Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Legal Studies

Journal

2016

Institution
Keyword
Publication

Articles 1 - 30 of 85

Full-Text Articles in Entire DC Network

Leveraging The Windows Amcache.Hve File In Forensic Investigations, Bhupendra Singh, Upasna Singh Dec 2016

Leveraging The Windows Amcache.Hve File In Forensic Investigations, Bhupendra Singh, Upasna Singh

Journal of Digital Forensics, Security and Law

The Amcache.hve is a registry hive file that is created by Microsoft® Windows® to store the information related to execution of programs. This paper highlights the evidential potential of Amcache.hve file and its application in the area of user activity analysis. The study uncovers numerous artifacts retained in Amcache.hve file when a user performs certain actions such as running host-based applications, installation of new applications, or running portable applications from external devices. The results of experiments demonstrate that Amcache.hve file stores intriguing artifacts related to applications such as timestamps of creation and last modification of any application; name, description, publisher …


The 2016 Analysis Of Information Remaining On Computer Hard Disks Offered For Sale On The Second Hand Market In The Uae, Thomas Martin, Andy Jones, Mohammed Alzaabi Dec 2016

The 2016 Analysis Of Information Remaining On Computer Hard Disks Offered For Sale On The Second Hand Market In The Uae, Thomas Martin, Andy Jones, Mohammed Alzaabi

Journal of Digital Forensics, Security and Law

This research describes our survey of data remaining on computer hard disks sold on the second hand market in the United Arab Emirates (UAE). This is a repetition of the first survey conducted in 2012 (Jones, Martin, & Alzaabi, 2012). Similar studies have been carried over the last ten years in the United Kingdom, Australia, USA, Germany and France: (Jones, Mee, Meyler, & Gooch, 2005), (Jones, Valli, Sutherland, & Thomas, 2006), (Jones, Valli, Dardick, & Sutherland, 2008), (Jones, Valli, Dardick, & Sutherland, 2009). This research was undertaken to gain insight into the volumes of data found on second-hand disks purchased …


The Impact Of Sha-1 File Hash Collisions On Digital Forensic Imaging: A Follow-Up Experiment, Gary C. Kessler Dec 2016

The Impact Of Sha-1 File Hash Collisions On Digital Forensic Imaging: A Follow-Up Experiment, Gary C. Kessler

Journal of Digital Forensics, Security and Law

A previous paper described an experiment showing that Message Digest 5 (MD5) hash collisions of files have no impact on integrity verification in the forensic imaging process. This paper describes a similar experiment applied when two files have a Secure Hash Algorithm (SHA-1) collision.


Table Of Contents Dec 2016

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Bloom Filters Optimized Wu-Manber For Intrusion Detection, Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, Babar Shah Dec 2016

Bloom Filters Optimized Wu-Manber For Intrusion Detection, Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, Babar Shah

Journal of Digital Forensics, Security and Law

With increasing number and severity of attacks, monitoring ingress and egress network traffic is becoming essential everyday task. Intrusion detection systems are the main tools for capturing and searching network traffic for potential harm. Signature-based intrusion detection systems are the most widely used, and they simply use a pattern matching algorithms to locate attack signatures in intercepted network traffic. Pattern matching algorithms are very expensive in terms of running time and memory usage, leaving intrusion detection systems unable to detect attacks in real-time. We propose a Bloom filters optimized Wu-Manber pattern matching algorithm to speed up intrusion detection. The Bloom …


A Survey Of Social Network Forensics, Umit Karabiyik, Muhammed Abdullah Canbaz, Ahmet Aksoy, Tayfun Tuna, Esra Akbas, Bilal Gonen, Ramazan S. Aygun Dec 2016

A Survey Of Social Network Forensics, Umit Karabiyik, Muhammed Abdullah Canbaz, Ahmet Aksoy, Tayfun Tuna, Esra Akbas, Bilal Gonen, Ramazan S. Aygun

Journal of Digital Forensics, Security and Law

Social networks in any form, specifically online social networks (OSNs), are becoming a part of our everyday life in this new millennium especially with the advanced and simple communication technologies through easily accessible devices such as smartphones and tablets. The data generated through the use of these technologies need to be analyzed for forensic purposes when criminal and terrorist activities are involved. In order to deal with the forensic implications of social networks, current research on both digital forensics and social networks need to be incorporated and understood. This will help digital forensics investigators to predict, detect and even prevent …


The Impact Of Md5 File Hash Collisions On Digital Forensic Imaging, Gary C. Kessler Dec 2016

The Impact Of Md5 File Hash Collisions On Digital Forensic Imaging, Gary C. Kessler

Journal of Digital Forensics, Security and Law

The Message Digest 5 (MD5) hash is commonly used as for integrity verification in the forensic imaging process. The ability to force MD5 hash collisions has been a reality for more than a decade, although there is a general consensus that hash collisions are of minimal impact to the practice of computer forensics. This paper describes an experiment to determine the results of imaging two disks that are identical except for one file, the two versions of which have different content but otherwise occupy the same byte positions on the disk, are the same size, and have the same hash …


A New Distributed Chinese Wall Security Policy Model, Saad Fehis, Omar Nouali, Mohand-Tahar Kechadi Dec 2016

A New Distributed Chinese Wall Security Policy Model, Saad Fehis, Omar Nouali, Mohand-Tahar Kechadi

Journal of Digital Forensics, Security and Law

The application of the Chinese wall security policy model (CWSPM) to control the information flows between two or more competing and/or conflicting companies in cloud computing (Multi-tenancy) or in the social network, is a very interesting solution. The main goal of the Chinese Wall Security Policy is to build a wall between the datasets of competing companies, and among the system subjects. This is done by the applying to the subjects mandatory rules, in order to control the information flow caused between them. This problem is one of the hottest topics in the area of cloud computing (as a distributed …


Contemporary Soviet Criminal Law: An Analysis Of The General Principles And Major Institutions Of Post-1958 Soviet Criminal Law, Chris Osakwe Dec 2016

Contemporary Soviet Criminal Law: An Analysis Of The General Principles And Major Institutions Of Post-1958 Soviet Criminal Law, Chris Osakwe

Georgia Journal of International & Comparative Law

No abstract provided.


A Duty To Document, Marc Kosciejew Dec 2016

A Duty To Document, Marc Kosciejew

Proceedings from the Document Academy

Access to information is a bedrock principle of contemporary democratic governments and their public agencies and entities. Access to information depends upon these public institutions to document their activities and decisions. When public institutions do not document their activities and decisions, citizens’ right of access is ultimately denied. Public accountability and trust, in addition to institutional memory and the historical record, are undermined without the creation of appropriate records. Establishing and enforcing a duty to document helps promote accountability, openness, transparency, good governance, and public trust in public institutions. A duty to document should therefore be a fundamental component of …


Reformers Against The Clock, William Sloan Greenawalt Dec 2016

Reformers Against The Clock, William Sloan Greenawalt

The Catholic Lawyer

No abstract provided.


Too Little, Too Late?, Revius O. Ortique, Jr. Dec 2016

Too Little, Too Late?, Revius O. Ortique, Jr.

The Catholic Lawyer

No abstract provided.


Alternate Legal Assistance Plans, John D. Robb Dec 2016

Alternate Legal Assistance Plans, John D. Robb

The Catholic Lawyer

No abstract provided.


Trends In Legal Services For The Poor, Junius L. Allison Dec 2016

Trends In Legal Services For The Poor, Junius L. Allison

The Catholic Lawyer

No abstract provided.


The O.E.O. Legal Services Program, Earl Johnson, Jr. Dec 2016

The O.E.O. Legal Services Program, Earl Johnson, Jr.

The Catholic Lawyer

No abstract provided.


Punishing Genocide: A Comparative Empirical Analysis Of Sentencing Laws And Practices At The International Criminal Tribunal For Rwanda (Ictr), Rwandan Domestic Courts, And Gacaca Courts, Barbora Hola, Hollie Nyseth Brehm Dec 2016

Punishing Genocide: A Comparative Empirical Analysis Of Sentencing Laws And Practices At The International Criminal Tribunal For Rwanda (Ictr), Rwandan Domestic Courts, And Gacaca Courts, Barbora Hola, Hollie Nyseth Brehm

Genocide Studies and Prevention: An International Journal

This article compares sentencing of those convicted of participation in the 1994 genocide in Rwanda. With over one million people facing trial, Rwanda constitutes the world’s most comprehensive case of criminal accountability after genocide and presents an important case study of punishing genocide. Criminal courts at three different levels— international, domestic, and local—sought justice in the aftermath of the violence. In order to compare punishment at each level, we analyze an unprecedented database of sentences given by the ICTR, the Rwandan domestic courts, and Rwanda’s Gacaca courts. The analysis demonstrates that sentencing varied across the three levels—ranging from limited time …


The Inaugural Issue Of Dignity, Donna M. Hughes Dec 2016

The Inaugural Issue Of Dignity, Donna M. Hughes

Dignity: A Journal of Analysis of Exploitation and Violence

No abstract provided.


Unsettled: How Climate Change Challenges A Foundation Of Our Legal System, And Adapting The Legal State, Victor B. Flatt Nov 2016

Unsettled: How Climate Change Challenges A Foundation Of Our Legal System, And Adapting The Legal State, Victor B. Flatt

BYU Law Review

One of the fundamental goals of law is to end disputes. This push to “settlement” is foundational and has historically worked to increase societal efficiency and justice by engendering legitimate expectations among the citizenry. However, the efficient nature of much legal finality, settlement and repose only exists against a background of evolution of the physical environment that is predictable and slowpaced. That background no longer exists. The alteration of the physical world, and thus, the background for our societal structure and decisions, is accelerating rapidly due to human-caused climate change. This creates a mismatch between the law’s tendency to finality …


The First Year Of The San Bernardino Restorative Youth Court, John M. Winslade Nov 2016

The First Year Of The San Bernardino Restorative Youth Court, John M. Winslade

Journal of Critical Issues in Educational Practice

The San Bernardino Restorative Youth Court was established by the San Bernardino City Unified School District school board and has operated for one school year (2015-16). The purpose of this article is to document what has happened in this year and to begin to address questions about the value of the youth court for those for whom it aims to make a difference. Data collated are at this point preliminary but some tentative conclusions can be drawn, even at this early stage. Here we shall outline these data and the conclusions that are suggested by them. The best available measure …


Criminals Behind The Veil: Political Philosophy And Punishment, Chad Flanders Nov 2016

Criminals Behind The Veil: Political Philosophy And Punishment, Chad Flanders

Brigham Young University Journal of Public Law

No abstract provided.


Welcome To Dignity, Donna M. Hughes Nov 2016

Welcome To Dignity, Donna M. Hughes

Dignity: A Journal of Analysis of Exploitation and Violence

No abstract provided.


Prosecuted But Not Silenced: Courtroom Reform For Sexually Abused Children By Maralee Mclean, Barry Goldstein Nov 2016

Prosecuted But Not Silenced: Courtroom Reform For Sexually Abused Children By Maralee Mclean, Barry Goldstein

Dignity: A Journal of Analysis of Exploitation and Violence

No abstract provided.


Table Of Contents Sep 2016

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Special Issue On Cyberharassment Investigation: Advances And Trends, Joanne Bryce, Virginia N. L. Franqueira, Andrew Marrington Sep 2016

Special Issue On Cyberharassment Investigation: Advances And Trends, Joanne Bryce, Virginia N. L. Franqueira, Andrew Marrington

Journal of Digital Forensics, Security and Law

Empirical and anecdotal evidence indicates that cyberharassment is more prevalent as the use of social media becomes increasingly widespread, making geography and physical proximity irrelevant. Cyberharassment can take different forms (e.g., cyberbullying, cyberstalking, cybertrolling), and be motivated by the objectives of inflicting distress, exercising control, impersonation, and defamation. Little is currently known about the modus operandi of offenders and their psychological characteristics. Investigation of these behaviours is particularly challenging because it involves digital evidence distributed across the devices of both alleged offenders and victims, as well as online service providers, sometimes over an extended period of time. This special issue …


Differentiating Cyberbullies And Internet Trolls By Personality Characteristics And Self-Esteem, Lauren A. Zezulka, Kathryn C. Seigfried-Spellar Sep 2016

Differentiating Cyberbullies And Internet Trolls By Personality Characteristics And Self-Esteem, Lauren A. Zezulka, Kathryn C. Seigfried-Spellar

Journal of Digital Forensics, Security and Law

Cyberbullying and internet trolling are both forms of online aggression or cyberharassment; however, research has yet to assess the prevalence of these behaviors in relationship to one another. In addition, the current study was the first to investigate whether individual differences and self-esteem discerned between self-reported cyberbullies and/or internet trolls (i.e., Never engaged in either, Cyberbully-only, Troll-only, Both Cyberbully and Troll). Of 308 respondents solicited from Mechanical Turk, 70 engaged in cyberbullying behaviors, 20 engaged in only trolling behaviors, 129 self-reported both behaviors, and 89 self-reported neither behavior. Results yielded low self-esteem, low conscientiousness, and low internal moral values for …


The Impact Of Low Self-Control On Online Harassment: Interaction With Opportunity., Hyunin Baek, Michael M. Losavio, George E. Higgins Sep 2016

The Impact Of Low Self-Control On Online Harassment: Interaction With Opportunity., Hyunin Baek, Michael M. Losavio, George E. Higgins

Journal of Digital Forensics, Security and Law

Developing Internet technology has increased the rates of youth online harassment. This study examines online harassment from adolescents with low self-control and the moderating effect of opportunity. The data used in this study were collected by the Korea Institute of Criminology in 2009. The total sample size was 1,091. The results indicated that low self-control, opportunity, and gender have a significant influence on online harassment. However, these results differed according to gender; for males, low self-control significantly impacted online harassment; for females, however, only low self-control significantly impacted online harassment. Furthermore, the interaction between low self-control and opportunity did not …


Toward Online Linguistic Surveillance Of Threatening Messages, Brian H. Spitzberg, Jean Mark Gawron Sep 2016

Toward Online Linguistic Surveillance Of Threatening Messages, Brian H. Spitzberg, Jean Mark Gawron

Journal of Digital Forensics, Security and Law

Threats are communicative acts, but it is not always obvious what they communicate or when they communicate imminent credible and serious risk. This paper proposes a research- and theory-based set of over 20 potential linguistic risk indicators that may discriminate credible from non-credible threats within online threat message corpora. Two prongs are proposed: (1) Using expert and layperson ratings to validate subjective scales in relation to annotated known risk messages, and (2) Using the resulting annotated corpora for automated machine learning with computational linguistic analyses to classify non-threats, false threats, and credible threats. Rating scales are proposed, existing threat corpora …


A Legal Examination Of Revenge Pornography And Cyber-Harassment, Thomas Lonardo, Tricia Martland, Doug White Sep 2016

A Legal Examination Of Revenge Pornography And Cyber-Harassment, Thomas Lonardo, Tricia Martland, Doug White

Journal of Digital Forensics, Security and Law

This paper examines the current state of the statutes in the United States as they relate to cyber-harassment in the context of "revenge porn". Revenge porn refers to websites which cater to those wishing to exploit, harass, or otherwise antagonize their ex partners using pornographic images and videos which were obtained during their relationships. The paper provide examples and illustrations as well as a summary of current statute in the United States. The paper additionally explores some of the various legal remedies available to victims of revenge pornography.


Down But Not Out! How Law School Clinics Can Help Bridge The Small Claims Court Access To Justice Gap, Rebecca Nieman Sep 2016

Down But Not Out! How Law School Clinics Can Help Bridge The Small Claims Court Access To Justice Gap, Rebecca Nieman

Buffalo Public Interest Law Journal

No abstract provided.


A Tale Of Two Clinics: Similarities And Differences In Evidence Of The Clinic Effect On The Development Of Law Students' Ethical And Altruistic Professional Identities, Jonel Newman, Donald Nicolson Sep 2016

A Tale Of Two Clinics: Similarities And Differences In Evidence Of The Clinic Effect On The Development Of Law Students' Ethical And Altruistic Professional Identities, Jonel Newman, Donald Nicolson

Buffalo Public Interest Law Journal

No abstract provided.