Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Embry-Riddle Aeronautical University (47)
- SelectedWorks (17)
- Selected Works (4)
- University of Connecticut (3)
- University of Pennsylvania Carey Law School (3)
-
- Old Dominion University (2)
- Portland State University (2)
- University of Nebraska - Lincoln (2)
- University of New Haven (2)
- California Polytechnic State University, San Luis Obispo (1)
- City University of New York (CUNY) (1)
- Florida International University (1)
- Marshall University (1)
- Maurer School of Law: Indiana University (1)
- Sacred Heart University (1)
- Singapore Management University (1)
- Syracuse University (1)
- Technological University Dublin (1)
- University at Albany, State University of New York (1)
- University of Nevada, Las Vegas (1)
- Vocational Training Council (1)
- Keyword
-
- Computer Forensics (4)
- Digital forensics (4)
- ICT for Development and Poverty Alleviation (4)
- Forensics (3)
- Innovation and Economic Growth (3)
-
- International Development (3)
- Android (2)
- Archivematica (2)
- DNG (2)
- Digital evidence (2)
- Digital triage (2)
- Enterprise and Investment Development (2)
- Evidence (2)
- ExifTool (2)
- Fedora (2)
- Fiji (2)
- ICT4D (2)
- JPEG 2000 (2)
- Jhove (2)
- Lightroom (2)
- MIS (2)
- Pacific Region (2)
- Photoshop (2)
- Raw (2)
- Service Delivery (2)
- Social Networks (2)
- Twitter (2)
- ViewScan (2)
- XMP (2)
- "Carla Lopez" (1)
- Publication
-
- Journal of Digital Forensics, Security and Law (33)
- Dr Deogratias Harorimana (14)
- Annual ADFSL Conference on Digital Forensics, Security and Law (13)
- Dr. Mutaz M. Al-Debei (5)
- All Faculty Scholarship (3)
-
- Electrical & Computer Engineering and Computer Science Faculty Publications (2)
- UConn Library Presentations (2)
- VMASC Publications (2)
- College of Engineering: Graduate Celebration Programs (1)
- Computer Sciences and Electrical Engineering Faculty Research (1)
- Conference papers (1)
- Department of Anthropology: Faculty Publications (1)
- Department of Computer Science and Engineering: Dissertations, Theses, and Student Research (1)
- Federal Communications Law Journal (1)
- Hong Kong Innovative Users Group Meetings (1)
- Legacy Theses & Dissertations (2009 - 2024) (1)
- Liberal Arts and Engineering Studies (1)
- Librarian Publications (1)
- M Ryan Hess (1)
- Publications (1)
- Publications and Research (1)
- Published Works (1)
- Research Collection School Of Computing and Information Systems (1)
- School of Computing and Information Sciences (1)
- Syracuse University Magazine (1)
- Systems Science Faculty Publications and Presentations (1)
- Wayne W. Wakeland (1)
- Yueh-Hsuan Weng (1)
- Publication Type
- File Type
Articles 1 - 30 of 94
Full-Text Articles in Social and Behavioral Sciences
Ict For Poverty Alleviation In Pacific Island Nations: Study Of Icts4d In Fiji, Deogratias Harorimana, Opeti Rokotuinivono, Emali Sewale, Fane Salaiwai, Marica Naulu, Evangelin Roy
Ict For Poverty Alleviation In Pacific Island Nations: Study Of Icts4d In Fiji, Deogratias Harorimana, Opeti Rokotuinivono, Emali Sewale, Fane Salaiwai, Marica Naulu, Evangelin Roy
Dr Deogratias Harorimana
ICT for Poverty Alleviation in Pacific Island Nations: Study of ICTs4D in Fiji There has been a vague and little knowledge on the role or potential of Information and Communications Technologies (ICTs) in relation to addressing poverty in Fiji. This may be probably due to the newness of the technology in the South Pacific Region as a whole but also probably due to the fact that only 9.7% of the current Fiji 931,000 populations are internet users (ITC Figures 2011). This paper reports on finding how ICTs is contributing towards poverty alleviation in Fiji. On the basis of reviewed best …
The Legal Challenges Of Networked Robotics: From The Safety Intelligence Perspective, Yueh-Hsuan Weng, Sophie T.H. Zhao
The Legal Challenges Of Networked Robotics: From The Safety Intelligence Perspective, Yueh-Hsuan Weng, Sophie T.H. Zhao
Yueh-Hsuan Weng
Mobile First Web And Content Strategy, Stefanie Havelka, David Stevens
Mobile First Web And Content Strategy, Stefanie Havelka, David Stevens
Publications and Research
The paradigm shift from the traditional desktop to the mobile web experience is fast approaching, and providing relevant date, location and time-sensitive content to users via mobile devices becomes an essential piece of the overall web strategy. This presentation demonstrates the concepts, techniques and technologies used to develop both the overall mobile content strategy and user experience, as well as the aggregation and delivery of content to both the desktop and mobile form factors from a single content source.
How Can Pacific Island Economies Benefits From The Advent Of Ict’S – Review Of Best Practices In Education, Deogratias Harorimana Sr
How Can Pacific Island Economies Benefits From The Advent Of Ict’S – Review Of Best Practices In Education, Deogratias Harorimana Sr
Dr Deogratias Harorimana
This paper explored implementation and use of information and communication technologies in Fiji, in order to gain insight into recent government initiatives to introduce computers and other ICTs for the community of Fiji. The focus of this paper in that it provided the framework for an in-depth exploration of e-learning centers around the country and the benefits from the advent of ICT’s in e-learning community centers in Fiji. Areas concentrated on are outcome of ICT’s in formal education to students and community as a whole in areas of agriculture, health, environment and infrastructure etc. The research sought understanding from the …
A Probabilistic Graphical Model For Topic And Preference Discovery On Social Media, Lu Liu, Feida Zhu, Lei Zhang, Shiqiang Yang
A Probabilistic Graphical Model For Topic And Preference Discovery On Social Media, Lu Liu, Feida Zhu, Lei Zhang, Shiqiang Yang
Research Collection School Of Computing and Information Systems
Many web applications today thrive on offering services for large-scale multimedia data, e.g., Flickr for photos and YouTube for videos. However, these data, while rich in content, are usually sparse in textual descriptive information. For example, a video clip is often associated with only a few tags. Moreover, the textual descriptions are often overly specific to the video content. Such characteristics make it very challenging to discover topics at a satisfactory granularity on this kind of data. In this paper, we propose a generative probabilistic model named Preference-Topic Model (PTM) to introduce the dimension of user preferences to enhance the …
Technical Assistance, Knowledge Gatekeeping And Indigenous Knowledge: Re-Thinking The International Development Practice, Deogratias Harorimana Sr
Technical Assistance, Knowledge Gatekeeping And Indigenous Knowledge: Re-Thinking The International Development Practice, Deogratias Harorimana Sr
Dr Deogratias Harorimana
This paper presents results from a multi-disciplinary conceptual analysis of development theory and practice. It reviews issues raised and proposes a shift in the epistemology of possession towards an epistemology of practice which is guided by the following aspects (1) The consideration of the learning culture of parties involved, (2) the ability and willingness for decontextualisation of the knowledge by the source and (3) the ability to embedded it by recipients (embededness ), (4) the importance that is attached to knowledge of the host country as reflected through (5) Similarity in culture, values, understanding of context and knowledge bases; (6) …
Unlibguiding Libguides: Using Jquery And Css With Campus Guides To Make Libguides A True Web Cms, M Ryan Hess
Unlibguiding Libguides: Using Jquery And Css With Campus Guides To Make Libguides A True Web Cms, M Ryan Hess
M Ryan Hess
DePaul University's Library Web Services team investigated the potential of Springshare CampusGuides for serving as a web content management system. The team overrode system CSS, added JQuery libraries and features, integrated an external SQL database into the site and leveraged the workflows and functionalities of Campus Guides to make it a more powerful WCMS.
Using System Dynamics To Contribute To Ecological Economics, Takuro Uehara, Yoko Nagase, Wayne W. Wakeland
Using System Dynamics To Contribute To Ecological Economics, Takuro Uehara, Yoko Nagase, Wayne W. Wakeland
Wayne W. Wakeland
This paper demonstrates the usefulness of the system dynamics approach to the development of ecological economics, the study of the interactions between economic systems and ecological systems. We build and analyze an ecological economic model: an extension of a population–resource dynamics model developed by Brander and Taylor and published in American Economic Review in 1998. The focus of the present paper is on the model building and analysis to contribute to theory building rather than eliciting policy implications from the model. Hence, this is an example of model-based theory building using system dynamics. Our analysis sheds light on several problems …
Using System Dynamics To Contribute To Ecological Economics, Takuro Uehara, Yoko Nagase, Wayne Wakeland
Using System Dynamics To Contribute To Ecological Economics, Takuro Uehara, Yoko Nagase, Wayne Wakeland
Systems Science Faculty Publications and Presentations
This paper demonstrates the usefulness of the system dynamics approach to the development of ecological economics, the study of the interactions between economic systems and ecological systems. We build and analyze an ecological economic model: an extension of a population–resource dynamics model developed by Brander and Taylor and published in American Economic Review in 1998. The focus of the present paper is on the model building and analysis to contribute to theory building rather than eliciting policy implications from the model. Hence, this is an example of model-based theory building using system dynamics. Our analysis sheds light on several problems …
When Antitrust Met Facebook, Christopher S. Yoo
When Antitrust Met Facebook, Christopher S. Yoo
All Faculty Scholarship
Social networks are among the hottest phenomena on the Internet. Facebook eclipsed Google as the most visited website in both 2010 and 2011. Moreover, according to Nielsen estimates, as of the end of 2011 the average American spent nearly seven hours per month on Facebook, which is more time than they spent on Google, Yahoo!, YouTube, Microsoft, and Wikipedia combined. LinkedIn’s May 19, 2011 initial public offering (“IPO”) surpassed expectations, placing the value of the company at nearly $9 billion, and approximately a year later, its stock price had risen another 20 percent. Facebook followed suit a year later with …
Identifying And Attributing Similar Traces With Greatest Common Factor Analysis, Fred Cohen
Identifying And Attributing Similar Traces With Greatest Common Factor Analysis, Fred Cohen
Journal of Digital Forensics, Security and Law
This paper presents an algorithm for comparing large numbers of traces to each other and identifying and presenting groups of traces with similar features. It is applied to forensic analysis in which groups of similar traces are automatically identified and presented so that attribution and other related claims may be asserted, and independently confirmed or refuted. The approach of this paper is to identify an approximate algorithm that will find a large subset of greatest common factor similar groups of arbitrary factors in far less time and space than an exact algorithm using examiner-provided selection criteria for factor definition.
Presentation On Optimized Still Image Batch Processing Of Special Collections Bound Monographs And Manuscripts Using Dng, Jpeg 2000, And Embedded Xmp Metadata, Michael J. Bennett
Presentation On Optimized Still Image Batch Processing Of Special Collections Bound Monographs And Manuscripts Using Dng, Jpeg 2000, And Embedded Xmp Metadata, Michael J. Bennett
UConn Library Presentations
No abstract provided.
Optimized Still Image Batch Processing Of Special Collections Bound Monographs And Manuscripts Using Dng, Jpeg 2000, And Embedded Xmp Metadata, Michael J. Bennett
Optimized Still Image Batch Processing Of Special Collections Bound Monographs And Manuscripts Using Dng, Jpeg 2000, And Embedded Xmp Metadata, Michael J. Bennett
Published Works
Batch still image processing is examined in the context of operational bound monographs and manuscripts reformatting. The scaling of overall workflows through the flexible use of Lightroom, Photoshop, VueScan, and Jhove on parametrically-edited raw DNG and batch-rendered JPEG 2000 files is surveyed. Potential gains in processing efficiency, in comprehensive device data capture and preservation, in adaptable master image repurposing capabilities, and in the smoother growth of the required large-scale digital storage capacities that surround such operational conversions are considered.
Real World Computer Forensics, Jessica Riccio
Real World Computer Forensics, Jessica Riccio
Liberal Arts and Engineering Studies
No abstract provided.
Beyond Coase: Emerging Technologies And Property Theory, Christopher S. Yoo
Beyond Coase: Emerging Technologies And Property Theory, Christopher S. Yoo
All Faculty Scholarship
In addition to prompting the development of the Coase Theorem, Ronald Coase’s landmark 1959 article on the Federal Communications Commission touched off a revolution in spectrum policy. Although one of Coase’s proposed reforms (that spectrum should be allocated through markets) has now become the conventional wisdom, his other principal recommendation (that governments stop dedicating portions of the spectrum to particular uses) has yet to be fully embraced. Drawing on spectrum as well as Internet traffic and electric power as examples, this Article argues that emerging technologies often reflect qualities that make defining property rights particularly difficult. These include the cumulative …
Digital Evidence Education In Schools Of Law, Aaron Alva, Barbara Endicott-Popovsky
Digital Evidence Education In Schools Of Law, Aaron Alva, Barbara Endicott-Popovsky
Annual ADFSL Conference on Digital Forensics, Security and Law
An examination of State of Connecticut v. Julie Amero provides insight into how a general lack of understanding of digital evidence can cause an innocent defendant to be wrongfully convicted. By contrast, the 101-page opinion in Lorraine v. Markel American Insurance Co. provides legal precedence and a detailed consideration for the admission of digital evidence. An analysis of both cases leads the authors to recommend additions to Law School curricula designed to raise the awareness of the legal community to ensure such travesties of justice, as in the Amero case, don’t occur in the future. Work underway at the University …
After Five Years Of E-Discovery Missteps: Sanctions Or Safe Harbor?, Milton Luoma, Vicki Luoma
After Five Years Of E-Discovery Missteps: Sanctions Or Safe Harbor?, Milton Luoma, Vicki Luoma
Annual ADFSL Conference on Digital Forensics, Security and Law
In 2003 the Zubulake case became the catalyst of change in the world of e-discovery. In that case Judge Shira Scheindlin of the United States District Court for the Southern District of New York set guidelines for e-discovery that served as the basis for amending the Federal Rules of Civil Procedure (FRCP) in December 2006. The amendments incorporated a number of concepts that were described by Judge Scheindlin in the Zubulake case. ( Zubulake v. UBS Warburg LLC, 2003) Since the Zubulake case and the FRCP amendments, numerous cases have interpreted these rules changes, but one of the main points …
A Case Study Of The Challenges Of Cyber Forensics Analysis Of Digital Evidence In A Child Pornography Trial, Richard Boddington
A Case Study Of The Challenges Of Cyber Forensics Analysis Of Digital Evidence In A Child Pornography Trial, Richard Boddington
Annual ADFSL Conference on Digital Forensics, Security and Law
Perfunctory case analysis, lack of evidence validation, and an inability or unwillingness to present understandable analysis reports adversely affect the outcome course of legal trials reliant on digital evidence. These issues have serious consequences for defendants facing heavy penalties or imprisonment yet expect their defence counsel to have clear understanding of the evidence. Poorly reasoned, validated and presented digital evidence can result in conviction of the innocent as well as acquittal of the guilty. A possession of child pornography Case Study highlights the issues that appear to plague case analysis and presentation of digital evidence relied on in these odious …
Facilitating Forensics In The Mobile Millennium Through Proactive Enterprise Security, Andrew R. Scholnick
Facilitating Forensics In The Mobile Millennium Through Proactive Enterprise Security, Andrew R. Scholnick
Annual ADFSL Conference on Digital Forensics, Security and Law
This work explores the impact of the emerging mobile communication device paradigm on the security-conscious enterprise, with regard to providing insights for proactive Information Assurance and facilitation of eventual Forensic analysis. Attention is given to technology evolution in the areas of best practices, attack vectors, software and hardware performance, access and activity monitoring, and architectural models.
Keywords: Forensics, enterprise security, mobile communication, best practices, attack vectors.
Multi-Parameter Sensitivity Analysis Of A Bayesian Network From A Digital Forensic Investigation, Richard E. Overill, Echo P. Zhang, Kam-Pui Chow
Multi-Parameter Sensitivity Analysis Of A Bayesian Network From A Digital Forensic Investigation, Richard E. Overill, Echo P. Zhang, Kam-Pui Chow
Annual ADFSL Conference on Digital Forensics, Security and Law
A multi-parameter sensitivity analysis of a Bayesian network (BN) used in the digital forensic investigation of the Yahoo! email case has been performed using the principle of ‘steepest gradient’ in the parameter space of the conditional probabilities. This procedure delivers a more reliable result for the dependence of the posterior probability of the BN on the values used to populate the conditional probability tables (CPTs) of the BN. As such, this work extends our previous studies using singleparameter sensitivity analyses of BNs, with the overall aim of more deeply understanding the indicative use of BNs within the digital forensic and …
Ipad2 Logical Acquisition: Automated Or Manual Examination?, Somaya Ali, Sumaya Alhosani, Farah Alzarooni, Ibrahim Baggili
Ipad2 Logical Acquisition: Automated Or Manual Examination?, Somaya Ali, Sumaya Alhosani, Farah Alzarooni, Ibrahim Baggili
Annual ADFSL Conference on Digital Forensics, Security and Law
Due to their usage increase worldwide, iPads are on the path of becoming key sources of digital evidence in criminal investigations. This research investigated the logical backup acquisition and examination of the iPad2 device using the Apple iTunes backup utility while manually examining the backup data (manual examination) and automatically parsing the backup data (Lantern software - automated examination). The results indicate that a manual examination of the logical backup structure from iTunes reveals more digital evidence, especially if installed application data is required for an investigation. However, the researchers note that if a quick triage is needed of an …
Cloud Forensics Investigation: Tracing Infringing Sharing Of Copyrighted Content In Cloud, Yi-Jun He, Echo P. Zhang, Lucas C.K. Hui, Siu Ming Yiu, K.P. Chow
Cloud Forensics Investigation: Tracing Infringing Sharing Of Copyrighted Content In Cloud, Yi-Jun He, Echo P. Zhang, Lucas C.K. Hui, Siu Ming Yiu, K.P. Chow
Annual ADFSL Conference on Digital Forensics, Security and Law
Cloud Computing is becoming a significant technology trend nowadays, but its abrupt rise also creates a brand new front for cybercrime investigation with various challenges. One of the challenges is to track down infringing sharing of copyrighted content in cloud. To solve this problem, we study a typical type of content sharing technologies in cloud computing, analyze the challenges that the new technologies bring to forensics, formalize a procedure to get digital evidences and obtain analytical results based on the evidences to track down illegal uploader. Furthermore, we propose a reasoning model based on the probability distribution in a Bayesian …
A Fuzzy Hashing Approach Based On Random Sequences And Hamming Distance, Frank Breitinger, Harald Baier
A Fuzzy Hashing Approach Based On Random Sequences And Hamming Distance, Frank Breitinger, Harald Baier
Annual ADFSL Conference on Digital Forensics, Security and Law
Hash functions are well-known methods in computer science to map arbitrary large input to bit strings of a fixed length that serve as unique input identifier/fingerprints. A key property of cryptographic hash functions is that even if only one bit of the input is changed the output behaves pseudo randomly and therefore similar files cannot be identified. However, in the area of computer forensics it is also necessary to find similar files (e.g. different versions of a file), wherefore we need a similarity preserving hash function also called fuzzy hash function. In this paper we present a new approach for …
The Xbox 360 And Steganography: How Criminals And Terrorists Could Be "Going Dark", Ashley Podhradsky, Rob D’Ovidio, Cindy Casey
The Xbox 360 And Steganography: How Criminals And Terrorists Could Be "Going Dark", Ashley Podhradsky, Rob D’Ovidio, Cindy Casey
Annual ADFSL Conference on Digital Forensics, Security and Law
Video game consoles have evolved from single-player embedded systems with rudimentary processing and graphics capabilities to multipurpose devices that provide users with parallel functionality to contemporary desktop and laptop computers. Besides offering video games with rich graphics and multiuser network play, today's gaming consoles give users the ability to communicate via email, video and text chat; transfer pictures, videos, and file;, and surf the World-Wide-Web. These communication capabilities have, unfortunately, been exploited by people to plan and commit a variety of criminal activities. In an attempt to cover the digital tracks of these unlawful undertakings, anti-forensic techniques, such as steganography, …
Toward Alignment Between Communities Of Practice And Knowledge-Based Decision Support, Jason Nichols, David Biros, Mark Weiser
Toward Alignment Between Communities Of Practice And Knowledge-Based Decision Support, Jason Nichols, David Biros, Mark Weiser
Annual ADFSL Conference on Digital Forensics, Security and Law
The National Repository of Digital Forensics Information (NRDFI) is a knowledge repository for law enforcement digital forensics investigators (LEDFI). Over six years, the NRDFI has undertaken significant design revisions in order to more closely align the architecture of the system with theory addressing motivation to share knowledge and communication within ego-centric groups and communities of practice. These revisions have been met with minimal change in usage patterns by LEDFI community members, calling into question the applicability of relevant theory when the domain for knowledge sharing activities expands beyond the confines of an individual organization to a community of practice. When …
Double-Compressed Jpeg Detection In A Steganalysis System, Jennifer L. Davidson, Pooja Parajape
Double-Compressed Jpeg Detection In A Steganalysis System, Jennifer L. Davidson, Pooja Parajape
Annual ADFSL Conference on Digital Forensics, Security and Law
The detection of hidden messages in JPEG images is a growing concern. Current detection of JPEG stego images must include detection of double compression: a JPEG image is double compressed if it has been compressed with one quality factor, uncompressed, and then re-compressed with a different quality factor. When detection of double compression is not included, erroneous detection rates are very high. The main contribution of this paper is to present an efficient double-compression detection algorithm that has relatively lower dimensionality of features and relatively lower computational time for the detection part, than current comparative classifiers. We use a model-based …
A Proposal For Incorporating Programming Blunder As Important Evidence In Abstraction-Filtration-Comparison Test, P. Vinod Bhattathiripad
A Proposal For Incorporating Programming Blunder As Important Evidence In Abstraction-Filtration-Comparison Test, P. Vinod Bhattathiripad
Annual ADFSL Conference on Digital Forensics, Security and Law
This paper investigates an unexplored concept in Cyber Forensics, namely, a Programming Blunder. Programming Blunder is identified as a variable or a code segment or a field in a database table, which is hardly used or executed in the context of the application or the user’s functionality. Blunder genes can be found in many parts of any program. It is the contention of this paper that this phenomenon of blunders needs to be studied systematically from its very genetic origins to their surface realizations in contrast to bugs and flaws, especially in view of their importance in software copyright infringement …
Update On The State Of The Science Of Digital Evidence Examination, Fred Cohen
Update On The State Of The Science Of Digital Evidence Examination, Fred Cohen
Annual ADFSL Conference on Digital Forensics, Security and Law
This paper updates previous work on the level of consensus in foundational elements of digital evidence examination. Significant consensus is found present only after definitions are made explicit, suggesting that, while there is a scientific agreement around some of the basic notions identified, the use of a common language is lacking.
Keywords: Digital forensics examination, terminology, scientific methodology, testability, validation, classification, scientific consensus
A Crowdsourcing Approach To Labelling A Mood Induced Speech Corpus, John Snel, Alexey Tarasov, Charlie Cullen, Sarah Jane Delany
A Crowdsourcing Approach To Labelling A Mood Induced Speech Corpus, John Snel, Alexey Tarasov, Charlie Cullen, Sarah Jane Delany
Conference papers
This paper demonstrates the use of crowdsourcing to accumulate ratings from na ̈ıve listeners as a means to provide labels for a naturalistic emotional speech dataset. In order to do so, listening tasks are performed with a rating tool, which is delivered via the web. The rating requirements are based on the classical dimensions, activation and evaluation, presented to the participant as two discretised 5-point scales. Great emphasis is placed on the participant’s overall understanding of the task, and on the ease-of-use of the tool so that labelling accuracy is reinforced. The accumulation process is ongoing with a goal to …
Network Neutrality And The Need For A Technological Turn In Internet Scholarship, Christopher S. Yoo
Network Neutrality And The Need For A Technological Turn In Internet Scholarship, Christopher S. Yoo
All Faculty Scholarship
To most social scientists, the technical details of how the Internet actually works remain arcane and inaccessible. At the same time, convergence is forcing scholars to grapple with how to apply regulatory regimes developed for traditional media to a world in which all services are provided via an Internet-based platform. This chapter explores the problems caused by the lack of familiarity with the underlying technology, using as its focus the network neutrality debate that has dominated Internet policy for the past several years. The analysis underscores a surprising lack of sophistication in the current debate. Unfamiliarity with the Internet’s architecture …