Call for Chapter Proposals Submission Deadline: January 5, 2005 http://cgi.di.uoa.gr/~nkolok/Idea.html Digital Crime and Forensic Science in Cyberspace yA book edited by Dr. P. Kanellis, Prof. E. Kiountouzis, Dr. N. Kolokotronis, and Associate Prof. D. Martakos Introduction The Organization for Economic Co-Operation and Development (OECD) defines "digital crime" as "...any illegal, unethical or unauthorized behaviour relating to the automatic processing and transmission of data." Computer attacks and digital crime are now commonplace, achieving national and international press coverage and thus becoming parts of everyday reality. Understanding the motives behind such incidents, the many forms that they can take and managing the complexity related to achieving a level of readiness to confront them are issues that no organization - public or private - can afford to ignore. It is a sign of the times that in 2003, 82% of U.S. companies surveyed by the Computer Security Institute faced security problems and dealt with damages that were estimated at $27.3 million. The use of scientifically derived and proven methods toward the collection, management and use of evidence derived from digital sources for the purpose of facilitating or furthering the reconstruction of events assessed as being criminal or helping to anticipate unauthorized actions shown to be disruptive to planned operations are called Digital Forensics (DF). But, although DF has the traditional forensics science as a base from which to borrow and grow, in contrast to traditional crime the context, content and processes associated with being digital are so unique and still emerging that it is a sobering realization the fact that we are and will continue to be exposed and vulnerable with the crimes committed passing undetected and unpunished. More so, if we accept that more than ten years after the first meetings of the Digital Forensics Research Workshop there are still no standards developed or a significant corpus of knowledge for DF. The timeliness of this edited volume is unquestionable as the urgency for developing and maintaining a digital forensics capability, as part of a holistic risk management framework, is evidenced by the directives and announcements by various standards bodies. For example, the Basel Committee on banking supervision recommends in the 14th principle for risk management: "... banks should develop... A process for collecting and preserving forensic evidence to facilitate appropriate post-mortem reviews of any e-banking incidents as well as to assist in the prosecution of attackers..." Overall objectives There is a single objective that this edited volume will seek to achieve: to present the state of the art in DF covering selective topics that hold significant weight as priorities in understanding the complexity and multidimensionality of the issues at hand so as to become the primary reference source for academics that research and practitioners that practice DF. The editors approach DF as a scientific field in its infancy with many sub-disciplines and at least 3 different 'application' areas (Law Enforcement, Military, and Business & Industry) with various stakeholders having different demands. Moreover, the highlight its difference from other forensic sciences as the media examined and the methods or techniques available to the examiners are to large extent market-driven products hastily launched with a lack of theoretical background and empirical proofs, giving rise to questions of validity. Thus, it is imperative that prospective authors will need to ensure that the following primary criteria are met and provide evidence in their chapter proposals: * The importance of the proposed topic and the weight it holds as a priority in helping us to unravel the complexities associated with DF, furthering our current understanding and pointing out the directions where further inquiry will be heading. * The solutions proposed to particular and well-defined challenges are the state of the art as far as both research and practice are concerned and the theory that supports them offers no grounds for concerns regarding their validity. Target audience The audience for which the book is intended is as follows: * Academics in the fields of Computer Science, Software Engineering and Information Systems who need a source of reference that covers the state of research in DF. * IT managers that must have the necessary know-how in order to handle an investigation and deal with cyber-investigators. * Security professionals and internal & external auditors that must be aware of computer and network forensics issues in order to informatively choose the proper action plan and the corresponding methods and tools. * Employees and home users who care about privacy issues and wish to know what constitutes evidence for computer crime. Recommended topics Recommended topics for chapters include but are not limited to the following: * Cyber-space, Digital Crime and Digital Forensics: cyber-space characteristics; actors identified in cyber-space; cyber-suspects subculture, profiling, and tactics; cyber-crime statistics; types and impact of cyber-crimes; overview and role of computer/network security policies. * Incident Response: verification of computer breaches; incident response strategies and procedures; reporting process; organizational and cost factors; procedure standardization issues; personnel expertise and training; current status analysis of procedures governed and/or accepted by law; future challenges. * Cyber-investigation Principles: cyber-investigation life cycle; responsibilities of actors involved; legal methods to obtain a computer and/or digital evidence; jurisdictions and agencies; investigative methods; trans-national issues. * Digital Evidence Collection and Handling: working with ISPs and telephone operators; examination of digital media; digital evidence integrity and safety; digital evidence metrics and implications on the information that need to be collected; aspects of individual privacy versus investigation needs. * Legal and Litigation Issues: description and comparison of international legal frameworks established; legal ways to seize digital evidence, constraints implied by law, types of digital evidence accepted in courts; investigative and testimonial challenges, future challenges. * Computer and Network Forensics: tools, techniques and methods for collection and analysis purposes, intrusion detection systems, future technologies, strengths and weaknesses, limitations; open research problems; legal barriers. Submission procedure Researchers and practitioners are invited to submit on or before January 5, 2004, an extended summary, not exceeding 3000 words. The proposal should include title, author's names and affiliations, a list of keywords, a tentative table of contents, references, and a short biographical note. The expected contribution of the proposal towards achieving the objectives of the book should be clearly stated. Authors of accepted proposals will be notified by February 5, 2005 about the status of their proposals and sent chapter organizational guidelines. Full chapters are expected to be submitted by April 15, 2005. All chapters will be reviewed on a blind review basis. The book is scheduled to be published by Idea Group, Inc., publisher of Idea Group Publishing, Information Science Publishing, IRM Press, CyberTech Publishing, and Idea Group Reference imprints, in 2005. Book editors affiliations Dr. Panagiotis Kanellis Department of Informatics Athens University of Economics & Business email@example.com Professor Evangelos Kiountouzis Department of Informatics Athens University of Economics & Business firstname.lastname@example.org Dr. Nicholas Kolokotronis Department of Informatics & Telecommunications National & Kapodistrian University of Athens email@example.com Associate Professor Drakoulis Martakos Department of Informatics & Telecommunications National & Kapodistrian University of Athens firstname.lastname@example.org Contact person Inquiries and submissions should be forwarded electronically (in MS Word) to Dr. Panagiotis Kanellis, tel: (+30) 210-9288751, fax: (+30) 210-9231897.