Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Embry-Riddle Aeronautical University (44)
- Selected Works (19)
- University of Pennsylvania Carey Law School (15)
- SelectedWorks (14)
- University of San Diego (14)
-
- Northwestern Pritzker School of Law (5)
- Montclair State University (4)
- University at Buffalo School of Law (4)
- Brigham Young University Law School (3)
- Kennesaw State University (3)
- University of Nebraska - Lincoln (3)
- University of Nevada, Las Vegas (3)
- Washington University in St. Louis (3)
- Georgetown University Law Center (2)
- Liberty University (2)
- Maurer School of Law: Indiana University (2)
- Portland State University (2)
- San Jose State University (2)
- The University of Akron (2)
- Arizona Summit Law School (1)
- California Polytechnic State University, San Luis Obispo (1)
- Claremont Colleges (1)
- Columbia Law School (1)
- Cornell University Law School (1)
- Eastern Kentucky University (1)
- Molloy University (1)
- Rhode Island College (1)
- Salve Regina University (1)
- University of Michigan Law School (1)
- University of New Hampshire (1)
- Keyword
-
- Criminal law (8)
- Jurisprudence (8)
- Constitutional Law (5)
- Criminal Law and Procedure (5)
- Criminal justice (5)
-
- Death penalty (4)
- Digital forensics (4)
- Human rights (4)
- International law (4)
- Justice (4)
- Legal History (4)
- Arab Awakening (3)
- Arab Spring (3)
- Behavioral Law and Economics (3)
- Capital punishment (3)
- Constitutional law (3)
- Crime (3)
- Criminal Law (3)
- Culpability (3)
- Essays about the Arab Awakening (2011) (3)
- Gender (3)
- Governance and Politics in Islamic Societies (3)
- International Affairs (3)
- Judges (3)
- Law (3)
- Law and Society (3)
- Law and economics (3)
- Legal Education (3)
- Legal Theory (3)
- Legal theory (3)
- Publication
-
- Journal of Digital Forensics, Security and Law (28)
- Annual ADFSL Conference on Digital Forensics, Security and Law (16)
- All Faculty Scholarship (15)
- San Diego Law Review (14)
- Faculty Working Papers (5)
-
- Donald J. Kochan (4)
- Ahmed E SOUAIAIA (3)
- BYU Law Review (3)
- Journal Articles (3)
- Scholarship@WashULaw (3)
- Advance (Justice Studies) (2)
- Articles by Maurer Faculty (2)
- Criminology and Criminal Justice Senior Capstone Project (2)
- Daniel A Monroy C (2)
- David C. Brown (2)
- Department of Justice Studies Faculty Scholarship and Creative Works (2)
- Department of Political Science and Law Faculty Scholarship and Creative Works (2)
- Georgetown Law Faculty Publications and Other Works (2)
- Georgia Journal of Public Policy (2)
- Graduate Research Symposium (GCUA) (2010 - 2017) (2)
- Nebraska Transcript (2)
- Prof. Elizabeth Burleson (2)
- Senior Honors Theses (2)
- Akron Law Faculty Publications (1)
- Alec Stone Sweet (1)
- Alex Steel (1)
- Allison D Redlich (1)
- Andrés Fabián Henao-Castro (1)
- Articles (1)
- Bernard Sama (1)
- Publication Type
- File Type
Articles 31 - 60 of 158
Full-Text Articles in Law
Survey On Cloud Forensics And Critical Criteria For Cloud Forensic Capability: A Preliminary Analysis, Keyun Ruan, Ibrahim Baggili, Joe Carthy, Tahar Kechadi
Survey On Cloud Forensics And Critical Criteria For Cloud Forensic Capability: A Preliminary Analysis, Keyun Ruan, Ibrahim Baggili, Joe Carthy, Tahar Kechadi
Annual ADFSL Conference on Digital Forensics, Security and Law
In this paper we present the current results and analysis of the survey “Cloud forensics and critical criteria for cloud forensic capability” carried out towards digital forensic experts and practitioners. This survey was created in order to gain a better understanding on some of the key questions of the new field - cloud forensics - before further research and development. We aim to understand concepts such as its definition, the most challenging issues, most valuable research directions, and the critical criteria for cloud forensic capability.
Keywords: Cloud Forensics, Cloud Computing, Digital Forensics, Survey, Cloud Forensic Capability
Kindle Forensics: Acquisition & Analysis, Peter Hannay
Kindle Forensics: Acquisition & Analysis, Peter Hannay
Annual ADFSL Conference on Digital Forensics, Security and Law
The Amazon Kindle eBook reader supports a wide range of capabilities beyond reading books. This functionality includes an inbuilt cellular data connection known as Whispernet. The Kindle provides web browsing, an application framework, eBook delivery and other services over this connection. The historic data left by user interaction with this device may be of forensic interest. Analysis of the Amazon Kindle device has resulted in a method to reliably extract and interpret data from these devices in a forensically complete manner.
Keywords: forensics, digital forensics, kindle, mobile, embedded, ebook, ereader
Aacsb‐Accredited Schools’ Adoption Of Information Security Curriculum, Linda Lau, Cheryl Davis
Aacsb‐Accredited Schools’ Adoption Of Information Security Curriculum, Linda Lau, Cheryl Davis
Annual ADFSL Conference on Digital Forensics, Security and Law
The need to professionally and successfully conduct computer forensic investigations of incidents has never been greater. This has launched an increasing demand for a skilled computer security workforce (Locasto, et al., 2011). This paper examines the extent to which AACSB-accredited universities located in Virginia, Maryland and Washington, D.C. are working towards providing courses that will meet this demand. The authors conduct an online research of the information security courses and programs offered by the 27 AACSB-accredited business schools in the selected area.
The preliminary investigation revealed that eight of the 27 participating universities did not offer any courses in cybersecurity, …
Digital Forensics Investigation In A Collegiate Environment, Robert E. Johnston
Digital Forensics Investigation In A Collegiate Environment, Robert E. Johnston
Annual ADFSL Conference on Digital Forensics, Security and Law
Creating, building, managing a cost effective digital forensics lab including a team of qualified examiners can be a challenge for colleges [1] with multiple campuses in multiple towns, counties and states. Leaving such examination responsibilities to each of the campuses results in not only disparity in the results but more than likely excessive duplication of efforts as well as the potential for compromise of evidence. Centralizing the forensic efforts results in a team that is not subject to the political pressures of a campus and virtually eliminates the possibility of examiner favoritism. Learn what it takes to create a cost …
Backtrack In The Outback - A Preliminary Report On Cyber Security Evaluation Of Organisations In Western Australia, Craig Valli, Andrew Woodward, Peter Hannay
Backtrack In The Outback - A Preliminary Report On Cyber Security Evaluation Of Organisations In Western Australia, Craig Valli, Andrew Woodward, Peter Hannay
Annual ADFSL Conference on Digital Forensics, Security and Law
The authors were involved in extensive vulnerability assessment and penetration testing of over 15 large organisations across various industry sectors in the Perth CBD. The actual live testing involved a team of five people for approximately a four week period, and was black box testing. The scanning consisted of running network and web vulnerability tools, and in a few cases, exploiting vulnerability to establish validity of the tools. The tools were run in aggressive mode with no attempt made to deceive or avoid detection by IDS/IPS or firewalls. The aim of the testing was to determine firstly whether these organisations …
Creating Realistic Corpora For Security And Forensic Education, Kam Woods, Christopher A. Lee, Simson Garfinkel, David Dittrich, Adam Russell, Kris Kearton
Creating Realistic Corpora For Security And Forensic Education, Kam Woods, Christopher A. Lee, Simson Garfinkel, David Dittrich, Adam Russell, Kris Kearton
Annual ADFSL Conference on Digital Forensics, Security and Law
We present work on the design, implementation, distribution, and use of realistic forensic datasets to support digital forensics and security education. We describe in particular the “M57-Patents” scenario, a multi-modal corpus consisting of hard drive images, RAM images, network captures, and images from other devices typically found in forensics investigations such as USB drives and cellphones. Corpus creation has been performed as part of a scripted scenario; subsequently it is less “noisy” than real-world data but retains the complexity necessary to support a wide variety of forensic education activities. Realistic forensic corpora allow direct comparison of approaches and tools across …
Developing A Forensic Continuous Audit Model, Grover S. Kearns, Katherine J. Barker
Developing A Forensic Continuous Audit Model, Grover S. Kearns, Katherine J. Barker
Annual ADFSL Conference on Digital Forensics, Security and Law
Despite increased attention to internal controls and risk assessment, traditional audit approaches do not seem to be highly effective in uncovering the majority of frauds. Less than 20 percent of all occupational frauds are uncovered by auditors. Forensic accounting has recognized the need for automated approaches to fraud analysis yet research has not examined the benefits of forensic continuous auditing as a method to detect and deter corporate fraud. The purpose of this paper is to show how such an approach is possible. A model is presented that supports the acceptance of forensic continuous auditing by auditors and management as …
Development Of A Distributed Print‐Out Monitoring System For Efficient Forensic Investigation, Satoshi Kai, Tetsutaro Uehara
Development Of A Distributed Print‐Out Monitoring System For Efficient Forensic Investigation, Satoshi Kai, Tetsutaro Uehara
Annual ADFSL Conference on Digital Forensics, Security and Law
If information leakage occurs, an investigator is instructed to specify what documents were leaked and who leaked them. In the present work, a distributed print-out monitoring system—which consists of a virtual printer driver and print-out policy/log management servers—was developed. For easily matching the discovered (i.e., leaked) paper document with the print-out log, the virtual printer driver acquires full-text of printed-out documents by DDI hooking technique to check the content, transforms a spool file to a picture file and creates both a thumbnail and text log for forensic investigation afterwards. The log size is as only about 0.04 times bigger than …
Mac Os X Forensics: Password Discovery, David Primeaux, Robert Dahlberg, Kamnab Keo, Stephen Larson, B. Pennell, K. Sherman
Mac Os X Forensics: Password Discovery, David Primeaux, Robert Dahlberg, Kamnab Keo, Stephen Larson, B. Pennell, K. Sherman
Annual ADFSL Conference on Digital Forensics, Security and Law
OS X provides a password-rich environment in which passwords protect OS X resources and perhaps many other resources accessed through OS X. Every password an investigator discovers in an OS X environment has the potential for use in discovering other such passwords, and any discovered passwords may also be useful in other aspects of an investigation, not directly related to the OS X environment. This research advises the use of multiple attack vectors in approaching the password problem in an OS X system, including the more generally applicable non-OS X-specific techniques such as social engineering or well-known password cracking techniques …
Software Piracy Forensics: Impact And Implications Of Post‐Piracy Modifications, Vinod Bhattathiripad, S. Santhosh Baboo
Software Piracy Forensics: Impact And Implications Of Post‐Piracy Modifications, Vinod Bhattathiripad, S. Santhosh Baboo
Annual ADFSL Conference on Digital Forensics, Security and Law
Piracy is potentially possible at any stage of the lifetime of the software. In a post-piracy situation, however, the growth of the respective versions of the software (both the original and pirated) is expected to be in different directions as a result of expectedly different implementation strategies. This paper shows how such post-piracy modifications are of special interest to a cyber crime expert investigating software piracy and suggests that the present software piracy forensic (or software copyright infringement investigation) approaches require amendments to take in such modifications. For this purpose, the paper also presents a format that is jargon-free, so …
Understanding Issues In Cloud Forensics: Two Hypothetical Case Studies, Josiah Dykstra, Alan T. Sherman
Understanding Issues In Cloud Forensics: Two Hypothetical Case Studies, Josiah Dykstra, Alan T. Sherman
Annual ADFSL Conference on Digital Forensics, Security and Law
The inevitable vulnerabilities and criminal targeting of cloud environments demand an understanding of how digital forensic investigations of the cloud can be accomplished. We present two hypothetical case studies of cloud crimes; child pornography being hosted in the cloud, and a compromised cloudbased website. Our cases highlight shortcomings of current forensic practices and laws. We describe significant challenges with cloud forensics, including forensic acquisition, evidence preservation and chain of custody, and open problems for continued research.
Keywords: Cloud computing, cloud forensics, digital forensics, case studies
A Practitioners Guide To The Forensic Investigation Of Xbox 360 Gaming Consoles, Ashley L. Podhradsky, Rob D’Ovidio, Cindy Casey
A Practitioners Guide To The Forensic Investigation Of Xbox 360 Gaming Consoles, Ashley L. Podhradsky, Rob D’Ovidio, Cindy Casey
Annual ADFSL Conference on Digital Forensics, Security and Law
Given the ubiquitous nature of computing, individuals now have nearly 24-7 access to the internet. People are not just going online through traditional means with a PC anymore, they are now frequently using nontraditional devices such as cell phones, smart phones, and gaming consoles. Given the increased use of gaming consoles for online access, there is also an increased use of gaming consoles to commit criminal activity. The digital forensic community has been tasked with creating new approaches for forensically analyzing gaming consoles. In this research paper the authors demonstrate different tools, both commercial and open source, available to forensically …
Sampling: Making Electronic Discovery More Cost Effective, Milton Luoma, Vicki Luoma
Sampling: Making Electronic Discovery More Cost Effective, Milton Luoma, Vicki Luoma
Annual ADFSL Conference on Digital Forensics, Security and Law
With the huge volumes of electronic data subject to discovery in virtually every instance of litigation, time and costs of conducting discovery have become exceedingly important when litigants plan their discovery strategies. Rather than incurring the costs of having lawyers review every document produced in response to a discovery request in search of relevant evidence, a cost effective strategy for document review planning is to use statistical sampling of the database of documents to determine the likelihood of finding relevant evidence by reviewing additional documents. This paper reviews and discusses how sampling can be used to make document review more …
Digital Forensics And The Law, Karon N. Murff, Hugh E. Gardenier, Martha L. Gardenier
Digital Forensics And The Law, Karon N. Murff, Hugh E. Gardenier, Martha L. Gardenier
Annual ADFSL Conference on Digital Forensics, Security and Law
As computers and digital devices become more entrenched in our way of life, they become tools for both good and nefarious purposes. When the digital world collides with the legal world, a vast chasm is created. This paper will reflect how the legal community is failing to meet its obligation to provide adequate representation due to a lack of education about digital (computer) forensics. Whether in a civil litigation setting or a criminal setting, attorneys, prosecutors and judges have inadequate knowledge when it comes to the important questions they need to ask regarding digital evidence. Reliance on expert witnesses is …
Exploring The Relationship Between Drug And Alcohol Treatment Facilities And Violent And Property Crime: A Socioeconomic Contingent Relationship, Christopher Salvatore, Travis A. Taniguchi
Exploring The Relationship Between Drug And Alcohol Treatment Facilities And Violent And Property Crime: A Socioeconomic Contingent Relationship, Christopher Salvatore, Travis A. Taniguchi
Department of Justice Studies Faculty Scholarship and Creative Works
Siting of drug and alcohol treatment facilities is often met with negative reactions because of the assumption that these facilities increase crime by attracting drug users (and possibly dealers) to an area. This assumption, however, rests on weak empirical footings that have not been subjected to strong empirical analyses. Using census block groups from Philadelphia, PA, it was found that the criminogenic impact of treatment facilities in and near a neighborhood on its violent and property crime rates may be contingent on the socioeconomic status (SES) of the neighborhood. Paying attention to both the density and proximity of facilities in …
Más Vale Malo Conocido Que…: El Efecto Dotación Y Los Pronósticos Teóricos Del Teorema De Coase, Daniel Monroy
Más Vale Malo Conocido Que…: El Efecto Dotación Y Los Pronósticos Teóricos Del Teorema De Coase, Daniel Monroy
Daniel A Monroy C
Some studies of the "endowment effect" in behavioral economics have criticized the theoretical prediction of the Coase Theorem even in its most basic formulation. This document describes the evidence of the existence of this "anomaly" in individual decision-making in various contexts in order to determine the possible general implications of this effect in the economic analysis itself especially as an explanation for the sometimes, insuperable gap between the willingness to accept for giving a right and the correlative willingness to pay to get it, also the paper describes a contradiction with the assumption of reversibility of preferences at any dot …
Obama's Failed Attempt To Close Gitmo: Why Executive Orders Can't Bring About Systemic Change, Erin B. Corcoran
Obama's Failed Attempt To Close Gitmo: Why Executive Orders Can't Bring About Systemic Change, Erin B. Corcoran
Law Faculty Scholarship
No abstract provided.
Construing The Outer Limits Of Sentencing Authority: A Proposed Bright-Line Rule For Noncapital Proportionality Review, Kevin White
BYU Law Review
No abstract provided.
Contested Legality And The Insecurity Of Status: Some Snapshots From A Decade Of Refugee Law, Donald Galloway
Contested Legality And The Insecurity Of Status: Some Snapshots From A Decade Of Refugee Law, Donald Galloway
Western Migration Conference Series
Bio:
Donald Galloway is a Professor of Law at the University of Victoria, British Columbia. He specializes in Refugee Law, Citizenship Law and Immigration Law. He was the founding President of the Canadian Association of Refugee and Forced Migration Studies (CARFMS) and is a former member of the Immigration and Refugee Board.
Reviewing Racism And The Right To Marry: An Analysis Of Loving V. Virginia, Kathryn L. Jordan
Reviewing Racism And The Right To Marry: An Analysis Of Loving V. Virginia, Kathryn L. Jordan
Senior Honors Theses
Prior to the 1967 United States Supreme Court case of Loving v. Virginia, many states had laws that banned the intermarriage of whites with black or other minorities. Since then, the number of interracial marriages has increased and the attitudes of society have shifted. This thesis uses Loving as basis to explore the ways in which societal views have changed since the overruling of the anti-miscegenation statutes. It first discusses the culture in America before Loving and then, explains the details of the Loving case. This is then followed by a synopsis of how the culture changed after Loving. After …
Facebook And The Police: Communication In The Social Networking Era, Mari Sakiyama, Deborah K. Shaffer, Joel D. Lieberman
Facebook And The Police: Communication In The Social Networking Era, Mari Sakiyama, Deborah K. Shaffer, Joel D. Lieberman
Graduate Research Symposium (GCUA) (2010 - 2017)
An increasing number of police departments are using Facebook to communicate with the public. As with any emerging communications technology, there is considerable variation in the usage of this medium. This study reports the results of a content analysis designed to determine how police departments are using Facebook.
Driving Forces: Police Fatalities, Carol Servino
Driving Forces: Police Fatalities, Carol Servino
Graduate Research Symposium (GCUA) (2010 - 2017)
Law enforcement is an inherently risky occupation. The number of traffic-related fatalities for law enforcement officers in the U.S. during the past 13 years has been increasing; however, the number of fatalities for the general population in motor vehicle traffic incidents declined during the same time period.
The federal government reports that federal motor vehicle safety standards aswell as behavioral and vehicle safety programs implemented by state and local law-enforcement agencies contributed to the downward trend for the general public.
What accounts for the pattern and problem with police driving-related deaths?
Determinants Of Domestic Minor Sex Trafficking And The Urgent Need For A Global Cultural Shift, Karen M. Hoover
Determinants Of Domestic Minor Sex Trafficking And The Urgent Need For A Global Cultural Shift, Karen M. Hoover
Senior Honors Theses
In the United States, an overtly selfish and sexual culture contributes to the spread of human trafficking, thereby requiring a complete culture shift in order to diminish this modern day slavery initiated by the aberrant culture. Sex trafficking of minors in the United States encompasses a variety of factors that facilitate the bondage and brutal enslavement of American children. These children are bought and sold hundreds of times, with no regard for their personal well-being. Major factors such as demand, vulnerability, and America’s induced culture of sex serve to increase the environment that trap children and youth in commercial sexual …
Should Primates Have Legal Rights?, Hannah Barten, Zhimin Chen
Should Primates Have Legal Rights?, Hannah Barten, Zhimin Chen
Festival of Communities: UG Symposium (Posters)
A primate having legal rights is a controversial topic these days. Many other countries around the world support the idea of great apes having legal rights, because we for one are one of the five great primates. Others do not support this trending topic as much as others. These types of people believe that great apes such as chimpanzees are superb testing animals for medical purposes, because of the fact that they are closely related to mankind. Organizations such as Great Ape Protection, work towards protecting the rights of these great apes since they cannot speak for themselves. In many …
For The Love Of The Case File, Christine P. Bartholomew
For The Love Of The Case File, Christine P. Bartholomew
Other Scholarship
No abstract provided.
Advance, Spring 2011, San Jose State University, Department Of Justice Studies
Advance, Spring 2011, San Jose State University, Department Of Justice Studies
Advance (Justice Studies)
News from the San Jose State University Record Clearance Project
The Nebraska Transcript 44:1, Spring 2011
The Nebraska Transcript 44:1, Spring 2011
Nebraska Transcript
Dean’s Message 2
Faculty Update Profile: Alan Frank 4
Mexico’s Criminal Justice Transformation 6
Faculty Notes 8
Network Neutrality 14
Lepard Leads Human Rights Project 16
Blankley’s Passion for ADR 17
Burkstrand-Reid’s Trust to Teach 18
Feature: Dean Susan Poser 19
Around the College Brummond’s New Role 22
Kluver Leads Admissions Efforts 23
Our Future in the Big Ten: Admissions 24
Job Market’s Impact on CSO 26
Evolution of Technology 28
Student Accolades 32
2010 Family Traditions Ceremony 34
Hitler’s Court 36
Recent Facility Renovations 37
Our Alumni Eilers: A Global Career 38
Nearhood Admissions Office 39
Winter Scholarship 40 …
Mental Disorder And Criminal Law, Stephen J. Morse
Mental Disorder And Criminal Law, Stephen J. Morse
All Faculty Scholarship
Mental disorder among criminal defendants affects every stage of the criminal justice process, from investigational issues to competence to be executed. As in all other areas of mental health law, at least some people with mental disorders, are treated specially. The underlying thesis of this Article is that people with mental disorder should, as far as is practicable and consistent with justice, be treated just like everyone else. In some areas, the law is relatively sensible and just. In others, too often the opposite is true and the laws sweep too broadly. I believe, however, that special rules to deal …
The Mandatory Death Penalty And A Sparsely Worded Constitution, Jack Tsen-Ta Lee
The Mandatory Death Penalty And A Sparsely Worded Constitution, Jack Tsen-Ta Lee
Jack Tsen-Ta LEE
It was not unexpected that the Singapore Court of Appeal would reaffirm the constitutionality of the mandatory death penalty for certain forms of drug trafficking in Yong Vui Kong v Public Prosecutor [2010] 3 S.L.R 489. ... The appellant made submissions based on Articles 9(1) and 12(1) of the Constitution, which respectively guarantee rights to life and personal liberty, and to equality before the law and equal protection of the law. This note examines aspects of the Article 9(1) arguments.
"Learning" Research And Legal Education: A Brief Overview And Selected Bibliographical Survey, Donald J. Kochan