Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Embry-Riddle Aeronautical University (397)
- University of Pennsylvania Carey Law School (64)
- University of Georgia School of Law (13)
- Maurer School of Law: Indiana University (7)
- University of South Florida (7)
-
- City University of New York (CUNY) (6)
- Selected Works (6)
- University of New Hampshire (6)
- Penn State Dickinson Law (4)
- SelectedWorks (4)
- University of Nebraska - Lincoln (4)
- California State University, San Bernardino (3)
- Old Dominion University (3)
- SIT Graduate Institute/SIT Study Abroad (3)
- University of Maryland Francis King Carey School of Law (3)
- Journal of Police and Legal Sciences (2)
- Seattle University School of Law (2)
- University of Kentucky (2)
- University of Minnesota Law School (2)
- University of Nevada, Las Vegas (2)
- Boise State University (1)
- Brigham Young University (1)
- California Polytechnic State University, San Luis Obispo (1)
- Duke Law (1)
- Florida International University (1)
- Fort Hays State University (1)
- Kennesaw State University (1)
- Notre Dame Law School (1)
- Pace University (1)
- Portland State University (1)
- Keyword
-
- Digital forensics (31)
- Privacy (21)
- Computer forensics (17)
- Digital Forensics (15)
- Digital evidence (13)
-
- Forensics (13)
- Internet (13)
- Cybersecurity (12)
- Technology (11)
- Computer Forensics (10)
- Artificial intelligence (7)
- Copyright (7)
- Information security (7)
- Security (7)
- Cloud computing (6)
- Competition (6)
- Cyber security (6)
- Data recovery (6)
- AI (5)
- Bandwidth (5)
- Big data (5)
- Cyber crime (5)
- Cybercrime (5)
- Data (5)
- Data disposal (5)
- Disk analysis (5)
- Intellectual property (5)
- Network economic effects (5)
- Quality of service (5)
- Regulation (5)
- Publication Year
- Publication
-
- Journal of Digital Forensics, Security and Law (293)
- Annual ADFSL Conference on Digital Forensics, Security and Law (102)
- All Faculty Scholarship (65)
- Military Cyber Affairs (7)
- Federal Communications Law Journal (5)
-
- The University of New Hampshire Law Review (5)
- Continuing Legal Education Presentations (4)
- Dickinson Law Review (2017-Present) (4)
- Independent Study Project (ISP) Collection (3)
- Journal of Business & Technology Law (3)
- Journal of Intellectual Property Law (3)
- Journal of International Technology and Information Management (3)
- Publications and Research (3)
- Articles, Chapters and Online Publications (2)
- Copyright, Fair Use, Scholarly Communication, etc. (2)
- Journal of Police and Legal Sciences (2)
- Minnesota Journal of Law, Science & Technology (2)
- Open Educational Resources (2)
- Presentations (2)
- Seattle Journal of Technology, Environmental & Innovation Law (2)
- The Journal of Sociotechnical Critique (2)
- Articles (1)
- Capstones (1)
- Carol A. Watson (1)
- Catholic University Journal of Law and Technology (1)
- Chancellor’s Honors Program Projects (1)
- Chien Hsun Chen (1)
- College of Engineering: Graduate Celebration Programs (1)
- Computer Science Faculty Publications and Presentations (1)
- Conference papers (1)
Articles 1 - 30 of 565
Full-Text Articles in Computer Engineering
The Role Of Artificial Intelligence In Determining The Criminal Fingerprint, Saeed Al Matrooshi
The Role Of Artificial Intelligence In Determining The Criminal Fingerprint, Saeed Al Matrooshi
Journal of Police and Legal Sciences
The research aimed to identify the motives and justifications for the use of artificial intelligence in predicting crimes, to explain the challenges of artificial intelligence algorithms, the risks of bias and their ethical rules, and to highlight the role of artificial intelligence in identifying the criminal fingerprint during the detection of crimes. The research relied on the analytical approach, for the purpose of identifying the motives and justifications for the use of intelligence. Artificial intelligence in crime detection, explaining the challenges of artificial intelligence algorithms, their risks of bias, and ethical rules, and exploring how artificial intelligence technology can hopefully …
Reducing Food Scarcity: The Benefits Of Urban Farming, S.A. Claudell, Emilio Mejia
Reducing Food Scarcity: The Benefits Of Urban Farming, S.A. Claudell, Emilio Mejia
Journal of Nonprofit Innovation
Urban farming can enhance the lives of communities and help reduce food scarcity. This paper presents a conceptual prototype of an efficient urban farming community that can be scaled for a single apartment building or an entire community across all global geoeconomics regions, including densely populated cities and rural, developing towns and communities. When deployed in coordination with smart crop choices, local farm support, and efficient transportation then the result isn’t just sustainability, but also increasing fresh produce accessibility, optimizing nutritional value, eliminating the use of ‘forever chemicals’, reducing transportation costs, and fostering global environmental benefits.
Imagine Doris, who is …
Ethical Implications Of Ai-Based Algorithms In Recruiting Processes: A Study Of Civil Rights Violations Under Title Vii And The Americans With Disabilities Act, Vanessa Rodriguez
Ethical Implications Of Ai-Based Algorithms In Recruiting Processes: A Study Of Civil Rights Violations Under Title Vii And The Americans With Disabilities Act, Vanessa Rodriguez
Cyber Operations and Resilience Program Graduate Projects
This research paper analyzes the ethical implications of utilizing artificial intelligence, specifically AI-based algorithms in business selection and recruiting processes, with a focus on potential violations under Title VII of the Civil Rights Act of 1964 and Title 1 of the Americans with Disabilities Act (ADA). Amazon’s attempt at launching AI recruiting tools is examined. This paper will assess the fairness of AI recruiting practices, considering data collection, potential biases, and accuracy concerns in its implementation process. Additionally, the paper will provide an overview of federal civil rights statutes enforced by the U.S. Equal Employment Opportunity Commission (EEOC) and recent …
Executive Order On The Safe, Secure, And Trustworthy Development And Use Of Artificial Intelligence, Joseph R. Biden
Executive Order On The Safe, Secure, And Trustworthy Development And Use Of Artificial Intelligence, Joseph R. Biden
Copyright, Fair Use, Scholarly Communication, etc.
Section 1. Purpose. Artificial intelligence (AI) holds extraordinary potential for both promise and peril. Responsible AI use has the potential to help solve urgent challenges while making our world more prosperous, productive, innovative, and secure. At the same time, irresponsible use could exacerbate societal harms such as fraud, discrimination, bias, and disinformation; displace and disempower workers; stifle competition; and pose risks to national security. Harnessing AI for good and realizing its myriad benefits requires mitigating its substantial risks. This endeavor demands a society-wide effort that includes government, the private sector, academia, and civil society.
My Administration places the highest urgency …
Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law, Bernard Ngalim
Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law, Bernard Ngalim
Journal of Cybersecurity Education, Research and Practice
This paper reviews cybersecurity laws and regulations in Cameroon, focusing on cybersecurity and information security audits and risk assessments. The importance of cybersecurity risk assessment and the implementation of security controls to cure deficiencies noted during risk assessments or audits is a critical step in developing cybersecurity resilience. Cameroon's cybersecurity legal framework provides for audits but does not explicitly enumerate controls. Consequently, integrating relevant controls from the NIST frameworks and ISO Standards can improve the cybersecurity posture in Cameroon while waiting for a comprehensive revision of the legal framework. NIST and ISO are internationally recognized as best practices in information …
Ai Is Here. Here’S How New Mexicans Can Prepare, Sonia Gipson Rankin, Melanie E. Moses
Ai Is Here. Here’S How New Mexicans Can Prepare, Sonia Gipson Rankin, Melanie E. Moses
Faculty Scholarship
Last December we asked the AI chatbot ChatGPT to solve a programming assignment given to computer science students at UNM. It wrote some Python code, but it generated an error. We gave the chatbot the error message and were astounded by how good its response was.
An Ml Based Digital Forensics Software For Triage Analysis Through Face Recognition, Gaurav Gogia, Parag H. Rughani
An Ml Based Digital Forensics Software For Triage Analysis Through Face Recognition, Gaurav Gogia, Parag H. Rughani
Journal of Digital Forensics, Security and Law
Since the past few years, the complexity and heterogeneity of digital crimes has increased exponentially, which has made the digital evidence & digital forensics paramount for both criminal investigation and civil litigation cases. Some of the routine digital forensic analysis tasks are cumbersome and can increase the number of pending cases especially when there is a shortage of domain experts. While the work is not very complex, the sheer scale can be taxing. With the current scenarios and future predictions, crimes are only going to become more complex and the precedent of collecting and examining digital evidence is only going …
Security-Enhanced Serial Communications, John White, Alexander Beall, Joseph Maurio, Dane Fichter, Dr. Matthew Davis, Dr. Zachary Birnbaum
Security-Enhanced Serial Communications, John White, Alexander Beall, Joseph Maurio, Dane Fichter, Dr. Matthew Davis, Dr. Zachary Birnbaum
Military Cyber Affairs
Industrial Control Systems (ICS) are widely used by critical infrastructure and are ubiquitous in numerous industries including telecommunications, petrochemical, and manufacturing. ICS are at a high risk of cyber attack given their internet accessibility, inherent lack of security, deployment timelines, and criticality. A unique challenge in ICS security is the prevalence of serial communication buses and other non-TCP/IP communications protocols. The communication protocols used within serial buses often lack authentication and integrity protections, leaving them vulnerable to spoofing and replay attacks. The bandwidth constraints and prevalence of legacy hardware in these systems prevent the use of modern message authentication and …
Enhancing The Battleverse: The People’S Liberation Army’S Digital Twin Strategy, Joshua Baughman
Enhancing The Battleverse: The People’S Liberation Army’S Digital Twin Strategy, Joshua Baughman
Military Cyber Affairs
No abstract provided.
What Senior U.S. Leaders Say We Should Know About Cyber, Dr. Joseph H. Schafer
What Senior U.S. Leaders Say We Should Know About Cyber, Dr. Joseph H. Schafer
Military Cyber Affairs
On April 6, 2023, the Atlantic Council’s Cyber Statecraft Initiative hosted a panel discussion on the new National Cybersecurity Strategy. The panel featured four senior officials from the Office of the National Cyber Director (ONCD), the Department of State (DoS), the Department of Justice (DoJ), and the Department of Homeland Security (DHS). The author attended and asked each official to identify the most important elements that policymakers and strategists must understand about cyber. This article highlights historical and recent struggles to express cyber policy, the responses from these officials, and the author’s ongoing research to improve national security cyber policy.
Operationalizing Deterrence By Denial In The Cyber Domain, Gentry Lane
Operationalizing Deterrence By Denial In The Cyber Domain, Gentry Lane
Military Cyber Affairs
No abstract provided.
The Exigency And How To Improve And Implement International Humanitarian Legislations More Advantageously In Times Of Both Cyber-Warfare And Cyberspace, Shawn J. Lalman
The Exigency And How To Improve And Implement International Humanitarian Legislations More Advantageously In Times Of Both Cyber-Warfare And Cyberspace, Shawn J. Lalman
Doctoral Dissertations and Master's Theses
This study provides a synopsis of the following topics: the prospective limiters levied on cyber-warfare by present–day international legislation; significant complexities and contentions brought up in the rendering & utilization of International Humanitarian Legislation against cyber-warfare; feasible repercussions of cyber-warfare on humanitarian causes. It is also to be contended and outlined in this research study that non–state actors can be held accountable for breaches of international humanitarian legislation committed using cyber–ordnance if sufficient resources and skill are made available. It details the factors that prosecutors and investigators must take into account when organizing investigations into major breaches of humanitarian legislation …
Antitrust Interoperability Remedies, Herbert J. Hovenkamp
Antitrust Interoperability Remedies, Herbert J. Hovenkamp
All Faculty Scholarship
Compelled interoperability can be a useful remedy for dominant firms, including large digital platforms, who violate the antitrust laws. They can address competition concerns without interfering unnecessarily with the structures that make digital platforms attractive and that have contributed so much to economic growth.
Given the wide variety of structures and business models for big tech, “interoperability” must be defined broadly. It can realistically include everything from “dynamic” interoperability that requires real time sharing of data and operations, to “static” interoperability which requires portability but not necessarily real time interactions. Also included are the compelled sharing of intellectual property or …
The Security And Cyber Defence Realities And Difficulties In Algeria, Kada Aicha
The Security And Cyber Defence Realities And Difficulties In Algeria, Kada Aicha
Journal of Police and Legal Sciences
This research paper aims to shed light on the digital challenge faced by Algeria as it enters the world of the knowledge society, which qualifies it to achieve cybersecurity and cyber defense against various forms and types of security threats, including cyber threats. The researcher used an analytical approach to understand the phenomenon under study and trace its causes, in addition to a case study method to study all aspects of the studied phenomenon and identify the characteristics of the case study - Algeria was chosen as the analysis unit. The study concluded several important results, including:
The deficiency of …
Certification Basis For A Fully Autonomous Uncrewed Passenger Carrying Urban Air Mobility Aircraft, Steve Price
Certification Basis For A Fully Autonomous Uncrewed Passenger Carrying Urban Air Mobility Aircraft, Steve Price
Student Works
The Urban Air Mobility campaign has set a goal to efficiently transport passengers and cargo in urban areas of operation with autonomous aircraft. This concept of operations will require aircraft to utilize technology that currently does not have clear regulatory requirements. This report contains a comprehensive analysis and creation of a certification basis for a fully autonomous uncrewed passenger carrying rotorcraft for use in Urban Air Mobility certified under Title 14 Code of Federal Regulations Part 27. Part 27 was first analyzed to determine the applicability of current regulations. The fully electric propulsion system and fully autonomous flight control system …
An Evaluation Framework For Digital Image Forensics Tools, Zainab Khalid, Sana Qadir
An Evaluation Framework For Digital Image Forensics Tools, Zainab Khalid, Sana Qadir
Journal of Digital Forensics, Security and Law
The boom of digital cameras, photography, and social media has drastically changed how humans live their day-to-day, but this normalization is accompanied by malicious agents finding new ways to forge and tamper with images for unlawful monetary (or other) gains. Disinformation in the photographic media realm is an urgent threat. The availability of a myriad of image editing tools renders it almost impossible to differentiate between photo-realistic and original images. The tools available for image forensics require a standard framework against which they can be evaluated. Such a standard framework can aid in evaluating the suitability of an image forensics …
Artificial Justice: The Quandary Of Ai In The Courtroom, Paul W. Grimm, Maura R. Grossman, Sabine Gless, Mireille Hildebrandt
Artificial Justice: The Quandary Of Ai In The Courtroom, Paul W. Grimm, Maura R. Grossman, Sabine Gless, Mireille Hildebrandt
Judicature International
No abstract provided.
Spotlight Report #6: Proffering Machine-Readable Personal Privacy Research Agreements: Pilot Project Findings For Ieee P7012 Wg, Noreen Y. Whysel, Lisa Levasseur
Spotlight Report #6: Proffering Machine-Readable Personal Privacy Research Agreements: Pilot Project Findings For Ieee P7012 Wg, Noreen Y. Whysel, Lisa Levasseur
Publications and Research
What if people had the ability to assert their own legally binding permissions for data collection, use, sharing, and retention by the technologies they use? The IEEE P7012 has been working on an interoperability specification for machine-readable personal privacy terms to support this ability since 2018. The premise behind the work of IEEE P7012 is that people need technology that works on their behalf—i.e. software agents that assert the individual’s permissions and preferences in a machine-readable format.
Thanks to a grant from the IEEE Technical Activities Board Committee on Standards (TAB CoS), we were able to explore the attitudes of …
Metasoftware: Building Blocks For Legal Technology, Houman Shadab
Metasoftware: Building Blocks For Legal Technology, Houman Shadab
Seattle Journal of Technology, Environmental & Innovation Law
This Article develops a novel concept in information technology called “metasoftware.” It then applies the concept of metasoftware to developing legal technology.
Metasoftware enables users to create the software of their choosing and stands in sharp contrast to traditional, functional. Functional software is the default type of software that is currently produced and includes word processing, email, social networking, enterprise resource management, online marketplaces, and video game software. Metasoftware, by contrast, is not functional. Metasoftware presents the user with a blank slate upon which to build functional software.
I argue that software is metasoftware to that extent that (1) it …
Defensive Industrial Policy: Cybersecurity Interventions To Reduce Intellectual Property Theft, Dr. Chad Dacus, Dr. Carl (Cj) Horn
Defensive Industrial Policy: Cybersecurity Interventions To Reduce Intellectual Property Theft, Dr. Chad Dacus, Dr. Carl (Cj) Horn
Military Cyber Affairs
Through cyber-enabled industrial espionage, China has appropriated what Keith Alexander, the former Director of the National Security Agency, dubbed “the largest transfer of wealth in history.” Although China disavows intellectual property (IP) theft by its citizens and has set self-sustained research and development as an important goal, it is unrealistic to believe IP theft will slow down meaningfully without changing China’s decision calculus. China and the United States have twice agreed, in principle, to respect one another’s IP rights. However, these agreements have lacked any real enforcement mechanism, so the United States must do more to ensure its IP is …
Offensive Cyber Operations And Future Littoral Operating Concepts, Jd Work
Offensive Cyber Operations And Future Littoral Operating Concepts, Jd Work
Military Cyber Affairs
Introduction of new ground-launch cruise missile options to hold adversary naval targets at risk in order to support conventional deterrence objectives through sea control and sea denial missions is the centerpiece of proposed reorganization of Marine Littoral forces, as part of new “Expeditionary Advanced Base Operations,” and “Littoral Operations in Contested Environments” concepts. Effective distributed sea control fires against pacing threat maritime formations requires defeat of integrated air defense systems. Offensive cyber operations capabilities may be considered as a means of altering the calculus of attrition in missile fires exchanges, but due to various sensitivities it has been difficult to …
Enter The Battleverse: China's Metaverse War, Josh Baughman
Enter The Battleverse: China's Metaverse War, Josh Baughman
Military Cyber Affairs
No abstract provided.
Designing Respectful Tech: What Is Your Relationship With Technology?, Noreen Y. Whysel
Designing Respectful Tech: What Is Your Relationship With Technology?, Noreen Y. Whysel
Publications and Research
According to research at the Me2B Alliance, people feel they have a relationship with technology. It’s emotional. It’s embodied. And it’s very personal. We are studying digital relationships to answer questions like “Do people have a relationship with technology?” “What does that relationship feel like?” And “Do people understand the commitments that they are making when they explore, enter into and dissolve these relationships?” There are parallels between messy human relationships and the kinds of relationships that people develop with technology. As with human relationships, we move through states of discovery, commitment and breakup with digital applications as well. Technology …
Dismantling The “Black Opticon”: Privacy, Race Equity, And Online Data-Protection Reform, Anita L. Allen
Dismantling The “Black Opticon”: Privacy, Race Equity, And Online Data-Protection Reform, Anita L. Allen
All Faculty Scholarship
African Americans online face three distinguishable but related categories of vulnerability to bias and discrimination that I dub the “Black Opticon”: discriminatory oversurveillance, discriminatory exclusion, and discriminatory predation. Escaping the Black Opticon is unlikely without acknowledgement of privacy’s unequal distribution and privacy law’s outmoded and unduly race-neutral façade. African Americans could benefit from race-conscious efforts to shape a more equitable digital public sphere through improved laws and legal institutions. This Essay critically elaborates the Black Opticon triad and considers whether the Virginia Consumer Data Protection Act (2021), the federal Data Protection Act (2021), and new resources for the Federal Trade …
A Proportionality-Based Framework For Government Regulation Of Digital Tracing Apps In Times Of Emergency, Sharon Bassan
A Proportionality-Based Framework For Government Regulation Of Digital Tracing Apps In Times Of Emergency, Sharon Bassan
Dickinson Law Review (2017-Present)
Times of emergency present an inherent conflict between the public interest and the preservation of individual rights. Such times require granting emergency powers to the government on behalf of the public interest and relaxing safeguards against government actions that infringe rights. The lack of theoretical framework to assess governmental decisions in times of emergency leads to a polarized and politicized discourse about potential policies, and often, to public distrust and lack of compliance.
Such a discourse was evident regarding Digital Tracing Apps (“DTAs”), which are apps installed on cellular phones to alert users that they were exposed to people who …
Will Products Liability Litigation Help Protect Iot Users From Cyber-Physical Attacks?, J Royce Fichtner, Troy J. Strader
Will Products Liability Litigation Help Protect Iot Users From Cyber-Physical Attacks?, J Royce Fichtner, Troy J. Strader
Journal of International Technology and Information Management
While there is an identifiable trend towards protecting consumers from data breaches and data misuses related to IoT devices through new legislation, new regulations, government enforcement actions, and private lawsuits, there has been little progress towards creating similar legally enforceable standards of care for “cyber-physical device security.” This article explores this underdeveloped area of academic inquiry into cyber-physical device security within the context of product liability litigation in the United States. The two questions addressed in this article are: (1) Have there been any successful products liability court decisions in the United States that have held IoT manufacturers liable for …
Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion
Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion
Dickinson Law Review (2017-Present)
No abstract provided.
Deepfakes, Shallowfakes, And The Need For A Private Right Of Action, Eric Kocsis
Deepfakes, Shallowfakes, And The Need For A Private Right Of Action, Eric Kocsis
Dickinson Law Review (2017-Present)
For nearly as long as there have been photographs and videos, people have been editing and manipulating them to make them appear to be something they are not. Usually edited or manipulated photographs are relatively easy to detect, but those days are numbered. Technology has no morality; as it advances, so do the ways it can be misused. The lack of morality is no clearer than with deepfake technology.
People create deepfakes by inputting data sets, most often pictures or videos into a computer. A series of neural networks attempt to mimic the original data set until they are nearly …
Don't Bite The Bait: Phishing Attack For Internet Banking (E-Banking), Ilker Kara
Don't Bite The Bait: Phishing Attack For Internet Banking (E-Banking), Ilker Kara
Journal of Digital Forensics, Security and Law
Phishing attacks are based on obtaining desired information from users quickly and easily with the help of misdirecting, panicking, curiosity, or excitement. Most of the phishing web sites are designed on internet banking(e-banking) and the attackers can acquire financial information of misled users with the tactics and discourses they develop. Despite the increase of prevention techniques against phishing attacks day by day, an effective solution could not be found for this issue due to the human factor. Because of this reason, real phishing attack studies are essential to study and analyze the attackers’ attack techniques and strategies. This study focused …
Effects Of Cloud Computing In The Workforce, Kevin Rossi Acosta
Effects Of Cloud Computing In The Workforce, Kevin Rossi Acosta
Cybersecurity Undergraduate Research Showcase
In recent years, the incorporation of cloud computing and cloud services has increased in many different types of organizations and companies. This paper will focus on the philosophical, economical, and political factors that cloud computing and cloud services have in the workforce and different organizations. Based on various scholarly articles and resources it was observed that organizations used cloud computing and cloud services to increase their overall productivity as well as decrease the overall cost of their operations, as well as the different policies that were created by lawmakers to control the realm of cloud computing. The results of this …