Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Embry-Riddle Aeronautical University (65)
- University of Colorado Law School (54)
- University of Tennessee, Knoxville (32)
- William & Mary Law School (16)
- Selected Works (11)
-
- California State University, Monterey Bay (10)
- University of Pennsylvania Carey Law School (5)
- Maurer School of Law: Indiana University (4)
- Florida A&M University College of Law (3)
- Santa Clara University (3)
- Kennesaw State University (2)
- Purdue University (2)
- SIT Graduate Institute/SIT Study Abroad (2)
- Salve Regina University (2)
- University of Pittsburgh School of Law (2)
- Brigham Young University Law School (1)
- Claremont Colleges (1)
- DePauw University (1)
- Duke Law (1)
- Emory University School of Law (1)
- Kansas State University Libraries (1)
- Roger Williams University (1)
- SJ Quinney College of Law, University of Utah (1)
- Singapore Management University (1)
- St. Mary's University (1)
- Stephen F. Austin State University (1)
- Texas Southern University (1)
- Union College (1)
- University of Georgia School of Law (1)
- University of Kentucky (1)
- Keyword
-
- Australia (14)
- California (13)
- Groundwater (11)
- New Mexico (10)
- Arizona (9)
-
- Water rights (9)
- Agriculture (8)
- Irrigation (8)
- New South Wales Aboriginal Land Council (7)
- Recreation (7)
- United States (7)
- Water supply (7)
- Colorado (6)
- Environment (6)
- Implementation (6)
- Intellectual property (6)
- New South Wales (6)
- Water quality (6)
- Aboriginal people (5)
- Climate change (5)
- Colorado River Basin (5)
- Cwp (5)
- Digital forensics (5)
- Murray-Darling Basin Authority (5)
- NSWALC (5)
- NWI (5)
- Oregon (5)
- Privacy (5)
- South Australia (5)
- Sustainability (5)
- Publication
-
- Journal of Digital Forensics, Security and Law (43)
- International Journal of Nuclear Security (32)
- Coping with Water Scarcity in River Basins Worldwide: Lessons Learned from Shared Experiences (Martz Summer Conference, June 9-10) (25)
- Annual ADFSL Conference on Digital Forensics, Security and Law (21)
- Indigenous Water Justice Symposium (June 6) (12)
-
- Books, Reports, and Studies (10)
- William & Mary Environmental Law and Policy Review (9)
- Tracy Mitrano (6)
- State and Federal Documents Relating to Monterey and San Luis Obispo Counties (5)
- Virginia Coastal Policy Center (5)
- All Faculty Scholarship (4)
- Individual Ranchos in Monterey and SLO Counties (4)
- Articles by Maurer Faculty (3)
- Holly Doremus (3)
- Santa Clara Magazine (3)
- Book Chapters (2)
- FLPMA Turns 40 (October 21) (2)
- Getches-Wilkinson Center for Natural Resources, Energy, and the Environment Newsletter (2013-) (2)
- Independent Study Project (ISP) Collection (2)
- KSU Proceedings on Cybersecurity Education, Research and Practice (2)
- Virginia Coastal Policy Center Annual Conference (2)
- Winter, Wilderness, and Climate--Threats and Solutions (October 12) (2)
- A Celebration of the Work of Charles Wilkinson (Martz Winter Symposium, March 10-11) (1)
- American Period Maps (1)
- Andrew Chin (1)
- BYU Law Review (1)
- Biostatistics Faculty Publications (1)
- Erik Edward Nordman (1)
- Faculty Articles (1)
- Faculty Scholarship (1)
- Publication Type
- File Type
Articles 211 - 232 of 232
Full-Text Articles in Law
The Amplified Need For Supreme Court Guidance On Student Speech Rights In The Digital Age, William Calve
The Amplified Need For Supreme Court Guidance On Student Speech Rights In The Digital Age, William Calve
St. Mary's Law Journal
Abstract forthcoming.
Wireless Network Neutrality: Technological Challenges And Policy Implications, Christopher S. Yoo
Wireless Network Neutrality: Technological Challenges And Policy Implications, Christopher S. Yoo
All Faculty Scholarship
One key aspect of the debate over network neutrality has been whether and how network neutrality should apply to wireless networks. The existing commentary has focused on the economics of wireless network neutrality, but to date a detailed analysis of how the technical aspects of wireless networks affect the implementation of network neutrality has yet to appear in the literature. As an initial matter, bad handoffs, local congestion, and the physics of wave propagation make wireless broadband networks significantly less reliable than fixed broadband networks. These technical differences require the network to manage dropped packets and congestion in a way …
The Other Side Of Garcia:The Right Of Publicity And Copyright Preemption, Jennifer E. Rothman
The Other Side Of Garcia:The Right Of Publicity And Copyright Preemption, Jennifer E. Rothman
All Faculty Scholarship
This essay is adapted from a talk that I gave on October 2, 2015 at Columbia Law School’s annual Kernochan Center Symposium. The all-day conference focused on Copyright Outside the Box. The essay considers the aftermath of Garcia v. Google, Inc., and the Ninth Circuit’s suggestion in that case that Garcia might have a right of publicity claim against the filmmakers, even though her copyright claim failed.
The essay provides a partial update of my prior work, Copyright Preemption and the Right of Publicity, 36 U.C. Davis L. Rev. 199 (2002), and suggests that despite numerous cases over …
Evidential Reasoning For Forensic Readiness, Yi-Ching Liao, Hanno Langweg
Evidential Reasoning For Forensic Readiness, Yi-Ching Liao, Hanno Langweg
Journal of Digital Forensics, Security and Law
To learn from the past, we analyse 1,088 "computer as a target" judgements for evidential reasoning by extracting four case elements: decision, intent, fact, and evidence. Analysing the decision element is essential for studying the scale of sentence severity for cross-jurisdictional comparisons. Examining the intent element can facilitate future risk assessment. Analysing the fact element can enhance an organization's capability of analysing criminal activities for future offender profiling. Examining the evidence used against a defendant from previous judgements can facilitate the preparation of evidence for upcoming legal disclosure. Follow the concepts of argumentation diagrams, we develop an automatic judgement summarizing …
Low Budget Forensic Drive Imaging Using Arm Based Single Board Computers, Eric Olson, Narasimha Shashidhar
Low Budget Forensic Drive Imaging Using Arm Based Single Board Computers, Eric Olson, Narasimha Shashidhar
Journal of Digital Forensics, Security and Law
Traditional forensic analysis of hard disks and external media typically involves a powered down machine and “dead analysis” of these devices. Forensic acquisition of hard drives and external media has traditionally been by one of several means: standalone forensic duplicator; using a hardware write-blocker or dock attached to a laptop, computer, workstation, etc., forensic operating systems that live boot from a USB, CD/DVD or virtual machines with preinstalled operating systems. Standalone forensics acquisition and imaging devices generally cost thousands of dollars. In this paper, we propose the use of single board computers as forensic imaging devices. Single board computers can …
Digital Forensics In Law Enforcement: A Needs Based Analysis Of Indiana Agencies, Teri A. Cummins Flory
Digital Forensics In Law Enforcement: A Needs Based Analysis Of Indiana Agencies, Teri A. Cummins Flory
Journal of Digital Forensics, Security and Law
Cyber crime is a growing problem, with the impact to society increasing exponentially, but the ability of local law enforcement agencies to investigate and successfully prosecute criminals for these crimes is unclear. Many national needs assessments have previously been conducted, and all indicated that state and local law enforcement did not have the training, tools, or staff to effectively conduct digital investigations, but very few have been completed recently. This study provided a current and localized assessment of the ability of Indiana law enforcement agencies to effectively investigate crimes involving digital evidence, the availability of training for both law enforcement …
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Exploring Deviant Hacker Networks (Dhm) On Social Media Platforms, Samer Al-Khateeb, Kevin J. Conlan, Nitin Agarwal, Ibrahim Baggili, Frank Breitinger
Exploring Deviant Hacker Networks (Dhm) On Social Media Platforms, Samer Al-Khateeb, Kevin J. Conlan, Nitin Agarwal, Ibrahim Baggili, Frank Breitinger
Journal of Digital Forensics, Security and Law
Online Social Networks (OSNs) have grown exponentially over the past decade. The initial use of social media for benign purposes (e.g., to socialize with friends, browse pictures and photographs, and communicate with family members overseas) has now transitioned to include malicious activities (e.g., cybercrime, cyberterrorism, and cyberwarfare). These nefarious uses of OSNs poses a significant threat to society, and thus requires research attention. In this exploratory work, we study activities of one deviant groups: hacker groups on social media, which we term Deviant Hacker Networks (DHN). We investigated the connection between different DHNs on Twitter: how they are connected, identified …
Log Analysis Using Temporal Logic And Reconstruction Approach: Web Server Case, Murat Gunestas, Zeki Bilgin
Log Analysis Using Temporal Logic And Reconstruction Approach: Web Server Case, Murat Gunestas, Zeki Bilgin
Journal of Digital Forensics, Security and Law
We present a post-mortem log analysis method based on Temporal Logic (TL), Event Processing Language (EPL), and reconstruction approach. After showing that the proposed method could be adapted to any misuse event or attack, we specifically investigate the case of web server misuses. To this end, we examine 5 different misuses on Wordpress web servers, and generate corresponding log files of these attacks for forensic analysis. Then we establish attack patterns and formalize them by means of a special case of temporal logic, i.e. many sorted first order metric temporal logic (MSFOMTL). Later on, we implement these attack patterns in …
Bytewise Approximate Matching: The Good, The Bad, And The Unknown, Vikram S. Harichandran, Frank Breitinger, Ibrahim Baggili
Bytewise Approximate Matching: The Good, The Bad, And The Unknown, Vikram S. Harichandran, Frank Breitinger, Ibrahim Baggili
Journal of Digital Forensics, Security and Law
Hash functions are established and well-known in digital forensics, where they are commonly used for proving integrity and file identification (i.e., hash all files on a seized device and compare the fingerprints against a reference database). However, with respect to the latter operation, an active adversary can easily overcome this approach because traditional hashes are designed to be sensitive to altering an input; output will significantly change if a single bit is flipped. Therefore, researchers developed approximate matching, which is a rather new, less prominent area but was conceived as a more robust counterpart to traditional hashing. Since the conception …
On Efficiency Of Distributed Password Recovery, Radek Hranický, Martin Holkovič, Petr Matoušek
On Efficiency Of Distributed Password Recovery, Radek Hranický, Martin Holkovič, Petr Matoušek
Journal of Digital Forensics, Security and Law
One of the major challenges in digital forensics today is data encryption. Due to the leaked information about unlawful sniffing, many users decided to protect their data by encryption. In case of criminal activities, forensic experts are challenged how to decipher suspect's data that are subject to investigation. A common method how to overcome password-based protection is a brute force password recovery using GPU-accelerated hardware. This approach seems to be expensive. This paper presents an alternative approach using task distribution based on BOINC platform. The cost, time and energy efficiency of this approach is discussed and compared to the GPU-based …
Towards Syntactic Approximate Matching - A Pre-Processing Experiment, Doowon Jeong, Frank Breitinger, Hari Kang, Sangjin Lee
Towards Syntactic Approximate Matching - A Pre-Processing Experiment, Doowon Jeong, Frank Breitinger, Hari Kang, Sangjin Lee
Journal of Digital Forensics, Security and Law
Over the past few years the popularity of approximate matching algorithms (a.k.a. fuzzy hashing) has increased. Especially within the area of bytewise approximate matching, several algorithms were published, tested and improved. It has been shown that these algorithms are powerful, however they are sometimes too precise for real world investigations. That is, even very small commonalities (e.g., in the header of a le) can cause a match. While this is a desired property, it may also lead to unwanted results. In this paper we show that by using simple pre-processing, we signicantly can in uence the outcome. Although our test …
Electronic Voting Service Using Block-Chain, Kibin Lee, Joshua I. James, Tekachew G. Ejeta, Hyoung J. Kim
Electronic Voting Service Using Block-Chain, Kibin Lee, Joshua I. James, Tekachew G. Ejeta, Hyoung J. Kim
Journal of Digital Forensics, Security and Law
Cryptocurrency, and its underlying technologies, has been gaining popularity for transaction management beyond financial transactions. Transaction information is maintained in the block-chain, which can be used to audit the integrity of the transaction. The focus on this paper is the potential availability of block-chain technology of other transactional uses. Block-chain is one of the most stable open ledgers that preserves transaction information, and is difficult to forge. Since the information stored in block-chain is not related to personally identify information, it has the characteristics of anonymity. Also, the block-chain allows for transparent transaction verification since all information in the block-chain …
Countering Noise-Based Splicing Detection Using Noise Density Transfer, Thibault Julliand, Vincent Nozick, Hugues Talbot
Countering Noise-Based Splicing Detection Using Noise Density Transfer, Thibault Julliand, Vincent Nozick, Hugues Talbot
Journal of Digital Forensics, Security and Law
Image splicing is a common and widespread type of manipulation, which is defined as pasting a portion of an image onto a second image. Several forensic methods have been developed to detect splicing, using various image properties. Some of these methods exploit the noise statistics of the image to try and find discrepancies. In this paper, we propose a new counter-forensic approach to eliminate the noise differences that can appear in a spliced image. This approach can also be used when creating computer graphics images, in order to endow them with a realistic noise. This is performed by changing the …
An Automated Approach For Digital Forensic Analysis Of Heterogeneous Big Data, Hussam Mohammed, Nathan Clarke, Fudong Li
An Automated Approach For Digital Forensic Analysis Of Heterogeneous Big Data, Hussam Mohammed, Nathan Clarke, Fudong Li
Journal of Digital Forensics, Security and Law
The major challenges with big data examination and analysis are volume, complex interdependence across content, and heterogeneity. The examination and analysis phases are considered essential to a digital forensics process. However, traditional techniques for the forensic investigation use one or more forensic tools to examine and analyse each resource. In addition, when multiple resources are included in one case, there is an inability to cross-correlate findings which often leads to inefficiencies in processing and identifying evidence. Furthermore, most current forensics tools cannot cope with large volumes of data. This paper develops a novel framework for digital forensic analysis of heterogeneous …
Making Sense Of Email Addresses On Drives, Neil C. Rowe, Riqui Schwamm, Michael R. Mccarrin, Ralucca Gera
Making Sense Of Email Addresses On Drives, Neil C. Rowe, Riqui Schwamm, Michael R. Mccarrin, Ralucca Gera
Journal of Digital Forensics, Security and Law
Drives found during investigations often have useful information in the form of email addresses which can be acquired by search in the raw drive data independent of the file system. Using this data we can build a picture of the social networks that a drive owner participated in, even perhaps better than investigating their online profiles maintained by social-networking services because drives contain much data that users have not approved for public display. However, many addresses found on drives are not forensically interesting, such as sales and support links. We developed a program to filter these out using a Naïve …
Verification Of Recovered Digital Evidence On The Amazon Kindle, Marcus Thompson, Raymond Hansen
Verification Of Recovered Digital Evidence On The Amazon Kindle, Marcus Thompson, Raymond Hansen
Journal of Digital Forensics, Security and Law
The Amazon Kindle is a popular e-book reader. This popularity will lead criminals to use the Kindle as an accessory to their crime. Very few Kindle publications in the digital forensics domain exist at the time of this writing. Various blogs on the Internet currently provide some of the foundation for Kindle forensics. For this research each fifth generation Kindle was populated with various types of files a typical user may introduce using one method, the USB interface. The Kindle was forensically imaged with AccessData’s Forensic Toolkit Imager before and after each Kindle was populated. Each file was deleted through …
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Understanding Access To Things: A Knowledge Commons Perspective, Michael J. Madison
Understanding Access To Things: A Knowledge Commons Perspective, Michael J. Madison
Book Chapters
This chapter explores the related ideas of access to knowledge resources and shared governance of those resources, often known as commons. Knowledge resources consist of many types and forms. Some are tangible, and some are intangible. Some are singular; some are reproduced in copies. Some are singular or unique; some are collected or pooled. Some are viewed, used, or consumed only by a single person; for some resources, collective or social consumption is the norm. Any given resource often has multiple attributes along these dimensions, depending on whether one examines the resource’s physical properties, its creative or inventive properties, or …
Information Abundance And Knowledge Commons, Michael J. Madison
Information Abundance And Knowledge Commons, Michael J. Madison
Book Chapters
Standard accounts of IP law describe systems of legal exclusion intended to prompt the production and distribution of intellectual resources, or information and knowledge, by making those things artificially scarce. The argument presented here frames IP law instead as one of several possible institutional responses to the need to coordinate the use of intellectual resources given their natural abundance, and not necessarily useful or effective responses at that. The chapter aims to shift analytic and empirical frameworks from those grounded in law to those grounded in governance, and from IP law in isolation to IP law as part of resource …
Our Gmo Labeling Debate: Human Health, The Environment, And The Precautionary Principle, Kate Porfilio 16
Our Gmo Labeling Debate: Human Health, The Environment, And The Precautionary Principle, Kate Porfilio 16
Honor Scholar Theses
No abstract provided.
Picking Up The Slackline: Can The United States And Japan Successfully Regulate Commercial Fishing Of Bluefin Tuna Following Failed Intergovernmental Attempts?, Sarah E. Bauer
Indiana Law Journal
Part I of this Note will address the reasons why intergovernmental organizations have failed to adequately regulate the commercial fishing of Bluefin tuna. Part II offers an analysis of the Bluefin markets in the United States and Japan and argues that these countries are ideal candidates for successful Bluefin regulation because of their market structures. Part III explores the likelihood that the two countries would implement such regulations, taking into account the respective governments’ histories of species-specific regulation.