Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Electrical and Computer Engineering (62)
- Computer Sciences (46)
- Physical Sciences and Mathematics (46)
- Computer Law (24)
- Law (24)
-
- Social and Behavioral Sciences (24)
- Forensic Science and Technology (23)
- Information Security (23)
- Legal Studies (23)
- Chemical Engineering (16)
- Civil Engineering (16)
- Civil and Environmental Engineering (16)
- Electrical and Electronics (16)
- Materials Science and Engineering (16)
- Mechanical Engineering (16)
- Metallurgy (16)
- Ocean Engineering (16)
- Structural Engineering (16)
- Business (1)
- Communication (1)
- Communication Technology and New Media (1)
- Computer and Systems Architecture (1)
- Digital Communications and Networking (1)
- First Amendment (1)
- Intellectual Property Law (1)
- Technology and Innovation (1)
- Institution
- Keyword
-
- Information security (4)
- Research relevance (2)
- ACSR and ACCR (1)
- Academic research (1)
- Acquisition (1)
-
- Action research (1)
- Adaptive NF inference system (ANFIS) (1)
- Adaptive antenna (1)
- Aluminum silicon alloy (1)
- AlxFeySiz intermetallic layer (1)
- Analytical Hierarchy Process (AHP) (1)
- And ad-hoc networks (1)
- Artificial neural network (1)
- Available Transfer Capacity (ATC) (1)
- Bagasse (1)
- Biodegradable plastics (1)
- Bioethanol (1)
- Biofilter (1)
- Boundary layer (1)
- CDMA (1)
- CPTFE film. (1)
- California Security Breach Information Act (CSBIA) (1)
- Campus information security (1)
- Capability curve (1)
- Carrier-to-interference ratio (1)
- Cellular communication (1)
- Chorosulfonic acid (1)
- Combinatorial design (1)
- Common body of knowledge (1)
- Compliance Toolkit (1)
Articles 1 - 30 of 64
Full-Text Articles in Computer Engineering
Sold Downstream: Free Speech, Fair Use, And Anti-Circumvention Law, R. Terry Parker
Sold Downstream: Free Speech, Fair Use, And Anti-Circumvention Law, R. Terry Parker
The University of New Hampshire Law Review
[Excerpt] “Here’s a hypo. Living in Asia, I purchased a shameful amount of music and movies, all legit purchases through reputable stores, HMV and Tower Records, but little of which will get reissued. I wanted to preserve my collection but software in the discs prevented me from ripping backup copies to my computer. Lacking the technological savvy to get around this software myself, I purchased and used a product to help me circumvent these controls. Discuss.
Courts agree that copying the music and movies here is infringement but that fair use may provide a defense. However, courts do not agree …
Analysis Of Three Phase Controlled Rectifier With The Same Distance Control As Compared To The Same Angle Control, Sudirman S., Sri Kurniati A.
Analysis Of Three Phase Controlled Rectifier With The Same Distance Control As Compared To The Same Angle Control, Sudirman S., Sri Kurniati A.
Makara Journal of Technology
Analysis of three phase controlled rectifier with the same distance control as compared to the same angle control. This research aim to compare the firing of the same distance and the same angle control at three phase controlled rectifier with seen generated harmonic at input (AC side). Then calculate of rectifier efficiency and power factor comparison from both the control type. The rectifier use passive filter with resistance 11 ohm and is analysed with program simulation using PSPICE version 7.1. Result of research indicate that use of the same distance control generates the 5th and 7th harmonics, while the same …
Limiting Maximum Drag Reduction Asymptote For The Moment Coefficient Of An Enclosed Rotating Disk With Fine Spiral Grooves, Budiarso Budiarso, Keizo Watanabe, Satoshi Ogata
Limiting Maximum Drag Reduction Asymptote For The Moment Coefficient Of An Enclosed Rotating Disk With Fine Spiral Grooves, Budiarso Budiarso, Keizo Watanabe, Satoshi Ogata
Makara Journal of Technology
In this study, the limiting maximum drag reduction asymptote for the moment coefficient of an enclosed rotating disk with fine spiral grooves in turbulent flow region were obtained analytically. Analysis which were based on an assumption for a simple parabolic velocity distribution of turbulent pipe flow to represent relative tangential velocity, was carried out using momentum integral equations of the boundary layer. For a certain K- parameter the moment coefficient results agree well with experimental results for maximum drag reduction in an enclosed rotating disk with fine spiral grooves and drag reduction ratio approximately was 15 %. Additionally, the experimental …
Reverse Link Cdma System Capacity Evaluation For Stratospheric Platform Mobile Communications, Iskandar Iskandar
Reverse Link Cdma System Capacity Evaluation For Stratospheric Platform Mobile Communications, Iskandar Iskandar
Makara Journal of Technology
We propose an analysis of reverse link CDMA multispot beam stratospheric platforms (SPF) in this paper. The SPF is currently proposed as a novel wireless technology for the development of the next generation fixed and mobile communications. The geometry of this technology is different from that of the terrestrial but rather similar to the satellite based cellular system. However, evaluation on the CDMA system capacity of this technology has not been much reported. This paper addresses all possible multiple access interference analyses including the effects of channel fading and shadowing in order to evaluate the system capacity. Single SPF and …
Trajectory Shaping Of Surface-To-Surface Missile With Terminal Impact Angle Constraint, S. Subchan
Trajectory Shaping Of Surface-To-Surface Missile With Terminal Impact Angle Constraint, S. Subchan
Makara Journal of Technology
This paper presents trajectory shaping of a surface-to-surface missile attacking a fixed with terminal impact angle constraint. The missile must hit the target from above, subject to the missile dynamics and path constraints. The problem is reinterpreted using optimal control theory resulting in the formulation of minimum integrated altitude. The formulation entails nonlinear, two-dimensional missile flight dynamics, boundary conditions and path constraints. The generic shape of optimal trajectory is: level flight, climbing, diving; this combination of the three flight phases is called the bunt manoeuvre. The numerical solution of optimal control problem is solved by a direct collocation method. The …
Effect Of Contact Time On Interface Reaction Between Aluminum Silicon (7% And 11%) Alloy And Steel Dies Skd 61, Bambang Suharno, Neni Octapiani Nurhayati, Bustanul Arifin, Sri Harjanto
Effect Of Contact Time On Interface Reaction Between Aluminum Silicon (7% And 11%) Alloy And Steel Dies Skd 61, Bambang Suharno, Neni Octapiani Nurhayati, Bustanul Arifin, Sri Harjanto
Makara Journal of Technology
Effect of Contact Time on Interface Reaction between Aluminum Silicon (7% and 11%) Alloy and Steel Dies SKD 61. Die soldering (die sticking) is a defect of metal casting in which molten metal “welds” to the metallic die mold surface during casting process. Die soldering is the result of an interface reaction between the molten aluminum and the die material. Aluminum alloy with 7 and 11% silicon and SKD 61 die steel are the most common melt and die material used in aluminum die casting. This research is done to study the morphology and the characteristics of the formed AlxFeySiz …
Co2 Absorption From Its Mixture With Ch4 Or N2 Through Hollow Fiber Membrane Contactor Using Water As Solvent, Sutrasno Kartohardjono, Anggara Anggara, Subihi Subihi, Yuliusman Yuliusman
Co2 Absorption From Its Mixture With Ch4 Or N2 Through Hollow Fiber Membrane Contactor Using Water As Solvent, Sutrasno Kartohardjono, Anggara Anggara, Subihi Subihi, Yuliusman Yuliusman
Makara Journal of Technology
CO2 Absorption from Its Mixture with CH4 or N2 through Hollow Fiber Membrane Contactor using Water as Solvent. Hollow fiber membrane contactors have been widely used as gas-liquid contactors recently such as in the CO2 absorption process from gas stream. This research aims to evaluate the effectiveness of hollow fiber membrane contactor to absorb CO2 from its mixture with CH4 or N2 using water through mass transfer and hydrodynamic tests. There are 3 membrane modules used in this research with shell diameter of 1.9 cm, length of 40 cm, outer fiber diameter of 2.7 mm and fiber number in the …
The Use Of Red Cabbage’S Anthocyanine Extract As A Photosensitizer On A Dye-Sensitized Nanocrystalline Tio2 Solar Cell, Akhiruddin Maddu, Mahfuddin Zuhri, Irmansyah Irmansyah
The Use Of Red Cabbage’S Anthocyanine Extract As A Photosensitizer On A Dye-Sensitized Nanocrystalline Tio2 Solar Cell, Akhiruddin Maddu, Mahfuddin Zuhri, Irmansyah Irmansyah
Makara Journal of Technology
The use of Red Cabbage’s anthocyanine extract as a photosensitizer on a Dye-Sensitized Nanocrystalline TiO2 Solar Cell. A solid-state dye-sensitized nanocrystalline TiO2 solar cell utilizing anthocyanin extract form red cabbage as photosensitizer was fabricated. The solar cell was formed in sandwich structure, which two electrodes sandwiching polymer electrolyte containing a redox couple (I-/I3 -). One of the electrodes, namely working electrode, TiO2 layer on TCO (transparent conducting oxide) coated glass substrate was sensitized with anthocyanin dye as electron donor in the system. Another electrode was a carbon sheet as a counter electrode. Gel electrolyte based on PEG (polyethylene glycol) containing …
The Potency Of Fire And Explosion Hazard On Premium Oil Storage Tank At Depot X 2007, Fatma Lestari, Warid Nurdiansyah
The Potency Of Fire And Explosion Hazard On Premium Oil Storage Tank At Depot X 2007, Fatma Lestari, Warid Nurdiansyah
Makara Journal of Technology
The Potency of Fire and Explosion Hazard on Premium Oil Storage Tank at Depot X 2007. Premium oil storage tanks have fire and explosion risk because Premium oil is flammable liquid. Because of that, fire and explosion risk assessment on Premium oil storage tank at Depot X is needed as foundation to fire and explosion risk management, and comply with regulations. Method of this research is Dow’s Fire and Explosion Index. This research indicate that F&EI value for Premium oil storage tank is 118,82. Based on that F&EI value, level of risk at Premium oil storage tank is intermediate risk.
Building National Digital Infrastructure: A Case Study Of Semiconductor Complex Limited, Deepak Kappor
Building National Digital Infrastructure: A Case Study Of Semiconductor Complex Limited, Deepak Kappor
Business Review
The digital revolution and the rapid technology developments thereafter created a real danger of the modem world getting divided into a new type of 'digital-haves and digital-have not's'. It was feared that developing countries like India may not be able to reap the benefits of the 'information age' because of the ever widening gap in technology and relevant infrastructure. As a strategic step to bridge the growing digital divide between India and the technologically advanced economies, the Government of India (GO I) decided to set up Semiconductor Complex Limited (SCL) in the year 1983 to develop Indian capabilities in the …
Simple: System Automatic Essay Assessment For Indonesian Language Subject Examination, Anak Agung Putri Ratna, Bagio Budiardjo, Djoko Hartanto
Simple: System Automatic Essay Assessment For Indonesian Language Subject Examination, Anak Agung Putri Ratna, Bagio Budiardjo, Djoko Hartanto
Makara Journal of Technology
SIMPLE: System Automatic Essay Assessment for Indonesian Language Subject Examination. Evaluation of study of a student is a very important aspect of an educational process. Evaluation is aimed at measuring the level of student understanding of the given lecture materials. Measuring student understanding of the course material, using essay-type exam, is generally used as the evaluation tool. In this essay-type exam, the student has to answer questions using sentences, whereby choices of possible answers are not indicated. The student has to answer the questions with his/her sentences. The answers may vary, since it reflects the student’s best thoughts of the …
Biodesulphurization Within Natural Gas In Oil And Gas Field, Sri Astuti Rahayu, M. Fierdaus, Syafrizal Syafrizal, M. Udiharto
Biodesulphurization Within Natural Gas In Oil And Gas Field, Sri Astuti Rahayu, M. Fierdaus, Syafrizal Syafrizal, M. Udiharto
Makara Journal of Technology
The presence of sulphur compounds in natural gas can interfere to the quality of natural gas. The decline of combustion gas capacity, metal instrument corrosion in gas piping, and the environmental pollution from gas emission can affect by their presence. Bio-filter is one of the methods that selected to reduce sulphur content in natural gas. A lab scale study of hydrogen sulphide reduction in natural gas had conducted in oil and gas field using bio-filter method. The bio-filter system (±1 L volume) contains an active carbon and thiosulphide medium as a substrate, Thiobacillus thioparus as a single culture of sulphur …
Mechanical Study On Using Of Accr Thermal Conductor At 500 Kv Sutet, Suprihadi Prasetyono
Mechanical Study On Using Of Accr Thermal Conductor At 500 Kv Sutet, Suprihadi Prasetyono
Makara Journal of Technology
Mechanical Study on using of ACCR Thermal Conductor at 500 kV SUTET. At the height of electricity demand increasing recently, circumstance of environment more limited and also expense of high investment, making thermal conductor (conductor thermal resistance) considered to be one of alternative in the electricity transmission bottlenecks. These days it has been developed thermal conductor ACCR (Aluminium Conductor Composite Reinforced) which can operate with temperature up to 240oC, so that making the current carrying capacity being higher than conventional conductor. This research aimed to study load current leading to mechanical characteristic ACCR conductor included tension, length of elongation and …
Kinetic Model For Triglyceride Hydrolysis Using Lipase:Review, Heri Hermansyah, A. Wijanarko, Dianursanti Dianursanti, Misri Gozan, Praswasti P. D.K Wulan, Rita Arbianti, Roekmijati W. Soemantojo, Tania Surya Utami, Yuliusman Yuliusman, Momoji Kubo, Naomi Shibasaki Kitakawa, Toshiy Yonemoto
Kinetic Model For Triglyceride Hydrolysis Using Lipase:Review, Heri Hermansyah, A. Wijanarko, Dianursanti Dianursanti, Misri Gozan, Praswasti P. D.K Wulan, Rita Arbianti, Roekmijati W. Soemantojo, Tania Surya Utami, Yuliusman Yuliusman, Momoji Kubo, Naomi Shibasaki Kitakawa, Toshiy Yonemoto
Makara Journal of Technology
Triglyceride hydrolysis using lipase has been proposed as a novel method to produce raw materials in food and cosmetic industries such as diacylglycerol, monoacylglycerol, glycerol and fatty acid. In order to design a reactor for utilizing this reaction on industrial scale, constructing a kinetic model is important. Since the substrates are oil and water, the hydrolysis takes place at oil-water interface. Furthermore, the triglyceride has three ester bonds, so that the hydrolysis stepwise proceeds. Thus, the reaction mechanism is very complicated. The difference between the interfacial and bulk concentrations of the enzyme, substrates and products, and the interfacial enzymatic reaction …
Sulfonation Of Cptfe Film Grafted Styrene For Proton Exchange Membrane Fuel Cell, Yohan Yohan
Sulfonation Of Cptfe Film Grafted Styrene For Proton Exchange Membrane Fuel Cell, Yohan Yohan
Makara Journal of Technology
Sulfonation of cPTFE Film grafted Styrene for Proton Exchange Membrane Fuel Cell. Sulfonation of γ-ray iradiated and styrene-grafted crosslinked polytetrafluoroethylene film (cPTFE-g-S film) have been done. The aim of the research is to make hydropyl membrane as proton exchange membrane fuel cell. Sulfonation was prepared with chlorosulfonic acid in chloroethane under various conditions. The impact of the percent of grafting, the concentration of chlorosulfonic acid, the reaction time,and the reaction temperature on the properties of sulfonated film is examinated. The results show that sulfonation of surface-grafted films is incomplete at room temperature. The increasing of concentration of chlorosulfonic acid and …
Utilization Of Bagasse Cellulose For Ethanol Production Through Simultaneous Saccharification And Fermentation By Xylanase, M. Samsuri, Misri Gozan, R. Mardias, M. Baiquni, Heri Hermansyah, Anondho Wijanarko, Bambang Prasetya, M. Nasikin
Utilization Of Bagasse Cellulose For Ethanol Production Through Simultaneous Saccharification And Fermentation By Xylanase, M. Samsuri, Misri Gozan, R. Mardias, M. Baiquni, Heri Hermansyah, Anondho Wijanarko, Bambang Prasetya, M. Nasikin
Makara Journal of Technology
Utilization of Bagasse Cellulose for Ethanol Production through Simultaneous Saccharification and Fermentation by Xylanase. Bagasse is a solid residue from sugar cane process, which is not many use it for some product which have more added value. Bagasse, which is a lignosellulosic material, be able to be use for alternative energy resources like bioethanol or biogas. With renewable energy resources a crisis of energy in Republic of Indonesia could be solved, especially in oil and gas. This research has done the conversion of bagasse to bioethanol with xylanase enzyme. The result show that bagasse contains of 52,7% cellulose, 20% hemicelluloses, …
Construction Of Short-Length High-Rates Ldpc Codes Using Difference Families, Deny Hamdani, Ery Safrianti
Construction Of Short-Length High-Rates Ldpc Codes Using Difference Families, Deny Hamdani, Ery Safrianti
Makara Journal of Technology
Low-density parity-check (LDPC) code is linear-block error-correcting code defined by sparse parity-check matrix. It is decoded using the massage-passing algorithm, and in many cases, capable of outperforming turbo code. This paper presents a class of low-density parity-check (LDPC) codes showing good performance with low encoding complexity. The code is constructed using difference families from combinatorial design. The resulting code, which is designed to have short code length and high code rate, can be encoded with low complexity due to its quasi-cyclic structure, and performs well when it is iteratively decoded with the sum-product algorithm. These properties of LDPC code are …
Production Of Medium Chain Length Polyhydroxyalkanoates From Oleic Acid Using Pseudomonas Putida Pga1 By Fed Batch Culture, Sidik Marsudi, Irene K.P. Tan, Seng Neon Gan, K. B. Ramachandran
Production Of Medium Chain Length Polyhydroxyalkanoates From Oleic Acid Using Pseudomonas Putida Pga1 By Fed Batch Culture, Sidik Marsudi, Irene K.P. Tan, Seng Neon Gan, K. B. Ramachandran
Makara Journal of Technology
Bacterial polyhydroxyalkanoates (PHAs) are a class of polymers currently receiving much attention because of their potential as renewable and biodegradable plastics. A wide variety of bacteria has been reported to produce PHAs including Pseudomonas strains. These strains are known as versatile medium chain length PHAs (PHAs-mcl) producers using fatty acids as carbon source. Oleic acid was used to produce PHAs-mcl using Pseudomonas putida PGA 1 by continuous feeding of both nitrogen and carbon source, in a fed batch culture. During cell growth, PHAs also accumulated, indicating that PHA production in this organism is growth associated. Residual cell increased until the …
Book Review: No Place To Hide, Gary C. Kessler
Book Review: No Place To Hide, Gary C. Kessler
Journal of Digital Forensics, Security and Law
This issue presents the second Book Review column for the JDFSL. It is an experiment to broaden the services that the journal provides to readers, so we are anxious to get your reaction. Is the column useful and interesting? Should we include more than one review per issue? Should we also review products? Do you have suggested books/products for review and/or do you want to write a review? All of this type of feedback -- and more -- is appreciated. Please feel free to send comments to Gary Kessler (gary.kessler@champlain.edu) or Glenn Dardick (gdardick@dardick.net).
Investigating Information Structure Of Phishing Emails Based On Persuasive Communication Perspective, Ki J. Lee, Il-Yeol Song
Investigating Information Structure Of Phishing Emails Based On Persuasive Communication Perspective, Ki J. Lee, Il-Yeol Song
Journal of Digital Forensics, Security and Law
Current approaches of phishing filters depend on classifying messages based on textually discernable features such as IP-based URLs or domain names as those features that can be easily extracted from a given phishing message. However, in the same sense, those easily perceptible features can be easily manipulated by sophisticated phishers. Therefore, it is important that universal patterns of phishing messages should be identified for feature extraction to serve as a basis for text classification. In this paper, we demonstrate that user perception regarding phishing message can be identified in central and peripheral routes of information processing. We also present a …
Monitoring And Surveillance In The Workplace: Lessons Learnt? – Investigating The International Legal Position, Verine Etsebeth
Monitoring And Surveillance In The Workplace: Lessons Learnt? – Investigating The International Legal Position, Verine Etsebeth
Journal of Digital Forensics, Security and Law
When considering the legal implications of monitoring and surveillance in the workplace, the question may be asked why companies deploy computer surveillance and monitoring in the first place. Several reasons may be put forward to justify why more than 80% of all major American firms monitor employee e-mails and Internet usage. However, what most companies forget is the fact that the absence or presence of monitoring and surveillance activities in a company holds serious legal consequences for companies. From the discussion in this paper it will become apparent that there is a vast difference in how most countries approach this …
The Evolution Of Internet Legal Regulation In Addressing Crime And Terrorism, Murdoch Watney
The Evolution Of Internet Legal Regulation In Addressing Crime And Terrorism, Murdoch Watney
Journal of Digital Forensics, Security and Law
Internet regulation has evolved from self-regulation to the criminalization of conduct to state control of information available, accessed and submitted. Criticism has been leveled at the different forms of state control and the methods employed to enforce state control. After the terrorist attack on the USA on 11 September 2001, governments justify Internet state control as a law enforcement and national security tool against the abuse and misuse of the Internet for the commission of serious crimes, such as phishing, child pornography; terrorism and copyright infringement. Some Internet users and civil rights groups perceive state control as an abomination which …
Information Technology Act 2000 In India - Authentication Of E-Documents, R. G. Pawar, B. S. Sawant, A. Kaiwade
Information Technology Act 2000 In India - Authentication Of E-Documents, R. G. Pawar, B. S. Sawant, A. Kaiwade
Journal of Digital Forensics, Security and Law
The Information Technology Act 2000 has enacted in India on 9th June 2000. This Act has mentioned provision of authentication of electronic document. It is the need of hour at that time that such provision is needed in the Indian Law system, especially for electronic commerce and electronic governance. Electronic commerce”, which involve the use of alternatives to paper based methods of communication and storage information. To do electronic commerce there should be authentication of particular document. The working of internet is the documents are traveling in terms of bits from one destination to other destination, through various media like …
The Common Body Of Knowledge: A Framework To Promote Relevant Information Security Research, Kenneth J. Knapp, F. N. Ford, Thomas E. Marshall, R. K. Rainer
The Common Body Of Knowledge: A Framework To Promote Relevant Information Security Research, Kenneth J. Knapp, F. N. Ford, Thomas E. Marshall, R. K. Rainer
Journal of Digital Forensics, Security and Law
This study proposes using an established common body of knowledge (CBK) as one means of organizing information security literature. Consistent with calls for more relevant information systems (IS) research, this industrydeveloped framework can motivate future research towards topics that are important to the security practitioner. In this review, forty-eight articles from ten IS journals from 1995 to 2004 are selected and cross-referenced to the ten domains of the information security CBK. Further, we distinguish articles as empirical research, frameworks, or tutorials. Generally, this study identified a need for additional empirical research in every CBK domain including topics related to legal …
An Exploratory Analysis Of Computer Mediated Communications On Cyberstalking Severity, Stephen D. Barnes, David P. Biros
An Exploratory Analysis Of Computer Mediated Communications On Cyberstalking Severity, Stephen D. Barnes, David P. Biros
Journal of Digital Forensics, Security and Law
The interaction between disjunctive interpersonal relationships, those where the parties to the relationship disagree on the goals of the relationship, and the use of computer mediated communications channels is a relatively unexplored domain. Bargh (2002) suggests that CMC channels can amplify the development of interpersonal relationships, and notes that the effect is not constant across communications activities. This proposal suggests a line of research that explores the interaction between computer mediated communications (CMC) and stalking, which is a common form of disjunctive relationships. Field data from cyberstalking cases will be used to look at the effects of CMC channels on …
Making Molehills Out Of Mountains: Bringing Security Research To The Classroom, Richard G. Taylor
Making Molehills Out Of Mountains: Bringing Security Research To The Classroom, Richard G. Taylor
Journal of Digital Forensics, Security and Law
Security research published in academic journals rarely finds its way to the business community or into the classroom. Even though the research is of high quality, it is written in a manner that is difficult to read and to understand. This paper argues that one way to get this academic research into the business community is to incorporate it into security classrooms. To do so, however, academic articles need to be adapted into a classroom-friendly format. This paper suggests ways to do this and provides an example of an academic article that was adapted for use in a security management …
Computer Crimes: A Case Study Of What Malaysia Can Learn From Others?, Janaletchumi Appudurai, Chitra L. Ramalingam
Computer Crimes: A Case Study Of What Malaysia Can Learn From Others?, Janaletchumi Appudurai, Chitra L. Ramalingam
Journal of Digital Forensics, Security and Law
Rapid development of information technology (IT) has brought with it many new applications such as e-commerce and global business. The past few years have seen activities in the legislative arena covering issues such as digital signatures, the international recognition of electronic documents and privacy and data protection. Both the developed and developing countries have exhibited keenness to embrace the IT environment. Securing this electronic environment from intrusion, however, continues to be problematic. A particular favorite form of computer crime would be ‘hacking’. As more computer systems move on to on-line processing and improved telecommunications, computer hackers are now a real …
Providing A Foundation For Analysis Of Volatile Data Stores, Timothy Vidas
Providing A Foundation For Analysis Of Volatile Data Stores, Timothy Vidas
Journal of Digital Forensics, Security and Law
Current threats against typical computer systems demonstrate a need for forensic analysis of memory-resident data in addition to the conventional static analysis common today. Certain attacks and types of malware exist solely in memory and leave little or no evidentiary information on nonvolatile stores such as a hard disk drive. The desire to preserve system state at the time of response may even warrant memory acquisition independent of perceived threats and the ability to analyze the acquired duplicate.
Tools capable of duplicating various types of volatile data stores are becoming widely available. Once the data store has been duplicated, current …
Education Organization Baseline Control Protection And Trusted Level Security, Wasim A. Al-Hamdani
Education Organization Baseline Control Protection And Trusted Level Security, Wasim A. Al-Hamdani
Journal of Digital Forensics, Security and Law
Many education organizations have adopted for security the enterprise best practices for implementation on their campuses, while others focus on ISO Standard (or/and) the National Institution of Standards and Technology.
All these adoptions are dependent on IT personal and their experiences or knowledge of the standard. On top of this is the size of the education organizations. The larger the population in an education organization, the more the problem of information and security become very clear. Thus, they have been obliged to comply with information security issues and adopt the national or international standard. The case is quite different when …
Securitycom: A Multi-Player Game For Researching And Teaching Information Security Teams, Douglas P. Twitchell
Securitycom: A Multi-Player Game For Researching And Teaching Information Security Teams, Douglas P. Twitchell
Journal of Digital Forensics, Security and Law
A major portion of government and business organizations’ attempts to counteract information security threats is teams of security personnel. These teams often consist of personnel of diverse backgrounds in specific specialties such as network administration, application development, and business administration, resulting in possible conflicts between security, functionality, and availability. This paper discusses the use of games to teach and research information security teams and outlines research to design and build a simple, team-oriented, configurable, information security game. It will be used to study how information security teams work together to defend against attacks using a multi-player game, and to study …