Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Legal Studies

PDF

2016

Institution
Keyword
Publication
Publication Type

Articles 1 - 30 of 173

Full-Text Articles in Law

The Impact Of Md5 File Hash Collisions On Digital Forensic Imaging, Gary C. Kessler Dec 2016

The Impact Of Md5 File Hash Collisions On Digital Forensic Imaging, Gary C. Kessler

Journal of Digital Forensics, Security and Law

The Message Digest 5 (MD5) hash is commonly used as for integrity verification in the forensic imaging process. The ability to force MD5 hash collisions has been a reality for more than a decade, although there is a general consensus that hash collisions are of minimal impact to the practice of computer forensics. This paper describes an experiment to determine the results of imaging two disks that are identical except for one file, the two versions of which have different content but otherwise occupy the same byte positions on the disk, are the same size, and have the same hash ...


A New Distributed Chinese Wall Security Policy Model, Saad Fehis, Omar Nouali, Mohand-Tahar Kechadi Dec 2016

A New Distributed Chinese Wall Security Policy Model, Saad Fehis, Omar Nouali, Mohand-Tahar Kechadi

Journal of Digital Forensics, Security and Law

The application of the Chinese wall security policy model (CWSPM) to control the information flows between two or more competing and/or conflicting companies in cloud computing (Multi-tenancy) or in the social network, is a very interesting solution. The main goal of the Chinese Wall Security Policy is to build a wall between the datasets of competing companies, and among the system subjects. This is done by the applying to the subjects mandatory rules, in order to control the information flow caused between them. This problem is one of the hottest topics in the area of cloud computing (as a ...


Leveraging The Windows Amcache.Hve File In Forensic Investigations, Bhupendra Singh, Upasna Singh Dec 2016

Leveraging The Windows Amcache.Hve File In Forensic Investigations, Bhupendra Singh, Upasna Singh

Journal of Digital Forensics, Security and Law

The Amcache.hve is a registry hive file that is created by Microsoft® Windows® to store the information related to execution of programs. This paper highlights the evidential potential of Amcache.hve file and its application in the area of user activity analysis. The study uncovers numerous artifacts retained in Amcache.hve file when a user performs certain actions such as running host-based applications, installation of new applications, or running portable applications from external devices. The results of experiments demonstrate that Amcache.hve file stores intriguing artifacts related to applications such as timestamps of creation and last modification of any ...


Table Of Contents Dec 2016

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Bloom Filters Optimized Wu-Manber For Intrusion Detection, Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, Babar Shah Dec 2016

Bloom Filters Optimized Wu-Manber For Intrusion Detection, Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, Babar Shah

Journal of Digital Forensics, Security and Law

With increasing number and severity of attacks, monitoring ingress and egress network traffic is becoming essential everyday task. Intrusion detection systems are the main tools for capturing and searching network traffic for potential harm. Signature-based intrusion detection systems are the most widely used, and they simply use a pattern matching algorithms to locate attack signatures in intercepted network traffic. Pattern matching algorithms are very expensive in terms of running time and memory usage, leaving intrusion detection systems unable to detect attacks in real-time. We propose a Bloom filters optimized Wu-Manber pattern matching algorithm to speed up intrusion detection. The Bloom ...


The Impact Of Sha-1 File Hash Collisions On Digital Forensic Imaging: A Follow-Up Experiment, Gary C. Kessler Dec 2016

The Impact Of Sha-1 File Hash Collisions On Digital Forensic Imaging: A Follow-Up Experiment, Gary C. Kessler

Journal of Digital Forensics, Security and Law

A previous paper described an experiment showing that Message Digest 5 (MD5) hash collisions of files have no impact on integrity verification in the forensic imaging process. This paper describes a similar experiment applied when two files have a Secure Hash Algorithm (SHA-1) collision.


A Survey Of Social Network Forensics, Umit Karabiyik, Muhammed Abdullah Canbaz, Ahmet Aksoy, Tayfun Tuna, Esra Akbas, Bilal Gonen, Ramazan S. Aygun Dec 2016

A Survey Of Social Network Forensics, Umit Karabiyik, Muhammed Abdullah Canbaz, Ahmet Aksoy, Tayfun Tuna, Esra Akbas, Bilal Gonen, Ramazan S. Aygun

Journal of Digital Forensics, Security and Law

Social networks in any form, specifically online social networks (OSNs), are becoming a part of our everyday life in this new millennium especially with the advanced and simple communication technologies through easily accessible devices such as smartphones and tablets. The data generated through the use of these technologies need to be analyzed for forensic purposes when criminal and terrorist activities are involved. In order to deal with the forensic implications of social networks, current research on both digital forensics and social networks need to be incorporated and understood. This will help digital forensics investigators to predict, detect and even prevent ...


The 2016 Analysis Of Information Remaining On Computer Hard Disks Offered For Sale On The Second Hand Market In The Uae, Thomas Martin, Andy Jones, Mohammed Alzaabi Dec 2016

The 2016 Analysis Of Information Remaining On Computer Hard Disks Offered For Sale On The Second Hand Market In The Uae, Thomas Martin, Andy Jones, Mohammed Alzaabi

Journal of Digital Forensics, Security and Law

This research describes our survey of data remaining on computer hard disks sold on the second hand market in the United Arab Emirates (UAE). This is a repetition of the first survey conducted in 2012 (Jones, Martin, & Alzaabi, 2012). Similar studies have been carried over the last ten years in the United Kingdom, Australia, USA, Germany and France: (Jones, Mee, Meyler, & Gooch, 2005), (Jones, Valli, Sutherland, & Thomas, 2006), (Jones, Valli, Dardick, & Sutherland, 2008), (Jones, Valli, Dardick, & Sutherland, 2009). This research was undertaken to gain insight into the volumes of data found on second-hand disks purchased in the UAE, as well ...


Contemporary Soviet Criminal Law: An Analysis Of The General Principles And Major Institutions Of Post-1958 Soviet Criminal Law, Chris Osakwe Dec 2016

Contemporary Soviet Criminal Law: An Analysis Of The General Principles And Major Institutions Of Post-1958 Soviet Criminal Law, Chris Osakwe

Georgia Journal of International & Comparative Law

No abstract provided.


In The Wake Of Broken Windows Policing How Aggressive Policing Contributed To East Harlem Residents Distrust Of Police, Stephanie Daniel, Nicole Lewis, Kalalea Kalalea Dec 2016

In The Wake Of Broken Windows Policing How Aggressive Policing Contributed To East Harlem Residents Distrust Of Police, Stephanie Daniel, Nicole Lewis, Kalalea Kalalea

Capstones

In 2015, the East Harlem neighborhood – specifically the 25th Precinct – had the highest rate of criminal court summonses amongst residential areas. At 145 summonses for every 1,000 residents, it was more than four times the citywide average, according to an analysis of data obtained from the NYPD.

Since 2010, summonses have declined as the NYPD moves towards a more community-based approach to policing. But the Broken Windows theory has left a lasting and often negative effect on the East Harlem community.

This past fall, CUNY reporters investigated how summonses have affected the relationship between East Harlem residents and the ...


A Duty To Document, Marc Kosciejew Dec 2016

A Duty To Document, Marc Kosciejew

Proceedings from the Document Academy

Access to information is a bedrock principle of contemporary democratic governments and their public agencies and entities. Access to information depends upon these public institutions to document their activities and decisions. When public institutions do not document their activities and decisions, citizens’ right of access is ultimately denied. Public accountability and trust, in addition to institutional memory and the historical record, are undermined without the creation of appropriate records. Establishing and enforcing a duty to document helps promote accountability, openness, transparency, good governance, and public trust in public institutions. A duty to document should therefore be a fundamental component of ...


Reformers Against The Clock, William Sloan Greenawalt Dec 2016

Reformers Against The Clock, William Sloan Greenawalt

The Catholic Lawyer

No abstract provided.


Effective Social Media Use By Law Enforcement Agencies: A Case Study Approach To Quantifying And Improving Efficacy And Developing Agency Best Practices, David T. Snively Dec 2016

Effective Social Media Use By Law Enforcement Agencies: A Case Study Approach To Quantifying And Improving Efficacy And Developing Agency Best Practices, David T. Snively

Master of Public Administration Practicums

In the wake of protests against law enforcement for an array of reasons, law enforcement officers and agencies have a responsibility to recognize and utilize the available mediums of communication with which they may best develop a connection to the communities they serve. Furthermore, law enforcement agencies must be informed that established, traditional methods of news dissemination – such as press conferences and printed articles – are now both ineffective and under-utilized, replaced in large part by social media live-time reports. For that reason, law enforcement agency executives must address both the responsibility to provide appropriately timed updates to critical incidents and ...


Policing Postsecondary Education: University Police Legitimacy And Fear Of Crime On Campus, Christina N. Barker Dec 2016

Policing Postsecondary Education: University Police Legitimacy And Fear Of Crime On Campus, Christina N. Barker

Electronic Theses and Dissertations

Assessing the perceptions that students have of the university police officers charged with ensuring student safety is important to maintaining the overall safety of the campus. The current study sought to assess the relationship between student perceptions of university police and the fear of crime felt by students while on campus. Data collection was conducted through a survey methodology using a convenient sample of students in which a self-report survey was sent to the university email addresses of all students enrolled in a southeastern university (n=260). Through the employment of a scale developed to assess the perceptions of university ...


Punishing Genocide: A Comparative Empirical Analysis Of Sentencing Laws And Practices At The International Criminal Tribunal For Rwanda (Ictr), Rwandan Domestic Courts, And Gacaca Courts, Barbora Hola, Hollie Nyseth Brehm Dec 2016

Punishing Genocide: A Comparative Empirical Analysis Of Sentencing Laws And Practices At The International Criminal Tribunal For Rwanda (Ictr), Rwandan Domestic Courts, And Gacaca Courts, Barbora Hola, Hollie Nyseth Brehm

Genocide Studies and Prevention: An International Journal

This article compares sentencing of those convicted of participation in the 1994 genocide in Rwanda. With over one million people facing trial, Rwanda constitutes the world’s most comprehensive case of criminal accountability after genocide and presents an important case study of punishing genocide. Criminal courts at three different levels— international, domestic, and local—sought justice in the aftermath of the violence. In order to compare punishment at each level, we analyze an unprecedented database of sentences given by the ICTR, the Rwandan domestic courts, and Rwanda’s Gacaca courts. The analysis demonstrates that sentencing varied across the three levels ...


The Winds Of Changes Shift: An Analyis Of Recent Growth In Bargaining Units And Representation Efforts In Higher Education, William A. Herbert Dec 2016

The Winds Of Changes Shift: An Analyis Of Recent Growth In Bargaining Units And Representation Efforts In Higher Education, William A. Herbert

Publications and Research

This article analyzes data accumulated during the first three quarters of 2016 regarding completed and pending questions of representation involving faculty and student employees in higher education. It is part of a larger and continuing National Center research project that tracks faculty and graduate student employee unionization growth and representation efforts at private and public institutions of higher learning since January 1, 2013. The data presented in this article demonstrates that the rate of newly certified units at private colleges and universities since January 1, 2016 far outpaces new units in the public sector. There has been a 25.9 ...


De L'Affaire Katanga Au Contrat Social Global: Un Regard Sur La Cour Pénale Internationale, Juan Branco Nov 2016

De L'Affaire Katanga Au Contrat Social Global: Un Regard Sur La Cour Pénale Internationale, Juan Branco

Juan Branco

No abstract provided.


Unsettled: How Climate Change Challenges A Foundation Of Our Legal System, And Adapting The Legal State, Victor B. Flatt Nov 2016

Unsettled: How Climate Change Challenges A Foundation Of Our Legal System, And Adapting The Legal State, Victor B. Flatt

BYU Law Review

One of the fundamental goals of law is to end disputes. This push to “settlement” is foundational and has historically worked to increase societal efficiency and justice by engendering legitimate expectations among the citizenry. However, the efficient nature of much legal finality, settlement and repose only exists against a background of evolution of the physical environment that is predictable and slowpaced. That background no longer exists. The alteration of the physical world, and thus, the background for our societal structure and decisions, is accelerating rapidly due to human-caused climate change. This creates a mismatch between the law’s tendency to ...


The Moroccan Jurist Al-Khamlīshī: Can A Woman Become A Legislator (Mujtahid)?, Nayel A. Badareen Nov 2016

The Moroccan Jurist Al-Khamlīshī: Can A Woman Become A Legislator (Mujtahid)?, Nayel A. Badareen

Journal of Islamic and Middle Eastern Multidisciplinary Studies

The idea of deducing legal rulings in Islamic law, or ijtihād, as well as the qualifications of the person who practices ijtihād, known as the mujtahid, has been a complex issue among Muslim ʿulamāʾ for centuries. Many Muslim ʿulamāʾ and Western scholars have maintained that the gate of ijtihād was closed. The title of mujtahid was therefore impossible to attain. The Moroccan intellectual al-Khamlīshī maintains that the strenuous conditions put forth by some of the Sunni jurists to qualify an individual to become a mujtahid actually contributed to the demise of ijtihād. These qualifications, according to al-Khamlīshī, were proven to ...


The Ostrich Instruction: Deliberate Ignorance As A Criminal Mens Rea, Ira P. Robbins Nov 2016

The Ostrich Instruction: Deliberate Ignorance As A Criminal Mens Rea, Ira P. Robbins

Ira P. Robbins

No abstract provided.


The Cry Of Wolfish In The Federal Courts: The Future Of Federal Judicial Intervention In Prison Administration, Ira P. Robbins Nov 2016

The Cry Of Wolfish In The Federal Courts: The Future Of Federal Judicial Intervention In Prison Administration, Ira P. Robbins

Ira P. Robbins

No abstract provided.


One Size Does Not Fit All: A Framework For Tailoring Intellectual Property Rights, Michael W. Carroll Nov 2016

One Size Does Not Fit All: A Framework For Tailoring Intellectual Property Rights, Michael W. Carroll

Michael W. Carroll

The United States and its trading partners have adopted cultural and innovation policies under which the government grants one-size-fits-all patents and copyrights to inventors and authors. On a global basis, the reasons for doing so vary, but in the United States granting intellectual property rights has been justified as the principal means of promoting innovation and cultural progress. Until recently, however, few have questioned the wisdom of using such blunt policy instruments to promote progress in a wide range of industries in which the economics of innovation varies considerably.

Provisionally accepting the assumptions of the traditional economic case for intellectual ...


Criminals Behind The Veil: Political Philosophy And Punishment, Chad Flanders Nov 2016

Criminals Behind The Veil: Political Philosophy And Punishment, Chad Flanders

Brigham Young University Journal of Public Law

No abstract provided.


Moral Competence And Brain Connectivity: A Resting-State Fmri Study, Wi Hoon Jung, Kristin Prehn, Zhuo Fang, Marc Korczykowski, Joseph W. Kable, Hengyi Rao, Diana C. Robertson Nov 2016

Moral Competence And Brain Connectivity: A Resting-State Fmri Study, Wi Hoon Jung, Kristin Prehn, Zhuo Fang, Marc Korczykowski, Joseph W. Kable, Hengyi Rao, Diana C. Robertson

Legal Studies and Business Ethics Papers

Moral competence (MC) refers to the ability to apply certain moral orientations in a consistent and differentiated manner when judging moral issues. People greatly differ in terms of MC, however, little is known about how these differences are implemented in the brain. To investigate this question, we used functional magnetic resonance imaging and examined resting-state functional connectivity (RSFC) in n = 31 individuals with MC scores in the highest 15% of the population and n = 33 individuals with MC scores in the lowest 15%, selected from a large sample of 730 Master of Business Administration (MBA) students. Compared to individuals with ...


Introduction, Tracy Mitrano Oct 2016

Introduction, Tracy Mitrano

Tracy Mitrano

No abstract provided.


How Mature Capitalism Turns Pollution Into Diamonds: Malagnogenesis And The Reverse-Engineering Of Harm Into Risk, Kevin P. Martyn Oct 2016

How Mature Capitalism Turns Pollution Into Diamonds: Malagnogenesis And The Reverse-Engineering Of Harm Into Risk, Kevin P. Martyn

Graduate Theses and Dissertations

In recent years, there has been a great deal of debate about the pervasiveness and persistence of neoliberal thinking. In the context of the post-2008 ‘great recession’ the resilience of neoliberalism is particularly confounding. To begin to unravel the ways in which neoliberalism is situated relative to risk, this study identifies an increasingly important neoliberal knowledge practice: malagnogenesis. Malagnogenesis is proposed herein as the production of ignorance that normalizes harm for and amongst marginalized populations. To shed light on the phenomena of malagnogenesis, this study investigated the history of leaded gasoline in the U.S. To that end, I followed ...


Designing Laboratories For Small Scale Digital Device Forensics, Richard P. Mislan, Tim Wedge Oct 2016

Designing Laboratories For Small Scale Digital Device Forensics, Richard P. Mislan, Tim Wedge

Annual ADFSL Conference on Digital Forensics, Security and Law

The ubiquity of small scale digital devices (SSDD), the public’s ever increasing societal dependence on SSDD, and the continual presence of SSDD at all types of crime scenes, including non-technical and violent crimes, demand a formalized curriculum for the education and training of future cyber forensic examiners. This paper presents the various SSDD forensics labs currently in use and under development for future use at the Purdue University Cyber Forensics Laboratory. The primary objective of each module is to provide specific real-world cases for the learning, comprehension, and understanding of hands-on investigative techniques and methodologies. The purpose of this ...


Network Forensic Investigation Of Internal Misuse/Crime In Saudi Arabia: A Hacking Case, Abdulrazaq Al-Murjan, Konstantinos Xynos Oct 2016

Network Forensic Investigation Of Internal Misuse/Crime In Saudi Arabia: A Hacking Case, Abdulrazaq Al-Murjan, Konstantinos Xynos

Annual ADFSL Conference on Digital Forensics, Security and Law

There are ad-hoc guidelines and a limited policy on computer incident response that does not include computer forensic preparation procedures (e.g. logging incidents). In addition, these guidelines do not consider the requirement of Islamic law for admissible evidence at an organisational level in Saudi Arabia. Network forensic investigation might breach the Saudi law if they follow ad-hoc or international digital forensic standards such as Association of Chief Police Officers (ACPO) guidelines. This might put the organisation in a costly situation when a malicious employee sues an Islamic court. This is because the law of Saudi Arabia is complying with ...


Paper Session Ii: Computer Forensics Field Triage Process Model, Marcus K. Rogers, James Goldman, Rick Mislan, Timothy Wedge, Steve Debrota Oct 2016

Paper Session Ii: Computer Forensics Field Triage Process Model, Marcus K. Rogers, James Goldman, Rick Mislan, Timothy Wedge, Steve Debrota

Annual ADFSL Conference on Digital Forensics, Security and Law

With the proliferation of digital based evidence, the need for the timely identification, analysis and interpretation of digital evidence is becoming more crucial. In many investigations critical information is required while at the scene or within a short period of time - measured in hours as opposed to days. The traditional cyber forensics approach of seizing a system(s)/media, transporting it to the lab, making a forensic image(s), and then searching the entire system for potential evidence, is no longer appropriate in some circumstances. In cases such as child abductions, pedophiles, missing or exploited persons, time is of the ...


Development Of A National Repository Of Digital Forensic Intelligence, Mark Weiser, David P. Biros, Greg Mosier Oct 2016

Development Of A National Repository Of Digital Forensic Intelligence, Mark Weiser, David P. Biros, Greg Mosier

Annual ADFSL Conference on Digital Forensics, Security and Law

Many people do all of their banking online, we and our children communicate with peers through computer systems, and there are many jobs that require near continuous interaction with computer systems. Criminals, however, are also “connected”, and our online interaction provides them a conduit into our information like never before. Our credit card numbers and other fiscal information are at risk, our children's personal information is exposed to the world, and our professional reputations are on the line.

The discipline of Digital Forensics in law enforcement agencies around the nation and world has grown to match the increased risk ...