Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Law

Institution
Keyword
Publication Year
Publication
Publication Type

Articles 541 - 565 of 565

Full-Text Articles in Computer Engineering

Development And Delivery Of Coursework: The Legal/Regulatory/Policy Environment Of Cyberforensics, John W. Bagby, John C. Ruhnka Jan 2006

Development And Delivery Of Coursework: The Legal/Regulatory/Policy Environment Of Cyberforensics, John W. Bagby, John C. Ruhnka

Journal of Digital Forensics, Security and Law

This paper describes a cyber-forensics course that integrates important public policy and legal issues as well as relevant forensic techniques. Cyber-forensics refers to the amalgam of multi-disciplinary activities involved in the identification, gathering, handling, custody, use and security of electronic files and records, involving expertise from the forensic domain, and which produces evidence useful in the proof of facts for both commercial and legal activities. The legal and regulatory environment in which electronic discovery takes place is of critical importance to cyber-forensics experts because the legal process imposes both constraints and opportunities for the effective use of evidence gathered through …


Designing A Data Warehouse For Cyber Crimes, Il-Yeol Song, John D. Maguire, Ki Jung Lee, Namyoun Choi, Xiaohua Hu, Peter Chen Jan 2006

Designing A Data Warehouse For Cyber Crimes, Il-Yeol Song, John D. Maguire, Ki Jung Lee, Namyoun Choi, Xiaohua Hu, Peter Chen

Journal of Digital Forensics, Security and Law

One of the greatest challenges facing modern society is the rising tide of cyber crimes. These crimes, since they rarely fit the model of conventional crimes, are difficult to investigate, hard to analyze, and difficult to prosecute. Collecting data in a unified framework is a mandatory step that will assist the investigator in sorting through the mountains of data. In this paper, we explore designing a dimensional model for a data warehouse that can be used in analyzing cyber crime data. We also present some interesting queries and the types of cyber crime analyses that can be performed based on …


Table Of Contents Jan 2006

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Table Of Contents Jan 2006

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Table Of Contents Jan 2006

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Table Of Contents Jan 2006

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Forensic Tools For Mobile Phone Subscriber Identity Modules, Wayne Jansen, Rick Ayers Jan 2006

Forensic Tools For Mobile Phone Subscriber Identity Modules, Wayne Jansen, Rick Ayers

Journal of Digital Forensics, Security and Law

Mobile phones and other handheld devices incorporating cellular capabilities, such as Personal Digital Assistants, are ubiquitous. Besides placing calls, these devices allow users to perform other useful tasks, including text messaging and phonebook entry management. When cell phones and cellular devices are involved in a crime or other incident, forensic specialists require tools that allow the proper retrieval and speedy examination of data present on the device. For devices conforming to the Global System for Mobile Communications (GSM) standards, certain data such as dialed numbers, text messages, and phonebook entries are maintained on a Subscriber Identity Module (SIM). This paper …


The Design Of An Undergraduate Degree Program In Computer & Digital Forensics, Gary C. Kessler, Michael E. Schirling Jan 2006

The Design Of An Undergraduate Degree Program In Computer & Digital Forensics, Gary C. Kessler, Michael E. Schirling

Journal of Digital Forensics, Security and Law

Champlain College formally started an undergraduate degree program in Computer & Digital Forensics in 2003. The underlying goals were that the program be multidisciplinary, bringing together the law, computer technology, and the basics of digital investigations; would be available as on online and oncampus offering; and would have a process-oriented focus. Success of this program has largely been due to working closely with practitioners, maintaining activity in events related to both industry and academia, and flexibility to respond to ever-changing needs. This paper provides an overview of how this program was conceived, developed, and implemented; its evolution over time; and …


Network Neutrality And The Economics Of Congestion, Christopher S. Yoo Jan 2006

Network Neutrality And The Economics Of Congestion, Christopher S. Yoo

All Faculty Scholarship

No abstract provided.


Hide It Or Unbundle It: A Comparison Of The Antitrust Investigations Against Microsoft In The U.S. And The E.U., Sue Ann Mota May 2005

Hide It Or Unbundle It: A Comparison Of The Antitrust Investigations Against Microsoft In The U.S. And The E.U., Sue Ann Mota

The University of New Hampshire Law Review

[Excerpt] "Microsoft Corporation, the world’s largest software company, has been facing antitrust scrutiny globally. In the U.S., after what’s been called the antitrust trial of the century, a consent decree was reached between Microsoft, the United States government, and several states, that closely resembled the litigated remedy that the remaining states received. Only Massachusetts appealed the litigated remedy, which was approved by the appeals court on June 30, 2004. In the United States, Microsoft was required to hide, but not remove, the Internet Explorer browser on the Windows Operating System. While antitrust litigation was ongoing in the United States against …


Reconsidering The Dmca, R. Polk Wagner Jan 2005

Reconsidering The Dmca, R. Polk Wagner

All Faculty Scholarship

patents, Law and economics, prosecution history estoppel, doctrine of equivalents, ex ante, ex post, default rules, PTO, Federal Circuit, patent prosecution, patent litigation, intellectual property, patent reform, patent administration, patent office


Beyond Network Neutrality, Christopher S. Yoo Jan 2005

Beyond Network Neutrality, Christopher S. Yoo

All Faculty Scholarship

In this Article, Professor Yoo takes issue with the emerging scholarly consensus in favor of ""network neutrality,"" which would prohibit network owners from employing proprietary protocols or entering into exclusivity agreements with content providers that would reduce the transparency of the Internet. Economic theory suggests that network neutrality advocates are focusing on the wrong policy problem. Rather than directing attention on the market for Internet content and applications, the segments of the industry that are the most competitive and the most likely to remain that way, communications policy would be better served if the focus were placed on the segment …


Architectural Censorship And The Fcc, Christopher S. Yoo Jan 2005

Architectural Censorship And The Fcc, Christopher S. Yoo

All Faculty Scholarship

Most First Amendment analyses of U.S. media policy have focused predominantly on “behavioral” regulation, which either prohibits the transmission of disfavored content (such as indecent programming) or mandates the dissemination of preferred content (such as children’s educational programming and political speech). In so doing, commentators have largely overlooked how program content is also affected by “structural” regulation, which focuses primarily on increasing the economic competitiveness of media industries. In this Article, Professor Christopher Yoo employs economic analysis to demonstrate how structural regulation can constitute a form of “architectural censorship” that has the unintended consequence of reducing the quantity, quality, and …


On The Regulation Of Networks As Complex Systems: A Graph Theory Approach, Daniel F. Spulber, Christopher S. Yoo Jan 2005

On The Regulation Of Networks As Complex Systems: A Graph Theory Approach, Daniel F. Spulber, Christopher S. Yoo

All Faculty Scholarship

The dominant approach to regulating communications networks treats each network component as if it existed in isolation. In so doing, the current approach fails to capture one of the essential characteristics of networks, which is the complex manner in which components interact with one another when combined into an integrated system. In this Essay, Professors Daniel Spulber and Christopher Yoo propose a new regulatory framework based on the discipline of mathematics known as graph theory, which better captures the extent to which networks represent complex systems. They then apply the insights provided by this framework to a number of current …


Would Mandating Network Neutrality Help Or Hurt Broadband Competition? A Comment On The End-To-End Debate, Christopher S. Yoo Jan 2004

Would Mandating Network Neutrality Help Or Hurt Broadband Competition? A Comment On The End-To-End Debate, Christopher S. Yoo

All Faculty Scholarship

No abstract provided.


The Rise And Demise Of The Technology-Specific Approach To The First Amendment, Christopher S. Yoo Jan 2003

The Rise And Demise Of The Technology-Specific Approach To The First Amendment, Christopher S. Yoo

All Faculty Scholarship

This article examines how analytical, technological, and doctrinal developments are forcing the courts to reconsider their media-specific approach to assessing the constitutionality of media regulation. In particular, it offers a comprehensive reevaluation of the continuing validity of the Broadcast Model of regulation, which contains features, such as licensing and direct content regulation, that normally would be considered paradigmatic violations of the First Amendment. Specifically, the analysis assesses the theoretical coherence of the traditional justification for extending a lesser degree of First Amendment protection to broadcasting than to other media (i.e., the physical scarcity of the electromagnetic spectrum) as well as …


New Models Of Regulation And Interagency Governance, Christopher S. Yoo Jan 2003

New Models Of Regulation And Interagency Governance, Christopher S. Yoo

All Faculty Scholarship

No abstract provided.


Access To Networks: Economic And Constitutional Connections, Daniel F. Spulber, Christopher S. Yoo Jan 2003

Access To Networks: Economic And Constitutional Connections, Daniel F. Spulber, Christopher S. Yoo

All Faculty Scholarship

A fundamental transformation is taking place in the basic approach to regulating network industries. Policy makers are in the process of abandoning their century-old commitment to rate regulation in favor of a new regulatory approach known as access regulation. Rather than controlling the price of outputs, the new approach focuses on compelling access to and mandating the price of inputs. Unfortunately, this shift in regulatory policy has not been met with an accompanying shift in the manner in which regulatory authorities regulate prices. Specifically, policy makers have continued to base rates on either historical or replacement cost. We argue that …


A Lessons Learned Repository For Computer Forensics, Warren Harrison, George Heuston, Mark Morrissey, David Aucsmith, Sarah Mocas, Steve Russelle Oct 2002

A Lessons Learned Repository For Computer Forensics, Warren Harrison, George Heuston, Mark Morrissey, David Aucsmith, Sarah Mocas, Steve Russelle

Computer Science Faculty Publications and Presentations

The Law Enforcement community possesses a large, but informal, community memory with respect to digital forensics. Large, because the experiences of every forensics technician and investigator contribute to the whole. Informal because there is seldom an explicit mechanism for disseminating this wisdom except “over the water cooler”. As a consequence, the same problems and mistakes continue to resurface and the same solutions are re-invented. In order to better exploit this informal collection of wisdom, the key points of each experience can be placed into a Repository for later dissemination. We describe a web-based Lessons Learned Repository (LLR) that facilitates contribution …


Vertical Integration And Media Regulation In The New Economy, Christopher S. Yoo Jan 2002

Vertical Integration And Media Regulation In The New Economy, Christopher S. Yoo

All Faculty Scholarship

Recent mergers and academic commentary have placed renewed focus on what has long been one of the central issues in media policy: whether media conglomerates can use vertical 'integration to harm competition. This Article seeks to move past previous studies, which have explored limited aspects of this issue, and apply the full sweep of modern economic theory to evaluate the regulation of vertical integration in media-related industries. It does so initially by applying the basic static efficiency analyses of vertical integration developed under the Chicago and post-Chicago Schools of antitrust law and economics to three industries: broadcasting, cable television, and …


Realspace Sovereigns In Cyberspace: Problems With The Anticybersquatting Consumer Protection Act, Catherine T. Struve, R. Polk Wagner Jan 2002

Realspace Sovereigns In Cyberspace: Problems With The Anticybersquatting Consumer Protection Act, Catherine T. Struve, R. Polk Wagner

All Faculty Scholarship

No abstract provided.


The Myth Of Private Ordering: Rediscovering Legal Realism In Cyberspace, Margaret Jane Radin, R. Polk Wagner Jan 1999

The Myth Of Private Ordering: Rediscovering Legal Realism In Cyberspace, Margaret Jane Radin, R. Polk Wagner

All Faculty Scholarship

While Cyberspace is, by now, well-recognized as a social and commercial environment of great promise, there is considerable debate about the form of governance that will best meet the needs of this new medium. Much of the present discussion casts this debate in stark terms?"top-down" hierarchical rules versus spontaneous "bottom-up" coordination?with self-ordering based on contracts and private agreements rather than public laws appearing both preferable and more likely to evolve. Following up on arguments presented by Professors Fisher and Elkin-Koren in this symposium, Radin and Wagner point out that the dichotomy between top-down and bottom-up obscures that a self-ordering regime …


Filters And The First Amendment, R. Polk Wagner Jan 1999

Filters And The First Amendment, R. Polk Wagner

All Faculty Scholarship

Internet content filters -- promising a technological solution to the uniquely social problem of widespread availability of adults-only content on the Internet -- appear to shift the debate over control of "cyberporn" from the legislative to the technical. Yet a growing number of commentators are expressing serious reservations about the free speech implications of filters. In this Article, I note that the ever-changing relationship between technology, network economics, and legal doctrine in the new economic and ideological marketplace of Cyberspace will fundamentally impact any constitutional analysis. I argue that the existing literature's analytic reliance on expansive concepts of state action …


Proposed Model Rules Governing The Admissibility Of Computer-Generated Evidence, Lynn Mclain, James E. Carbine Jan 1998

Proposed Model Rules Governing The Admissibility Of Computer-Generated Evidence, Lynn Mclain, James E. Carbine

All Faculty Scholarship

Pursuant to a grant from the State Justice Institute, the Court of Appeals of Maryland Standing Committee on Rules of Practice and Procedure drafted, and the Court of Appeals adopted, model rules regarding computer-generated animations and simulations. The rules address discovery, pretrial rulings, and preservation of the record for appeal.


Study Of Electronic Cash: Its Impact On The Economy And Society, And Its Future, Sanjana Prasad Jan 1998

Study Of Electronic Cash: Its Impact On The Economy And Society, And Its Future, Sanjana Prasad

LLM Theses and Essays

Technological advancement has introduced an electronic method for the payment for goods and services. With these advancements and the growth of the internet, the market-place of the world has become one universe without borders. This paper examines the various methods of electronic payment for goods and services and the domestic and international laws that govern their operations. The paper explores concerns about money laundering, counterfeiting, internet security, cyber scams in electronic cash as well as proffered security solutions to these problems. The paper concludes with the proposition that electronic cash in the form of cards (ATM) are more accessible to …