Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

2010

SelectedWorks

Science and Technology

Science and Technology Law

Articles 1 - 4 of 4

Full-Text Articles in Law

An Illustration Of Hashing And Its Effect On Illegal File Content In The Digital Age, Stephen Hoffman Apr 2010

An Illustration Of Hashing And Its Effect On Illegal File Content In The Digital Age, Stephen Hoffman

Stephen P. Hoffman

I aim to show, through practical examples, that computer forensics techniques such as the use of hash values are inherently flawed in tracking illegal computer files. First, I describe the underlying theory of hashing algorithms and hash values, as well as explain that several U.S. government agencies keep detailed file databases in order to track or detect illegal files, e.g. pirated media or child pornography. These databases include the file’s unique hash values. Then, I provide real examples of hash values using MD5 and SHA-1 hashing algorithms to show how extremely minor alterations to a computer file produce radically different …


Biometrics, Retinal Scanning, And The Right To Privacy In The 21st Century, Stephen Hoffman Jan 2010

Biometrics, Retinal Scanning, And The Right To Privacy In The 21st Century, Stephen Hoffman

Stephen P. Hoffman

Biometric identification techniques such as retinal scanning and fingerprinting have now become commonplace, but near-future improvements on these methods present troubling issues for personal privacy. For example, retinal scanning can be used to diagnose certain medical conditions, even ones for which the patient has no symptoms or has any other way of detecting the problem. If a health insurance company scans the retinas of potential clients before they purchase coverage, they could be charged higher premiums for conditions that do not present any issues. Not only is this unfair, but the ease with which these scans can be conducted—including scanning …


The Rise, Fall And Rise Again Of The Genetic Foundation For Legal Parentage Determination, Yehezkel Margalit Jan 2010

The Rise, Fall And Rise Again Of The Genetic Foundation For Legal Parentage Determination, Yehezkel Margalit

Hezi Margalit

Recently, we have witnessed dramatic changes in the formation of the family and parenthood. One of the results of those shifts is a growing number of children growing up outside of the traditional marriage framework. Therefore, the dilemma of determining a child's parentage, which was usually resolved by a legal fiction as to the child's legal parents, is becoming increasingly problematic. It is appropriate that any discussion of the establishment of legal parentage should start with a study of the rise of the most popular modern model, the genetic model.

It is relevant to point out that from the beginning …


An Evolutionary Study Of Cloud Computing Services Privacy Terms, Konstantinos Stylianou Jan 2010

An Evolutionary Study Of Cloud Computing Services Privacy Terms, Konstantinos Stylianou

Konstantinos Stylianou

This paper presents an empirical study on the evolution of privacy terms of cloud computing services. The purpose is to see whether the transition to cloud computing also means that users are bound by more intrusive terms of use that pose a greater threat to their privacy. In that direction several typical cloud services (e.g. GoogleDocs, Amazon EC2) are examined from their start of operation till today and numerous versions of their privacy terms are juxtaposed in an effort to pinpoint and interpret the differences between them. The paper concludes that with the spread of cloud computing services more and …