
11.50-12.20 Jorge Davila, Javier Lopez (Department of Computer Science,
Polytechnic University of Madrid / Spain), Rene Peralta (Department of
Computer Science, Yale University / USA), Jose M. Troya (Department of
Computer Science, Polytechnic University of Madrid / Spain):“A First
Electronic Approach to Latin Notary Public Services”
12.20-13.50 Lunch
SESSION III: (Mis-) Use of Digital Signature Systems
13.50-14.20 Jaroslav Janacek, Richard Ostertag (Department of Computer
Science, Comenius University / Slovakia):“Problems in Practical Use of
Electronic Signatures”
14.20-14.50 Adrian Spalka, Armin B. Cremers, Hanno Langweg (Department of
Computer Science, University of Bonn / Germany):“The fairy tale of ‘What
You See Is What You Sign’ -Trojan Horse Attacks on Software for Digital
Signatures”
14.50-15.10 Coffee Break
SESSION IV: Ethical and Human Aspects
15.10-15.40 Matthias Schwab (School of Behavior Science, University of
Melbourne / Australia): “Moral Philosophy, IT Misuse, and the Psychology of
Information Processing”
15.4016.10 Jozef Vyskoc, Lenka Fibíková (VaF / Slovakia): “IT Users‘
Perception of Information Security”
16.10-16.30 Coffee Break
SESSION V: Privacy and Technology
16.30-17.00 Mikael Nilsson (Ericsson Infotech, Karlstad / Sweden), Helena
Lindskog, Simone Fischer-Hübner (Department of Computer Science, Karlstad
University / Sweden):“Privacy Enhancements in the Mobile Internet”
17.00-17.30 Arslan Brömme (Department of Computer Science, Hamburg
University / Germany):“A Discussion on Privacy Needs and (Mis)Use of
Biometric IT-Systems”
Social Event, Conference Dinner
Saturday, 16 June 2001:
SESSION VI: Information Warfare and High Tech Crime
9.00-9.45 Invited talk: Klaus Brunnstein (IFIP Vice President, Hamburg
University/ Germany):
“About Virtual Weapons in Cyberwar”
9.45 -10.15 Robert Willison (Computer Security Research Centre / I.S.
Department, London School of Economics): “Analysing the Procedural Stages
of Computer-Assisted Fraud”
10.15-10.45 Coffee Break
SESSION VII: IT Law Development
10.45-11.30 Invited talk: IT Misuse and the Law in Slovakia (TBD)
11.30-12.00 Dagmar Brechlerova (Czech University of Agriculture / Czech
Republic):“IT and Law in the Czech republic”
12.00-13.30 Lunch
SESSION VIII: Risk Analysis and Risk Avoidance
13.30-14.00 S. Kokolakis, C. Labrinoudakis (Univ. of the Aegean) and D.
Gritzalis (Athens Univ. of Economics and Business):“Recurrent IT security
issues and recommendations: Learning from risk assessment reviews”
14.00-14.30 Sungbaeck Cho, Zbigniew Ciechanowicz (Information Security
Group, Royal Holloway, University of London / UK):“Selection of Systems for
Detailed Risk Analysis in Combined Risk Analysis Approach”
14.30-14.50 Coffee Break
14.50-15.20 Ernest Jordan, David Musson (Macquarie Graduate School of
Management, Macquarie University / Australia):“Public and private sectors:
contrasts in IT risk governance”
15.20-15.50 Hans Hedbom , Stefan Lindskog, and Erland Jonsson (Chalmers
University of Technology / Sweden):“Risks and Dangers of Security Extensions”
15.50-16.00 Conclusions, Farewell
----------------------
Programme Committee:
Simone Fischer-Hübner (Karlstad University / Sweden WG Chair)
Klaus Brunnstein (Hamburg University / Germany)
Roger Clarke (Australian National University / Australia)
Daniel Olejar (Comenius University / Slovakia)
Kai Rannenberg (Microsoft Research / UK)
Kathrin Schier (EURO Kartensysteme / Germany)
Basie von Solms (Rand Afrikaans University / South Africa TC-11 Chair)
Gunnar Wenngren (Linköping University / Sweden)
Robert Willison (London School of Economics / UK)
Louise Yngström (Stockholm University / Sweden)
Organising Committee:
Daniel Olejar (Comenius University / Slovakia - Chair)
Simone Fischer-Hübner (Karlstad University / Sweden)
Martin Latzenhofer (University of Vienna / Austria)
Jozef Vyskoc (VaF / Slovakia)
Albin Zuccato (University of Vienna / Austria)
Conference Web Site: http://www.conference.sk/ifip/
-----------------------------------------------------------------------
Prof. Dr. Simone Fischer-Huebner
Karlstad University
Department of Computer Science
Universitetsgatan 1
S 651 88 Karlstad / Sweden
Tel: +46 54 700 1723
Fax: +46 54 700 1828
http://www.cs.kau.se/~simone/
simone.fischer-huebner@kau.se
-------------------------------------------------------
--
Beste (~\/\/~)
Gr"u"se, \_/\_/olfgang