Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Embry-Riddle Aeronautical University (48)
- Maurer School of Law: Indiana University (6)
- Selected Works (3)
- William & Mary Law School (3)
- Chicago-Kent College of Law (2)
-
- University of Pennsylvania Carey Law School (2)
- City University of New York (CUNY) (1)
- La Salle University (1)
- Olivet Nazarene University (1)
- Southern Methodist University (1)
- The Catholic University of America, Columbus School of Law (1)
- The University of Maine (1)
- University of Arkansas, Fayetteville (1)
- University of Kentucky (1)
- University of Nebraska Medical Center (1)
- University of South Florida (1)
- Virginia Commonwealth University (1)
- Keyword
-
- Data protection (4)
- Law (4)
- Artificial intelligence (3)
- Blockchain (3)
- Cybersecurity (3)
-
- Technology (3)
- Apportionment (2)
- Bitcoin (2)
- Digital forensics (2)
- Election Districts (2)
- Election Law (2)
- Gerrymandering (2)
- Network security (2)
- Privacy (2)
- Privacy law (2)
- Security (2)
- Tactful inattention paradigm (2)
- 3D printing (1)
- AR Drone 2.0. (1)
- Affairs (1)
- Algorithms (1)
- Application development (1)
- Approximate matching (1)
- Artificial Intelligence (1)
- Automated licensing (1)
- Automation (1)
- Big Data (1)
- Big forensic data (1)
- Characterization (1)
- Cloud architecture (1)
- Publication
-
- Journal of Digital Forensics, Security and Law (33)
- Annual ADFSL Conference on Digital Forensics, Security and Law (15)
- Articles by Maurer Faculty (5)
- All Faculty Scholarship (4)
- Arkansas Law Review (1)
-
- Books & Book Chapters by Maurer Faculty (1)
- Capstone Experience (1)
- Catholic University Journal of Law and Technology (1)
- Daniel J Gervais (1)
- Electronic Theses and Dissertations (1)
- Elizabeth De Armond (1)
- Faculty Publications (1)
- MPA/MPP/MPFM Capstone Projects (1)
- Mathematics and Computer Science Capstones (1)
- Numeracy (1)
- SMU Data Science Review (1)
- Stephen E Henderson (1)
- Student Scholarship – Computer Science (1)
- Student Theses (1)
- Theses and Dissertations (1)
- William & Mary Law Review (1)
- William & Mary Law Review Online (1)
Articles 1 - 30 of 75
Full-Text Articles in Computer Sciences
Forensic Analysis Of A Crash-Damaged Cheerson Cx-20 Auto Pathfinder Drone, Ian N. Mcateer, Peter Hannay, Muhammad I. Malik, Zubair Baig
Forensic Analysis Of A Crash-Damaged Cheerson Cx-20 Auto Pathfinder Drone, Ian N. Mcateer, Peter Hannay, Muhammad I. Malik, Zubair Baig
Journal of Digital Forensics, Security and Law
Long gone are the days when Unmanned Aerial Vehicles (UAVs) and drones (multirotor UAVs) were the exclusive domain of the military for surveillance or tactical strike purposes. For relatively little money mainly due to high-tech progression in microprocessor design, anyone can now purchase a drone with GNSS-tracking capabilities and can support a live high-resolution video feed to its flight controller. The global population of drones has sky- rocketed in recent years as this new technology has been embraced for both its recreational and commercial applications. However, the more nefarious members of society have also recognized the potential for using drones …
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Russia Today, Cyberterrorists Tomorrow: U.S. Failure To Prepare Democracy For Cyberspace, Jonathan F. Lancelot
Russia Today, Cyberterrorists Tomorrow: U.S. Failure To Prepare Democracy For Cyberspace, Jonathan F. Lancelot
Journal of Digital Forensics, Security and Law
This paper is designed to expose vulnerabilities within the US electoral system, the use of cyberspace to exploit weaknesses within the information assurance strategies of the democratic and republican party organizations, and deficiencies within the social media communications and voting machine exploits. A brief history of discriminatory practices in voting rights and voting access will be set as the foundation for the argument that the system is vulnerable in the cyber age, and the need for reform at the local, state and national levels will be emphasized. The possibility of a foreign nation-state influencing the outcome of an election by …
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Paul Baran, Network Theory, And The Past, Present, And Future Of Internet, Christopher S. Yoo
Paul Baran, Network Theory, And The Past, Present, And Future Of Internet, Christopher S. Yoo
All Faculty Scholarship
Paul Baran’s seminal 1964 article “On Distributed Communications Networks” that first proposed packet switching also advanced an underappreciated vision of network architecture: a lattice-like, distributed network, in which each node of the Internet would be homogeneous and equal in status to all other nodes. Scholars who have subsequently embraced the concept of a lattice-like network approach have largely overlooked the extent to which it is both inconsistent with network theory (associated with the work of Duncan Watts and Albert-László Barabási), which emphasizes the importance of short cuts and hubs in enabling networks to scale, and the actual way, the Internet …
Bots, Bias And Big Data: Artificial Intelligence, Algorithmic Bias And Disparate Impact Liability In Hiring Practices, Mckenzie Raub
Bots, Bias And Big Data: Artificial Intelligence, Algorithmic Bias And Disparate Impact Liability In Hiring Practices, Mckenzie Raub
Arkansas Law Review
No abstract provided.
Revolution In Crime: How Cryptocurrencies Have Changed The Criminal Landscape, Igor Groysman
Revolution In Crime: How Cryptocurrencies Have Changed The Criminal Landscape, Igor Groysman
Student Theses
This thesis will examine the ways in which various cryptocurrencies have impacted certain traditional crimes. While crime is always evolving with technology, cryptocurrencies are a game changer in that they provide anonymous and decentralized payment systems which, while they can be tracked in a reactive sense via the blockchain, are seen by criminals as having better uses for them than traditional fiat currencies, such as the ability to send money relatively fast to another party without going through an intermediary, or the ability to obscure the origin of the money for money laundering purposes. Every week there are new cryptocurrencies …
Enhancement Of Media Splicing Detection: A General Framework, Songpon Teerakanok, Tetsutaro Uehara
Enhancement Of Media Splicing Detection: A General Framework, Songpon Teerakanok, Tetsutaro Uehara
Journal of Digital Forensics, Security and Law
Digital media (i.e., image, audio) has played an influential role in today information system. The increasing of popularity in digital media has brought forth many technological advancements. The advancements, however, also gives birth to a number of forgeries and attacks against this type of information. With the availability of easy-to-use media manipulating tools available online, the authenticity of today digital media cannot be guaranteed. In this paper, a new general framework for enhancing today media splicing detection has been proposed. By combining results from two traditional approaches, the enhanced detection results show improvement in term of clarity in which anomalies …
A New Framework For Securing, Extracting And Analyzing Big Forensic Data, Hitesh Sachdev, Hayden Wimmer, Lei Chen, Carl Rebman
A New Framework For Securing, Extracting And Analyzing Big Forensic Data, Hitesh Sachdev, Hayden Wimmer, Lei Chen, Carl Rebman
Journal of Digital Forensics, Security and Law
Finding new methods to investigate criminal activities, behaviors, and responsibilities has always been a challenge for forensic research. Advances in big data, technology, and increased capabilities of smartphones has contributed to the demand for modern techniques of examination. Smartphones are ubiquitous, transformative, and have become a goldmine for forensics research. Given the right tools and research methods investigating agencies can help crack almost any illegal activity using smartphones. This paper focuses on conducting forensic analysis in exposing a terrorist or criminal network and introduces a new Big Forensic Data Framework model where different technologies of Hadoop and EnCase software are …
A Bit Like Cash: Understanding Cash-For-Bitcoin Transactions Through Individual Vendors, Stephanie J. Robberson, Mark R. Mccoy
A Bit Like Cash: Understanding Cash-For-Bitcoin Transactions Through Individual Vendors, Stephanie J. Robberson, Mark R. Mccoy
Journal of Digital Forensics, Security and Law
As technology improves and economies become more globalized, the concept of currency has evolved. Bitcoin, a cryptographic digital currency, has been embraced as a secure and convenient type of money. Due to its security and privacy for the user, Bitcoin is a good tool for conducting criminal trades. The Financial Crimes Enforcement Network (FinCEN) has regulations in place to make identification information of Bitcoin purchasers accessible to law enforcement, but enforcing these rules with cash-for-Bitcoin traders is difficult. This study surveyed cash-for-Bitcoin vendors in Oklahoma, Texas, Arkansas, Missouri, Kansas, Colorado, and New Mexico to determine personal demographic information, knowledge of …
Ontologies And The Semantic Web For Digital Investigation Tool Selection, Hayden Wimmer, Lei Chen, Thomas Narock
Ontologies And The Semantic Web For Digital Investigation Tool Selection, Hayden Wimmer, Lei Chen, Thomas Narock
Journal of Digital Forensics, Security and Law
The nascent field of digital forensics is heavily influenced by practice. Much digital forensics research involves the use, evaluation, and categorization of the multitude of tools available to researchers and practitioners. As technology evolves at an increasingly rapid pace, the digital forensics field must constantly adapt by creating and evaluating new tools and techniques to perform forensic analysis on many disparate systems such as desktops, notebook computers, mobile devices, cloud, and personal wearable sensor devices, among many others. While researchers have attempted to use ontologies to classify the digital forensics domain on various dimensions, no ontology of digital forensic tools …
Sharia Law And Digital Forensics In Saudi Arabia, Fahad Alanazi, Andrew Jones, Catherine Menon
Sharia Law And Digital Forensics In Saudi Arabia, Fahad Alanazi, Andrew Jones, Catherine Menon
Journal of Digital Forensics, Security and Law
These days, digital crime is one of the main challenges for law enforcement and the judicial system. Many of the laws which are used to protect the users of current technologies were derived from legislation and laws that are utilized in the control of crimes that are based in the physical realm. This applies not only in Western countries, but in countries that adopt Sharia law. There is a need to establish specific legislation and accepted best practice to deal with digital crimes that is compatible with Sharia law, which affects more than one billion Muslims. This paper presents a …
A Forensic Enabled Data Provenance Model For Public Cloud, Shariful Haque, Travis Atkison
A Forensic Enabled Data Provenance Model For Public Cloud, Shariful Haque, Travis Atkison
Journal of Digital Forensics, Security and Law
Cloud computing is a newly emerging technology where storage, computation and services are extensively shared among a large number of users through virtualization and distributed computing. This technology makes the process of detecting the physical location or ownership of a particular piece of data even more complicated. As a result, improvements in data provenance techniques became necessary. Provenance refers to the record describing the origin and other historical information about a piece of data. An advanced data provenance system will give forensic investigators a transparent idea about the data's lineage, and help to resolve disputes over controversial pieces of data …
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Publication Information
Journal of Digital Forensics, Security and Law
No abstract provided.
A Characterization Of The Medical-Legal Partnership (Mlp) Of Nebraska Medicine, Jordan Pieper
A Characterization Of The Medical-Legal Partnership (Mlp) Of Nebraska Medicine, Jordan Pieper
Capstone Experience
This research study was completed at Legal Aid of Nebraska’s Health, Education, and Law Project through the partnership it has formed working with Nebraska Medicine and Iowa Legal Aid. Traditionally, health and disease have always been viewed exclusively as "healthcare" issues. But with healthcare consistently growing towards holistic approaches to help patients, we now know there are deeper, structural conditions of society that can act as strong driving forces of a person's poor daily living conditions that can negatively impact health. The importance of a Medical-Legal Partnership is that it considers a patient's social determinants of health (SDHs). The goal …
Case Study: Using Crime Data And Open Source Data To Design A Police Patrol Area, Brent Allen
Case Study: Using Crime Data And Open Source Data To Design A Police Patrol Area, Brent Allen
SMU Data Science Review
This case study examines how to use existing crime data augmented with open source data to design a patrol area. We used the a demand signal of "calls for service" vice reports which summarize calls for service. Additionally, we augmented our existing data with traffic data from Google Maps. Traffic delays did not correspond to traffic incidents reported in the area examined. These data were plotted geographically to aid in the determination of the new patrol area. The new patrol area was created around natural geographic boundaries, the density of calls for service and police operational experience.
Contents, Adfsl
Contents, Adfsl
Annual ADFSL Conference on Digital Forensics, Security and Law
No abstract provided.
Front Matter, Adfsl
Front Matter, Adfsl
Annual ADFSL Conference on Digital Forensics, Security and Law
No abstract provided.
A Survey Of Lawyers’ Cyber Security Practises In Western Australia, Craig Valli, Mike Johnstone, Rochelle Fleming
A Survey Of Lawyers’ Cyber Security Practises In Western Australia, Craig Valli, Mike Johnstone, Rochelle Fleming
Annual ADFSL Conference on Digital Forensics, Security and Law
This paper reports on the results of a survey that is the initial phase of an action research project being conducted with the Law Society of Western Australia. The online survey forms a baseline for the expression of a targeted training regime aimed at improving the cyber security awareness and posture of the membership of the Society. The full complement of over 3000 members were given the opportunity to participate in the survey, with 122 members responding in this initial round. The survey was designed to elicit responses about information technology use and the awareness of good practices with respect …