Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Law

2013

Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 120

Full-Text Articles in Engineering

Ieee Istas13- People As Sensors: The Social Implications Of Living In A Smart World, Alexander Hayes, Katina Michael, Nick Rheinberger Jun 2015

Ieee Istas13- People As Sensors: The Social Implications Of Living In A Smart World, Alexander Hayes, Katina Michael, Nick Rheinberger

Alexander Hayes Mr.

What is the technological trajectory of people wearing sensors? What are the benefits, risks and costs? What is the vibe going to be like at ISTAS13 with people like Marvin Minsky and Ray Kurzweil attending? What do you hope to gain from the meeting? Can we foresee a time that all glasses will be embedded with sensors? What are the implications? E.g. in the higher education sector? What about the gathering of evidence by law enforcement? What is point of eye?


Workshop | Body Worn Video Recorders: The Socio-Technical Implications Of Gathering Direct Evidence, Katina Michael, Alexander Hayes Jun 2015

Workshop | Body Worn Video Recorders: The Socio-Technical Implications Of Gathering Direct Evidence, Katina Michael, Alexander Hayes

Alexander Hayes Mr.

- From in-car video recording to body-worn video recording

- Exploring available technologies: how do they work, pros and cons

- Storing direct evidence in secure storage: factors to consider

- Citizens “shooting” back with POV tech – what are their rights?

- Crowdsourced sousveillance- harnessing public data for forensic profiling

- Police force policies and practices on the application of new media


Imitation Is The Sincerest Form Of Flattery: Software And User Interface Design In A Changing Patent Landscape, Megan Cardaman Dec 2013

Imitation Is The Sincerest Form Of Flattery: Software And User Interface Design In A Changing Patent Landscape, Megan Cardaman

Megan Cardaman

No abstract provided.


The Santa Clara, 2013-11-14, Santa Clara University Nov 2013

The Santa Clara, 2013-11-14, Santa Clara University

The Santa Clara

No abstract provided.


The Santa Clara, 2013-11-07, Santa Clara University Nov 2013

The Santa Clara, 2013-11-07, Santa Clara University

The Santa Clara

No abstract provided.


The Santa Clara, 2013-10-31, Santa Clara University Oct 2013

The Santa Clara, 2013-10-31, Santa Clara University

The Santa Clara

No abstract provided.


The Santa Clara, 2013-10-24, Santa Clara University Oct 2013

The Santa Clara, 2013-10-24, Santa Clara University

The Santa Clara

No abstract provided.


The Santa Clara, 2013-10-17, Santa Clara University Oct 2013

The Santa Clara, 2013-10-17, Santa Clara University

The Santa Clara

No abstract provided.


The Santa Clara, 2013-10-10, Santa Clara University Oct 2013

The Santa Clara, 2013-10-10, Santa Clara University

The Santa Clara

No abstract provided.


The Santa Clara, 2013-10-03, Santa Clara University Oct 2013

The Santa Clara, 2013-10-03, Santa Clara University

The Santa Clara

No abstract provided.


S.H.O.T. Db (Statistics Help Officer Tactics) – Officer-Involved Shootings Database, Hasan Arslan Oct 2013

S.H.O.T. Db (Statistics Help Officer Tactics) – Officer-Involved Shootings Database, Hasan Arslan

Cornerstone 3 Reports : Interdisciplinary Informatics

No abstract provided.


Money Laundering Detection Framework To Link The Disparate And Evolving Schemes, Murad Mehmet, Duminda Wijesekera, Miguel F. Buchholtz Sep 2013

Money Laundering Detection Framework To Link The Disparate And Evolving Schemes, Murad Mehmet, Duminda Wijesekera, Miguel F. Buchholtz

Journal of Digital Forensics, Security and Law

Money launderers hide traces of their transactions with the involvement of entities that participate in sophisticated schemes. Money laundering detection requires unraveling concealed connections among multiple but seemingly unrelated human money laundering networks, ties among actors of those schemes, and amounts of funds transferred among those entities. The link among small networks, either financial or social, is the primary factor that facilitates money laundering. Hence, the analysis of relations among money laundering networks is required to present the full structure of complex schemes. We propose a framework that uses sequence matching, case-based analysis, social network analysis, and complex event processing …


The Santa Clara, 2013-09-26, Santa Clara University Sep 2013

The Santa Clara, 2013-09-26, Santa Clara University

The Santa Clara

No abstract provided.


Issue Brief: Saving By Mitigating, University Of Louisville, New England Environmental Finance Center Sep 2013

Issue Brief: Saving By Mitigating, University Of Louisville, New England Environmental Finance Center

Sustainable Communities Capacity Building

Natural disasters can cause loss of life, inflict damage to buildings and infrastructure, and have devastating consequences for a community’s economic, social, and environmental well-being. Hazard mitigation means reducing damages from disasters.

Local governments have the responsibility to protect the health, safety, and welfare of their citizens. Proactive mitigation policies and actions help reduce risk and create safer, more disaster-resilient communities. Mitigation is an investment in your community’s future safety, equity, and sustainability.


2013 Tsu Undergraduate Research Program, David Owerbach Aug 2013

2013 Tsu Undergraduate Research Program, David Owerbach

Office of Research Institutional Research and Scholarship

No abstract provided.


Juxtaposing Nasa’S Aeronet Aod With Carb Pm Data Over The San Joaquin Valley To Facilitate Multi-Angle Imaging Spectroradiometer (Misr) Pm Pollution Research, John Kanemoto Aug 2013

Juxtaposing Nasa’S Aeronet Aod With Carb Pm Data Over The San Joaquin Valley To Facilitate Multi-Angle Imaging Spectroradiometer (Misr) Pm Pollution Research, John Kanemoto

STAR Program Research Presentations

Airborne particulate matter (PM) has been shown to increase the risk for asthma, chronic bronchitis, cardiopulmonary complications, and respiratory cell membrane damage/infection/leakage. PM levels are currently analyzed from two perspectives: stationary land-based monitoring (LBM) sites and total Aerosol Optical Depth (AOD) atmospheric column measurements. Both perspectives often leave miles of space between measuring locations and will have a continually increasing cost from introducing/maintaining sites. The Multi-angle Imaging SpectroRadiometer (MISR) satellite team hopes to begin investigating/archiving PM levels comprehensively via inputting MISR AOD measurements into a function/model which predicts the amount of ground level PM.

In the future, multivariable spatial correlations …


Agenda: Changing Regulatory Frameworks For Shale Development And "Social License To Operate", University Of Colorado Boulder. Getches-Wilkinson Center For Natural Resources, Energy, And The Environment Jul 2013

Agenda: Changing Regulatory Frameworks For Shale Development And "Social License To Operate", University Of Colorado Boulder. Getches-Wilkinson Center For Natural Resources, Energy, And The Environment

Changing Regulatory Frameworks for Shale Development and "Social License to Operate" (July 24)

Rapid development of unconventional shale resources in recent years has raised a series of regulatory issues both here and abroad. Because of the "distributed" nature of shale development and the significant increase in wells in key basins, local land-use conflicts have also erupted in certain areas of the country, leading to restrictions and moratoria on drilling by state, county, and municipal governments and raising questions about the industry's continued social license to operate in key jurisdictions. This moderated panel discussion will assess the current regulatory framework governing shale gas development and the changing dynamics among federal, state, and local regulation …


The Taxation Of Cloud Computing And Digital Content, David Shakow Jul 2013

The Taxation Of Cloud Computing And Digital Content, David Shakow

All Faculty Scholarship

“Cloud computing” raises important and difficult questions in state tax law, and for Federal taxes, particularly in the foreign tax area. As cloud computing solutions are adopted by businesses, items we view as tangible are transformed into digital products. In this article, I will describe the problems cloud computing poses for tax systems. I will show how current law is applied to cloud computing and will identify the difficulties current approaches face as they are applied to this developing technology.

My primary interest is how Federal tax law applies to cloud computing, particularly as the new technology affects international transactions. …


Protecting The Electric Power Grid From Electromagnetic Pulse: Legal And Policy Aspects, George H. Baker Iii, William R. Harris, Thomas S. Popik Jun 2013

Protecting The Electric Power Grid From Electromagnetic Pulse: Legal And Policy Aspects, George H. Baker Iii, William R. Harris, Thomas S. Popik

George H Baker

Since the release of the 2004 and 2008 reports of the congressionally-authorized Commission to Assess the Threat to the United States from Electromagnetic Pulse Attack (“EMP Commission”), there has been a growing societal realization that civilian infrastructure is vulnerable to electromagnetic pulse (EMP) threats. And among the DHS list of critical infrastructure sectors, the electric power grid is both the most vulnerable, because EMP couples most efficiently to long power lines, and the most critical, because the grid is the keystone infrastructure upon which all other infrastructures depend. Simply put, grid failure is an existential threat to national governance and …


Social Implications Of Wearable Computing And Augmediated Reality In Every Day Life (Ieee Symposium On Technology And Society, Istas13), Katina Michael Jun 2013

Social Implications Of Wearable Computing And Augmediated Reality In Every Day Life (Ieee Symposium On Technology And Society, Istas13), Katina Michael

Associate Professor Katina Michael

It was in July 2012 that Steve Mann and I corresponded on the possibility of hosting a conference on wearable computing in Toronto, Canada. Steve had just returned home from a family holiday to France and publicly blogged about an unfortunate incident that had happened to him while away. On 17th July 2012 he posted: “Physical assault by McDonald’s for wearing Digital Eye Glass”. We both knew the timing was right for such an event that was not just a technical engineering or applied orientation on the theme of smart worlds, but an event that would grapple with the dichotomies …


A Forensic Study Of The Effectiveness Of Selected Anti-Virus Products Against Ssdt Hooking Rootkits, Sami Al-Shaheri, Dale Lindskog, Pavol Zavarsky, Ron Ruhl Jun 2013

A Forensic Study Of The Effectiveness Of Selected Anti-Virus Products Against Ssdt Hooking Rootkits, Sami Al-Shaheri, Dale Lindskog, Pavol Zavarsky, Ron Ruhl

Annual ADFSL Conference on Digital Forensics, Security and Law

For Microsoft Windows Operating Systems, both anti-virus products and kernel rootkits often hook the System Service Dispatch Table (SSDT). This research paper investigates the interaction between these two in terms of the SSDT. To investigate these matters, we extracted digital evidence from volatile memory, and studied that evidence using the Volatility framework. Due to the diversity in detection techniques used by the anti-virus products, and the diversity of infection techniques used by rootkits, our investigation produced diverse results, results that helped us to understand several SSDT hooking strategies, and the interaction between the selected anti-virus products and the rootkit samples. …


An Ontology-Based Forensic Analysis Tool, Mohammed Alzaabi, Andy Jones, Thomas A. Martin Jun 2013

An Ontology-Based Forensic Analysis Tool, Mohammed Alzaabi, Andy Jones, Thomas A. Martin

Annual ADFSL Conference on Digital Forensics, Security and Law

The analysis of forensic investigation results has generally been identified as the most complex phase of a digital forensic investigation. This phase becomes more complicated and time consuming as the storage capacity of digital devices is increasing, while at the same time the prices of those devices are decreasing. Although there are some tools and techniques that assist the investigator in the analysis of digital evidence, they do not adequately address some of the serious challenges, particularly with the time and effort required to conduct such tasks. In this paper, we consider the use of semantic web technologies and in …


First Glance: An Introductory Analysis Of Network Forensics Of Tor, Raymond Hansen Jun 2013

First Glance: An Introductory Analysis Of Network Forensics Of Tor, Raymond Hansen

Annual ADFSL Conference on Digital Forensics, Security and Law

The Tor network is a low-latency overlay network for TCP flows that is designed to provide privacy and anonymity to its users. It is currently in use by many as a means to avoid censorship of both information to be shared and information to be retrieved. This paper details the architecture of the Tor network as a platform for evaluating the current state of forensic analysis of the Tor network. Specific attempts to block access to the Tor network are examined to identify (a) the processes utilized to identify Tor nodes, and (b) the resulting exposure of potentially inculpatory evidence. …


A Thematic Review Of User Compliance With Information Security Policies Literature, David Sikolia Jun 2013

A Thematic Review Of User Compliance With Information Security Policies Literature, David Sikolia

Annual ADFSL Conference on Digital Forensics, Security and Law

The adoption of computer and internet technology has greatly improved the way businesses operate. However the risk to the confidentiality, integrity and availability of organizational data and systems has greatly increased too. Information security is an ever present concern for all organizations. Financial estimates of the impact of security breaches to information and technology resources range from hundreds of billions to over one trillion dollars each year worldwide (D'Arcy et al., 2011b). Organizations have therefore developed a combination of technical, administrative, and physical controls to reduce this risk (D'Arcy et al., 2011a). Administrative measures include the development of information security …


Journey Into Windows 8 Recovery Artifacts, W. K. Johnson Jun 2013

Journey Into Windows 8 Recovery Artifacts, W. K. Johnson

Annual ADFSL Conference on Digital Forensics, Security and Law

One of the most difficult processes of digital forensics is to understand how new technology interacts with current technology and how digital forensic analysts can utilize current Digital Forensics technologies and processes to recover and find information hidden. Microsoft has released their new operating system Windows 8, with this new release Microsoft has added some features to the operating system that will present some interesting complications to digital forensics. Since the initial release of the Windows 8 Release Candidates there have been some research released that focus primarily on the new user created artifacts and a few artifacts that have …


An Image Forensic Scheme With Robust And Fragile Watermarking For Business Documents, Sai Ho Kwok Jun 2013

An Image Forensic Scheme With Robust And Fragile Watermarking For Business Documents, Sai Ho Kwok

Annual ADFSL Conference on Digital Forensics, Security and Law

This paper proposes an image forensic scheme with both robust and fragile watermarking techniques for business documents. Through a dual watermarking approach, the proposed scheme can achieve image forensics objectives of (a) identification of source; (b) authentication of documents; and (c) locating the tempered areas of documents due to attacks. An example is presented to prove the concepts of the proposed scheme.

Keywords: Image Forensics, Fragile and Robust Watermarking, Business Document.


Significance Of Semantic Reconciliation In Digital Forensics, Nickson M. Karie, H. S. Venter Jun 2013

Significance Of Semantic Reconciliation In Digital Forensics, Nickson M. Karie, H. S. Venter

Annual ADFSL Conference on Digital Forensics, Security and Law

Digital forensics (DF) is a growing field that is gaining popularity among many computer professionals, law enforcement agencies and other stakeholders who must always cooperate in this profession. Unfortunately, this has created an environment replete with semantic disparities within the domain that needs to be resolved and/or eliminated. For the purpose of this study, semantic disparity refers to disagreements about the meaning, interpretation, descriptions and the intended use of the same or related data and terminologies. If semantic disparity is not detected and resolved, it may lead to misunderstandings. Even worse, since the people involved may not be from the …


System-Generated Digital Forensic Evidence In Graphic Design Applications, Enos Mabuto, Hein Venter Jun 2013

System-Generated Digital Forensic Evidence In Graphic Design Applications, Enos Mabuto, Hein Venter

Annual ADFSL Conference on Digital Forensics, Security and Law

Graphic design applications are often used for the editing and design of digital art. The same applications can be used for creating counterfeit documents such as identity documents (IDs), driver’s licences, passports, etc. However, the use of any graphic design application leaves behind traces of digital information that can be used during a digital forensic investigation. Current digital forensic tools examine a system to find digital evidence, but they do not examine a system specifically for the creating of counterfeit documents created through the use of graphic design applications. The paper in hand reviews the system-generated digital forensic evidence gathered …


Money Laundering Detection Framework To Link The Disparate And Evolving Schemes, Murad Mehmet, Duminda Wijesekera, Miguel F. Buchholtz Jun 2013

Money Laundering Detection Framework To Link The Disparate And Evolving Schemes, Murad Mehmet, Duminda Wijesekera, Miguel F. Buchholtz

Annual ADFSL Conference on Digital Forensics, Security and Law

Money launderers hide traces of their transactions with the involvement of entities that participate in sophisticated schemes. Money laundering detection requires unraveling concealed connections among multiple but seemingly unrelated human money laundering networks, ties among actors of those schemes, and amounts of funds transferred among those entities. The link among small networks, either financial or social, is the primary factor that facilitates money laundering. Hence, the analysis of relations among money laundering networks is required to present the full structure of complex schemes. We propose a framework that uses sequence matching, case-based analysis, social network analysis, and complex event processing …


Agenda: Water, Oil And Gas: Recycling And Reuse Of Water, University Of Colorado Boulder. Getches-Wilkinson Center For Natural Resources, Energy, And The Environment. Intermountain Oil And Gas Bmp Project, Rocky Mountain Land Use Institute, Sturm College Of Law, University Of Denver, Colorado Bar Association, Natural Resources & Energy Section Jun 2013

Agenda: Water, Oil And Gas: Recycling And Reuse Of Water, University Of Colorado Boulder. Getches-Wilkinson Center For Natural Resources, Energy, And The Environment. Intermountain Oil And Gas Bmp Project, Rocky Mountain Land Use Institute, Sturm College Of Law, University Of Denver, Colorado Bar Association, Natural Resources & Energy Section

Water, Oil and Gas: Recycling and Reuse of Water (June 11)

Program co-chairs: Sarah Klahn, Matthew Sura; planning committee: Susan Daggett, Kathryn Mutz.

Co-sponsored by: Getches-Wilkinson Center for Natural Resources, Energy and the Environment, University of Colorado Law School, Rocky Mountain Land Use Institute, Sturm College of Law, University of Denver, Natural Resources & Energy Section of the Colorado Bar Association.

This program is the second in a 3-part series focusing on critical water, oil and gas issues in Colorado. This second program focuses on the technology behind the recycling of produced water and hydraulic back fracturing flowback fluid and the issue of mandatory recycling. It also addresses the legal implications …