Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 52

Full-Text Articles in Social and Behavioral Sciences

Minerva 2012, The Honors College Dec 2012

Minerva 2012, The Honors College

Minerva

This issue of Minerva includes a celebration of the life and impact of former Honors Dean, Charlie Slavin; a discussion of the Honors College's role in the University of Maine Blue Sky Strategic Plan; and profiles of student Kyle Franklin and alumni Heidi Crosby and Richard Becker.


Identifying And Attributing Similar Traces With Greatest Common Factor Analysis, Fred Cohen Jun 2012

Identifying And Attributing Similar Traces With Greatest Common Factor Analysis, Fred Cohen

Journal of Digital Forensics, Security and Law

This paper presents an algorithm for comparing large numbers of traces to each other and identifying and presenting groups of traces with similar features. It is applied to forensic analysis in which groups of similar traces are automatically identified and presented so that attribution and other related claims may be asserted, and independently confirmed or refuted. The approach of this paper is to identify an approximate algorithm that will find a large subset of greatest common factor similar groups of arbitrary factors in far less time and space than an exact algorithm using examiner-provided selection criteria for factor definition.


An End To End-To-End? A Review Essay Of Barbara Van Schewick’S Internet Architecture And Innovation, Adam Candeub May 2012

An End To End-To-End? A Review Essay Of Barbara Van Schewick’S Internet Architecture And Innovation, Adam Candeub

Federal Communications Law Journal

Amidst much controversy, the FCC released its landmark "network neutrality" order in December 2010. This regulation prohibits Internet service providers, such as Verizon or Comcast, from discriminating in favor of traffic or content that they own or with which they are affiliated. Professor Barbara van Schewick's recently published book, Internet Architecture and Innovation, could not be timelier. Employing a variety of economic and technical arguments, van Schewick defends the type of regulation the FCC passed as necessary to preserve the Internet's potential for innovation. My central critique of Internet Architecture is its deployment of economic theories on one side of …


Copyright Page Apr 2012

Copyright Page

The Journal of Tennessee State University

No abstract provided.


Table Of Contents Apr 2012

Table Of Contents

The Journal of Tennessee State University

No abstract provided.


Forward Apr 2012

Forward

The Journal of Tennessee State University

No abstract provided.


The Economic Impact Of Tennessee State University On The State Of Tennessee 2010-2011, Soumendra Ghosh, Anis Mnif, Sabeen Fahim Apr 2012

The Economic Impact Of Tennessee State University On The State Of Tennessee 2010-2011, Soumendra Ghosh, Anis Mnif, Sabeen Fahim

The Journal of Tennessee State University

No abstract provided.


Editorial Board Page Apr 2012

Editorial Board Page

The Journal of Tennessee State University

No abstract provided.


Some Notable Writers, Editors, And Publishers Affiliated With Tsu Over Its First 100 Years Apr 2012

Some Notable Writers, Editors, And Publishers Affiliated With Tsu Over Its First 100 Years

The Journal of Tennessee State University

No abstract provided.


Living Our Lives As Elders: A Convocation Address, Celeste C. Williams Apr 2012

Living Our Lives As Elders: A Convocation Address, Celeste C. Williams

The Journal of Tennessee State University

No abstract provided.


Dr. Thomas E. Poag: The Life And Works Of A Tsu Legend, Helen R. Houston Apr 2012

Dr. Thomas E. Poag: The Life And Works Of A Tsu Legend, Helen R. Houston

The Journal of Tennessee State University

No abstract provided.


Service-Learning And Civic Engagement: A Return To Our Roots, Deena Sue Fuller Apr 2012

Service-Learning And Civic Engagement: A Return To Our Roots, Deena Sue Fuller

The Journal of Tennessee State University

No abstract provided.


Coach Ed Temple And The Tigerbelles, Yildiz B. Binkley, Reavis Mitchell, Tara Mitchell Mielnik Apr 2012

Coach Ed Temple And The Tigerbelles, Yildiz B. Binkley, Reavis Mitchell, Tara Mitchell Mielnik

The Journal of Tennessee State University

No abstract provided.


Past To Present: School Of Allied Health Professions To College Of Health Sciences And Contributions To Health Improvement In The Local Community And Beyond, Mohamed Kanu, Ronald Barredo, Elizabeth Williams, Revlon Briggs Apr 2012

Past To Present: School Of Allied Health Professions To College Of Health Sciences And Contributions To Health Improvement In The Local Community And Beyond, Mohamed Kanu, Ronald Barredo, Elizabeth Williams, Revlon Briggs

The Journal of Tennessee State University

No abstract provided.


A Royal Band, The Chosen Few: The Birth Of Tennessee State University, Crystal A. Degregory Apr 2012

A Royal Band, The Chosen Few: The Birth Of Tennessee State University, Crystal A. Degregory

The Journal of Tennessee State University

No abstract provided.


Tennessee State University: A Synopsis Of “A Touch Of Greatness,” 1912-2012, Bobby L. Lovett Apr 2012

Tennessee State University: A Synopsis Of “A Touch Of Greatness,” 1912-2012, Bobby L. Lovett

The Journal of Tennessee State University

No abstract provided.


Table Of Contents Mar 2012

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Column: The Physics Of Digital Information-Part 2, Fred Cohen Jan 2012

Column: The Physics Of Digital Information-Part 2, Fred Cohen

Journal of Digital Forensics, Security and Law

In part 1 of this series (Cohen, 2011a), we discussed some of the basics of building a physics of digital information. Assuming, as we have, that science is about causality and that a scientific theory should require that cause(C) produces effect (E) via mechanism M (written C→ME), we explore that general theory of digital systems from the perspective of attributing effects (i.e., traces of activities in digital systems) to their causes. Full details of the current version of this physics are available online2 , and in this article, we explore a few more of them.


An Overview Of The Jumplist Configuration File In Windows 7, Harjinder S. Lallie, Parmjit S. Bains Jan 2012

An Overview Of The Jumplist Configuration File In Windows 7, Harjinder S. Lallie, Parmjit S. Bains

Journal of Digital Forensics, Security and Law

The introduction of Jumplists in Windows 7 was an important feature from a forensic examiners viewpoint. Jumplist configuration files can provide the examiner with a wealth of information relating to file access and in particular: dates/times, Volume GUIDs and unique file object IDs relating to those files. Some of the information in the Jumplist could be used to build a more precise timeline relating to system and file usage. In this article, we analyse the structure of a Jumplist configuration file and in particular a record from a Jumplist configuration file and highlight some of the important entries therein.


Comparing Android Applications To Find Copying, Larry Melling, Bob Zeidman Jan 2012

Comparing Android Applications To Find Copying, Larry Melling, Bob Zeidman

Journal of Digital Forensics, Security and Law

The Android smartphone operating system includes a Java virtual machine that enables rapid development and deployment of a wide variety of applications. The open nature of the platform means that reverse engineering of applications is relatively easy, and many developers are concerned as applications similar to their own show up in the Android marketplace and want to know if these applications are pirated. Fortunately, the same characteristics that make an Android application easy to reverse engineer and copy also provide opportunities for Android developers to compare downloaded applications to their own. This paper describes the process for comparing a developer’s …


Pandora’S Email Box? An Exploratory Study Of Web-Based Email Forgery Detection And Validation., Richard Boddington, Grant Boxall, Jeremy Ardley Jan 2012

Pandora’S Email Box? An Exploratory Study Of Web-Based Email Forgery Detection And Validation., Richard Boddington, Grant Boxall, Jeremy Ardley

Journal of Digital Forensics, Security and Law

Web based email systems may be a source of pristine digital evidence because of the perceived difficulty of client tampering with messages stored inside the email account. We demonstrate that such assumption is wrong in the case of Windows Live Hotmail®1 . Windows Live Mail®1 synchronises message on client-side computers with the Hotmail® server, benefiting users wishing to synchronise their email accounts and personal devices. However, this synchronisation opens an exploit for wrongdoers to tamper with existing email messages and attachments as well as facilitating the insertion of fabricated messages. The exploit process enables persistent storage of tampered and fabricated …


Applying The Acpo Principles In Public Cloud Forensic Investigations, Harjinder S. Lallie, Lee Pimlott Jan 2012

Applying The Acpo Principles In Public Cloud Forensic Investigations, Harjinder S. Lallie, Lee Pimlott

Journal of Digital Forensics, Security and Law

The numerous advantages offered by cloud computing has fuelled its growth and has made it one of the most significant of current computing trends. The same advantages have created complex issues for those conducting digital forensic investigations. Digital forensic investigators rely on the ACPO (Association of Chief Police Officers) or similar guidelines when conducting an investigation, however the guidelines make no reference to some of the issues presented by cloud investigations. This study investigates the impact of cloud computing on ACPO’s core principles and asks whether these principles can still be applied in a cloud investigation and the challenges presented …


Technology Corner: Dating Of Electronic Hardware For Prior Art Investigations, Sellam Ismail Jan 2012

Technology Corner: Dating Of Electronic Hardware For Prior Art Investigations, Sellam Ismail

Journal of Digital Forensics, Security and Law

In many legal matters, specifically patent litigation, determining and authenticating the date of computer hardware or other electronic products or components is often key to establishing the item as legitimate evidence of prior art. Such evidence can be used to buttress claims of technologies available or of events transpiring by or at a particular date.


Book Review: The Software Ip Detective's Handbook: Measurement, Comparison, And Infringement Detections, Diane Barrett Jan 2012

Book Review: The Software Ip Detective's Handbook: Measurement, Comparison, And Infringement Detections, Diane Barrett

Journal of Digital Forensics, Security and Law

Do not the book title fool you into thinking that the book is only for those looking to detect software infringement detection. It is a comprehensive look at software intellectual property. The book covers a wide range of topics and has something to offer for just about everyone from lawyers to programmers.


Column: Factors Affecting Data Decay, Kevin Fairbanks, Simson Garfinkel Jan 2012

Column: Factors Affecting Data Decay, Kevin Fairbanks, Simson Garfinkel

Journal of Digital Forensics, Security and Law

In nuclear physics, the phrase decay rate is used to denote the rate that atoms and other particles spontaneously decompose. Uranium-235 famously decays into a variety of daughter isotopes including Thorium and Neptunium, which themselves decay to others. Decay rates are widely observed and wildly different depending on many factors, both internal and external. U-235 has a half-life of 703,800,000 years, for example, while free neutrons have a half-life of 611 seconds and neutrons in an atomic nucleus are stable.


Toward Alignment Between Communities Of Practice And Knowledge-Based Decision Support, Jason Nichols, David Biros, Mark Weiser Jan 2012

Toward Alignment Between Communities Of Practice And Knowledge-Based Decision Support, Jason Nichols, David Biros, Mark Weiser

Journal of Digital Forensics, Security and Law

The National Repository of Digital Forensics Information (NRDFI) is a knowledge repository for law enforcement digital forensics investigators (LEDFI). Over six years, the NRDFI has undertaken significant design revisions in order to more closely align the architecture of the system with theory addressing motivation to share knowledge and communication within ego-centric groups and communities of practice. These revisions have been met with minimal change in usage patterns by LEDFI community members, calling into question the applicability of relevant theory when the domain for knowledge sharing activities expands beyond the confines of an individual organization to a community of practice. When …


Book Review: System Forensics, Investigation, And Response, Nate Keith Jan 2012

Book Review: System Forensics, Investigation, And Response, Nate Keith

Journal of Digital Forensics, Security and Law

I recently expressed an interest to a respected colleague in finding a way to “give back” to the forensic community. He suggested writing a review for a text he recently received and provide feedback to the community. It is my intent to present an objective analysis of System Forensics, Investigation, and Response.


Automated Identification And Reconstruction Of Youtube Video Access, Jonathan Patterson, Christopher Hargreaves Jan 2012

Automated Identification And Reconstruction Of Youtube Video Access, Jonathan Patterson, Christopher Hargreaves

Journal of Digital Forensics, Security and Law

YouTube is one of the most popular video-sharing websites on the Internet, allowing users to upload, view and share videos with other users all over the world. YouTube contains many different types of videos, from homemade sketches to instructional and educational tutorials, and therefore attracts a wide variety of users with different interests. The majority of YouTube visits are perfectly innocent, but there may be circumstances where YouTube video access is related to a digital investigation, e.g. viewing instructional videos on how to perform potentially unlawful actions or how to make unlawful articles. When a user accesses a YouTube video …


Technology Corner Automated Data Extraction Using Facebook, Nick V. Flor Jan 2012

Technology Corner Automated Data Extraction Using Facebook, Nick V. Flor

Journal of Digital Forensics, Security and Law

Because of Facebook’s popularity, law enforcement agents often use it as a key source of evidence. But like many user digital trails, there can be a large amount of data to extract for analysis. In this paper, we explore the basics of extracting data programmatically from a user’s Facebook via a Web app. A data extraction app requests data using the Facebook Graph API, and Facebook returns a JSON object containing the data. Before an app can access a user’s Facebook data, the user must log into Facebook and give permission. Thus, this approach is limited to situations where users …


Column: Analysis Of Digital Traces, Fred Cohen Jan 2012

Column: Analysis Of Digital Traces, Fred Cohen

Journal of Digital Forensics, Security and Law

In part 1 of this series (Cohen, 2011a), Analysis of digital traces is a foundational process by which the examiner, typically using computer software tools, comes to understand and answer basic questions regarding digital traces.