Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Embry-Riddle Aeronautical University (32)
- University at Buffalo School of Law (14)
- San Jose State University (9)
- St. John's University School of Law (6)
- Brigham Young University Law School (4)
-
- Maurer School of Law: Indiana University (4)
- University of Rhode Island (3)
- California State University, San Bernardino (1)
- Clark University (1)
- Coastal Carolina University (1)
- Florida International University (1)
- Georgia State University (1)
- Governors State University (1)
- Liberty University (1)
- Nova Southeastern University (1)
- The University of Akron (1)
- University of Georgia School of Law (1)
- University of Nebraska at Kearney (1)
- University of South Florida (1)
- Western Michigan University (1)
- Keyword
-
- Digital forensics (5)
- Computer forensics (4)
- Death penalty (3)
- Dignity (3)
- Recidivism (3)
-
- Academic journal (2)
- Cyber forensics (2)
- Cyber-harassment (2)
- Digital Forensics (2)
- Forensic imaging (2)
- Fuzzy hashing (2)
- Prison (2)
- Punishment (2)
- Rape (2)
- Subjectivity (2)
- Violence (2)
- 391 U.S. 510 (1968) (1)
- AB 109 (1)
- ASRS (1)
- Abortion (1)
- Academic Skills (1)
- Access to information (1)
- Accomplice (1)
- Acknowledged peer review (1)
- Acquittal rates (1)
- Addresses (1)
- Aggravating circumstances (1)
- Agitation (1)
- Alaska Natives (1)
- Amazon kindle (1)
- Publication
-
- Journal of Digital Forensics, Security and Law (31)
- Buffalo Law Review (11)
- Themis: Research Journal of Justice Studies and Forensic Science (9)
- The Catholic Lawyer (6)
- Dignity: A Journal of Analysis of Exploitation and Violence (3)
-
- BYU Law Review (2)
- Buffalo Public Interest Law Journal (2)
- Indiana Journal of Global Legal Studies (2)
- Indiana Law Journal (2)
- Bridges: A Journal of Student Research (1)
- Brigham Young University Education and Law Journal (1)
- Brigham Young University Journal of Public Law (1)
- Buffalo Human Rights Law Review (1)
- Class, Race and Corporate Power (1)
- DISCOVERY: Georgia State Honors College Undergraduate Research Journal (1)
- Fidei et Veritatis: The Liberty University Journal of Graduate Research (1)
- Genocide Studies and Prevention: An International Journal (1)
- Georgia Journal of International & Comparative Law (1)
- GrandFamilies: The Contemporary Journal of Research, Practice and Policy (1)
- International Journal of Aviation, Aeronautics, and Aerospace (1)
- Journal of Critical Issues in Educational Practice (1)
- Proceedings from the Document Academy (1)
- Scholarly Undergraduate Research Journal at Clark (SURJ) (1)
- The International Undergraduate Journal For Service-Learning, Leadership, and Social Change (1)
- The Qualitative Report (1)
- Undergraduate Research Journal (1)
Articles 1 - 30 of 85
Full-Text Articles in Entire DC Network
Leveraging The Windows Amcache.Hve File In Forensic Investigations, Bhupendra Singh, Upasna Singh
Leveraging The Windows Amcache.Hve File In Forensic Investigations, Bhupendra Singh, Upasna Singh
Journal of Digital Forensics, Security and Law
The Amcache.hve is a registry hive file that is created by Microsoft® Windows® to store the information related to execution of programs. This paper highlights the evidential potential of Amcache.hve file and its application in the area of user activity analysis. The study uncovers numerous artifacts retained in Amcache.hve file when a user performs certain actions such as running host-based applications, installation of new applications, or running portable applications from external devices. The results of experiments demonstrate that Amcache.hve file stores intriguing artifacts related to applications such as timestamps of creation and last modification of any application; name, description, publisher …
The 2016 Analysis Of Information Remaining On Computer Hard Disks Offered For Sale On The Second Hand Market In The Uae, Thomas Martin, Andy Jones, Mohammed Alzaabi
The 2016 Analysis Of Information Remaining On Computer Hard Disks Offered For Sale On The Second Hand Market In The Uae, Thomas Martin, Andy Jones, Mohammed Alzaabi
Journal of Digital Forensics, Security and Law
This research describes our survey of data remaining on computer hard disks sold on the second hand market in the United Arab Emirates (UAE). This is a repetition of the first survey conducted in 2012 (Jones, Martin, & Alzaabi, 2012). Similar studies have been carried over the last ten years in the United Kingdom, Australia, USA, Germany and France: (Jones, Mee, Meyler, & Gooch, 2005), (Jones, Valli, Sutherland, & Thomas, 2006), (Jones, Valli, Dardick, & Sutherland, 2008), (Jones, Valli, Dardick, & Sutherland, 2009). This research was undertaken to gain insight into the volumes of data found on second-hand disks purchased …
The Impact Of Sha-1 File Hash Collisions On Digital Forensic Imaging: A Follow-Up Experiment, Gary C. Kessler
The Impact Of Sha-1 File Hash Collisions On Digital Forensic Imaging: A Follow-Up Experiment, Gary C. Kessler
Journal of Digital Forensics, Security and Law
A previous paper described an experiment showing that Message Digest 5 (MD5) hash collisions of files have no impact on integrity verification in the forensic imaging process. This paper describes a similar experiment applied when two files have a Secure Hash Algorithm (SHA-1) collision.
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Bloom Filters Optimized Wu-Manber For Intrusion Detection, Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, Babar Shah
Bloom Filters Optimized Wu-Manber For Intrusion Detection, Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, Babar Shah
Journal of Digital Forensics, Security and Law
With increasing number and severity of attacks, monitoring ingress and egress network traffic is becoming essential everyday task. Intrusion detection systems are the main tools for capturing and searching network traffic for potential harm. Signature-based intrusion detection systems are the most widely used, and they simply use a pattern matching algorithms to locate attack signatures in intercepted network traffic. Pattern matching algorithms are very expensive in terms of running time and memory usage, leaving intrusion detection systems unable to detect attacks in real-time. We propose a Bloom filters optimized Wu-Manber pattern matching algorithm to speed up intrusion detection. The Bloom …
A Survey Of Social Network Forensics, Umit Karabiyik, Muhammed Abdullah Canbaz, Ahmet Aksoy, Tayfun Tuna, Esra Akbas, Bilal Gonen, Ramazan S. Aygun
A Survey Of Social Network Forensics, Umit Karabiyik, Muhammed Abdullah Canbaz, Ahmet Aksoy, Tayfun Tuna, Esra Akbas, Bilal Gonen, Ramazan S. Aygun
Journal of Digital Forensics, Security and Law
Social networks in any form, specifically online social networks (OSNs), are becoming a part of our everyday life in this new millennium especially with the advanced and simple communication technologies through easily accessible devices such as smartphones and tablets. The data generated through the use of these technologies need to be analyzed for forensic purposes when criminal and terrorist activities are involved. In order to deal with the forensic implications of social networks, current research on both digital forensics and social networks need to be incorporated and understood. This will help digital forensics investigators to predict, detect and even prevent …
The Impact Of Md5 File Hash Collisions On Digital Forensic Imaging, Gary C. Kessler
The Impact Of Md5 File Hash Collisions On Digital Forensic Imaging, Gary C. Kessler
Journal of Digital Forensics, Security and Law
The Message Digest 5 (MD5) hash is commonly used as for integrity verification in the forensic imaging process. The ability to force MD5 hash collisions has been a reality for more than a decade, although there is a general consensus that hash collisions are of minimal impact to the practice of computer forensics. This paper describes an experiment to determine the results of imaging two disks that are identical except for one file, the two versions of which have different content but otherwise occupy the same byte positions on the disk, are the same size, and have the same hash …
A New Distributed Chinese Wall Security Policy Model, Saad Fehis, Omar Nouali, Mohand-Tahar Kechadi
A New Distributed Chinese Wall Security Policy Model, Saad Fehis, Omar Nouali, Mohand-Tahar Kechadi
Journal of Digital Forensics, Security and Law
The application of the Chinese wall security policy model (CWSPM) to control the information flows between two or more competing and/or conflicting companies in cloud computing (Multi-tenancy) or in the social network, is a very interesting solution. The main goal of the Chinese Wall Security Policy is to build a wall between the datasets of competing companies, and among the system subjects. This is done by the applying to the subjects mandatory rules, in order to control the information flow caused between them. This problem is one of the hottest topics in the area of cloud computing (as a distributed …
Contemporary Soviet Criminal Law: An Analysis Of The General Principles And Major Institutions Of Post-1958 Soviet Criminal Law, Chris Osakwe
Georgia Journal of International & Comparative Law
No abstract provided.
A Duty To Document, Marc Kosciejew
A Duty To Document, Marc Kosciejew
Proceedings from the Document Academy
Access to information is a bedrock principle of contemporary democratic governments and their public agencies and entities. Access to information depends upon these public institutions to document their activities and decisions. When public institutions do not document their activities and decisions, citizens’ right of access is ultimately denied. Public accountability and trust, in addition to institutional memory and the historical record, are undermined without the creation of appropriate records. Establishing and enforcing a duty to document helps promote accountability, openness, transparency, good governance, and public trust in public institutions. A duty to document should therefore be a fundamental component of …
Reformers Against The Clock, William Sloan Greenawalt
Reformers Against The Clock, William Sloan Greenawalt
The Catholic Lawyer
No abstract provided.
Too Little, Too Late?, Revius O. Ortique, Jr.
Too Little, Too Late?, Revius O. Ortique, Jr.
The Catholic Lawyer
No abstract provided.
Alternate Legal Assistance Plans, John D. Robb
Alternate Legal Assistance Plans, John D. Robb
The Catholic Lawyer
No abstract provided.
Trends In Legal Services For The Poor, Junius L. Allison
Trends In Legal Services For The Poor, Junius L. Allison
The Catholic Lawyer
No abstract provided.
The O.E.O. Legal Services Program, Earl Johnson, Jr.
The O.E.O. Legal Services Program, Earl Johnson, Jr.
The Catholic Lawyer
No abstract provided.
Punishing Genocide: A Comparative Empirical Analysis Of Sentencing Laws And Practices At The International Criminal Tribunal For Rwanda (Ictr), Rwandan Domestic Courts, And Gacaca Courts, Barbora Hola, Hollie Nyseth Brehm
Punishing Genocide: A Comparative Empirical Analysis Of Sentencing Laws And Practices At The International Criminal Tribunal For Rwanda (Ictr), Rwandan Domestic Courts, And Gacaca Courts, Barbora Hola, Hollie Nyseth Brehm
Genocide Studies and Prevention: An International Journal
This article compares sentencing of those convicted of participation in the 1994 genocide in Rwanda. With over one million people facing trial, Rwanda constitutes the world’s most comprehensive case of criminal accountability after genocide and presents an important case study of punishing genocide. Criminal courts at three different levels— international, domestic, and local—sought justice in the aftermath of the violence. In order to compare punishment at each level, we analyze an unprecedented database of sentences given by the ICTR, the Rwandan domestic courts, and Rwanda’s Gacaca courts. The analysis demonstrates that sentencing varied across the three levels—ranging from limited time …
The Inaugural Issue Of Dignity, Donna M. Hughes
The Inaugural Issue Of Dignity, Donna M. Hughes
Dignity: A Journal of Analysis of Exploitation and Violence
No abstract provided.
Unsettled: How Climate Change Challenges A Foundation Of Our Legal System, And Adapting The Legal State, Victor B. Flatt
Unsettled: How Climate Change Challenges A Foundation Of Our Legal System, And Adapting The Legal State, Victor B. Flatt
BYU Law Review
One of the fundamental goals of law is to end disputes. This push to “settlement” is foundational and has historically worked to increase societal efficiency and justice by engendering legitimate expectations among the citizenry. However, the efficient nature of much legal finality, settlement and repose only exists against a background of evolution of the physical environment that is predictable and slowpaced. That background no longer exists. The alteration of the physical world, and thus, the background for our societal structure and decisions, is accelerating rapidly due to human-caused climate change. This creates a mismatch between the law’s tendency to finality …
The First Year Of The San Bernardino Restorative Youth Court, John M. Winslade
The First Year Of The San Bernardino Restorative Youth Court, John M. Winslade
Journal of Critical Issues in Educational Practice
The San Bernardino Restorative Youth Court was established by the San Bernardino City Unified School District school board and has operated for one school year (2015-16). The purpose of this article is to document what has happened in this year and to begin to address questions about the value of the youth court for those for whom it aims to make a difference. Data collated are at this point preliminary but some tentative conclusions can be drawn, even at this early stage. Here we shall outline these data and the conclusions that are suggested by them. The best available measure …
Criminals Behind The Veil: Political Philosophy And Punishment, Chad Flanders
Criminals Behind The Veil: Political Philosophy And Punishment, Chad Flanders
Brigham Young University Journal of Public Law
No abstract provided.
Welcome To Dignity, Donna M. Hughes
Welcome To Dignity, Donna M. Hughes
Dignity: A Journal of Analysis of Exploitation and Violence
No abstract provided.
Prosecuted But Not Silenced: Courtroom Reform For Sexually Abused Children By Maralee Mclean, Barry Goldstein
Prosecuted But Not Silenced: Courtroom Reform For Sexually Abused Children By Maralee Mclean, Barry Goldstein
Dignity: A Journal of Analysis of Exploitation and Violence
No abstract provided.
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Special Issue On Cyberharassment Investigation: Advances And Trends, Joanne Bryce, Virginia N. L. Franqueira, Andrew Marrington
Special Issue On Cyberharassment Investigation: Advances And Trends, Joanne Bryce, Virginia N. L. Franqueira, Andrew Marrington
Journal of Digital Forensics, Security and Law
Empirical and anecdotal evidence indicates that cyberharassment is more prevalent as the use of social media becomes increasingly widespread, making geography and physical proximity irrelevant. Cyberharassment can take different forms (e.g., cyberbullying, cyberstalking, cybertrolling), and be motivated by the objectives of inflicting distress, exercising control, impersonation, and defamation. Little is currently known about the modus operandi of offenders and their psychological characteristics. Investigation of these behaviours is particularly challenging because it involves digital evidence distributed across the devices of both alleged offenders and victims, as well as online service providers, sometimes over an extended period of time. This special issue …
Differentiating Cyberbullies And Internet Trolls By Personality Characteristics And Self-Esteem, Lauren A. Zezulka, Kathryn C. Seigfried-Spellar
Differentiating Cyberbullies And Internet Trolls By Personality Characteristics And Self-Esteem, Lauren A. Zezulka, Kathryn C. Seigfried-Spellar
Journal of Digital Forensics, Security and Law
Cyberbullying and internet trolling are both forms of online aggression or cyberharassment; however, research has yet to assess the prevalence of these behaviors in relationship to one another. In addition, the current study was the first to investigate whether individual differences and self-esteem discerned between self-reported cyberbullies and/or internet trolls (i.e., Never engaged in either, Cyberbully-only, Troll-only, Both Cyberbully and Troll). Of 308 respondents solicited from Mechanical Turk, 70 engaged in cyberbullying behaviors, 20 engaged in only trolling behaviors, 129 self-reported both behaviors, and 89 self-reported neither behavior. Results yielded low self-esteem, low conscientiousness, and low internal moral values for …
The Impact Of Low Self-Control On Online Harassment: Interaction With Opportunity., Hyunin Baek, Michael M. Losavio, George E. Higgins
The Impact Of Low Self-Control On Online Harassment: Interaction With Opportunity., Hyunin Baek, Michael M. Losavio, George E. Higgins
Journal of Digital Forensics, Security and Law
Developing Internet technology has increased the rates of youth online harassment. This study examines online harassment from adolescents with low self-control and the moderating effect of opportunity. The data used in this study were collected by the Korea Institute of Criminology in 2009. The total sample size was 1,091. The results indicated that low self-control, opportunity, and gender have a significant influence on online harassment. However, these results differed according to gender; for males, low self-control significantly impacted online harassment; for females, however, only low self-control significantly impacted online harassment. Furthermore, the interaction between low self-control and opportunity did not …
Toward Online Linguistic Surveillance Of Threatening Messages, Brian H. Spitzberg, Jean Mark Gawron
Toward Online Linguistic Surveillance Of Threatening Messages, Brian H. Spitzberg, Jean Mark Gawron
Journal of Digital Forensics, Security and Law
Threats are communicative acts, but it is not always obvious what they communicate or when they communicate imminent credible and serious risk. This paper proposes a research- and theory-based set of over 20 potential linguistic risk indicators that may discriminate credible from non-credible threats within online threat message corpora. Two prongs are proposed: (1) Using expert and layperson ratings to validate subjective scales in relation to annotated known risk messages, and (2) Using the resulting annotated corpora for automated machine learning with computational linguistic analyses to classify non-threats, false threats, and credible threats. Rating scales are proposed, existing threat corpora …
A Legal Examination Of Revenge Pornography And Cyber-Harassment, Thomas Lonardo, Tricia Martland, Doug White
A Legal Examination Of Revenge Pornography And Cyber-Harassment, Thomas Lonardo, Tricia Martland, Doug White
Journal of Digital Forensics, Security and Law
This paper examines the current state of the statutes in the United States as they relate to cyber-harassment in the context of "revenge porn". Revenge porn refers to websites which cater to those wishing to exploit, harass, or otherwise antagonize their ex partners using pornographic images and videos which were obtained during their relationships. The paper provide examples and illustrations as well as a summary of current statute in the United States. The paper additionally explores some of the various legal remedies available to victims of revenge pornography.
Down But Not Out! How Law School Clinics Can Help Bridge The Small Claims Court Access To Justice Gap, Rebecca Nieman
Down But Not Out! How Law School Clinics Can Help Bridge The Small Claims Court Access To Justice Gap, Rebecca Nieman
Buffalo Public Interest Law Journal
No abstract provided.
A Tale Of Two Clinics: Similarities And Differences In Evidence Of The Clinic Effect On The Development Of Law Students' Ethical And Altruistic Professional Identities, Jonel Newman, Donald Nicolson
A Tale Of Two Clinics: Similarities And Differences In Evidence Of The Clinic Effect On The Development Of Law Students' Ethical And Altruistic Professional Identities, Jonel Newman, Donald Nicolson
Buffalo Public Interest Law Journal
No abstract provided.