Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Embry-Riddle Aeronautical University (397)
- University of Pennsylvania Carey Law School (64)
- University of Georgia School of Law (13)
- Maurer School of Law: Indiana University (7)
- University of South Florida (7)
-
- City University of New York (CUNY) (6)
- Selected Works (6)
- University of New Hampshire (6)
- Penn State Dickinson Law (4)
- SelectedWorks (4)
- University of Nebraska - Lincoln (4)
- California State University, San Bernardino (3)
- Old Dominion University (3)
- SIT Graduate Institute/SIT Study Abroad (3)
- University of Maryland Francis King Carey School of Law (3)
- Journal of Police and Legal Sciences (2)
- Seattle University School of Law (2)
- University of Kentucky (2)
- University of Minnesota Law School (2)
- University of Nevada, Las Vegas (2)
- Boise State University (1)
- Brigham Young University (1)
- California Polytechnic State University, San Luis Obispo (1)
- Duke Law (1)
- Florida International University (1)
- Fort Hays State University (1)
- Kennesaw State University (1)
- Notre Dame Law School (1)
- Pace University (1)
- Portland State University (1)
- Keyword
-
- Digital forensics (31)
- Privacy (21)
- Computer forensics (17)
- Digital Forensics (15)
- Digital evidence (13)
-
- Forensics (13)
- Internet (13)
- Cybersecurity (12)
- Technology (11)
- Computer Forensics (10)
- Artificial intelligence (7)
- Copyright (7)
- Information security (7)
- Security (7)
- Cloud computing (6)
- Competition (6)
- Cyber security (6)
- Data recovery (6)
- AI (5)
- Bandwidth (5)
- Big data (5)
- Cyber crime (5)
- Cybercrime (5)
- Data (5)
- Data disposal (5)
- Disk analysis (5)
- Intellectual property (5)
- Network economic effects (5)
- Quality of service (5)
- Regulation (5)
- Publication Year
- Publication
-
- Journal of Digital Forensics, Security and Law (293)
- Annual ADFSL Conference on Digital Forensics, Security and Law (102)
- All Faculty Scholarship (65)
- Military Cyber Affairs (7)
- Federal Communications Law Journal (5)
-
- The University of New Hampshire Law Review (5)
- Continuing Legal Education Presentations (4)
- Dickinson Law Review (2017-Present) (4)
- Independent Study Project (ISP) Collection (3)
- Journal of Business & Technology Law (3)
- Journal of Intellectual Property Law (3)
- Journal of International Technology and Information Management (3)
- Publications and Research (3)
- Articles, Chapters and Online Publications (2)
- Copyright, Fair Use, Scholarly Communication, etc. (2)
- Journal of Police and Legal Sciences (2)
- Minnesota Journal of Law, Science & Technology (2)
- Open Educational Resources (2)
- Presentations (2)
- Seattle Journal of Technology, Environmental & Innovation Law (2)
- The Journal of Sociotechnical Critique (2)
- Articles (1)
- Capstones (1)
- Carol A. Watson (1)
- Catholic University Journal of Law and Technology (1)
- Chancellor’s Honors Program Projects (1)
- Chien Hsun Chen (1)
- College of Engineering: Graduate Celebration Programs (1)
- Computer Science Faculty Publications and Presentations (1)
- Conference papers (1)
Articles 541 - 565 of 565
Full-Text Articles in Computer Engineering
Development And Delivery Of Coursework: The Legal/Regulatory/Policy Environment Of Cyberforensics, John W. Bagby, John C. Ruhnka
Development And Delivery Of Coursework: The Legal/Regulatory/Policy Environment Of Cyberforensics, John W. Bagby, John C. Ruhnka
Journal of Digital Forensics, Security and Law
This paper describes a cyber-forensics course that integrates important public policy and legal issues as well as relevant forensic techniques. Cyber-forensics refers to the amalgam of multi-disciplinary activities involved in the identification, gathering, handling, custody, use and security of electronic files and records, involving expertise from the forensic domain, and which produces evidence useful in the proof of facts for both commercial and legal activities. The legal and regulatory environment in which electronic discovery takes place is of critical importance to cyber-forensics experts because the legal process imposes both constraints and opportunities for the effective use of evidence gathered through …
Designing A Data Warehouse For Cyber Crimes, Il-Yeol Song, John D. Maguire, Ki Jung Lee, Namyoun Choi, Xiaohua Hu, Peter Chen
Designing A Data Warehouse For Cyber Crimes, Il-Yeol Song, John D. Maguire, Ki Jung Lee, Namyoun Choi, Xiaohua Hu, Peter Chen
Journal of Digital Forensics, Security and Law
One of the greatest challenges facing modern society is the rising tide of cyber crimes. These crimes, since they rarely fit the model of conventional crimes, are difficult to investigate, hard to analyze, and difficult to prosecute. Collecting data in a unified framework is a mandatory step that will assist the investigator in sorting through the mountains of data. In this paper, we explore designing a dimensional model for a data warehouse that can be used in analyzing cyber crime data. We also present some interesting queries and the types of cyber crime analyses that can be performed based on …
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Forensic Tools For Mobile Phone Subscriber Identity Modules, Wayne Jansen, Rick Ayers
Forensic Tools For Mobile Phone Subscriber Identity Modules, Wayne Jansen, Rick Ayers
Journal of Digital Forensics, Security and Law
Mobile phones and other handheld devices incorporating cellular capabilities, such as Personal Digital Assistants, are ubiquitous. Besides placing calls, these devices allow users to perform other useful tasks, including text messaging and phonebook entry management. When cell phones and cellular devices are involved in a crime or other incident, forensic specialists require tools that allow the proper retrieval and speedy examination of data present on the device. For devices conforming to the Global System for Mobile Communications (GSM) standards, certain data such as dialed numbers, text messages, and phonebook entries are maintained on a Subscriber Identity Module (SIM). This paper …
The Design Of An Undergraduate Degree Program In Computer & Digital Forensics, Gary C. Kessler, Michael E. Schirling
The Design Of An Undergraduate Degree Program In Computer & Digital Forensics, Gary C. Kessler, Michael E. Schirling
Journal of Digital Forensics, Security and Law
Champlain College formally started an undergraduate degree program in Computer & Digital Forensics in 2003. The underlying goals were that the program be multidisciplinary, bringing together the law, computer technology, and the basics of digital investigations; would be available as on online and oncampus offering; and would have a process-oriented focus. Success of this program has largely been due to working closely with practitioners, maintaining activity in events related to both industry and academia, and flexibility to respond to ever-changing needs. This paper provides an overview of how this program was conceived, developed, and implemented; its evolution over time; and …
Network Neutrality And The Economics Of Congestion, Christopher S. Yoo
Network Neutrality And The Economics Of Congestion, Christopher S. Yoo
All Faculty Scholarship
No abstract provided.
Hide It Or Unbundle It: A Comparison Of The Antitrust Investigations Against Microsoft In The U.S. And The E.U., Sue Ann Mota
Hide It Or Unbundle It: A Comparison Of The Antitrust Investigations Against Microsoft In The U.S. And The E.U., Sue Ann Mota
The University of New Hampshire Law Review
[Excerpt] "Microsoft Corporation, the world’s largest software company, has been facing antitrust scrutiny globally. In the U.S., after what’s been called the antitrust trial of the century, a consent decree was reached between Microsoft, the United States government, and several states, that closely resembled the litigated remedy that the remaining states received. Only Massachusetts appealed the litigated remedy, which was approved by the appeals court on June 30, 2004. In the United States, Microsoft was required to hide, but not remove, the Internet Explorer browser on the Windows Operating System. While antitrust litigation was ongoing in the United States against …
Reconsidering The Dmca, R. Polk Wagner
Reconsidering The Dmca, R. Polk Wagner
All Faculty Scholarship
patents, Law and economics, prosecution history estoppel, doctrine of equivalents, ex ante, ex post, default rules, PTO, Federal Circuit, patent prosecution, patent litigation, intellectual property, patent reform, patent administration, patent office
Beyond Network Neutrality, Christopher S. Yoo
Beyond Network Neutrality, Christopher S. Yoo
All Faculty Scholarship
In this Article, Professor Yoo takes issue with the emerging scholarly consensus in favor of ""network neutrality,"" which would prohibit network owners from employing proprietary protocols or entering into exclusivity agreements with content providers that would reduce the transparency of the Internet. Economic theory suggests that network neutrality advocates are focusing on the wrong policy problem. Rather than directing attention on the market for Internet content and applications, the segments of the industry that are the most competitive and the most likely to remain that way, communications policy would be better served if the focus were placed on the segment …
Architectural Censorship And The Fcc, Christopher S. Yoo
Architectural Censorship And The Fcc, Christopher S. Yoo
All Faculty Scholarship
Most First Amendment analyses of U.S. media policy have focused predominantly on “behavioral” regulation, which either prohibits the transmission of disfavored content (such as indecent programming) or mandates the dissemination of preferred content (such as children’s educational programming and political speech). In so doing, commentators have largely overlooked how program content is also affected by “structural” regulation, which focuses primarily on increasing the economic competitiveness of media industries. In this Article, Professor Christopher Yoo employs economic analysis to demonstrate how structural regulation can constitute a form of “architectural censorship” that has the unintended consequence of reducing the quantity, quality, and …
On The Regulation Of Networks As Complex Systems: A Graph Theory Approach, Daniel F. Spulber, Christopher S. Yoo
On The Regulation Of Networks As Complex Systems: A Graph Theory Approach, Daniel F. Spulber, Christopher S. Yoo
All Faculty Scholarship
The dominant approach to regulating communications networks treats each network component as if it existed in isolation. In so doing, the current approach fails to capture one of the essential characteristics of networks, which is the complex manner in which components interact with one another when combined into an integrated system. In this Essay, Professors Daniel Spulber and Christopher Yoo propose a new regulatory framework based on the discipline of mathematics known as graph theory, which better captures the extent to which networks represent complex systems. They then apply the insights provided by this framework to a number of current …
Would Mandating Network Neutrality Help Or Hurt Broadband Competition? A Comment On The End-To-End Debate, Christopher S. Yoo
Would Mandating Network Neutrality Help Or Hurt Broadband Competition? A Comment On The End-To-End Debate, Christopher S. Yoo
All Faculty Scholarship
No abstract provided.
The Rise And Demise Of The Technology-Specific Approach To The First Amendment, Christopher S. Yoo
The Rise And Demise Of The Technology-Specific Approach To The First Amendment, Christopher S. Yoo
All Faculty Scholarship
This article examines how analytical, technological, and doctrinal developments are forcing the courts to reconsider their media-specific approach to assessing the constitutionality of media regulation. In particular, it offers a comprehensive reevaluation of the continuing validity of the Broadcast Model of regulation, which contains features, such as licensing and direct content regulation, that normally would be considered paradigmatic violations of the First Amendment. Specifically, the analysis assesses the theoretical coherence of the traditional justification for extending a lesser degree of First Amendment protection to broadcasting than to other media (i.e., the physical scarcity of the electromagnetic spectrum) as well as …
New Models Of Regulation And Interagency Governance, Christopher S. Yoo
New Models Of Regulation And Interagency Governance, Christopher S. Yoo
All Faculty Scholarship
No abstract provided.
Access To Networks: Economic And Constitutional Connections, Daniel F. Spulber, Christopher S. Yoo
Access To Networks: Economic And Constitutional Connections, Daniel F. Spulber, Christopher S. Yoo
All Faculty Scholarship
A fundamental transformation is taking place in the basic approach to regulating network industries. Policy makers are in the process of abandoning their century-old commitment to rate regulation in favor of a new regulatory approach known as access regulation. Rather than controlling the price of outputs, the new approach focuses on compelling access to and mandating the price of inputs. Unfortunately, this shift in regulatory policy has not been met with an accompanying shift in the manner in which regulatory authorities regulate prices. Specifically, policy makers have continued to base rates on either historical or replacement cost. We argue that …
A Lessons Learned Repository For Computer Forensics, Warren Harrison, George Heuston, Mark Morrissey, David Aucsmith, Sarah Mocas, Steve Russelle
A Lessons Learned Repository For Computer Forensics, Warren Harrison, George Heuston, Mark Morrissey, David Aucsmith, Sarah Mocas, Steve Russelle
Computer Science Faculty Publications and Presentations
The Law Enforcement community possesses a large, but informal, community memory with respect to digital forensics. Large, because the experiences of every forensics technician and investigator contribute to the whole. Informal because there is seldom an explicit mechanism for disseminating this wisdom except “over the water cooler”. As a consequence, the same problems and mistakes continue to resurface and the same solutions are re-invented. In order to better exploit this informal collection of wisdom, the key points of each experience can be placed into a Repository for later dissemination. We describe a web-based Lessons Learned Repository (LLR) that facilitates contribution …
Vertical Integration And Media Regulation In The New Economy, Christopher S. Yoo
Vertical Integration And Media Regulation In The New Economy, Christopher S. Yoo
All Faculty Scholarship
Recent mergers and academic commentary have placed renewed focus on what has long been one of the central issues in media policy: whether media conglomerates can use vertical 'integration to harm competition. This Article seeks to move past previous studies, which have explored limited aspects of this issue, and apply the full sweep of modern economic theory to evaluate the regulation of vertical integration in media-related industries. It does so initially by applying the basic static efficiency analyses of vertical integration developed under the Chicago and post-Chicago Schools of antitrust law and economics to three industries: broadcasting, cable television, and …
Realspace Sovereigns In Cyberspace: Problems With The Anticybersquatting Consumer Protection Act, Catherine T. Struve, R. Polk Wagner
Realspace Sovereigns In Cyberspace: Problems With The Anticybersquatting Consumer Protection Act, Catherine T. Struve, R. Polk Wagner
All Faculty Scholarship
No abstract provided.
The Myth Of Private Ordering: Rediscovering Legal Realism In Cyberspace, Margaret Jane Radin, R. Polk Wagner
The Myth Of Private Ordering: Rediscovering Legal Realism In Cyberspace, Margaret Jane Radin, R. Polk Wagner
All Faculty Scholarship
While Cyberspace is, by now, well-recognized as a social and commercial environment of great promise, there is considerable debate about the form of governance that will best meet the needs of this new medium. Much of the present discussion casts this debate in stark terms?"top-down" hierarchical rules versus spontaneous "bottom-up" coordination?with self-ordering based on contracts and private agreements rather than public laws appearing both preferable and more likely to evolve. Following up on arguments presented by Professors Fisher and Elkin-Koren in this symposium, Radin and Wagner point out that the dichotomy between top-down and bottom-up obscures that a self-ordering regime …
Filters And The First Amendment, R. Polk Wagner
Filters And The First Amendment, R. Polk Wagner
All Faculty Scholarship
Internet content filters -- promising a technological solution to the uniquely social problem of widespread availability of adults-only content on the Internet -- appear to shift the debate over control of "cyberporn" from the legislative to the technical. Yet a growing number of commentators are expressing serious reservations about the free speech implications of filters. In this Article, I note that the ever-changing relationship between technology, network economics, and legal doctrine in the new economic and ideological marketplace of Cyberspace will fundamentally impact any constitutional analysis. I argue that the existing literature's analytic reliance on expansive concepts of state action …
Proposed Model Rules Governing The Admissibility Of Computer-Generated Evidence, Lynn Mclain, James E. Carbine
Proposed Model Rules Governing The Admissibility Of Computer-Generated Evidence, Lynn Mclain, James E. Carbine
All Faculty Scholarship
Pursuant to a grant from the State Justice Institute, the Court of Appeals of Maryland Standing Committee on Rules of Practice and Procedure drafted, and the Court of Appeals adopted, model rules regarding computer-generated animations and simulations. The rules address discovery, pretrial rulings, and preservation of the record for appeal.
Study Of Electronic Cash: Its Impact On The Economy And Society, And Its Future, Sanjana Prasad
Study Of Electronic Cash: Its Impact On The Economy And Society, And Its Future, Sanjana Prasad
LLM Theses and Essays
Technological advancement has introduced an electronic method for the payment for goods and services. With these advancements and the growth of the internet, the market-place of the world has become one universe without borders. This paper examines the various methods of electronic payment for goods and services and the domestic and international laws that govern their operations. The paper explores concerns about money laundering, counterfeiting, internet security, cyber scams in electronic cash as well as proffered security solutions to these problems. The paper concludes with the proposition that electronic cash in the form of cards (ATM) are more accessible to …