Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 21 of 21

Full-Text Articles in Law

Demanding Accountability In Domestic Violence Courts, Johnna Pike Nov 2018

Demanding Accountability In Domestic Violence Courts, Johnna Pike

Violence Against Women conference

This presentation explores whether specialized domestic violence courts are achieving their stated objective of abuser accountability. Domestic violence emerged from the private realm of family life into the public consciousness during the 1970s. Since then, there has been a largely successful movement to reframe domestic violence as a “real” social problem necessitating meaningful criminal justice intervention. Within the criminal justice system, victim and feminist groups have mostly prevailed in controlling the discourse around domestic violence as a gender-based offense. As a result, a criminal court model aimed at empowering victims and at holding abusers accountable has emerged. However, the efficacy …


Creating A Workplace Culture Of Civility And Respect: Preventing Unlawful Harassment And Discrimination, Rose Davenport Nov 2018

Creating A Workplace Culture Of Civility And Respect: Preventing Unlawful Harassment And Discrimination, Rose Davenport

Shared Knowledge Conference

This research project identifies a plan to study best practices addressing unlawful workplace harassment and discrimination in New Mexico-based hospital healthcare systems. Initially, this project focusses on Presbyterian Healthcare Services and the University of New Mexico Hospital, with the possibility of including other local healthcare systems. In light of recent developments from “#MeToo” and “Time’s Up” movements, the issues of unlawful sexual harassment and discrimination are hot topics in today’s society and need to be more openly addressed by all levels of an organization, in order to identify these issues head-on and hopefully prevent them from continuing to occur in …


Title Ix: Where Is It Today?, Claudia Costa, Esq., Benjamin Levine, Esq. Jun 2018

Title Ix: Where Is It Today?, Claudia Costa, Esq., Benjamin Levine, Esq.

Title IX Summit

The new administration brought many changes. A new Dear Colleague Letter was issued and a position was adopted with respect to transgender students. The position taken by the new administration is at odds with many local laws and even with the position which the EEOC holds today. Similar conflicts exist in the courts throughout the country. Moreover, cases involving bathroom access are on the rise and so too are the costs of resolving them. This panel shall discuss the changes being made by the new administration and the trends in the courts in the face of these changes.


Contents, Adfsl May 2018

Contents, Adfsl

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


Front Matter, Adfsl May 2018

Front Matter, Adfsl

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


Analysis Of Data Erasure Capability On Sshd Drives For Data Recovery, Andrew Blyth May 2018

Analysis Of Data Erasure Capability On Sshd Drives For Data Recovery, Andrew Blyth

Annual ADFSL Conference on Digital Forensics, Security and Law

Data Protection and Computer Forensics/Anti-Forensics has now become a critical area of concern for organizations. A key element to this is how data is sanitized at end of life. In this paper we explore Hybrid Solid State Hybrid Drives (SSHD) and the impact that various Computer Forensics and Data Recovery techniques have when performing data erasure upon a SSHD.


Knowledge Expiration In Security Awareness Training, Tianjian Zhang May 2018

Knowledge Expiration In Security Awareness Training, Tianjian Zhang

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


Positive Identification Of Lsb Image Steganography Using Cover Image Comparisons, Michael Pelosi, Nimesh Poudel, Pratap Lamichhane, Devon Lam, Gary Kessler, Joshua Macmonagle May 2018

Positive Identification Of Lsb Image Steganography Using Cover Image Comparisons, Michael Pelosi, Nimesh Poudel, Pratap Lamichhane, Devon Lam, Gary Kessler, Joshua Macmonagle

Annual ADFSL Conference on Digital Forensics, Security and Law

In this paper we introduce a new software concept specifically designed to allow the digital forensics professional to clearly identify and attribute instances of LSB image steganography by using the original cover image in side-by-side comparison with a suspected steganographic payload image. The “CounterSteg” software allows detailed analysis and comparison of both the original cover image and any modified image, using sophisticated bit- and color-channel visual depiction graphics. In certain cases, the steganographic software used for message transmission can be identified by the forensic analysis of LSB and other changes in the payload image. The paper demonstrates usage and typical …


Exploring The Use Of Graph Databases To Catalog Artifacts For Client Forensics, Rose Shumba May 2018

Exploring The Use Of Graph Databases To Catalog Artifacts For Client Forensics, Rose Shumba

Annual ADFSL Conference on Digital Forensics, Security and Law

Cloud computing has revolutionized the methods by which digital data is stored, processed, and transmitted. It is providing users with data storage and processing services, enabling access to resources through multiple devices. Although organizations continue to embrace the advantages of flexibility and scalability offered by cloud computing, insider threats are becoming a serious concern as cited by security researchers. Insiders can use authorized access to steal sensitive information, calling for the need for an investigation. This concept paper describes research in progress towards developing a Neo4j graph database tool to enhance client forensics. The tool, with a Python interface, allows …


States Of Mind: Exploring “Energy Sources” To Support Thinking, Stephen R. Seward May 2018

States Of Mind: Exploring “Energy Sources” To Support Thinking, Stephen R. Seward

ICOT 18 - International Conference on Thinking - Cultivating Mindsets for Global Citizens

Submission Title and Descriptor for Review

States of Mind: Exploring “Energy Sources” to Support Thinking

Facing uncertainty, complex problems, and managing non-linear dynamical change are part of our existence. By examining the “States of Mind”—efficacy, craftsmanship, consciousness, flexibility, interdependence—we are able clarify thinking, encouraging divergence and resourcefulness. Aquire strategies to develop mindfulness and thinking dispositions. Participants will learn about the states of mind, design questions to engage thinking, and engage in collaborative dialogue. Explore and plan next steps for becoming more strategic in your capabilities to create positive thinking and adaptive change within yourself and those you interact with.


Non-Use Of A Mobile Phone During Conducting Crime Can Also Be Evidential, Vinod Polpaya Bhattathiripad Ph D May 2018

Non-Use Of A Mobile Phone During Conducting Crime Can Also Be Evidential, Vinod Polpaya Bhattathiripad Ph D

Annual ADFSL Conference on Digital Forensics, Security and Law

Cyber-clever criminals who are aware of the consequence of using mobile phones during conducting crimes often stay away from their phones while involved in crimes. Some of them even change their handset and SIM card, subsequently. This article looks into how, intentional disassociation (and even unintentional non-use) of mobile phone in (non-cyber) crimes, can become evidential clues of the perpetrators’ involvement in criminal acts. With the help of a recent judicial episode, this article reveals how extremely careful and masterful handling of extensive and voluminous Call Details Records and tower dumps by a cyber-savvy investigating official can unearth evidential clues …


Forensic Analysis Of The Exfat Artifacts, Yves Vandermeer, An Lekhac, Tahar Kechadi, Joe Carthy May 2018

Forensic Analysis Of The Exfat Artifacts, Yves Vandermeer, An Lekhac, Tahar Kechadi, Joe Carthy

Annual ADFSL Conference on Digital Forensics, Security and Law

Although keeping some basic concepts inherited from FAT32, the exFAT file system introduces many differences, such as the new mapping scheme of directory entries. The combination of exFAT mapping scheme with the allocation of bitmap files and the use of FAT leads to new forensic possibilities. The recovery of deleted files, including fragmented ones and carving becomes more accurate compared with former forensic processes. Nowadays, the accurate and sound forensic analysis is more than ever needed, as there is a high risk of erroneous interpretation. Indeed, most of the related work in the literature on exFAT structure and forensics, is …


Live Gpu Forensics: The Process Of Recovering Video Frames From Nvidia Gpu, Yazeed M. Albabtain, Baijian Yang May 2018

Live Gpu Forensics: The Process Of Recovering Video Frames From Nvidia Gpu, Yazeed M. Albabtain, Baijian Yang

Annual ADFSL Conference on Digital Forensics, Security and Law

The purpose of this research is to apply a graphics processing unit (GPU) forensics method to recover video artifacts from NVIDIA GPU. The tested video specs are 512 x 512 in resolution for video 1 and 800 x 600 in resolution for video 2. Both videos are mpeg4 video codec. A VLC player was used in the experiment. A special program has been developed using OpenCL to recover 1) patterns that are frames consist of pixel values and 2) dump data from the GPU global memory. The dump data that represent the video frame were located using simple steps. The …


Unmanned Aerial Vehicle Forensic Investigation Process: Dji Phantom 3 Drone As A Case Study, Alan Roder, Kim-Kwang Raymond Choo, Nhien-A Le-Khac May 2018

Unmanned Aerial Vehicle Forensic Investigation Process: Dji Phantom 3 Drone As A Case Study, Alan Roder, Kim-Kwang Raymond Choo, Nhien-A Le-Khac

Annual ADFSL Conference on Digital Forensics, Security and Law

Drones (also known as Unmanned Aerial Vehicles – UAVs) are a potential source of evidence in a digital investigation, partly due to their increasing popularity in our society. However, existing UAV/drone forensics generally rely on conventional digital forensic investigation guidelines such as those of ACPO and NIST, which may not be entirely fit-for-purpose. In this paper, we identify the challenges associated with UAV/drone forensics. We then explore and evaluate existing forensic guidelines, in terms of their effectiveness for UAV/drone forensic investigations. Next, we present our set of guidelines for UAV/drone investigations. Finally, we demonstrate how the proposed guidelines can be …


Detection And Recovery Of Anti-Forensic (Vault) Applications On Android Devices, Michaila Duncan, Umit Karabiyik May 2018

Detection And Recovery Of Anti-Forensic (Vault) Applications On Android Devices, Michaila Duncan, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

Significant number of mobile device users currently employ anti-forensics applications, also known as vault or locker applications, on their mobile devices in order to hide files such as photos. Because of this, investigators are required to spend a large portion of their time manually looking at the applications installed on the device. Currently, there is no automated method of detecting these anti-forensics applications on an Android device. This work presents the creation and testing of a vault application detection system to be used on Android devices. The main goal of this work is twofold: (i) Detecting and reporting the presence …


Coverage For Obesity Prevention & Treatment Services: Analysis Of Medicaid & State Employee Health Insurance Programs, Nichole Jannah, Christine Gallagher, William Dietz Apr 2018

Coverage For Obesity Prevention & Treatment Services: Analysis Of Medicaid & State Employee Health Insurance Programs, Nichole Jannah, Christine Gallagher, William Dietz

GW Research Days 2016 - 2020

BACKGROUND

Despite the high prevalence of obesity among U.S. adults, coverage for evidence-based obesity treatment modalities is inconsistent across states. The primary objective of this study was to examine changes in coverage for adult obesity prevention and treatment services within Medicaid programs and state employee health plans between 2009 and 2017.

METHODS

Changes in coverage were assessed by comparing data from plan year (PY) 2016/2017 to baseline data collected during PY 2009/2010. Data were obtained through an extensive review of administrative documents, health plan websites, provider manuals, subscriber handbooks, fee schedules, and drug formularies from Medicaid and state employee health …


Reconsidering The Immutability Of "Race": An Examination Of The Disconnect Between "Race" In Title Vii Jurisprudence And Social Science Literature, Natalie Tupta Mar 2018

Reconsidering The Immutability Of "Race": An Examination Of The Disconnect Between "Race" In Title Vii Jurisprudence And Social Science Literature, Natalie Tupta

Graduate Student Research Symposium

This paper discusses reconceptualizing racial discrimination under Title VII of the Civil Rights Act in light of modern social science theories on racial identity. Title VII prohibits employment discrimination on the basis of race, color, religion, sex, or national origin, and the judiciary calls these bases for discrimination “protected classes.” To bring a successful legal claim under Title VII, a person must demonstrate that she actually belongs to a protected class. In the case of a claim of racial discrimination, this means the plaintiff must belong to a racial group based on immutable characteristics, which are traits that cannot simply …


Understanding The Sexual Assault Kit Backlog In Pennsylvania, Kallie Crawford, Lyndsie Ferrara Mar 2018

Understanding The Sexual Assault Kit Backlog In Pennsylvania, Kallie Crawford, Lyndsie Ferrara

Graduate Student Research Symposium

According to the FBI, to date, there are more than 400,000 untested sexual assault kits nationwide. While this is a huge issue that cannot be solved overnight, continual improvements and changes are needed to reduce and hopefully eliminate the backlog.

This research examines work going on nationwide and aims to better understand the backlog issues specifically in Pennsylvania. Furthermore, the research examines a program utilized by the law enforcement community that garnered necessary resources. First, a comprehensive review of improved practices in proactive jurisdictions of Ohio, Houston, Texas, and Detroit, Michigan was conducted to identify general policies and procedures that …


Back Matter, Adfsl Feb 2018

Back Matter, Adfsl

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


Front Matter, Adfsl Feb 2018

Front Matter, Adfsl

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


Contents, Adfsl Feb 2018

Contents, Adfsl

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.