CMI Conference on Digital Transformations (CMI) 2020
Event submitted on Tuesday, October 27th 2020, approved by Content Team ✓
This event has been tagged as follows:
- Artificial Intelligence
- Machine Learning
- Offensive Security (Malware)
The CMI Conference on Digital Transformations is rammed full of actionable Cybersecurity content and it’s an event that we’d highly recommend.
Conference Event Summary
The following description was either submitted by the Conference Organizer on Tuesday, October 27th 2020, or created by us.
The online conference will be concerned with the potentials and challenges of the increasing use of digital technologies, the resulting digitalization of businesses, organizations, and society in general, and the resulting societal transformations. The conference will deal with positive potentials as well as problematic implications and challenges.
All suggestions for papers dealing with aspects of the processes of digital transformations are welcome. Two tracks are specified, a broad track on ‘Social and business applications for media, services, and industry’ and a more specialized track on ‘Cybersecurity and privacy’.
Contributions can be either full research papers, position papers, or posters.
Contributions within technology development as well as contributions discussing technology developments within social science or humanities frameworks are solicited. Presentations and discussions will take place via video conferencing.
Track 1: Social And Business Applications For Media, Services, And Industry
- AI/ML applications
- New mobile technologies
- Cloud and edge computing
- New business and service potentials
- Organizational challenges of AI/ML application
- New media developments
- Social media business models
- Business models of the darknet
- Forced digitalization caused by COVID-19
- Calculated audiences, calculated media, and media made by numbers
- Algorithmic recommendations: fairness, biases, and automated decision making
- Techno-political aspects of media infrastructure – ownership, control, stability
- From physical to virtual service encounters and service delivery – what is gained, what is lost?
Track 2: Cybersecurity And Privacy
- Cybersecurity and the GDPR
- Advancements in network intrusion detection
- Blockchain and cybersecurity: applications and attacks
- Privacy Enhancing Technologies
- Privacy by Design
- Collaborative defense mechanisms
- Automotive cybersecurity
- Attacker deception methods
- Security for the Internet of Things
- Security of software-defined infrastructures
- Trust and identity management
- Ethical issues of cybersecurity
- Ethical issues of privacy
- Computer ethics
- Offensive cybersecurity
- Cybersecurity and the well-functioning of transparent democracies
- AI, cybersecurity, and privacy policies for security and privacy
- Business models
- Digital Identity management
- Surveillance capitalism