{"id":71,"date":"2016-10-01T02:25:10","date_gmt":"2016-09-30T23:25:10","guid":{"rendered":"http:\/\/cyberpoliticsconference.org\/?page_id=71"},"modified":"2025-10-05T21:03:05","modified_gmt":"2025-10-05T18:03:05","slug":"call-for-papers-conference-issues","status":"publish","type":"page","link":"https:\/\/cyberpoliticsconference.org\/index.php\/call-for-papers-conference-issues\/","title":{"rendered":"Call For Papers: Conference Issues"},"content":{"rendered":"<p><strong>Call For Papers: Conference Issues<\/strong><\/p>\n<p data-start=\"164\" data-end=\"183\"><strong data-start=\"164\" data-end=\"183\">Call for Papers<\/strong><\/p>\n<p data-start=\"185\" data-end=\"283\"><strong data-start=\"185\" data-end=\"283\">The 9th Bosphorus International Conference on Cybersecurity, Digital Politics, and Social Sciences<\/strong><\/p>\n<p data-start=\"285\" data-end=\"954\">We are pleased to invite researchers, academics, policymakers, and practitioners to submit papers to the 9th Bosphorus International Conference on Cybersecurity, Digital Politics, and Social Sciences. As the digital realm increasingly shapes the political, economic, and social fabric of global society, this conference provides a critical platform to explore interdisciplinary perspectives, emerging trends, theoretical frameworks, and practical approaches to the evolving cyber and digital environment. The conference seeks to foster dialogue, bridge academic and policy-oriented discussions, and contribute to global scholarship in these rapidly transforming fields.<\/p>\n<p data-start=\"956\" data-end=\"995\"><strong data-start=\"956\" data-end=\"995\">Conference Tracks (Not limited to):<\/strong><\/p>\n<ul data-start=\"997\" data-end=\"3162\">\n<li data-start=\"997\" data-end=\"1019\">\n<p data-start=\"999\" data-end=\"1019\"><strong data-start=\"999\" data-end=\"1019\">Digital Politics<\/strong><\/p>\n<\/li>\n<li data-start=\"1020\" data-end=\"1039\">\n<p data-start=\"1022\" data-end=\"1039\"><strong data-start=\"1022\" data-end=\"1039\">Cyberpolitics<\/strong><\/p>\n<\/li>\n<li data-start=\"1040\" data-end=\"1061\">\n<p data-start=\"1042\" data-end=\"1061\"><strong data-start=\"1042\" data-end=\"1061\">Cyber Diplomacy<\/strong><\/p>\n<\/li>\n<li data-start=\"1062\" data-end=\"1092\">\n<p data-start=\"1064\" data-end=\"1092\"><strong data-start=\"1064\" data-end=\"1092\">AI and Global Governance<\/strong><\/p>\n<\/li>\n<li data-start=\"1093\" data-end=\"1128\">\n<p data-start=\"1095\" data-end=\"1128\"><strong data-start=\"1095\" data-end=\"1128\">Digital Policy and Regulation<\/strong><\/p>\n<\/li>\n<li data-start=\"1129\" data-end=\"1168\">\n<p data-start=\"1131\" data-end=\"1168\"><strong data-start=\"1131\" data-end=\"1168\">Cybersecurity Strategy and Policy<\/strong><\/p>\n<\/li>\n<li data-start=\"1169\" data-end=\"1194\">\n<p data-start=\"1171\" data-end=\"1194\"><strong data-start=\"1171\" data-end=\"1194\">Digital Sovereignty<\/strong><\/p>\n<\/li>\n<li data-start=\"1195\" data-end=\"1233\">\n<p data-start=\"1197\" data-end=\"1233\"><strong data-start=\"1197\" data-end=\"1233\">Cyber Deterrence and Geopolitics<\/strong><\/p>\n<\/li>\n<li data-start=\"1234\" data-end=\"1271\">\n<p data-start=\"1236\" data-end=\"1271\"><strong data-start=\"1236\" data-end=\"1271\">Cyberwarfare and Hybrid Threats<\/strong><\/p>\n<\/li>\n<li data-start=\"1272\" data-end=\"1313\">\n<p data-start=\"1274\" data-end=\"1313\"><strong data-start=\"1274\" data-end=\"1313\">Cybersecurity and National Security<\/strong><\/p>\n<\/li>\n<li data-start=\"1314\" data-end=\"1352\">\n<p data-start=\"1316\" data-end=\"1352\"><strong data-start=\"1316\" data-end=\"1352\">Cyber Intelligence and Espionage<\/strong><\/p>\n<\/li>\n<li data-start=\"1314\" data-end=\"1352\"><strong>E-Medicine<\/strong><\/li>\n<li data-start=\"1314\" data-end=\"1352\"><\/li>\n<li data-start=\"1314\" data-end=\"1352\"><strong>Cybersecurity in medicine<\/strong><\/li>\n<li data-start=\"1314\" data-end=\"1352\"><strong>AI in Medicine<\/strong><\/li>\n<li data-start=\"1353\" data-end=\"1407\">\n<p data-start=\"1355\" data-end=\"1407\"><strong data-start=\"1355\" data-end=\"1407\">Election Interference and Digital Disinformation<\/strong><\/p>\n<\/li>\n<li data-start=\"1408\" data-end=\"1451\">\n<p data-start=\"1410\" data-end=\"1451\"><strong data-start=\"1410\" data-end=\"1451\">AI Ethics and Democratic Institutions<\/strong><\/p>\n<\/li>\n<li data-start=\"1452\" data-end=\"1492\">\n<p data-start=\"1454\" data-end=\"1492\"><strong data-start=\"1454\" data-end=\"1492\">Geopolitics of Data and Algorithms<\/strong><\/p>\n<\/li>\n<li data-start=\"1493\" data-end=\"1536\">\n<p data-start=\"1495\" data-end=\"1536\"><strong data-start=\"1495\" data-end=\"1536\">Cyber Power and Great Power Rivalries<\/strong><\/p>\n<\/li>\n<li data-start=\"1537\" data-end=\"1589\">\n<p data-start=\"1539\" data-end=\"1589\"><strong data-start=\"1539\" data-end=\"1589\">Digital Authoritarianism vs. Digital Democracy<\/strong><\/p>\n<\/li>\n<li data-start=\"1590\" data-end=\"1631\">\n<p data-start=\"1592\" data-end=\"1631\"><strong data-start=\"1592\" data-end=\"1631\">Smart Cities and Digital Governance<\/strong><\/p>\n<\/li>\n<li data-start=\"1632\" data-end=\"1689\">\n<p data-start=\"1634\" data-end=\"1689\"><strong data-start=\"1634\" data-end=\"1689\">Digital Infrastructure and Geopolitical Competition<\/strong><\/p>\n<\/li>\n<li data-start=\"1690\" data-end=\"1718\">\n<p data-start=\"1692\" data-end=\"1718\"><strong data-start=\"1692\" data-end=\"1718\">Algorithmic Governance<\/strong><\/p>\n<\/li>\n<li data-start=\"1719\" data-end=\"1758\">\n<p data-start=\"1721\" data-end=\"1758\"><strong data-start=\"1721\" data-end=\"1758\">Cyber Norms and International Law<\/strong><\/p>\n<\/li>\n<li data-start=\"1759\" data-end=\"1815\">\n<p data-start=\"1761\" data-end=\"1815\"><strong data-start=\"1761\" data-end=\"1815\">Global Internet Governance and Multistakeholderism<\/strong><\/p>\n<\/li>\n<li data-start=\"1816\" data-end=\"1867\">\n<p data-start=\"1818\" data-end=\"1867\"><strong data-start=\"1818\" data-end=\"1867\">Digital Rights and Human Rights in Cyberspace<\/strong><\/p>\n<\/li>\n<li data-start=\"1868\" data-end=\"1922\">\n<p data-start=\"1870\" data-end=\"1922\"><strong data-start=\"1870\" data-end=\"1922\">Platform Governance and Political Accountability<\/strong><\/p>\n<\/li>\n<li data-start=\"1923\" data-end=\"1962\">\n<p data-start=\"1925\" data-end=\"1962\"><strong data-start=\"1925\" data-end=\"1962\">AI in Security and Defense Policy<\/strong><\/p>\n<\/li>\n<li data-start=\"1963\" data-end=\"2012\">\n<p data-start=\"1965\" data-end=\"2012\"><strong data-start=\"1965\" data-end=\"2012\">Cyber Peacebuilding and Conflict Prevention<\/strong><\/p>\n<\/li>\n<li data-start=\"2013\" data-end=\"2058\">\n<p data-start=\"2015\" data-end=\"2058\"><strong data-start=\"2015\" data-end=\"2058\">Digital Inclusion and Global Inequality<\/strong><\/p>\n<\/li>\n<li data-start=\"2059\" data-end=\"2141\">\n<p data-start=\"2061\" data-end=\"2141\"><strong data-start=\"2061\" data-end=\"2081\">Figital Politics<\/strong> (Intersection of physical and digital political engagement)<\/p>\n<\/li>\n<li data-start=\"2142\" data-end=\"2156\">\n<p data-start=\"2144\" data-end=\"2156\"><strong data-start=\"2144\" data-end=\"2156\">Cyberlaw<\/strong><\/p>\n<\/li>\n<li data-start=\"2157\" data-end=\"2175\">\n<p data-start=\"2159\" data-end=\"2175\"><strong data-start=\"2159\" data-end=\"2175\">Cyber Ethics<\/strong><\/p>\n<\/li>\n<li data-start=\"2176\" data-end=\"2198\">\n<p data-start=\"2178\" data-end=\"2198\"><strong data-start=\"2178\" data-end=\"2198\">Cyber Philosophy<\/strong><\/p>\n<\/li>\n<li data-start=\"2199\" data-end=\"2219\">\n<p data-start=\"2201\" data-end=\"2219\"><strong data-start=\"2201\" data-end=\"2219\">Cyber Conflict<\/strong><\/p>\n<\/li>\n<li data-start=\"2220\" data-end=\"2244\">\n<p data-start=\"2222\" data-end=\"2244\"><strong data-start=\"2222\" data-end=\"2244\">Cyber Surveillance<\/strong><\/p>\n<\/li>\n<li data-start=\"2245\" data-end=\"2262\">\n<p data-start=\"2247\" data-end=\"2262\"><strong data-start=\"2247\" data-end=\"2262\">E-democracy<\/strong><\/p>\n<\/li>\n<li data-start=\"2263\" data-end=\"2278\">\n<p data-start=\"2265\" data-end=\"2278\"><strong data-start=\"2265\" data-end=\"2278\">E-economy<\/strong><\/p>\n<\/li>\n<li data-start=\"2279\" data-end=\"2295\">\n<p data-start=\"2281\" data-end=\"2295\"><strong data-start=\"2281\" data-end=\"2295\">E-commerce<\/strong><\/p>\n<\/li>\n<li data-start=\"2296\" data-end=\"2313\">\n<p data-start=\"2298\" data-end=\"2313\"><strong data-start=\"2298\" data-end=\"2313\">E-education<\/strong><\/p>\n<\/li>\n<li data-start=\"2314\" data-end=\"2335\">\n<p data-start=\"2316\" data-end=\"2335\"><strong data-start=\"2316\" data-end=\"2335\">E-participation<\/strong><\/p>\n<\/li>\n<li data-start=\"2336\" data-end=\"2358\">\n<p data-start=\"2338\" data-end=\"2358\"><strong data-start=\"2338\" data-end=\"2358\">E-accountability<\/strong><\/p>\n<\/li>\n<li data-start=\"2359\" data-end=\"2389\">\n<p data-start=\"2361\" data-end=\"2389\"><strong data-start=\"2361\" data-end=\"2389\">Metaverse and Governance<\/strong><\/p>\n<\/li>\n<li data-start=\"2390\" data-end=\"2428\">\n<p data-start=\"2392\" data-end=\"2428\"><strong data-start=\"2392\" data-end=\"2428\">Metaverse Platforms \/ Ecosystems<\/strong><\/p>\n<\/li>\n<li data-start=\"2429\" data-end=\"2471\">\n<p data-start=\"2431\" data-end=\"2471\"><strong data-start=\"2431\" data-end=\"2471\">Cryptocurrency and Political Economy<\/strong><\/p>\n<\/li>\n<li data-start=\"2472\" data-end=\"2517\">\n<p data-start=\"2474\" data-end=\"2517\"><strong data-start=\"2474\" data-end=\"2517\">Social Media and Political Mobilization<\/strong><\/p>\n<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Call For Papers: Conference Issues Call for Papers The 9th Bosphorus International Conference on Cybersecurity, Digital Politics, and Social Sciences We are pleased to invite researchers, academics, policymakers, and practitioners to submit papers to the 9th Bosphorus International Conference on&hellip; <\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-71","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/cyberpoliticsconference.org\/index.php\/wp-json\/wp\/v2\/pages\/71","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberpoliticsconference.org\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberpoliticsconference.org\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberpoliticsconference.org\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberpoliticsconference.org\/index.php\/wp-json\/wp\/v2\/comments?post=71"}],"version-history":[{"count":12,"href":"https:\/\/cyberpoliticsconference.org\/index.php\/wp-json\/wp\/v2\/pages\/71\/revisions"}],"predecessor-version":[{"id":1082,"href":"https:\/\/cyberpoliticsconference.org\/index.php\/wp-json\/wp\/v2\/pages\/71\/revisions\/1082"}],"wp:attachment":[{"href":"https:\/\/cyberpoliticsconference.org\/index.php\/wp-json\/wp\/v2\/media?parent=71"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}