Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Law

Institution
Keyword
Publication Year
Publication
Publication Type

Articles 61 - 90 of 571

Full-Text Articles in Computer Engineering

Stability In Government, Emerging Technology, And Decentralized Economies: An Analysis Of Alternative Uses Of Cryptocurrencies, Mickayla Stogsdill May 2019

Stability In Government, Emerging Technology, And Decentralized Economies: An Analysis Of Alternative Uses Of Cryptocurrencies, Mickayla Stogsdill

Chancellor’s Honors Program Projects

No abstract provided.


Procure-To-Pay Software In The Digital Age: An Exploration And Analysis Of Efficiency Gains And Cybersecurity Risks In Modern Procurement Systems, Drew Lane Jan 2019

Procure-To-Pay Software In The Digital Age: An Exploration And Analysis Of Efficiency Gains And Cybersecurity Risks In Modern Procurement Systems, Drew Lane

MPA/MPP/MPFM Capstone Projects

Procure-to-Pay (P2P) softwares are an integral part of the payment and procurement processing functions at large-scale governmental institutions. These softwares house all of the financial functions related to procurement, accounts payable, and often human resources, helping to facilitate and automate the process from initiation of a payment or purchase, to the actual disbursal of funds. Often, these softwares contain budgeting and financial reporting tools as part of the offering. As such an integral part of the financial process, these softwares obviously come at an immense cost from a set of reputable vendors. In the case of government, these vendors mainly …


Transparency And Algorithmic Governance, Cary Coglianese, David Lehr Jan 2019

Transparency And Algorithmic Governance, Cary Coglianese, David Lehr

All Faculty Scholarship

Machine-learning algorithms are improving and automating important functions in medicine, transportation, and business. Government officials have also started to take notice of the accuracy and speed that such algorithms provide, increasingly relying on them to aid with consequential public-sector functions, including tax administration, regulatory oversight, and benefits administration. Despite machine-learning algorithms’ superior predictive power over conventional analytic tools, algorithmic forecasts are difficult to understand and explain. Machine learning’s “black-box” nature has thus raised concern: Can algorithmic governance be squared with legal principles of governmental transparency? We analyze this question and conclude that machine-learning algorithms’ relative inscrutability does not pose a …


Toward The Personalization Of Copyright Law, Adi Libson, Gideon Parchomovsky Jan 2019

Toward The Personalization Of Copyright Law, Adi Libson, Gideon Parchomovsky

All Faculty Scholarship

In this Article, we provide a blueprint for personalizing copyright law in order to reduce the deadweight loss that stems from its universal application to all users, including those who would not have paid for it. We demonstrate how big data can help identify inframarginal users, who would not pay for copyrighted content, and we explain how copyright liability and remedies should be modified in such cases.


The Global Disinformation Order: 2019 Global Inventory Of Organised Social Media Manipulation, Samantha Bradshaw, Philip N. Howard Jan 2019

The Global Disinformation Order: 2019 Global Inventory Of Organised Social Media Manipulation, Samantha Bradshaw, Philip N. Howard

Copyright, Fair Use, Scholarly Communication, etc.

Executive Summary

Over the past three years, we have monitored the global organization of social media manipulation by governments and political parties. Our 2019 report analyses the trends of computational propaganda and the evolving tools, capacities, strategies, and resources.

1. Evidence of organized social media manipulation campaigns which have taken place in 70 countries, up from 48 countries in 2018 and 28 countries in 2017. In each country, there is at least one political party or government agency using social media to shape public attitudes domestically.

2.Social media has become co-opted by many authoritarian regimes. In 26 countries, computational propaganda …


Should Robots Prosecute And Defend?, Stephen E. Henderson Dec 2018

Should Robots Prosecute And Defend?, Stephen E. Henderson

Stephen E Henderson

Even when we achieve the ‘holy grail’ of artificial intelligence—machine intelligence that is at least as smart as a human being in every area of thought—there may be classes of decisions for which it is intrinsically important to retain a human in the loop. On the common account of American criminal adjudication, the role of prosecutor seems to include such decisions given the largely unreviewable declination authority, whereas the role of defense counsel would seem fully susceptible of automation. And even for the prosecutor, the benefits of automation might outweigh the intrinsic decision-making loss, given that the ultimate decision—by judge …


Paul Baran, Network Theory, And The Past, Present, And Future Of Internet, Christopher S. Yoo Dec 2018

Paul Baran, Network Theory, And The Past, Present, And Future Of Internet, Christopher S. Yoo

All Faculty Scholarship

Paul Baran’s seminal 1964 article “On Distributed Communications Networks” that first proposed packet switching also advanced an underappreciated vision of network architecture: a lattice-like, distributed network, in which each node of the Internet would be homogeneous and equal in status to all other nodes. Scholars who have subsequently embraced the concept of a lattice-like network approach have largely overlooked the extent to which it is both inconsistent with network theory (associated with the work of Duncan Watts and Albert-László Barabási), which emphasizes the importance of short cuts and hubs in enabling networks to scale, and the actual way, the Internet …


A New Framework For Securing, Extracting And Analyzing Big Forensic Data, Hitesh Sachdev, Hayden Wimmer, Lei Chen, Carl Rebman Oct 2018

A New Framework For Securing, Extracting And Analyzing Big Forensic Data, Hitesh Sachdev, Hayden Wimmer, Lei Chen, Carl Rebman

Journal of Digital Forensics, Security and Law

Finding new methods to investigate criminal activities, behaviors, and responsibilities has always been a challenge for forensic research. Advances in big data, technology, and increased capabilities of smartphones has contributed to the demand for modern techniques of examination. Smartphones are ubiquitous, transformative, and have become a goldmine for forensics research. Given the right tools and research methods investigating agencies can help crack almost any illegal activity using smartphones. This paper focuses on conducting forensic analysis in exposing a terrorist or criminal network and introduces a new Big Forensic Data Framework model where different technologies of Hadoop and EnCase software are …


The Tao Of The Dao: Taxing An Entity That Lives On A Blockchain, David J. Shakow Aug 2018

The Tao Of The Dao: Taxing An Entity That Lives On A Blockchain, David J. Shakow

All Faculty Scholarship

In this report, Shakow explains how a decentralized autonomous organization functions and interacts with the U.S. tax system and presents the many tax issues that these structures raise. The possibility of using smart contracts to allow an entity to operate totally autonomously on a blockchain platform seems attractive. However, little thought has been given to how such an entity can comply with the requirements of a tax system. The DAO, the first major attempt to create such an organization, failed because of a programming error. If successful examples proliferate in the future, tax authorities will face significant problems in getting …


Ftc Regulating Cybersecurity Post Wyndham: An International Common Law Comparison On The Impact Of Regulation Of Cybersecurity, Andrew Z. R. Smith May 2018

Ftc Regulating Cybersecurity Post Wyndham: An International Common Law Comparison On The Impact Of Regulation Of Cybersecurity, Andrew Z. R. Smith

Georgia Journal of International & Comparative Law

No abstract provided.


Energy Demand Response For High-Performance Computing Systems, Kishwar Ahmed Mar 2018

Energy Demand Response For High-Performance Computing Systems, Kishwar Ahmed

FIU Electronic Theses and Dissertations

The growing computational demand of scientific applications has greatly motivated the development of large-scale high-performance computing (HPC) systems in the past decade. To accommodate the increasing demand of applications, HPC systems have been going through dramatic architectural changes (e.g., introduction of many-core and multi-core systems, rapid growth of complex interconnection network for efficient communication between thousands of nodes), as well as significant increase in size (e.g., modern supercomputers consist of hundreds of thousands of nodes). With such changes in architecture and size, the energy consumption by these systems has increased significantly. With the advent of exascale supercomputers in the next …


Lowering Legal Barriers To Rpki Adoption, Christopher S. Yoo, David A. Wishnick Jan 2018

Lowering Legal Barriers To Rpki Adoption, Christopher S. Yoo, David A. Wishnick

All Faculty Scholarship

Across the Internet, mistaken and malicious routing announcements impose significant costs on users and network operators. To make routing announcements more reliable and secure, Internet coordination bodies have encouraged network operators to adopt the Resource Public Key Infrastructure (“RPKI”) framework. Despite this encouragement, RPKI’s adoption rates are low, especially in North America.

This report presents the results of a year-long investigation into the hypothesis—widespread within the network operator community—that legal issues pose barriers to RPKI adoption and are one cause of the disparities between North America and other regions of the world. On the basis of interviews and analysis of …


Providing Protection To Programmers' Works: Disregard The Merger Doctrine And Adopt The Application Approach, Akshay Jain Jan 2018

Providing Protection To Programmers' Works: Disregard The Merger Doctrine And Adopt The Application Approach, Akshay Jain

Catholic University Journal of Law and Technology

In today’s technological landscape, computer programs are one of the most highly complex and popular inventions. However, they still receive little or sometimes no legal protection. As a consequence, programmers are reluctant to create new programs, discouraging innovation and preventing the public to benefit from using these inventions. If the court does afford them copyright protection, they may still not receive legal damages for copyright infringement because the court would not consider their program registered under the Copyright Act of 1976.

This Comment argues for greater copyright protection for programs by disregarding the merger doctrine, which does not provide protection …


Regulating Robo Advice Across The Financial Services Industry, Tom Baker, Benedict G. C. Dellaert Jan 2018

Regulating Robo Advice Across The Financial Services Industry, Tom Baker, Benedict G. C. Dellaert

All Faculty Scholarship

Automated financial product advisors – “robo advisors” – are emerging across the financial services industry, helping consumers choose investments, banking products, and insurance policies. Robo advisors have the potential to lower the cost and increase the quality and transparency of financial advice for consumers. But they also pose significant new challenges for regulators who are accustomed to assessing human intermediaries. A well-designed robo advisor will be honest and competent, and it will recommend only suitable products. Because humans design and implement robo advisors, however, honesty, competence, and suitability cannot simply be assumed. Moreover, robo advisors pose new scale risks that …


Common Carriage’S Domain, Christopher S. Yoo Jan 2018

Common Carriage’S Domain, Christopher S. Yoo

All Faculty Scholarship

The judicial decision invalidating the Federal Communications Commission's first Open Internet Order has led advocates to embrace common carriage as the legal basis for network neutrality. In so doing, network neutrality proponents have overlooked the academic literature on common carriage as well as lessons from its implementation history. This Essay distills these learnings into five factors that play a key role in promoting common carriage's success: (1) commodity products, (2) simple interfaces, (3) stability and uniformity in the transmission technology, (4) full deployment of the transmission network, and (5) stable demand and market shares. Applying this framework to the Internet …


Consuming Digital Debris In The Plasticene, Stephen R. Parks Jan 2018

Consuming Digital Debris In The Plasticene, Stephen R. Parks

Theses and Dissertations

Claims of customization and control by socio-technical industries are altering the role of consumer and producer. These narratives are often misleading attempts to engage consumers with new forms of technology. By addressing capitalist intent, material, and the reproduction limits of 3-D printed objects’, I observe the aspirational promise of becoming a producer of my own belongings through new networks of production. I am interested in gaining a better understanding of the data consumed that perpetuates hyper-consumptive tendencies for new technological apparatuses. My role as a designer focuses on the resolution of not only the surface of the object through 3-D …


Breadcrumbs: Privacy As A Privilege, Prachi Bhardwaj Dec 2017

Breadcrumbs: Privacy As A Privilege, Prachi Bhardwaj

Capstones

Breadcrumbs: Privacy as a Privilege Abstract

By: Prachi Bhardwaj

In 2017, the world saw more data breaches than in any year prior. The count was more than the all-time high record in 2016, which was 40 percent more than the year before that.

That’s because consumer data is incredibly valuable today. In the last three decades, data storage has gone from being stored physically to being stored almost entirely digitally, which means consumer data is more accessible and applicable to business strategies. As a result, companies are gathering data in ways previously unknown to the average consumer, and hackers are …


Data Protection In Nigeria: Addressing The Multifarious Challenges Of A Deficient Legal System, Roland Akindele Dec 2017

Data Protection In Nigeria: Addressing The Multifarious Challenges Of A Deficient Legal System, Roland Akindele

Journal of International Technology and Information Management

This paper provides an overview of the current state of privacy and data protection policies and regulations in Nigeria. The paper contends that the extant legal regime in Nigeria is patently inadequate to effectively protect individuals against abuse resulting from the processing of their personal data. The view is based on the critical analysis of the current legal regime in Nigeria vis-à-vis the review of some vital data privacy issues. The paper makes some recommendations for the reform of the law.


An Unsung Success Story: A Forty-Year Retrospective On U.S. Communications Policy, Christopher S. Yoo Nov 2017

An Unsung Success Story: A Forty-Year Retrospective On U.S. Communications Policy, Christopher S. Yoo

All Faculty Scholarship

Looking backwards on the occasion of Telecommunications Policy’s fortieth anniversary reveals just how far U.S. communications policy has come. All of the major challenges of 1976, such as promoting competition in customer premises equipment, long distance, and television networking, have largely been overcome. Moreover, new issues that emerged later, such as competition in local telephone service and multichannel video program distribution, have also largely been solved. More often than not, the solution has been the result of structural changes that enhanced facilities-based competition rather than agency-imposed behavioral requirements. Moreover, close inspection reveals that in most cases, prodding by the courts …


How Useful Is Gsv As An Environmental Observation Tool? An Analysis Of The Evidence So Far., Katherine Nesse, Leah Airt Oct 2017

How Useful Is Gsv As An Environmental Observation Tool? An Analysis Of The Evidence So Far., Katherine Nesse, Leah Airt

SPU Works

Researchers in many disciplines have turned to Google Street View to replace pedestrian- or carbased in-person observation of streetscapes. It is most prevalent within the research literature on the relationship between neighborhood environments and public health but has been used as diverse as disaster recovery, ecology and wildlife habitat, and urban design. Evaluations of the tool have found that the results of GSV-based observation are similar to the results from in-person observation although the similarity depends on the type of characteristic being observed. Larger, permanent and discrete features showed more consistency between the two methods and smaller, transient and judgmental …


The Tax Treatment Of Tokens: What Does It Betoken?, David J. Shakow Aug 2017

The Tax Treatment Of Tokens: What Does It Betoken?, David J. Shakow

All Faculty Scholarship

Digital tokens have been used to raise substantial amounts of money. But little attention has been paid to the tax consequences surrounding their issuance and sale. There are significant potential tax liabilities lurking in the use of digital tokens. But, because of the anonymity inherent in the blockchain structures used for the issuance of tokens and payments for them, there is a significant question as to whether those tax liabilities will ever be collected.


Regulating By Robot: Administrative Decision Making In The Machine-Learning Era, Cary Coglianese, David Lehr Jun 2017

Regulating By Robot: Administrative Decision Making In The Machine-Learning Era, Cary Coglianese, David Lehr

All Faculty Scholarship

Machine-learning algorithms are transforming large segments of the economy, underlying everything from product marketing by online retailers to personalized search engines, and from advanced medical imaging to the software in self-driving cars. As machine learning’s use has expanded across all facets of society, anxiety has emerged about the intrusion of algorithmic machines into facets of life previously dependent on human judgment. Alarm bells sounding over the diffusion of artificial intelligence throughout the private sector only portend greater anxiety about digital robots replacing humans in the governmental sphere. A few administrative agencies have already begun to adopt this technology, while others …


Understanding Deleted File Decay On Removable Media Using Differential Analysis, James H. Jones Jr, Anurag Srivastava, Josh Mosier, Connor Anderson, Seth Buenafe May 2017

Understanding Deleted File Decay On Removable Media Using Differential Analysis, James H. Jones Jr, Anurag Srivastava, Josh Mosier, Connor Anderson, Seth Buenafe

Annual ADFSL Conference on Digital Forensics, Security and Law

Digital content created by picture recording devices is often stored internally on the source device, on either embedded or removable media. Such storage media is typically limited in capacity and meant primarily for interim storage of the most recent image files, and these devices are frequently configured to delete older files as necessary to make room for new files. When investigations involve such devices and media, it is sometimes these older deleted files that would be of interest. It is an established fact that deleted file content may persist in part or in its entirety after deletion, and identifying the …


Harnessing Predictive Models For Assisting Network Forensic Investigations Of Dns Tunnels, Irvin Homem, Panagiotis Papapetrou May 2017

Harnessing Predictive Models For Assisting Network Forensic Investigations Of Dns Tunnels, Irvin Homem, Panagiotis Papapetrou

Annual ADFSL Conference on Digital Forensics, Security and Law

In recent times, DNS tunneling techniques have been used for malicious purposes, however network security mechanisms struggle to detect them. Network forensic analysis has been proven effective, but is slow and effort intensive as Network Forensics Analysis Tools struggle to deal with undocumented or new network tunneling techniques. In this paper, we present a machine learning approach, based on feature subsets of network traffic evidence, to aid forensic analysis through automating the inference of protocols carried within DNS tunneling techniques. We explore four network protocols, namely, HTTP, HTTPS, FTP, and POP3. Three features are extracted from the DNS tunneled traffic: …


A Forensic Email Analysis Tool Using Dynamic Visualization, Johannes Stadlinger, Andreas Dewald Mar 2017

A Forensic Email Analysis Tool Using Dynamic Visualization, Johannes Stadlinger, Andreas Dewald

Journal of Digital Forensics, Security and Law

Communication between people counts to the most important information of today’s business. As a result, in case of forensic investigations in big companies, analysis of communication data in general and especially email, as the still most widely used business communication platform with an immense and still growing volume, is a typical task in digital forensics. One of the challenges is to identify the relevant communication partners and structures in the suspects surrounding as quickly as possible in order to react appropriately and identify further targets of evaluation. Due to the amount of emails in typical inboxes, reading through all the …


Find Me If You Can: Mobile Gps Mapping Applications Forensic Analysis & Snavp The Open Source, Modular, Extensible Parser, Jason Moore, Ibrahim Baggili, Frank Breitinger Mar 2017

Find Me If You Can: Mobile Gps Mapping Applications Forensic Analysis & Snavp The Open Source, Modular, Extensible Parser, Jason Moore, Ibrahim Baggili, Frank Breitinger

Journal of Digital Forensics, Security and Law

The use of smartphones as navigation devices has become more prevalent. The ubiquity of hand-held navigation devices such as Garmins or Toms Toms has been falling whereas the ownership of smartphones and their adoption as GPS devices is growing. This work provides a comprehensive study of the most popular smartphone mapping applications, namely Google Maps, Apple Maps, Waze, MapQuest, Bing, and Scout, on both Android and iOS. It details what data was found, where it was found, and how it was acquired for each application. Based on the findings, the work allowed for the construction of a tool capable of …


Compression Of Virtual-Machine Memory In Dynamic Malware Analysis, James E. Fowler Ph.D. Mar 2017

Compression Of Virtual-Machine Memory In Dynamic Malware Analysis, James E. Fowler Ph.D.

Journal of Digital Forensics, Security and Law

Lossless compression of memory dumps from virtual machines that run malware samples is considered with the goal of significantly reducing archival costs in dynamic-malware-analysis applications. Given that, in such dynamic-analysis scenarios, malware samples are typically run in virtual machines just long enough to activate any self-decryption or other detection- avoidance maneuvers, the virtual-machine memory typically changes little from that of the baseline state, with the difference being attributable in large degree to the loading of additional executables and libraries. Consequently, delta coding is proposed to compress the current virtual-machine memory dump by coding its differences with respect to a predicted …


Table Of Contents Mar 2017

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Front Matter Mar 2017

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Special Issue Of Best Papers From The 11th International Conference On Systematic Approaches To Digital Forensic Engineering (Sadfe 2016) Mar 2017

Special Issue Of Best Papers From The 11th International Conference On Systematic Approaches To Digital Forensic Engineering (Sadfe 2016)

Journal of Digital Forensics, Security and Law

The SADFE series feature the different editions of the International Conference on Systematic Approaches to Digital Forensics Engineering. Now in its eleventh edition, SADFE has established itself as the premier conference for researchers and practitioners working in Systematic Approaches to Digital Forensics Engineering.

SADFE 2016, the eleventh international conference on Systematic Approaches to Digital Forensic Engineering was held in Kyoto, Japan, September 20 - 22, 2016.

Digital forensics engineering and the curation of digital collections in cultural institutions face pressing and overlapping challenges related to provenance, chain of custody, authenticity, integrity, and identity. The generation, analysis and sustainability of digital …