Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Colorado (16)
- Oil shale development (14)
- Wyoming (12)
- Fracing (11)
- Fracking (11)
-
- Hydraulic fracturing (11)
- BLM (9)
- Oil shale (9)
- Shale plays (9)
- U.S. Bureau of Land Management (9)
- Utah (8)
- Climate change (7)
- Shale gas (7)
- Barrels per day (6)
- Coal (6)
- Marcellus (6)
- Natural gas (6)
- Piceance Basin (6)
- Shale gas development (6)
- Water quality (6)
- Air quality (5)
- BMPs (5)
- Benefits (5)
- EPA (5)
- Environmental impacts (5)
- National Environmental Policy Act (5)
- New York (5)
- Oil shale industry (5)
- Shell (5)
- Texas (5)
- Publication
-
- Journal of Digital Forensics, Security and Law (20)
- Annual ADFSL Conference on Digital Forensics, Security and Law (14)
- The Promise and Peril of Oil Shale Development (February 5) (13)
- Opportunities and Obstacles to Reducing the Environmental Footprint of Natural Gas Development in Uintah Basin (October 14) (10)
- Shale Plays in the Intermountain West: Legal and Policy Issues (November 12) (10)
-
- All Faculty Scholarship (7)
- Paul F. Eschenfelder (4)
- Santa Clara Magazine (3)
- Federal Communications Law Journal (2)
- US-Mexico Negotiations on Improved Colorado River Management: An Update (February 19) (2)
- 2010 World Energy Justice Conference (November 5) (1)
- Articles (1)
- Conference papers (1)
- Emmanuel Mario B Santos aka Marc Guerrero (1)
- George H Baker (1)
- International Bulletin of Political Psychology (1)
- Julio Rojas-Mora (1)
- Law Faculty Scholarship (1)
- Michael C. Dorneich (1)
- Ohio Valley Regional Student Conference (1)
- Sam Han (1)
- Publication Type
Articles 31 - 60 of 96
Full-Text Articles in Engineering
Spot Off: The Gao Takes On The Tsa’S Behavior Detection Program, Ibpp Editor
Spot Off: The Gao Takes On The Tsa’S Behavior Detection Program, Ibpp Editor
International Bulletin of Political Psychology
The United States Government Accountability Office (GAO) has recently Issued Efforts to Validate TSA’s Passenger Screening Behavior Detection Program Underway, but Opportunities Exist to Strengthen Validation and Address Operational Problems (May 2010, GAO-10-763). This IBPP article will describe and comment on the main GAO findings and additional data on which the findings are based. The article will end with some basic challenges to behavior detection as a useful security measure.
The Defiance College Undergraduate Major In Digital Forensic Science: Setting The Bar Higher, Gregg H. Gunsch
The Defiance College Undergraduate Major In Digital Forensic Science: Setting The Bar Higher, Gregg H. Gunsch
Annual ADFSL Conference on Digital Forensics, Security and Law
This paper provides background information to accompany the panel discussion on Curriculum Design and Implementation in Computer Forensics Education. It is specifically focused on the content and delivery of Defiance College’s undergraduate (B.S.) program majoring in Digital Forensic Science (DFS). The genesis and evolution of the Defiance College DFS program are described, along with its successes, challenges and known opportunities for improvement. The desired outcomes of the panel discussion include articulating the necessary components of an undergraduate program, refining expectations of knowledge and skills required of students upon graduation, and suggesting strategies for achieving those expectations despite inevitable resource limitations …
Computer Forensics For Graduate Accountants: A Motivational Curriculum Design Approach, Grover S. Kearns
Computer Forensics For Graduate Accountants: A Motivational Curriculum Design Approach, Grover S. Kearns
Annual ADFSL Conference on Digital Forensics, Security and Law
Computer forensics involves the investigation of digital sources to acquire evidence that can be used in a court of law. It can also be used to identify and respond to threats to hosts and systems. Accountants use computer forensics to investigate computer crime or misuse, theft of trade secrets, theft of or destruction of intellectual property, and fraud. Education of accountants to use forensic tools is a goal of the AICPA (American Institute of Certified Public Accountants). Accounting students, however, may not view information technology as vital to their career paths and need motivation to acquire forensic knowledge and skills. …
Digital Records Forensics: A New Science And Academic Program For Forensic Readiness, Luciana Duranti, Barbara Endicott-Popovsky
Digital Records Forensics: A New Science And Academic Program For Forensic Readiness, Luciana Duranti, Barbara Endicott-Popovsky
Annual ADFSL Conference on Digital Forensics, Security and Law
This paper introduces the Digital Records Forensics project, a research endeavour located at the University of British Columbia in Canada and aimed at the development of a new science resulting from the integration of digital forensics with diplomatics, archival science, information science and the law of evidence, and of an interdisciplinary graduate degree program, called Digital Records Forensics Studies, directed to professionals working for law enforcement agencies, legal firms, courts, and all kind of institutions and business that require their services. The program anticipates the need for organizations to become “forensically ready,” defined by John Tan as “maximizing the ability …
A Layered Framework Approach To Mitigate Crimeware, Mathew Nyamagwa
A Layered Framework Approach To Mitigate Crimeware, Mathew Nyamagwa
Annual ADFSL Conference on Digital Forensics, Security and Law
Crimeware attacks are growing at such an alarming rate and are becoming so prevalent that the FBI now rank cybercrime among its top priorities after terrorism and espionage. New studies estimate cyber crimes cost firms an astounding $1 trillion annually. But the good news? Over 80% of them are preventable. Crimeware is not a purely technical threat but more or a socio-technical affair. This clearly brings out the fact that computers do not commit a crime, but we (humans) do! In this paper I propose a layered approach that involves all stakeholders from end-users to service-providers and law enforcement to …
Canvass - A Steganalysis Forensic Tool For Jpeg Images, Jennifer L. Davidson, Jaikishan Jalan
Canvass - A Steganalysis Forensic Tool For Jpeg Images, Jennifer L. Davidson, Jaikishan Jalan
Annual ADFSL Conference on Digital Forensics, Security and Law
Steganography is a way to communicate a message such that no one except the sender and recipient suspects the existence of the message. This type of covert communication lends itself to a variety of different purposes such as spy-to-spy communication, exchange of pornographic material hidden in innocuous image files, and other illicit acts. Computer forensic personnel have an interest in testing for possible steganographic files, but often do not have access to the technical and financial resources required to perform steganalysis in an effective manner. This paper describes the results of a funded effort by a grant from the National …
Measuring Whitespace Patterns As An Indication Of Plagiarism, Ilana Shay, Nikolaus Baer, Robert Zeidman
Measuring Whitespace Patterns As An Indication Of Plagiarism, Ilana Shay, Nikolaus Baer, Robert Zeidman
Annual ADFSL Conference on Digital Forensics, Security and Law
There are several different methods of comparing source code from different programs to find copying1 . Perhaps the most common method is comparing source code statements, comments, strings, identifiers, and instruction sequences. However, there are anecdotes about the use of whitespace patterns in code. These virtually invisible patterns of spaces and tabs have been used in litigation to imply copying, but no formal study has been performed that shows that these patterns can actually identify copied code. This paper presents a detailed study of whitespace patterns and the uniqueness of these patterns in different programs.
Keywords: Copyright Infringement, Intellectual Property, …
Electronic Discovery: A Fool’S Errand Where Angels Fear To Tread?, Milton Luoma, Vicki Luoma
Electronic Discovery: A Fool’S Errand Where Angels Fear To Tread?, Milton Luoma, Vicki Luoma
Annual ADFSL Conference on Digital Forensics, Security and Law
Electronic discovery has transformed the discovery phase of civil litigation in recent years. The expectations of lawyers and parties were initially established in the Rowe and Zubulake cases that led to a complete revision of the electronic discovery rules contained in the Federal Rules of Civil Procedure. Subsequent cases have underscored the importance of document search methodologies and implications for attorneys, IT professionals, and digital forensics professionals. The authors review how electronic discovery has evolved thus far and offer recommendations regarding the electronic discovery process.
Keywords: Electronic discovery, e-discovery, keyword search, concept search,
Hard Disk Storage: Firmware Manipulation And Forensic Impact And Current Best Practice, Gareth Davies, Iain Sutherland
Hard Disk Storage: Firmware Manipulation And Forensic Impact And Current Best Practice, Gareth Davies, Iain Sutherland
Annual ADFSL Conference on Digital Forensics, Security and Law
The most common form of storage media utilized in both commercial and domestic systems is the hard disk drive, consequently these devices feature heavily in digital investigations. Hard disk drives are a collection of complex components. These components include hardware and firmware elements that are essential for the effective operation of the drive. There are now a number of devices available, intended for data recovery, which can be used to manipulate the firmware components contained within the drive. It has been previously shown that it is possible to alter firmware for malicious purposes, either to conceal information or to prevent …
Social Networking: A Boon To Criminals, Tejashree D. Datar, Richard Mislan
Social Networking: A Boon To Criminals, Tejashree D. Datar, Richard Mislan
Annual ADFSL Conference on Digital Forensics, Security and Law
With the world getting more and more digitized, social networking has also found a place in the cyber world. These social networking sites (SNSs) which enable people to socialize, and build and maintain relationships are attracting attention of all kinds of people such as teens, adults, sports persons, and even businesses. But these SNSs are also getting unwanted attention from people like sexual predators, spammers, and people involved in criminal and illegal activities. This paper talks about SNSs and how these sites are exploited for criminal or illegal activity. The SNSs are discussed in detail with respect to user profiles, …
Organizational Handling Of Digital Evidence, Sheona A. Hoolachan, William B. Glisson
Organizational Handling Of Digital Evidence, Sheona A. Hoolachan, William B. Glisson
Annual ADFSL Conference on Digital Forensics, Security and Law
There are a number of factors that impact a digital forensics investigation. These factors include: the digital media in question, implemented processes and methodologies, the legal aspects, and the individuals involved in the investigation. This paper presents the initial idea that Digital Forensic Practice (DFP) recommendations can potentially improve how organizations handle digital evidence. The recommendations are derived from an in-depth survey conducted with practitioners in both commercial organizations and law enforcement along with supporting literature. The recommendations presented in this paper can be used to assess an organization’s existing digital forensics practices and a guide to Digital Forensics Improvement …
A Framework To Integrate The Data Of Interview Investigation And Digital Evidence, Fahad Alshathry
A Framework To Integrate The Data Of Interview Investigation And Digital Evidence, Fahad Alshathry
Annual ADFSL Conference on Digital Forensics, Security and Law
The physical interview process in crime investigation produces an extremely large amount of data, particularly in big cases. In comparison, examiners of digital evidence have enormous amounts of data to search through whilst looking for data relating to the investigation. However, the links between their results are limited. Whilst investigators need to refute or support their hypothesis throughout, digital evidence examiners often use search based keywords. These keywords are usually created from evidence taken from the physical investigation reports and this basic method has been found to have many shortcomings and limitations. This paper proposes a highly automatic framework to …
Developing Voip Honeypots: A Preliminary Investigation Into Malfeasant Activity, Craig Valli
Developing Voip Honeypots: A Preliminary Investigation Into Malfeasant Activity, Craig Valli
Annual ADFSL Conference on Digital Forensics, Security and Law
30 years ago PABX systems were compromised by hackers wanting to make long distance calls at some other entities expense. This activity faded as telephony became cheaper and PABX systems had countermeasures installed to overcome attacks. Now the world has moved onto the provision of telephony via broadband enabled Voice over Internet Protocol (VoIP) with this service now being provided as a replacement for conventional fixed wire telephony by major telecommunication providers worldwide. Due to increasing bandwidth it is possible for systems to support multiple voice connections simultaneously. The networked nature of the Internet allows for attackers of these VoIP …
Higate (High Grade Anti‐Tamper Equipment) Prototype And Application To E‐Discovery, Yui Sakurai, Yuki Ashino, Tetsutaro Uehara, Hiroshi Yoshiura, Ryoichi Sasaki
Higate (High Grade Anti‐Tamper Equipment) Prototype And Application To E‐Discovery, Yui Sakurai, Yuki Ashino, Tetsutaro Uehara, Hiroshi Yoshiura, Ryoichi Sasaki
Annual ADFSL Conference on Digital Forensics, Security and Law
These days, most data is digitized and processed in various ways by computers. In the past, computer owners were free to process data as desired and to observe the inputted data as well as the interim results. However, the unrestricted processing of data and accessing of interim results even by computer users is associated with an increasing number of adverse events. These adverse events often occur when sensitive data such as personal or confidential business information must be handled by two or more parties, such as in the case of e-Discovery, used in legal proceedings, or epidemiologic studies. To solve …
Developing A Baccalaureate Digital Forensics Major, John H. Riley
Developing A Baccalaureate Digital Forensics Major, John H. Riley
Annual ADFSL Conference on Digital Forensics, Security and Law
As colleges and universities consider instituting a bachelor’s degree in digital forensics or computer forensics, there are numerous questions to be addressed. While some of these normally occur in the development of any new major, there are aspects of digital forensics which do not often (if ever) occur in other majors. We discuss the issues that should be resolved in the development of a baccalaureate degree program in digital forensics.
Keywords: Digital forensics major. Computer forensics major.
Global Warming Advocacy Science: A Cross Examination, Jason S. Johnston
Global Warming Advocacy Science: A Cross Examination, Jason S. Johnston
All Faculty Scholarship
Legal scholarship has come to accept as true the various pronouncements of the Intergovernmental Panel on Climate Change (IPCC) and other scientists who have been active in the movement for greenhouse gas (ghg) emission reductions to combat global warming. The only criticism that legal scholars have had of the story told by this group of activist scientists – what may be called the climate establishment – is that it is too conservative in not paying enough attention to possible catastrophic harm from potentially very high temperature increases. This paper departs from such faith in the climate establishment by comparing the …
Proceedings Of The 2009 Nrc Federal Facilities Council/James Madison University Symposium On Protecting Large Facility Complexes;, George H. Baker, Cheryl E. Wilkins
Proceedings Of The 2009 Nrc Federal Facilities Council/James Madison University Symposium On Protecting Large Facility Complexes;, George H. Baker, Cheryl E. Wilkins
George H Baker
Large, complex facilities pose unique protection challenges involving multidisciplinary expertise and collaboration among government, academia, and the private sector. The symposium served as a forum for sharing experiences in dealing with large facility catastrophic events and risk management. The symposium was organized based on the value of interaction among different people representing diverse disciplines. In many instances, such interactions lead to solutions that would not have been developed within disciplinary stovepipes. The venue was divided into three panels addressing physical security, cyber security, and real facility case studies. We were also privileged to have three keynote speakers including Dr. Charles …
Achieving The Vision Through High Ethical Standards, Sarah E. Bertke
Achieving The Vision Through High Ethical Standards, Sarah E. Bertke
Ohio Valley Regional Student Conference
No abstract provided.
Network Neutrality Or Internet Innovation?, Christopher S. Yoo
Network Neutrality Or Internet Innovation?, Christopher S. Yoo
All Faculty Scholarship
Over the past two decades, the Internet has undergone an extensive re-ordering of its topology that has resulted in increased variation in the price and quality of its services. Innovations such as private peering, multihoming, secondary peering, server farms, and content delivery networks have caused the Internet’s traditionally hierarchical architecture to be replaced by one that is more heterogeneous. Relatedly, network providers have begun to employ an increasingly varied array of business arrangements and pricing. This variation has been interpreted by some as network providers attempting to promote their self interest at the expense of the public. In fact, these …
Agenda: Us-Mexico Negotiations On Improved Colorado River Management: An Update, University Of Colorado Boulder. Natural Resources Law Center, Western Water Policy Program, Colorado Water Conservation Board
Agenda: Us-Mexico Negotiations On Improved Colorado River Management: An Update, University Of Colorado Boulder. Natural Resources Law Center, Western Water Policy Program, Colorado Water Conservation Board
US-Mexico Negotiations on Improved Colorado River Management: An Update (February 19)
The United States and Mexico are currently negotiating an international accord on a variety of Colorado River water matters, including the prospects for new water projects, conservation efforts, and operational improvements. Participants are invited to hear an update on these efforts from individuals directly involved in the negotiations, including Mario López Pérez, Engineering and Technical Standards Manager in the National Water Commission of México, who is responsible for binational water issues with the USA, Guatemala and Belize.
Colorado River Water: Mexico's Perspective On The Ongoing Negotiations, Mario López Pérez
Colorado River Water: Mexico's Perspective On The Ongoing Negotiations, Mario López Pérez
US-Mexico Negotiations on Improved Colorado River Management: An Update (February 19)
Presenter: Mario López, Engineering and Technical Standards Manager, National Water Commission of México
53 slides
Slides: Costs And Benefits Of Oil Shale Development, James T. Bartis
Slides: Costs And Benefits Of Oil Shale Development, James T. Bartis
The Promise and Peril of Oil Shale Development (February 5)
Presenter: James T. Bartis, Senior Policy Researcher, Rand Corporation
21 slides
Slides: Oil Shale Water Needs, State Water Planning And The Colorado River Compact, Daniel R. Birch
Slides: Oil Shale Water Needs, State Water Planning And The Colorado River Compact, Daniel R. Birch
The Promise and Peril of Oil Shale Development (February 5)
Presenter: Daniel R. Birch, Deputy General Manager & Chief Engineer, Colorado River District
17 slides
Slides: Impacts Of Oil Shale On Carbon Emissions, Jeremy Boak
Slides: Impacts Of Oil Shale On Carbon Emissions, Jeremy Boak
The Promise and Peril of Oil Shale Development (February 5)
Presenter: Dr. Jeremy Boak, Center for Oil Shale Technology & Research, Colorado School of Mines
43 slides
Slides: Water For Oil (Shale)?, Bart Miller
Slides: Water For Oil (Shale)?, Bart Miller
The Promise and Peril of Oil Shale Development (February 5)
Presenter: Bart Miller, Water Program Director, Western Resource Advocates
10 slides
Slides: Costs And Benefits Of Development: An Industry Perspective, Glenn Vawter
Slides: Costs And Benefits Of Development: An Industry Perspective, Glenn Vawter
The Promise and Peril of Oil Shale Development (February 5)
Presenter: Glenn Vawter, Executive Director, National Oil Shale Association
12 slides
Slides: The History Of Oil Shale Development And What It Means For The Future, Patty Limerick
Slides: The History Of Oil Shale Development And What It Means For The Future, Patty Limerick
The Promise and Peril of Oil Shale Development (February 5)
Presenter: Patty Limerick, Center of the American West, University of Colorado at Boulder
35 slides
Agenda: The Promise And Peril Of Oil Shale Development, University Of Colorado Boulder. Natural Resources Law Center
Agenda: The Promise And Peril Of Oil Shale Development, University Of Colorado Boulder. Natural Resources Law Center
The Promise and Peril of Oil Shale Development (February 5)
The largest known oil shale deposits in the world are in the Green River Formation, which covers portions of Colorado, Utah, and Wyoming. Fully one-half of the world’s oil shale lies within 150 miles of Grand Junction, Colorado, and about 80% of these reserves are on federal land. Estimates of recoverable reserves in the Green River Formation range from 500 billion to 1.53 trillion barrels. At present consumption rates, this is enough oil to satisfy 100% of U.S. demand for well over 100 years.
Development of oil shale could cause significant impacts on the Colorado Plateau. It would provide for …
Slides: The Promise And Peril Of Oil Shale: Federal Law And Policy, David Bernhardt
Slides: The Promise And Peril Of Oil Shale: Federal Law And Policy, David Bernhardt
The Promise and Peril of Oil Shale Development (February 5)
Presenter: David Bernhardt, Brownstein Hyatt Farber Schreck, Denver, CO
13 slides
Slides: The Logistics And Energy Needs Of Oil Shale Extraction, Alan K. Burnham
Slides: The Logistics And Energy Needs Of Oil Shale Extraction, Alan K. Burnham
The Promise and Peril of Oil Shale Development (February 5)
Presenter: Dr. Alan K. Burnham, Chief Technology Officer, American Shale Oil, LLC
10 slides