Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences

PDF

2010

Institution
Keyword
Publication
Publication Type

Articles 31 - 60 of 72

Full-Text Articles in Computer Engineering

Developing Voip Honeypots: A Preliminary Investigation Into Malfeasant Activity, Craig Valli May 2010

Developing Voip Honeypots: A Preliminary Investigation Into Malfeasant Activity, Craig Valli

Annual ADFSL Conference on Digital Forensics, Security and Law

30 years ago PABX systems were compromised by hackers wanting to make long distance calls at some other entities expense. This activity faded as telephony became cheaper and PABX systems had countermeasures installed to overcome attacks. Now the world has moved onto the provision of telephony via broadband enabled Voice over Internet Protocol (VoIP) with this service now being provided as a replacement for conventional fixed wire telephony by major telecommunication providers worldwide. Due to increasing bandwidth it is possible for systems to support multiple voice connections simultaneously. The networked nature of the Internet allows for attackers of these VoIP …


Higate (High Grade Anti‐Tamper Equipment) Prototype And Application To E‐Discovery, Yui Sakurai, Yuki Ashino, Tetsutaro Uehara, Hiroshi Yoshiura, Ryoichi Sasaki May 2010

Higate (High Grade Anti‐Tamper Equipment) Prototype And Application To E‐Discovery, Yui Sakurai, Yuki Ashino, Tetsutaro Uehara, Hiroshi Yoshiura, Ryoichi Sasaki

Annual ADFSL Conference on Digital Forensics, Security and Law

These days, most data is digitized and processed in various ways by computers. In the past, computer owners were free to process data as desired and to observe the inputted data as well as the interim results. However, the unrestricted processing of data and accessing of interim results even by computer users is associated with an increasing number of adverse events. These adverse events often occur when sensitive data such as personal or confidential business information must be handled by two or more parties, such as in the case of e-Discovery, used in legal proceedings, or epidemiologic studies. To solve …


Fast Energy Loss Computation And Fuzzy-Based Shunt Capacitor Insertion, Philadelphia University May 2010

Fast Energy Loss Computation And Fuzzy-Based Shunt Capacitor Insertion, Philadelphia University

Philadelphia University, Jordan

No abstract provided.


Developing A Baccalaureate Digital Forensics Major, John H. Riley May 2010

Developing A Baccalaureate Digital Forensics Major, John H. Riley

Annual ADFSL Conference on Digital Forensics, Security and Law

As colleges and universities consider instituting a bachelor’s degree in digital forensics or computer forensics, there are numerous questions to be addressed. While some of these normally occur in the development of any new major, there are aspects of digital forensics which do not often (if ever) occur in other majors. We discuss the issues that should be resolved in the development of a baccalaureate degree program in digital forensics.

Keywords: Digital forensics major. Computer forensics major.


Healthcare Professional Roles: The Ontology Model For E-Learning, Lorraine Carmody, Elizabeth Sherry, John Cardiff May 2010

Healthcare Professional Roles: The Ontology Model For E-Learning, Lorraine Carmody, Elizabeth Sherry, John Cardiff

Conference Papers

The paper aims to present the MEDeLEARN project, an ontology-driven virtual learning environment for Medical Information System training. The current training environment for healthcare professionals in the use of essential medical information systems in a large urban training hospital is based on conventional instructor-led training sessions. Problems arise due to the demanding nature of the hospital working environment, causing training to be cancelled or curtailed. This mode of training delivery is deemed to be inefficient and ineffective, with the danger of serious errors occurring as a consequence.

The project investigates whether a virtual learning environment can address the competency gap …


Network Neutrality Or Internet Innovation?, Christopher S. Yoo Apr 2010

Network Neutrality Or Internet Innovation?, Christopher S. Yoo

All Faculty Scholarship

Over the past two decades, the Internet has undergone an extensive re-ordering of its topology that has resulted in increased variation in the price and quality of its services. Innovations such as private peering, multihoming, secondary peering, server farms, and content delivery networks have caused the Internet’s traditionally hierarchical architecture to be replaced by one that is more heterogeneous. Relatedly, network providers have begun to employ an increasingly varied array of business arrangements and pricing. This variation has been interpreted by some as network providers attempting to promote their self interest at the expense of the public. In fact, these …


Rwanda National Customer Satisfaction Survey: Results And Conclusions, Deogratias Harorimana Mar 2010

Rwanda National Customer Satisfaction Survey: Results And Conclusions, Deogratias Harorimana

Dr Deogratias Harorimana

It can be said that development practice requires more than financial and manpower inputs. Rwanda, in 1994 suffered a Genocide. The Society,collectively and under the leadership of His Excellence Paul Kagame the current elected President of Rwanda came together and designed strategies that would propel Rwanda to a Middle-Income, Private Sector Led Economy by the Year 2020.

In 2009, a client seating in one of the Hotels in a Suburb of Remera, in Kigali City, complained about poor service delivery he was experiencing from the waitress staff.Using his Blackberry message, the client forwarded an email to some of the RDB …


Enterprise Development Policies And Capacity-Building In Science, Technology And Innovation (Sti)-Response To The Issue Note, Deogratias Harorimana Jan 2010

Enterprise Development Policies And Capacity-Building In Science, Technology And Innovation (Sti)-Response To The Issue Note, Deogratias Harorimana

Dr Deogratias Harorimana

Enterprise Development, Investment and Business Climate are all important for economic growth. But what policies, strategies are needed to make economic growth a reality. The author has followed one of the World's fastest reformer and emerging nation in the Heart of Africa-Rwanda. The paper shares lessons and practical aspects related to building an entrepreneurial population, and building a government which is a facilitator of business climate


Solid State Drives: The Beginning Of The End For Current Practice In Digital Forensic Recovery?, Graeme B. Bell, Richard Boddington Jan 2010

Solid State Drives: The Beginning Of The End For Current Practice In Digital Forensic Recovery?, Graeme B. Bell, Richard Boddington

Journal of Digital Forensics, Security and Law

Digital evidence is increasingly relied upon in computer forensic examinations and legal proceedings in the modern courtroom. The primary storage technology used for digital information has remained constant over the last two decades, in the form of the magnetic disc. Consequently, investigative, forensic, and judicial procedures are well-established for magnetic disc storage devices (Carrier, 2005). However, a paradigm shift has taken place in technology storage and complex, transistor-based devices for primary storage are now increasingly common. Most people are aware of the transition from portable magnetic floppy discs to portable USB transistor flash devices, yet the transition from magnetic hard …


Table Of Contents Jan 2010

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Survey Report On Training And Spending On Customer Care Services, Deogratias Harorimana Sr Jan 2010

Survey Report On Training And Spending On Customer Care Services, Deogratias Harorimana Sr

Dr Deogratias Harorimana

In a bid to promote and develop good customer care service in various sectors of Rwandan economy, a survey was conducted to assess progress and trends on customer service capacity building. Although shortcomings are there, there have been efforts and registered trends across the country on service delivery front. Investment in Capacity Building IS happening in certain sectors but this is unevenly distributed. In 2008 companies had started recognizing the significance of good service and cultivate a good working environment and training. From 2009, there was a decline in investment in capacity building in front office and key service delivery …


Value Networks For Developing Mobile Innovations: The Case Of Apple Iphone, Mutaz M. Al-Debei Jan 2010

Value Networks For Developing Mobile Innovations: The Case Of Apple Iphone, Mutaz M. Al-Debei

Dr. Mutaz M. Al-Debei

This paper intuitively utilizes a methodical approach (i.e. VNM Model) to analyze the success of Apple iPhone mobile innovation from a value network perspective. The paper demonstrates, through the case of iPhone, how a powerful and well- designed value network is a critical enabler of innovations in the mobile telecommunications industry. Retrospectively, the paper also discusses key value drivers of successful value networks.


Developing A Unified Framework Of The Business Model Concept, Mutaz M. Al-Debei, David Avison Jan 2010

Developing A Unified Framework Of The Business Model Concept, Mutaz M. Al-Debei, David Avison

Dr. Mutaz M. Al-Debei

Recent rapid advances in Information and Communication Technologies (ICTs) have highlighted the rising importance of the Business Model (BM) concept in the field of Information Systems (IS). Despite agreement on its importance to an organization’s success, the concept is still fuzzy and vague, and there is little consensus regarding its compositional facets. Identifying the fundamental concepts, modeling principles, practical functions, and reach of the BM relevant to IS and other business concepts is by no means complete. This paper, following a comprehensive review of the literature, principally employs the content analysis method and utilizes a deductive reasoning approach to provide …


Developing A Decision-Making Framework For Web Service Security Profiles: A Design-Science Paradigm, Mutaz M. Al-Debei, Bachar Alrouh, Gheorghita Ghinea Jan 2010

Developing A Decision-Making Framework For Web Service Security Profiles: A Design-Science Paradigm, Mutaz M. Al-Debei, Bachar Alrouh, Gheorghita Ghinea

Dr. Mutaz M. Al-Debei

In this paper, we provide a novel analytical hierarchy process decision-making framework for Web service security profiles. This framework aids in solving the dilemma of which Web service security profile is most fitting in a particular situation. This is because the developed framework allows architects and developers to take informed decisions following a systematic and manageable approach. In developing the framework, we followed the design-science research paradigm within which we incorporated a number of laboratory experiments.


Engaging With Citizens Online: Understanding The Role Of Epetitioning In Local Government Democracy, Mutaz M. Al-Debei, Panagiotis Panagiotopoulos Jan 2010

Engaging With Citizens Online: Understanding The Role Of Epetitioning In Local Government Democracy, Mutaz M. Al-Debei, Panagiotis Panagiotopoulos

Dr. Mutaz M. Al-Debei

According to the Local Democracy, Economic Development and Construction Act introduced in 2009, UK local authorities are expected to implement ―a facility for making petitions in electronic form to the authority‖. Motivated by this arrangement, this paper reflects on the findings of a case study investigation conducted with the Royal Borough of Kingston (one of the first local authorities to implement such a service since 2004). Lessons learnt from the case suggest that ePetitions reveal increased potential to enhance local government democracy, but are also shaped by challenging open implementation issues which can highly influence the initiative’s impact. Our conclusions …


The Design And Engineering Of Mobile Data Services:Developing An Ontology Based On Business Model Thinking, Mutaz M. Al-Debei, Guy Fitzgerald Jan 2010

The Design And Engineering Of Mobile Data Services:Developing An Ontology Based On Business Model Thinking, Mutaz M. Al-Debei, Guy Fitzgerald

Dr. Mutaz M. Al-Debei

This paper addresses the design and engineering problem related to mobile data services. The aim of the research is to inform and advise mobile service design and engineering by looking at this issue from a rigorous and holistic perspective. To this aim, this paper develops an ontology based on business model thinking. The developed ontology identifies four primary dimensions in designing business models of mobile data services: value proposition, value network, value architecture, and value finance. Within these dimensions, 15 key design concepts are identified along with their interrelationships and rules in the telecommunication service business model domain and unambiguous …


The Design Of Innovative Mobile Artifacts: How To Develop Powerful Value Networks?, Mutaz M. Al-Debei, Guy Fitzgerald Jan 2010

The Design Of Innovative Mobile Artifacts: How To Develop Powerful Value Networks?, Mutaz M. Al-Debei, Guy Fitzgerald

Dr. Mutaz M. Al-Debei

The development of mobile data services and products calls for participation and collaboration amongst many actors with different expertise. However, building powerful value network is challenging and requires a detailed examination of a number of design constructs and their interrelationships. This research provides an intuitive model to help effectively design such networks. The model is illustrated using NTT DoCoMo’s i-mode case. It is argued that the model offers a useful methodical approach for telecoms providers to develop a thriving value network capable of creating significant mobile innovations and benefits.


Rethinking The Business Model Concept With Eparticipation, Mutaz M. Al-Debei, Panagiotis Panagiotopoulos, Guy Fitzgerald, Tony Elliman Jan 2010

Rethinking The Business Model Concept With Eparticipation, Mutaz M. Al-Debei, Panagiotis Panagiotopoulos, Guy Fitzgerald, Tony Elliman

Dr. Mutaz M. Al-Debei

Enhancing citizen participation in policy making using Information and Communication Technologies (ICTs) is emerging as a strategic issue for political organisations. ICT-mediated participation, or eParticipation, projects range from the more traditional public sector initiatives, such as petitions and consultations, to attempts at integrating new forms of participatory Web 2.0 media. In this paper, we argue that the potential of ICTs to deliver sustainable eParticipation has not been fully achieved. This is mainly because of the lack of (1) effective coordination at the implementation level, (2) appropriate infrastructure, and (3) effective service design and development. In addressing this gap, we examine …


Application Planning, Jochen Albrecht, Clare Davies Jan 2010

Application Planning, Jochen Albrecht, Clare Davies

Publications and Research

No abstract provided.


Challenges For Human, Social, Cultural, And Behavioral Modeling, S. K. Numrich, Andreas Tolk Jan 2010

Challenges For Human, Social, Cultural, And Behavioral Modeling, S. K. Numrich, Andreas Tolk

Computational Modeling & Simulation Engineering Faculty Publications

Today's military focus has moved away from the force-on-force battlefield of the past century and into the domain of irregular warfare and its companion security, stability, transition and reconstruction missions. With that change in focus has come a need to examine the operational environment from a wider perspective, one that includes the whole range of human experiences and circumstances. As the set of factors and list of players expands, the need for reliable modeling and simulation increases, if for no other reason than to help the human decision maker make sense of this expanded decision space. However, to do this, …


Clustering Spam Domains And Destination Websites: Digital Forensics With Data Mining, Chun Wei, Alan Sprague, Gary Warner, Anthony Skjellum Jan 2010

Clustering Spam Domains And Destination Websites: Digital Forensics With Data Mining, Chun Wei, Alan Sprague, Gary Warner, Anthony Skjellum

Journal of Digital Forensics, Security and Law

Spam related cyber crimes have become a serious threat to society. Current spam research mainly aims to detect spam more effectively. We believe the identification and disruption of the supporting infrastructure used by spammers is a more effective way of stopping spam than filtering. The termination of spam hosts will greatly reduce the profit a spammer can generate and thwart his ability to send more spam. This research proposes an algorithm for clustering spam domains extracted from spam emails based on the hosting IP addresses and tracing the IP addresses over a period of time. The results show that many …


Generating System Requirements For A Mobile Digital Evidence Collection System: A Preliminary Step Towards Enhancing The Forensic Collection Of Digital Devices, Ibrahim Baggili Jan 2010

Generating System Requirements For A Mobile Digital Evidence Collection System: A Preliminary Step Towards Enhancing The Forensic Collection Of Digital Devices, Ibrahim Baggili

Electrical & Computer Engineering and Computer Science Faculty Publications

Collecting digital devices in a forensically sound manner is becoming more critical since 80% of all cases have some sort of digital evidence involved in them (Rogers, 2006, p. 1) .The process of documenting and tagging digital devices is cumbersome and involves details that might not apply to other types of evidence, since each evidence item has unique physical characteristics (Hesitis & Wilbon, 2005, p. 17). The process becomes less manageable when a large number of digital devices are seized. This paper examines the information and issues investigators should be aware of when collecting digital devices at crime scenes. Furthermore, …


The Changing Patterns Of Internet Usage, Christopher S. Yoo Jan 2010

The Changing Patterns Of Internet Usage, Christopher S. Yoo

All Faculty Scholarship

The Internet unquestionably represents one of the most important technological developments in recent history. It has revolutionized the way people communicate with one another and obtain information and created an unimaginable variety of commercial and leisure activities. Interestingly, many members of the engineering community often observe that the current network is ill-suited to handle the demands that end users are placing on it. Indeed, engineering researchers often describe the network as ossified and impervious to significant architectural change. As a result, both the U.S. and the European Commission are sponsoring “clean slate” projects to study how the Internet might be …


Innovations In The Internet’S Architecture That Challenge The Status Quo, Christopher S. Yoo Jan 2010

Innovations In The Internet’S Architecture That Challenge The Status Quo, Christopher S. Yoo

All Faculty Scholarship

The current debate over broadband policy has largely overlooked a number of changes to the architecture of the Internet that have caused the price paid by and quality of service received by traffic traveling across the Internet to vary widely. Topological innovations, such as private peering, multihoming, secondary peering, server farms, and content delivery networks, have caused the Internet’s traditionally hierarchical architecture to be replaced by one that is more heterogeneous. Moreover, network providers have begun to employ an increasingly varied array of business arrangements. Some of these innovations are responses to the growing importance of peer-to-peer technologies. Others, such …


Identifying A Computer Forensics Expert: A Study To Measure The Characteristics Of Forensic Computer Examiners, Gregory H. Carlton, Reginald Worthley Jan 2010

Identifying A Computer Forensics Expert: A Study To Measure The Characteristics Of Forensic Computer Examiners, Gregory H. Carlton, Reginald Worthley

Journal of Digital Forensics, Security and Law

The usage of digital evidence from electronic devices has been rapidly expanding within litigation, and along with this increased usage, the reliance upon forensic computer examiners to acquire, analyze, and report upon this evidence is also rapidly growing. This growing demand for forensic computer examiners raises questions concerning the selection of individuals qualified to perform this work. While courts have mechanisms for qualifying witnesses that provide testimony based on scientific data, such as digital data, the qualifying criteria covers a wide variety of characteristics including, education, experience, training, professional certifications, or other special skills. In this study, we compare task …


Adaptation Of Pyflag To Efficient Analysis Of Seized Computer Data Storage, Aleksander Byrski, Wojciech Stryjewski, Bartłomiej Czechowicz Jan 2010

Adaptation Of Pyflag To Efficient Analysis Of Seized Computer Data Storage, Aleksander Byrski, Wojciech Stryjewski, Bartłomiej Czechowicz

Journal of Digital Forensics, Security and Law

Based on existing software aimed at investigation support in the analysis of computer data storage seized during investigation (PyFlag), an extension is proposed involving the introduction of dedicated components for data identification and filtering. Hash codes for popular software contained in NIST/NSRL database are considered in order to avoid unwanted files while searching and to classify them into several categories. The extension allows for further analysis, e.g. using artificial intelligence methods. The considerations are illustrated by the overview of the system's design.


Table Of Contents Jan 2010

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Computer Forensic Functions Testing: Media Preparation, Write Protection And Verification, Yinghua Guo, Jill Slay Jan 2010

Computer Forensic Functions Testing: Media Preparation, Write Protection And Verification, Yinghua Guo, Jill Slay

Journal of Digital Forensics, Security and Law

The growth in the computer forensic field has created a demand for new software (or increased functionality to existing software) and a means to verify that this software is truly forensic i.e. capable of meeting the requirements of the trier of fact. In this work, we review our previous work---a function oriented testing framework for validation and verification of computer forensic tools. This framework consists of three parts: function mapping, requirements specification and reference set development. Through function mapping, we give a scientific and systemized description of the fundamentals of computer forensic discipline, i.e. what functions are needed in the …


Higate (High Grade Anti-Tamper Equipment) Prototype And Application To E-Discovery, Yui Sakurai, Yuki Ashino, Tetsutaro Uehara, Hiroshi Yoshiura, Ryoichi Sasaki Jan 2010

Higate (High Grade Anti-Tamper Equipment) Prototype And Application To E-Discovery, Yui Sakurai, Yuki Ashino, Tetsutaro Uehara, Hiroshi Yoshiura, Ryoichi Sasaki

Journal of Digital Forensics, Security and Law

These days, most data is digitized and processed in various ways by computers. In the past, computer owners were free to process data as desired and to observe the inputted data as well as the interim results. However, the unrestricted processing of data and accessing of interim results even by computer users is associated with an increasing number of adverse events. These adverse events often occur when sensitive data such as personal or confidential business information must be handled by two or more parties, such as in the case of e-Discovery, used in legal proceedings, or epidemiologic studies. To solve …


Developing Voip Honeypots: A Preliminary Investigation Into Malfeasant Activity, Craig Valli Jan 2010

Developing Voip Honeypots: A Preliminary Investigation Into Malfeasant Activity, Craig Valli

Journal of Digital Forensics, Security and Law

30 years ago PABX systems were compromised by hackers wanting to make long distance calls at some other entities expense. This activity faded as telephony became cheaper and PABX systems had countermeasures installed to overcome attacks. Now the world has moved onto the provision of telephony via broadband enabled Voice over Internet Protocol (VoIP) with this service now being provided as a replacement for conventional fixed wire telephony by major telecommunication providers worldwide. Due to increasing bandwidth it is possible for systems to support multiple voice connections simultaneously. The networked nature of the Internet allows for attackers of these VoIP …