Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Clustering (2)
- Computer forensics (2)
- Cyber crime (2)
- Digital forensics (2)
- Disk analysis (2)
-
- APIHook (1)
- Accounting (1)
- Amendment (1)
- Anti-Tamper (1)
- Anti-analysis (1)
- Anti-forensics (1)
- Auditing (1)
- Biometrics (1)
- Bitlocker (1)
- Christianity (1)
- Civil procedure (1)
- Civil rights (1)
- Computer Forensics (1)
- Computer crime (1)
- Copyright (1)
- Creative Commons Licenses (1)
- Critical race theory (1)
- Curriculum design. (1)
- Cybercrime Provenance (1)
- Data Mining (1)
- Data destruction (1)
- Data disposal (1)
- Data leakage (1)
- Data map (1)
- Data mapping (1)
- Publication
- Publication Type
Articles 31 - 51 of 51
Full-Text Articles in Law
Computer Forensics For Graduate Accountants: A Motivational Curriculum Design Approach, Grover S. Kearns
Computer Forensics For Graduate Accountants: A Motivational Curriculum Design Approach, Grover S. Kearns
Journal of Digital Forensics, Security and Law
Computer forensics involves the investigation of digital sources to acquire evidence that can be used in a court of law. It can also be used to identify and respond to threats to hosts and systems. Accountants use computer forensics to investigate computer crime or misuse, theft of trade secrets, theft of or destruction of intellectual property, and fraud. Education of accountants to use forensic tools is a goal of the AICPA (American Institute of Certified Public Accountants). Accounting students, however, may not view information technology as vital to their career paths and need motivation to acquire forensic knowledge and skills. …
Higate (High Grade Anti-Tamper Equipment) Prototype And Application To E-Discovery, Yui Sakurai, Yuki Ashino, Tetsutaro Uehara, Hiroshi Yoshiura, Ryoichi Sasaki
Higate (High Grade Anti-Tamper Equipment) Prototype And Application To E-Discovery, Yui Sakurai, Yuki Ashino, Tetsutaro Uehara, Hiroshi Yoshiura, Ryoichi Sasaki
Journal of Digital Forensics, Security and Law
These days, most data is digitized and processed in various ways by computers. In the past, computer owners were free to process data as desired and to observe the inputted data as well as the interim results. However, the unrestricted processing of data and accessing of interim results even by computer users is associated with an increasing number of adverse events. These adverse events often occur when sensitive data such as personal or confidential business information must be handled by two or more parties, such as in the case of e-Discovery, used in legal proceedings, or epidemiologic studies. To solve …
Developing Voip Honeypots: A Preliminary Investigation Into Malfeasant Activity, Craig Valli
Developing Voip Honeypots: A Preliminary Investigation Into Malfeasant Activity, Craig Valli
Journal of Digital Forensics, Security and Law
30 years ago PABX systems were compromised by hackers wanting to make long distance calls at some other entities expense. This activity faded as telephony became cheaper and PABX systems had countermeasures installed to overcome attacks. Now the world has moved onto the provision of telephony via broadband enabled Voice over Internet Protocol (VoIP) with this service now being provided as a replacement for conventional fixed wire telephony by major telecommunication providers worldwide. Due to increasing bandwidth it is possible for systems to support multiple voice connections simultaneously. The networked nature of the Internet allows for attackers of these VoIP …
Digital Records Forensics: A New Science And Academic Program For Forensic Readiness, Luciana Duranti, Barbara Endicott-Popovsky
Digital Records Forensics: A New Science And Academic Program For Forensic Readiness, Luciana Duranti, Barbara Endicott-Popovsky
Journal of Digital Forensics, Security and Law
This paper introduces the Digital Records Forensics project, a research endeavour located at the University of British Columbia in Canada and aimed at the development of a new science resulting from the integration of digital forensics with diplomatics, archival science, information science and the law of evidence, and of an interdisciplinary graduate degree program, called Digital Records Forensics Studies, directed to professionals working for law enforcement agencies, legal firms, courts, and all kind of institutions and business that require their services. The program anticipates the need for organizations to become “forensically ready,” defined by John Tan as “maximizing the ability …
Book Review: Digital Forensic Evidence Examination (2nd Ed.), Gary C. Kessler
Book Review: Digital Forensic Evidence Examination (2nd Ed.), Gary C. Kessler
Journal of Digital Forensics, Security and Law
On the day that I sat down to start to write this review, the following e-mail came across on one of my lists: Person A and Person B write back and forth and create an email thread. Person A then forwards the email to Person C, but changes some wording in the email exchange between A & B. What is the easiest way (and is it even possible) to find out when that earlier email message was altered before sent to Person C? Before you try to answer these questions, read Fred Cohen's Digital Forensic Evidence Examination. His book won't …
Reeling In Big Phish With A Deep Md5 Net, Brad Wardman, Gary Warner, Heather Mccalley, Sarah Turner, Anthony Skjellum
Reeling In Big Phish With A Deep Md5 Net, Brad Wardman, Gary Warner, Heather Mccalley, Sarah Turner, Anthony Skjellum
Journal of Digital Forensics, Security and Law
Phishing continues to grow as phishers discover new exploits and attack vectors for hosting malicious content; the traditional response using takedowns and blacklists does not appear to impede phishers significantly. A handful of law enforcement projects — for example the FBI's Digital PhishNet and the Internet Crime and Complaint Center (ic3.gov) — have demonstrated that they can collect phishing data in substantial volumes, but these collections have not yet resulted in a significant decline in criminal phishing activity. In this paper, a new system is demonstrated for prioritizing investigative resources to help reduce the time and effort expended examining this …
Solid State Drives: The Beginning Of The End For Current Practice In Digital Forensic Recovery?, Graeme B. Bell, Richard Boddington
Solid State Drives: The Beginning Of The End For Current Practice In Digital Forensic Recovery?, Graeme B. Bell, Richard Boddington
Journal of Digital Forensics, Security and Law
Digital evidence is increasingly relied upon in computer forensic examinations and legal proceedings in the modern courtroom. The primary storage technology used for digital information has remained constant over the last two decades, in the form of the magnetic disc. Consequently, investigative, forensic, and judicial procedures are well-established for magnetic disc storage devices (Carrier, 2005). However, a paradigm shift has taken place in technology storage and complex, transistor-based devices for primary storage are now increasingly common. Most people are aware of the transition from portable magnetic floppy discs to portable USB transistor flash devices, yet the transition from magnetic hard …
Trust Account Fraud And Effective Information Security Management, Sameera Mubarak
Trust Account Fraud And Effective Information Security Management, Sameera Mubarak
Journal of Digital Forensics, Security and Law
The integrity of lawyers’ trust accounts has come under scrutiny in the last few years. There are strong possibilities of information technology security breaches happening within the firms, either accidental or deliberate. The damage caused by these security breaches could be extreme. For example, a trust account fund in an Australian law firm was misused in a security breach in which Telstra charged A$50,000 for phone usage, mainly for ISD calls to Hong Kong. Our study involved interviewing principals of ten law companies to find out solicitors’ attitudes to computer security and the possibility of breaches of their trust accounts. …
Malware Forensics: Discovery Of The Intent Of Deception, Murray Brand, Craig Valli, Andrew Woodward
Malware Forensics: Discovery Of The Intent Of Deception, Murray Brand, Craig Valli, Andrew Woodward
Journal of Digital Forensics, Security and Law
Malicious software (malware) has a wide variety of analysis avoidance techniques that it can employ to hinder forensic analysis. Although legitimate software can incorporate the same analysis avoidance techniques to provide a measure of protection against reverse engineering and to protect intellectual property, malware invariably makes much greater use of such techniques to make detailed analysis labour intensive and very time consuming. Analysis avoidance techniques are so heavily used by malware that the detection of the use of analysis avoidance techniques could be a very good indicator of the presence of malicious intent. However, there is a tendency for analysis …
The 2009 Analysis Of Information Remaining On Disks Offered For Sale On The Second Hand Market, Andy Jones, Craig Valli, Glenn S. Dardick, Iain Sutherland, G. Dabibi, Gareth Davies
The 2009 Analysis Of Information Remaining On Disks Offered For Sale On The Second Hand Market, Andy Jones, Craig Valli, Glenn S. Dardick, Iain Sutherland, G. Dabibi, Gareth Davies
Journal of Digital Forensics, Security and Law
The ever increasing use and reliance upon computers in both the public and private sector has led to enormous numbers of computers being disposed of at the end of their useful life within an organisation. As the cost of computers has dropped, their use in the home has also continued to increase. In most organisations, computers have a relatively short life and are replaced on a regular basis with the result that, if not properly cleansed of data, they are released into the public domain containing data that can be relatively up to date. This problem is exacerbated by the …
Avoiding Sanctions At The E-Discovery Meet-And-Confer In Common Law Countries, Milton Luoma, Vicki Luoma
Avoiding Sanctions At The E-Discovery Meet-And-Confer In Common Law Countries, Milton Luoma, Vicki Luoma
Journal of Digital Forensics, Security and Law
The rules of civil procedure in common law countries have been amended to better deal with the requirements of electronic discovery. One of the key changes in case management is the scheduling of a meet-and-confer session where the parties to litigation must meet early in the case before any discovery procedures have begun to exchange information regarding the nature, location, formats, and pertinent facts regarding custody and control of a party’s electronically stored information (ESI). Failure to abide by the rules and participate in good faith at the meet-and-confer session can have dire consequences for the parties and lawyers involved. …
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Authentication Of Biometric Features Using Texture Coding For Id Cards, Jonathan Blackledge, Eugene Coyle
Authentication Of Biometric Features Using Texture Coding For Id Cards, Jonathan Blackledge, Eugene Coyle
Conference papers
The use of image based information exchange has grown rapidly over the years in terms of both e-to-e image storage and transmission and in terms of maintaining paper documents in electronic form. Further, with the dramatic improvements in the quality of COTS (Commercial-Off-The-Shelf) printing and scanning devices, the ability to counterfeit electronic and printed documents has become a widespread problem. Consequently, there has been an increasing demand to develop digital watermarking techniques which can be applied to both electronic and printed images (and documents) that can be authenticated, prevent unauthorized copying of their content and, in the case of printed …
Digital Multi-Media And The Limits Of Privacy Law, Jacqueline D. Lipton
Digital Multi-Media And The Limits Of Privacy Law, Jacqueline D. Lipton
Articles
While digital video and multi-media technologies are becoming increasingly prevalent, existing privacy laws tend to focus on text-based personal records. Individuals have little recourse when concerned about infringements of their privacy interests in audio, video, and multi-media files. Often people are simply unaware that video or audio records have been made. Even if they are aware of the existence of the records, they may be unaware of potential legal remedies, or unable to afford legal recourse. This paper concentrates on the ability of individuals to obtain legal redress for unauthorized use of audio, video and multi-media content that infringes their …
Clustering Spam Domains And Destination Websites: Digital Forensics With Data Mining, Chun Wei, Alan Sprague, Gary Warner, Anthony Skjellum
Clustering Spam Domains And Destination Websites: Digital Forensics With Data Mining, Chun Wei, Alan Sprague, Gary Warner, Anthony Skjellum
Journal of Digital Forensics, Security and Law
Spam related cyber crimes have become a serious threat to society. Current spam research mainly aims to detect spam more effectively. We believe the identification and disruption of the supporting infrastructure used by spammers is a more effective way of stopping spam than filtering. The termination of spam hosts will greatly reduce the profit a spammer can generate and thwart his ability to send more spam. This research proposes an algorithm for clustering spam domains extracted from spam emails based on the hosting IP addresses and tracing the IP addresses over a period of time. The results show that many …
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Forensic Analysis Of The Windows 7 Registry, Khawla A. Alghafli, Andrew Jones, Thomas A. Martin
Forensic Analysis Of The Windows 7 Registry, Khawla A. Alghafli, Andrew Jones, Thomas A. Martin
Journal of Digital Forensics, Security and Law
The recovery of digital evidence of crimes from storage media is an increasingly time consuming process as the capacity of the storage media is in a state of constant growth. It is also a difficult and complex task for the forensic investigator to analyse all of the locations in the storage media. These two factors, when combined, may result in a delay in bringing a case to court. The concept of this paper is to start the initial forensic analysis of the storage media in locations that are most likely to contain digital evidence, the Windows Registry. Consequently, the forensic …
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Wikipedia And The European Union Database Directive, Jacqueline D. Lipton
Wikipedia And The European Union Database Directive, Jacqueline D. Lipton
Articles
“Web 2.0" and "User Generated Content (UGC)" are the new buzzwords in cyberspace. In recent years, law and policy makers have struggled to keep pace with the needs of digital natives in terms of online content control in the new participatory web culture. Much of the discourse about intellectual property rights in this context revolves around copyright law: for example, who owns copyright in works generated by multiple people, and what happens when these joint authored works borrow from existing copyright works in terms of derivative works rights and the fair use defense. Many works compiled by groups are subject …
Questioning Cultural Commons, Lawrence B. Solum
Questioning Cultural Commons, Lawrence B. Solum
Georgetown Law Faculty Publications and Other Works
In Constructing Commons in the Cultural Environment, Michael J. Madison, Brett M. Frischmann, and Katherine J. Strandburg offer an innovative and attractive vision of the future of cultural and scientific knowledge through the construction of “cultural commons,” which they define as “environments for developing and distributing cultural and scientific knowledge through institutions that support pooling and sharing that knowledge in a managed way.” The kind of “commons” they have in mind is modeled on the complex arrangement of social norms that allocate lobstering rights among fishermen in Maine and extends to arrangements such as patent pools, open-source software development …