International Conference on Cyber Laws, Governance, and Privacy
by Mastering Up
94 94 people viewed this event.
<h5 data-start="254" data-end="285">1] Conference Introduction</h5>
<p data-start="286" data-end="1024">In an age of rapid digital transformation, regulatory upheaval and privacy concerns, cyber-law, governance and data privacy have become critical fields of inquiry and practice. The <strong data-start="467" data-end="534">International Conference on Cyber Laws, Governance, and Privacy</strong> brings together scholars, legal practitioners, policy-makers, technologists and industry experts to engage with the evolving landscape of digital governance. This hybrid event on 29 August 2026 organised by Mastering Up will provide a platform to explore the intersections of law, policy, technology and human rights in cyberspace. We invite you to join us as we examine the frameworks, challenges and emerging solutions that will shape the future of cyber governance and privacy globally.</p>
<hr data-start="1026" data-end="1029" />
<h5 data-start="1031" data-end="1059">2] Conference Objective</h5>
<p data-start="1060" data-end="1099">The objectives of the conference are:</p>
<ul data-start="1100" data-end="1973">
<li data-start="1100" data-end="1269">
<p data-start="1102" data-end="1269">To convene a multidisciplinary community of experts in cyber law, governance, data protection and privacy from academia, industry, government and non-profit sectors.</p>
</li>
<li data-start="1270" data-end="1435">
<p data-start="1272" data-end="1435">To examine current and emerging legal frameworks, policy instruments and technology-enabled tools that govern cyberspace, data flows, privacy and digital rights.</p>
</li>
<li data-start="1436" data-end="1622">
<p data-start="1438" data-end="1622">To promote dialogue on the governance of transformative technologies (AI, IoT, blockchain, big data, cloud) and their implications for privacy, accountability, ethics and regulation.</p>
</li>
<li data-start="1623" data-end="1795">
<p data-start="1625" data-end="1795">To enable sharing of research, case studies, best practices and lessons learned in implementing cyber-law and privacy regimes in different jurisdictions and industries.</p>
</li>
<li data-start="1796" data-end="1973">
<p data-start="1798" data-end="1973">To provide a platform for early-career researchers, legal professionals and technologists to present their work, engage with peers and foster interdisciplinary collaborations.</p>
</li>
</ul>
<hr data-start="1975" data-end="1978" />
<h5 data-start="1980" data-end="2006">3] Conference Outcome</h5>
<p data-start="2007" data-end="2076">Participants can expect the following outcomes from the conference:</p>
<ul data-start="2077" data-end="3037">
<li data-start="2077" data-end="2226">
<p data-start="2079" data-end="2226">Presentation of high-quality peer-reviewed papers, case studies and policy-oriented contributions dealing with cyber-law, governance and privacy.</p>
</li>
<li data-start="2227" data-end="2371">
<p data-start="2229" data-end="2371">Publication of selected papers in reputable Scopus and WoS/SCI indexed journals (see below) for greater visibility and academic recognition.</p>
</li>
<li data-start="2372" data-end="2515">
<p data-start="2374" data-end="2515">Enhanced understanding of global and jurisdictional variations in cyber governance, data protection, privacy law and technology regulation.</p>
</li>
<li data-start="2516" data-end="2717">
<p data-start="2518" data-end="2717">Networking opportunities with legal scholars, policymakers, technology experts and industry practitioners which may lead to collaborative research, policy initiatives and professional partnerships.</p>
</li>
<li data-start="2718" data-end="2880">
<p data-start="2720" data-end="2880">A certificate of participation (and for presenting authors, a certificate of presentation/eligibility for publication) recognising contributions to the field.</p>
</li>
<li data-start="2881" data-end="3037">
<p data-start="2883" data-end="3037">Practical take-aways and insights for implementing robust cyber-governance frameworks, privacy-compliant systems and future-proofed regulatory strategies.</p>
</li>
</ul>
<hr data-start="3039" data-end="3042" />
<h5 data-start="3044" data-end="3084">4] Call for Papers – List of Topics</h5>
<p data-start="3085" data-end="3234">We invite authors to submit original, unpublished research papers, review articles or case studies related (but not limited) to the following themes:</p>
<ul data-start="3236" data-end="4311">
<li data-start="3236" data-end="3317">
<p data-start="3238" data-end="3317">Cyber law, data protection and privacy legislation (national & international)</p>
</li>
<li data-start="3318" data-end="3410">
<p data-start="3320" data-end="3410">Governance of next-generation digital technologies: AI, IoT, blockchain, cloud, big data</p>
</li>
<li data-start="3411" data-end="3480">
<p data-start="3413" data-end="3480">Cybersecurity policy, cybercrime regulation and digital forensics</p>
</li>
<li data-start="3481" data-end="3562">
<p data-start="3483" data-end="3562">Privacy by design, data ethics, algorithmic accountability and digital rights</p>
</li>
<li data-start="3563" data-end="3654">
<p data-start="3565" data-end="3654">Cross-border data flows, data localisation, international cyber-agreements and treaties</p>
</li>
<li data-start="3655" data-end="3746">
<p data-start="3657" data-end="3746">Regulatory challenges for platform governance, social media, digital content moderation</p>
</li>
<li data-start="3747" data-end="3851">
<p data-start="3749" data-end="3851">Cyber governance in critical infrastructure, smart cities, industrial IoT and cyber-physical systems</p>
</li>
<li data-start="3852" data-end="3922">
<p data-start="3854" data-end="3922">Human rights, freedom of expression and privacy in the digital age</p>
</li>
<li data-start="3923" data-end="3996">
<p data-start="3925" data-end="3996">Cyber-insurance, liability, risk management and compliance frameworks</p>
</li>
<li data-start="3997" data-end="4079">
<p data-start="3999" data-end="4079">Emerging issues: quantum computing, deepfakes, biometrics, identity management</p>
</li>
<li data-start="4080" data-end="4190">
<p data-start="4082" data-end="4190">Case studies of legislative reform, corporate governance, compliance strategies in different jurisdictions</p>
</li>
<li data-start="4191" data-end="4311">
<p data-start="4193" data-end="4311">Role of public-private partnerships, multi-stakeholder governance models, and institutional frameworks in cyberspace</p>
</li>
</ul>
<p data-start="4313" data-end="4429">We welcome innovative, interdisciplinary contributions that make a meaningful impact on theory, practice and policy.</p>
<hr data-start="4431" data-end="4434" />
<h5 data-start="4436" data-end="4481">5] About Mastering Up [EduTech Platform]</h5>
<p data-start="4482" data-end="5193">Mastering Up is a forward-looking EduTech platform dedicated to empowering learners, researchers, professionals and institutions through high-quality courses, conferences and knowledge-sharing events. Focused on bridging the gap between academia, industry and policy-making, Mastering Up curates subject- and sector-wise international conferences, workshops and training programmes across Science, Technology, Engineering, Management, Mathematics, and Law & Governance. In organising this conference, Mastering Up brings together expertise, digital infrastructure and a global network to deliver a seamless hybrid experience — enabling participants to engage, present and collaborate from anywhere in the world.</p>
<hr data-start="5195" data-end="5198" />
<h5 data-start="5200" data-end="5235">6] Important Dates (Estimated)</h5>
<ul data-start="5236" data-end="5502">
<li data-start="5236" data-end="5290">
<p data-start="5238" data-end="5290"><strong data-start="5238" data-end="5275">Last date for Abstract Submission</strong>: 1 July 2026</p>
</li>
<li data-start="5291" data-end="5348">
<p data-start="5293" data-end="5348"><strong data-start="5293" data-end="5332">Notification of Abstract Acceptance</strong>: 15 July 2026</p>
</li>
<li data-start="5349" data-end="5406">
<p data-start="5351" data-end="5406"><strong data-start="5351" data-end="5389">Registration Date without Late Fee</strong>: 1 August 2026</p>
</li>
<li data-start="5407" data-end="5462">
<p data-start="5409" data-end="5462"><strong data-start="5409" data-end="5444">Registration Date with Late Fee</strong>: 15 August 2026</p>
</li>
<li data-start="5463" data-end="5502">
<p data-start="5465" data-end="5502"><strong data-start="5465" data-end="5484">Conference Date</strong>: 29 August 2026</p>
</li>
</ul>
<p data-start="5504" data-end="5582"><em data-start="5504" data-end="5582">Note: Exact dates subject to final confirmation by the Organising Committee.</em></p>
<hr data-start="5584" data-end="5587" />
<h5 data-start="5589" data-end="5614">7] Registration Fees</h5>
<p data-start="5615" data-end="5803">Participants are requested to register their names through the conference website. Registrations are accepted on <em data-start="5728" data-end="5753">first come, first serve</em> basis.<br data-start="5760" data-end="5763" />Registration fee for each participant:</p>
<ul data-start="5804" data-end="6006">
<li data-start="5804" data-end="5839">
<p data-start="5806" data-end="5839">Foreign Delegates: <strong data-start="5825" data-end="5837">US $ 100</strong></p>
</li>
<li data-start="5840" data-end="6006">
<p data-start="5842" data-end="5861">Indian Delegates:</p>
<ul data-start="5864" data-end="6006">
<li data-start="5864" data-end="5912">
<p data-start="5866" data-end="5912">Students/Scholars: ₹1,000 (Late Fee: ₹1,500)</p>
</li>
<li data-start="5915" data-end="5953">
<p data-start="5917" data-end="5953">Faculty: ₹2,000 (Late Fee: ₹2,500)</p>
</li>
<li data-start="5956" data-end="6006">
<p data-start="5958" data-end="6006">Industry/Scientists: ₹3,000 (Late Fee: ₹3,500)</p>
</li>
</ul>
</li>
</ul>
<p data-start="6008" data-end="6242">Participation and registration entitle you to access all conference sessions (virtual + in-person where applicable), conference materials, certificate of participation, and eligibility for paper publication (for accepted full-papers).</p>
<hr data-start="6244" data-end="6247" />
<h5 data-start="6249" data-end="6268">8] Publication</h5>
<p data-start="6269" data-end="6512">Selected papers from the conference will be invited for publication in reputable <strong data-start="6350" data-end="6360">Scopus</strong> and <strong data-start="6365" data-end="6389">Web of Science / SCI</strong> indexed journals depending on the terms of each journal. The following are five suitable journals for authors to consider:</p>
<div class="_tableContainer_1rjym_1">
<div class="group _tableWrapper_1rjym_13 flex w-fit flex-col-reverse">
<table class="w-fit min-w-(--thread-content-width)" data-start="6514" data-end="7426">
<thead data-start="6514" data-end="6539">
<tr data-start="6514" data-end="6539">
<th data-start="6514" data-end="6524" data-col-size="lg">Journal</th>
<th data-start="6524" data-end="6531" data-col-size="sm">ISSN</th>
<th data-start="6531" data-end="6539" data-col-size="md">Link</th>
</tr>
</thead>
<tbody data-start="6565" data-end="7426">
<tr data-start="6565" data-end="6758">
<td data-start="6565" data-end="6700" data-col-size="lg"><em data-start="6567" data-end="6624">International Journal of Law and Information Technology</em> — Print 0967-0769 / Online 1464-3693 <span class="" data-state="closed"><span class="ms-1 inline-flex max-w-full items-center relative top-[-0.094rem] animate-[show_150ms_ease-in]" data-testid="webpage-citation-pill"><a class="flex h-4.5 overflow-hidden rounded-xl px-2 text-[9px] font-medium transition-colors duration-150 ease-in-out text-token-text-secondary! bg-[#F4F4F4]! dark:bg-[#303030]!" href="https://academic.oup.com/ijlit?utm_source=chatgpt.com" target="_blank" rel="noopener"><span class="relative start-0 bottom-0 flex h-full w-full items-center"><span class="flex h-4 w-full items-center justify-between overflow-hidden"><span class="max-w-[15ch] grow truncate overflow-hidden text-center">OUP Academic</span></span></span></a></span></span></td>
<td data-col-size="sm" data-start="6700" data-end="6724">0967-0769 / 1464-3693</td>
<td data-col-size="md" data-start="6724" data-end="6758"><a class="decorated-link" href="https://academic.oup.com/ijlit?utm_source=chatgpt.com" target="_new" rel="noopener" data-start="6726" data-end="6756">https://academic.oup.com/ijlit</a></td>
</tr>
<tr data-start="6759" data-end="6919">
<td data-start="6759" data-end="6865" data-col-size="lg"><em data-start="6761" data-end="6787">Journal of Cybersecurity</em> — Online ISSN: 2057-2085 (Open Access) <span class="" data-state="closed"><span class="ms-1 inline-flex max-w-full items-center relative top-[-0.094rem] animate-[show_150ms_ease-in]" data-testid="webpage-citation-pill"><a class="flex h-4.5 overflow-hidden rounded-xl px-2 text-[9px] font-medium transition-colors duration-150 ease-in-out text-token-text-secondary! bg-[#F4F4F4]! dark:bg-[#303030]!" href="https://academic.oup.com/cybersecurity?utm_source=chatgpt.com" target="_blank" rel="noopener"><span class="relative start-0 bottom-0 flex h-full w-full items-center"><span class="flex h-4 w-full items-center justify-between overflow-hidden"><span class="max-w-[15ch] grow truncate overflow-hidden text-center">OUP Academic</span></span></span></a></span></span></td>
<td data-col-size="sm" data-start="6865" data-end="6877">2057-2085</td>
<td data-col-size="md" data-start="6877" data-end="6919"><a class="decorated-link" href="https://academic.oup.com/cybersecurity?utm_source=chatgpt.com" target="_new" rel="noopener" data-start="6879" data-end="6917">https://academic.oup.com/cybersecurity</a></td>
</tr>
<tr data-start="6920" data-end="7065">
<td data-start="6920" data-end="7017" data-col-size="lg"><em data-start="6922" data-end="6960">Journal of Cybersecurity and Privacy</em> — ISSN: 2624-800X <span class="" data-state="closed"><span class="ms-1 inline-flex max-w-full items-center relative top-[-0.094rem] animate-[show_150ms_ease-in]" data-testid="webpage-citation-pill"><a class="flex h-4.5 overflow-hidden rounded-xl px-2 text-[9px] font-medium transition-colors duration-150 ease-in-out text-token-text-secondary! bg-[#F4F4F4]! dark:bg-[#303030]!" href="https://www.mdpi.com/journal/jcp?utm_source=chatgpt.com" target="_blank" rel="noopener"><span class="relative start-0 bottom-0 flex h-full w-full items-center"><span class="flex h-4 w-full items-center justify-between overflow-hidden"><span class="max-w-[15ch] grow truncate overflow-hidden text-center">MDPI</span></span></span></a></span></span></td>
<td data-col-size="sm" data-start="7017" data-end="7029">2624-800X</td>
<td data-col-size="md" data-start="7029" data-end="7065"><a class="decorated-link" href="https://www.mdpi.com/journal/jcp?utm_source=chatgpt.com" target="_new" rel="noopener" data-start="7031" data-end="7063">https://www.mdpi.com/journal/jcp</a></td>
</tr>
<tr data-start="7066" data-end="7271">
<td data-start="7066" data-end="7185" data-col-size="lg"><em data-start="7068" data-end="7100">Computer Law & Security Review</em> — ISSN: 0267-3649 (Print) / e-ISSN: 1873-5266 <span class="" data-state="closed"><span class="ms-1 inline-flex max-w-full items-center relative top-[-0.094rem] animate-[show_150ms_ease-in]" data-testid="webpage-citation-pill"><a class="flex h-4.5 overflow-hidden rounded-xl px-2 text-[9px] font-medium transition-colors duration-150 ease-in-out text-token-text-secondary! bg-[#F4F4F4]! dark:bg-[#303030]!" href="https://www.sciencedirect.com/journal/computer-law-and-security-review?utm_source=chatgpt.com" target="_blank" rel="noopener"><span class="relative start-0 bottom-0 flex h-full w-full items-center"><span class="flex h-4 w-full items-center justify-between overflow-hidden"><span class="max-w-[15ch] grow truncate overflow-hidden text-center">sciencedirect.com</span></span></span></a></span></span></td>
<td data-col-size="sm" data-start="7185" data-end="7197">0267-3649</td>
<td data-col-size="md" data-start="7197" data-end="7271"><a class="decorated-link" href="https://www.sciencedirect.com/journal/computer-law-and-security-review?utm_source=chatgpt.com" target="_new" rel="noopener" data-start="7199" data-end="7269">https://www.sciencedirect.com/journal/computer-law-and-security-review</a></td>
</tr>
<tr data-start="7272" data-end="7426">
<td data-start="7272" data-end="7377" data-col-size="lg"><em data-start="7274" data-end="7318">International Journal of Cyber Criminology</em> — ISSN: 0974-2891 <span class="" data-state="closed"><span class="ms-1 inline-flex max-w-full items-center relative top-[-0.094rem] animate-[show_150ms_ease-in]" data-testid="webpage-citation-pill"><a class="flex h-4.5 overflow-hidden rounded-xl px-2 text-[9px] font-medium transition-colors duration-150 ease-in-out text-token-text-secondary! bg-[#F4F4F4]! dark:bg-[#303030]!" href="https://www.cybercrimejournal.com/open-access.php?utm_source=chatgpt.com" target="_blank" rel="noopener"><span class="relative start-0 bottom-0 flex h-full w-full items-center"><span class="flex h-4 w-full items-center justify-between"><span class="max-w-[15ch] grow truncate overflow-hidden text-center">cybercrimejournal.com</span><span class="-me-1 flex h-full items-center rounded-full px-1 text-[#8F8F8F]">+1</span></span></span></a></span></span></td>
<td data-col-size="sm" data-start="7377" data-end="7389">0974-2891</td>
<td data-col-size="md" data-start="7389" data-end="7426"><a class="decorated-link" href="https://www.cybercrimejournal.com" target="_new" rel="noopener" data-start="7391" data-end="7424">https://www.cybercrimejournal.com</a></td>
</tr>
</tbody>
</table>
</div>
</div>
<p data-start="7428" data-end="7684">Authors are encouraged to review each journal’s specific author guidelines, indexing status, publication charges (if any), and scope before submission. Note that final publication depends on acceptance by the chosen journal and compliance with their terms.</p>
<hr data-start="7686" data-end="7689" />
<h5 data-start="7691" data-end="7721">9] Contact & Registration</h5>
<ul data-start="7722" data-end="7854">
<li data-start="7722" data-end="7760">
<p data-start="7724" data-end="7760"><strong data-start="7724" data-end="7733">Email</strong>: <a class="decorated-link cursor-pointer" rel="noopener" data-start="7735" data-end="7758">contact@masteringup.com</a></p>
</li>
<li data-start="7761" data-end="7854">
<p data-start="7763" data-end="7854"><strong data-start="7763" data-end="7784">Registration Link</strong>: <a class="decorated-link" href="https://rzp.io/rzp/muconference" target="_new" rel="noopener" data-start="7786" data-end="7852">https://rzp.io/rzp/muconference</a></p>
</li>
</ul>
<p data-start="7856" data-end="8016">We look forward to your participation in the conference and to your valuable contributions that will help shape the future of cyber-law, governance and privacy</p>