Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Embry-Riddle Aeronautical University (36)
- SelectedWorks (7)
- University of Georgia School of Law (3)
- Western University (3)
- Selected Works (2)
-
- University of Arkansas, Fayetteville (2)
- University of Nebraska - Lincoln (2)
- University of Nevada, Las Vegas (2)
- Air Force Institute of Technology (1)
- Binghamton University (1)
- California State University, San Bernardino (1)
- DePaul University (1)
- Institute of Business Administration (1)
- Louisiana Tech University (1)
- Old Dominion University (1)
- Pace University (1)
- Population Council (1)
- Portland State University (1)
- Singapore Management University (1)
- Technological University Dublin (1)
- University of Pennsylvania Carey Law School (1)
- University of Texas at El Paso (1)
- Wayne State University (1)
- Keyword
-
- Digital forensics (3)
- Applied sciences (2)
- Archaeology (2)
- Automated Psychological assessment (2)
- Computer Graphics (2)
-
- Content Analysis (2)
- Detecting (2)
- Digital Communication (2)
- Digital Forensics (2)
- Disgruntlement (2)
- Employee Anger (2)
- Evaluation of Information Systems (2)
- Evidence (2)
- Forensic Animation (2)
- Guidelines. (2)
- Innovation (2)
- Insider Risk (2)
- Mobile Data Services (2)
- Negative Sentiment (2)
- Reconstruction (2)
- Threat (2)
- Visualisation (2)
- Visualization (2)
- Workplace Violence (2)
- 3D GIS (1)
- 3D Modeling (1)
- 3D WebGIS (1)
- 802.11 (1)
- ACASI (Audio Computer-Assisted Self-Interviewing) (1)
- ADAM (1)
- Publication
-
- Journal of Digital Forensics, Security and Law (23)
- Annual ADFSL Conference on Digital Forensics, Security and Law (13)
- Dr. Mutaz M. Al-Debei (5)
- Continuing Legal Education Presentations (3)
- Department of Anthropology: Faculty Publications (2)
-
- Electronic Thesis and Dissertation Repository (2)
- Graduate Theses and Dissertations (2)
- UNLV Theses, Dissertations, Professional Papers, and Capstones (2)
- AFIT Patents (1)
- All Faculty Scholarship (1)
- Business Review (1)
- College of Computing and Digital Media Dissertations (1)
- Conference Papers (1)
- Craig Napier (1)
- Dissertations and Theses (1)
- Doctoral Dissertations (1)
- Dr Deogratias Harorimana (1)
- Electrical and Computer Engineering Publications (1)
- Emmanouil Alexander Zografakis EZ (1)
- Engineering Management & Systems Engineering Projects for D. Eng. Degree (1)
- Journal of International Technology and Information Management (1)
- MPA Capstone Projects 2006 - 2015 (1)
- Nader Ale Ebrahim (1)
- Open Access Theses & Dissertations (1)
- Reproductive Health (1)
- Research Collection School Of Computing and Information Systems (1)
- Wayne State University Dissertations (1)
- Wilson Center for Social Entrepreneurship (1)
- Publication Type
Articles 61 - 72 of 72
Full-Text Articles in Computer Engineering
Technology Corner: Visualising Forensic Data: Evidence Guidelines (Part 2), Damian Schofield, Ken Fowle
Technology Corner: Visualising Forensic Data: Evidence Guidelines (Part 2), Damian Schofield, Ken Fowle
Journal of Digital Forensics, Security and Law
Visualisation is becoming increasingly important for understanding information, such as investigative data (for example: computing, medical and crime scene evidence) and analysis (for example, network capability assessment, data file reconstruction and planning scenarios). Investigative data visualisation is used to reconstruct a scene or item and is used to assist the viewer (who may well be a member of the general public with little or no understanding of the subject matter) to understand what is being presented. Analysis visualisations, on the other hand, are usually developed to review data, information and assess competing scenario hypotheses for those who usually have an …
Book Review: Placing The Suspect Behind The Keyboard: Using Digital Forensics And Investigative Techniques To Identify Cybercrime Suspects, Thomas Nash
Journal of Digital Forensics, Security and Law
In this must read for any aspiring novice cybercrime investigator as well as the seasoned professional computer guru alike, Brett Shaver takes the reader into the ever changing and dynamic world of Cybercrime investigation. Shaver, an experienced criminal investigator, lays out the details and intricacies of a computer related crime investigation in a clear and concise manner in his new easy to read publication, Placing the Suspect behind the Keyboard. Using Digital Forensics and Investigative techniques to Identify Cybercrime Suspects. Shaver takes the reader from start to finish through each step of the investigative process in well organized …
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Risk Management Of Email And Internet Use In The Workplace, John Ruhnka, Windham E. Loopesko
Risk Management Of Email And Internet Use In The Workplace, John Ruhnka, Windham E. Loopesko
Journal of Digital Forensics, Security and Law
The article surveys the changing risk environment for corporations from their employees’ electronic communications. It identifies the types of liabilities that corporations can incur from such employee communications. It discusses the objectives of corporate internet use policies and the types of provisions such policies should contain. It suggests an alternative risk-based approach to corporate acceptable use policies instead of a traditional “laundry list” of internet use prohibitions.
Trends In Android Malware Detection, Kaveh Shaerpour, Ali Dehghantanha, Ramlan Mahmod
Trends In Android Malware Detection, Kaveh Shaerpour, Ali Dehghantanha, Ramlan Mahmod
Journal of Digital Forensics, Security and Law
This paper analyzes different Android malware detection techniques from several research papers, some of these techniques are novel while others bring a new perspective to the research work done in the past. The techniques are of various kinds ranging from detection using host based frameworks and static analysis of executable to feature extraction and behavioral patterns. Each paper is reviewed extensively and the core features of each technique are highlighted and contrasted with the others. The challenges faced during the development of such techniques are also discussed along with the future prospects for Android malware detection. The findings of the …
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Analysis Of A Second Hand Google Mini Search Appliance, Stephen Larson
Analysis Of A Second Hand Google Mini Search Appliance, Stephen Larson
Journal of Digital Forensics, Security and Law
Information and the technological advancements for which mankind develops with regards to its storage has increased tremendously over the past few decades. As the total amount of data stored rapidly increases in conjunction with the amount of widely available computer-driven devices being used, solutions are being developed to better harness this data (LaTulippe, 2011). One of these solutions is commonly known as a search appliance. Search appliances have been used in e-discovery for several years. The Google Mini Search Appliance (Mini) has not only been used for e-discovery, but for indexing and searching internal documents. To accomplish these tasks, search …
The Advanced Data Acquisition Model (Adam): A Process Model For Digital Forensic Practice, Richard Adams, Val Hobbs, Graham Mann
The Advanced Data Acquisition Model (Adam): A Process Model For Digital Forensic Practice, Richard Adams, Val Hobbs, Graham Mann
Journal of Digital Forensics, Security and Law
As with other types of evidence, the courts make no presumption that digital evidence is reliable without some evidence of empirical testing in relation to the theories and techniques associated with its production. The issue of reliability means that courts pay close attention to the manner in which electronic evidence has been obtained and in particular the process in which the data is captured and stored. Previous process models have tended to focus on one particular area of digital forensic practice, such as law enforcement, and have not incorporated a formal description. We contend that this approach has prevented the …
Science Column: Reconstruction: The Experimental Side Of Digital Forensics, Fred Cohen
Science Column: Reconstruction: The Experimental Side Of Digital Forensics, Fred Cohen
Journal of Digital Forensics, Security and Law
Many in digital forensics seem to forget that the science part of digital forensics means experimentation and that implies a whole lot of things that most practitioners never learned.
Technology Corner: Calculating The Number Of Android Lock Patterns: An Unfinished Study In Number Theory, Gary C. Kessler
Technology Corner: Calculating The Number Of Android Lock Patterns: An Unfinished Study In Number Theory, Gary C. Kessler
Journal of Digital Forensics, Security and Law
Although one is unlikely to ever want to brute-force an Android lock pattern, many do wonder about the relative strength of the lock pattern versus a multidigit personal identification number (PIN). It becomes obvious pretty quickly that there are many more lock patterns than the 10,000 possible four-digit PINs.
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
An Exploration Of Social Media Use Among Multiply Minoritized Lgbtq Youth, Alfie Leanna Lucero
An Exploration Of Social Media Use Among Multiply Minoritized Lgbtq Youth, Alfie Leanna Lucero
Open Access Theses & Dissertations
This study responds to a need for research in a fast-growing and significant area of study, that of exploring, understanding, and documenting the numerous ways that multiply marginalized LGBTQ youth between the ages of 14 and 17 use social media. The primary research question examined whether social media provide safe spaces for multiply minoritized LGBTQ youth to express and explore issues of sexuality and gender. In addition, the study explores and categorizes multiple ways that the participants interact with social media and makes comparisons to prior work with more general populations. The study provides descriptions of the participants in terms …