Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 27 of 27

Full-Text Articles in Social and Behavioral Sciences

W&L Law Fall Scholarship Celebration 2013, Nora V. Demleitner Nov 2013

W&L Law Fall Scholarship Celebration 2013, Nora V. Demleitner

Library Events

On November 14, 2013, the Washington and Lee Law Library hosted a first-of-its-kind Fall Scholarship Celebration. The event took place in the Law Library's main reading room from 5:00 p.m. to 7:00 p.m.

On display were dozens of scholarly articles, books, chapters, and amicus briefs authored by the W&L Law faculty and student body during 2012 and 2013, with hundreds of additional works accessible online through the Scholarly Commons institutional repository.

Faculty, librarians, staff, and administrators mingled with law students over hors d'oeuvres and wine to peruse the formidable scholarly output of the W&L Law community. Spouses, alumni, faculty from …


A Forensic Study Of The Effectiveness Of Selected Anti-Virus Products Against Ssdt Hooking Rootkits, Sami Al-Shaheri, Dale Lindskog, Pavol Zavarsky, Ron Ruhl Jun 2013

A Forensic Study Of The Effectiveness Of Selected Anti-Virus Products Against Ssdt Hooking Rootkits, Sami Al-Shaheri, Dale Lindskog, Pavol Zavarsky, Ron Ruhl

Annual ADFSL Conference on Digital Forensics, Security and Law

For Microsoft Windows Operating Systems, both anti-virus products and kernel rootkits often hook the System Service Dispatch Table (SSDT). This research paper investigates the interaction between these two in terms of the SSDT. To investigate these matters, we extracted digital evidence from volatile memory, and studied that evidence using the Volatility framework. Due to the diversity in detection techniques used by the anti-virus products, and the diversity of infection techniques used by rootkits, our investigation produced diverse results, results that helped us to understand several SSDT hooking strategies, and the interaction between the selected anti-virus products and the rootkit samples. …


An Ontology-Based Forensic Analysis Tool, Mohammed Alzaabi, Andy Jones, Thomas A. Martin Jun 2013

An Ontology-Based Forensic Analysis Tool, Mohammed Alzaabi, Andy Jones, Thomas A. Martin

Annual ADFSL Conference on Digital Forensics, Security and Law

The analysis of forensic investigation results has generally been identified as the most complex phase of a digital forensic investigation. This phase becomes more complicated and time consuming as the storage capacity of digital devices is increasing, while at the same time the prices of those devices are decreasing. Although there are some tools and techniques that assist the investigator in the analysis of digital evidence, they do not adequately address some of the serious challenges, particularly with the time and effort required to conduct such tasks. In this paper, we consider the use of semantic web technologies and in …


First Glance: An Introductory Analysis Of Network Forensics Of Tor, Raymond Hansen Jun 2013

First Glance: An Introductory Analysis Of Network Forensics Of Tor, Raymond Hansen

Annual ADFSL Conference on Digital Forensics, Security and Law

The Tor network is a low-latency overlay network for TCP flows that is designed to provide privacy and anonymity to its users. It is currently in use by many as a means to avoid censorship of both information to be shared and information to be retrieved. This paper details the architecture of the Tor network as a platform for evaluating the current state of forensic analysis of the Tor network. Specific attempts to block access to the Tor network are examined to identify (a) the processes utilized to identify Tor nodes, and (b) the resulting exposure of potentially inculpatory evidence. …


A Thematic Review Of User Compliance With Information Security Policies Literature, David Sikolia Jun 2013

A Thematic Review Of User Compliance With Information Security Policies Literature, David Sikolia

Annual ADFSL Conference on Digital Forensics, Security and Law

The adoption of computer and internet technology has greatly improved the way businesses operate. However the risk to the confidentiality, integrity and availability of organizational data and systems has greatly increased too. Information security is an ever present concern for all organizations. Financial estimates of the impact of security breaches to information and technology resources range from hundreds of billions to over one trillion dollars each year worldwide (D'Arcy et al., 2011b). Organizations have therefore developed a combination of technical, administrative, and physical controls to reduce this risk (D'Arcy et al., 2011a). Administrative measures include the development of information security …


Journey Into Windows 8 Recovery Artifacts, W. K. Johnson Jun 2013

Journey Into Windows 8 Recovery Artifacts, W. K. Johnson

Annual ADFSL Conference on Digital Forensics, Security and Law

One of the most difficult processes of digital forensics is to understand how new technology interacts with current technology and how digital forensic analysts can utilize current Digital Forensics technologies and processes to recover and find information hidden. Microsoft has released their new operating system Windows 8, with this new release Microsoft has added some features to the operating system that will present some interesting complications to digital forensics. Since the initial release of the Windows 8 Release Candidates there have been some research released that focus primarily on the new user created artifacts and a few artifacts that have …


An Image Forensic Scheme With Robust And Fragile Watermarking For Business Documents, Sai Ho Kwok Jun 2013

An Image Forensic Scheme With Robust And Fragile Watermarking For Business Documents, Sai Ho Kwok

Annual ADFSL Conference on Digital Forensics, Security and Law

This paper proposes an image forensic scheme with both robust and fragile watermarking techniques for business documents. Through a dual watermarking approach, the proposed scheme can achieve image forensics objectives of (a) identification of source; (b) authentication of documents; and (c) locating the tempered areas of documents due to attacks. An example is presented to prove the concepts of the proposed scheme.

Keywords: Image Forensics, Fragile and Robust Watermarking, Business Document.


Significance Of Semantic Reconciliation In Digital Forensics, Nickson M. Karie, H. S. Venter Jun 2013

Significance Of Semantic Reconciliation In Digital Forensics, Nickson M. Karie, H. S. Venter

Annual ADFSL Conference on Digital Forensics, Security and Law

Digital forensics (DF) is a growing field that is gaining popularity among many computer professionals, law enforcement agencies and other stakeholders who must always cooperate in this profession. Unfortunately, this has created an environment replete with semantic disparities within the domain that needs to be resolved and/or eliminated. For the purpose of this study, semantic disparity refers to disagreements about the meaning, interpretation, descriptions and the intended use of the same or related data and terminologies. If semantic disparity is not detected and resolved, it may lead to misunderstandings. Even worse, since the people involved may not be from the …


System-Generated Digital Forensic Evidence In Graphic Design Applications, Enos Mabuto, Hein Venter Jun 2013

System-Generated Digital Forensic Evidence In Graphic Design Applications, Enos Mabuto, Hein Venter

Annual ADFSL Conference on Digital Forensics, Security and Law

Graphic design applications are often used for the editing and design of digital art. The same applications can be used for creating counterfeit documents such as identity documents (IDs), driver’s licences, passports, etc. However, the use of any graphic design application leaves behind traces of digital information that can be used during a digital forensic investigation. Current digital forensic tools examine a system to find digital evidence, but they do not examine a system specifically for the creating of counterfeit documents created through the use of graphic design applications. The paper in hand reviews the system-generated digital forensic evidence gathered …


Money Laundering Detection Framework To Link The Disparate And Evolving Schemes, Murad Mehmet, Duminda Wijesekera, Miguel F. Buchholtz Jun 2013

Money Laundering Detection Framework To Link The Disparate And Evolving Schemes, Murad Mehmet, Duminda Wijesekera, Miguel F. Buchholtz

Annual ADFSL Conference on Digital Forensics, Security and Law

Money launderers hide traces of their transactions with the involvement of entities that participate in sophisticated schemes. Money laundering detection requires unraveling concealed connections among multiple but seemingly unrelated human money laundering networks, ties among actors of those schemes, and amounts of funds transferred among those entities. The link among small networks, either financial or social, is the primary factor that facilitates money laundering. Hence, the analysis of relations among money laundering networks is required to present the full structure of complex schemes. We propose a framework that uses sequence matching, case-based analysis, social network analysis, and complex event processing …


Identifying Peer-To-Peer Traffic On Shared Wireless Networks, Simon Piel, Ej Jung Jun 2013

Identifying Peer-To-Peer Traffic On Shared Wireless Networks, Simon Piel, Ej Jung

Annual ADFSL Conference on Digital Forensics, Security and Law

Tracing contraband downloads leads investigators to an IP address, and in turn Internet Service Providers (ISP) can provide a physical location using this IP address. However, most homes and offices share this IP address among many computers using wireless networks. In other words, there needs to be another investigation to find out which computer was responsible for contraband downloads. To make matters worse, these shared wireless networks often have vulnerabilities in access control such as using WEP or using weak passwords. In such cases, any computer in range, not necessarily at the given physical address, could be responsible. We use …


On Resolving The Cloud Forensics Conundrum, John Bagby Jun 2013

On Resolving The Cloud Forensics Conundrum, John Bagby

Annual ADFSL Conference on Digital Forensics, Security and Law

The “cloud” is idiom for an ill-defined set of online services. The cloud simultaneously offers IT savings and promises advances in functionality (e.g., ubiquity). However, the cloud also imposes poorly understood burdens on security and it may provoke injustice. Thus, the cloud presents a durable and seemingly irreconcilable conundrum for the digital forensics communit(ies). First, cloud proponents make efficiency promises for cloud services (SaaS, IaaS, PaaS). These translate well into the digital forensics domain. Indeed, the cloud may enable crowd sourcing of investigatory data vastly lowering costs of dispute resolution. For example, cloud-based litigation war rooms may reduce electronic discovery …


Cybercrime And Punishment: An Analysis Of The Deontological And Utilitarian Functions Of Punishment In The Information Age, Karim Jetha Jun 2013

Cybercrime And Punishment: An Analysis Of The Deontological And Utilitarian Functions Of Punishment In The Information Age, Karim Jetha

Annual ADFSL Conference on Digital Forensics, Security and Law

This conceptual piece analyzes the role of criminal punishment and the nature of cyber crime to investigate whether the current punishment schemes are appropriate given the deontological and utilitarian goals of punishment: retribution, deterrence, incapacitation, and rehabilitation. The research has implications for policymaking in cybercriminal law.

Keywords: cybercrime, criminal law, punishment, retribution, deterrence, information economics


The Development Of Computer Forensic Legal System In China, Yonghao Mai, K. P. Chow, Rongsheng Xu, Gang Zhou, Fei Xu, Jun Zhang Jun 2013

The Development Of Computer Forensic Legal System In China, Yonghao Mai, K. P. Chow, Rongsheng Xu, Gang Zhou, Fei Xu, Jun Zhang

Annual ADFSL Conference on Digital Forensics, Security and Law

The computer forensic discipline was established around 2000 in China, which was further developed along with Chinese judicial appraisal system in 2005. The new criminal and civil procedure laws of the People’s Republic of China was enacted on 1 Jan 2013. The new laws specified electronic data is legal evidence and has great impact on the current practice on handling electronic evidence. This paper introduces the electronic data and electronic evidence examination procedure in mainland China, the general concept of computer forensic legal system, the management of computer judicial experts, the management of computer judicial expertise institutions.

Keywords: China legal …


Session 4-2-E: The Effects Of Gaming Tax/Retention Rate On Casino Performance, Will E. Cummings May 2013

Session 4-2-E: The Effects Of Gaming Tax/Retention Rate On Casino Performance, Will E. Cummings

International Conference on Gambling & Risk Taking

Overview

Gaming Taxes affect investors in and operators of casinos

... and therefore casino performance

Gravity Models in general High variance from classical ideal

Variance tells us something about the impact of gaming tax rates


Session 4-1-B: Casino Legalization As An Evolutionary Game -- Who Will Be The Next?, Miao He May 2013

Session 4-1-B: Casino Legalization As An Evolutionary Game -- Who Will Be The Next?, Miao He

International Conference on Gambling & Risk Taking

Introduction

For the community/governor who has a strong preposition to casino gaming (e.g., gambler, religious group), his/her motivation to participate/accept casino legalization is

∆PAEA+tA>cî and ∆PB(RB+EB)+tB>cĴ

What’s the motivation for the other community/governors who are neutral to casino gaming?

How the casino legalization process evolved and finally reached the equilibrium state?


Session 3-4-B: Impacts Of The Structure Of The Casino Industry, William N. Thompson, Catherine Prentice May 2013

Session 3-4-B: Impacts Of The Structure Of The Casino Industry, William N. Thompson, Catherine Prentice

International Conference on Gambling & Risk Taking

This paper looks at impacts of the structures of casino industries in 13 American states venues. The legalization of casinos has been a major policy issue in scores of national and sub-national venues over the past 60 years. Among the critical issues in the legalization process has been the subject of whether casino establishments should be authorized as singular, that is, monopoly, entities in a specific location (city, state, or nation) much as public utilities, or they should be licensed in an open market free competitive manner. A middle ground approach find venues allowing a limited number of licenses, ergo, …


Session 3-3-B: The Interplay Between Law, Development And Spillover Effects Of Casino Gaming: Theory And The Asian Evidences, Ricardo Chi Sen Siu May 2013

Session 3-3-B: The Interplay Between Law, Development And Spillover Effects Of Casino Gaming: Theory And The Asian Evidences, Ricardo Chi Sen Siu

International Conference on Gambling & Risk Taking

Taking into consideration of the unique features and practice of casino gaming, the significance of law in the development of this industry, and the onging interactions between law, the industry’s succeeding performance and its spillover effects are generalized and illustrated in this paper. Based on the rationales of law and economics, and the institutional approach to economic analysis, a functional model is constructed to depict the related interplaying forces and the development of casino gaming. In principle, it is shown that business scope and scale of casino gaming is largely defined by law on one hand, and the revisions of …


Session 3-2-B: What Changing Public Policies Toward Gambling Mean For Gaming Law, I. Nelson Rose May 2013

Session 3-2-B: What Changing Public Policies Toward Gambling Mean For Gaming Law, I. Nelson Rose

International Conference on Gambling & Risk Taking

The Three Waves Of Legal Gambling

First Wave - Colonial period to mid-19th century: Legal Debris: “Lotteries” prohibited in state constitutions and Canada (except Quebec)

Second Wave - Wild West; South after the Civil War , new inventions. Crash - Victorian morality Legal Debris: Statutes prohibit bookmaking, slot machines; U.S. federal and Quebec anti-lottery laws

Third Wave - Depression to present: Legal Debris: Piecemeal legalization by states, provinces


Session 3-2-B: Paspa: An Unconstitutional Patent, Kevin P. Braig May 2013

Session 3-2-B: Paspa: An Unconstitutional Patent, Kevin P. Braig

International Conference on Gambling & Risk Taking

The Professional and Amateur Sports Protection Act (“PASPA”) is a patent monopoly because the statute (A) imitates the Crown’s practice of allocating markets by patent; (B) functions like a patent issued under the United States Patent Code; and (C) imposes monopoly-like costs upon the public. The Constitution’s Patent Clause is a brilliant public financing scheme and unique in that it is the only grant of power to Congress in the Constitution that begins with a specific prescription of proper legislative purpose. Congress cannot grant just any person a patent monopoly for any purpose. Rather, Congress can grant a patent monopoly …


Las Abuelas E La Memoria, Doris Cristobal Apr 2013

Las Abuelas E La Memoria, Doris Cristobal

Archives of an Activist: Celebrating the Donations of Rita Arditti to UMass Boston

Viví en Buenos Aires Argentina durante cuatro años y en mi estadía en ese país aprendí mucho acerca de los efectos que les había dejado la Dictadura militar de 1976. Conocí a hijos, familiares, madres y abuelas de los desaparecidos y de su trabajo importante luchando por la vigencia de los derechos humanos en la Argentina. Aprendí también, que existen fuertes lazos de solidaridad entre el pueblo argentino y los pueblos de Latinoamérica; por ejemplo que el pueblo argentino es muy agradecido con mi país porque durante la dictadura muchos exiliados encontraron protección del gobierno peruano, y que en la …


Death And Politics: The Role Of Demographic Characteristics And Testimony Type In Death Penalty Cases Involving Future Dangerousness Testimony, Amy Magnus, Miliaikeala Heen, Joel D. Lieberman Apr 2013

Death And Politics: The Role Of Demographic Characteristics And Testimony Type In Death Penalty Cases Involving Future Dangerousness Testimony, Amy Magnus, Miliaikeala Heen, Joel D. Lieberman

Graduate Research Symposium (GCUA) (2010 - 2017)

Past research examining expert future dangerousness prediction testimony in death penalty cases and civil confinement hearings for sex offenders has found that jurors tend to be more persuaded by less scientific “clinical” testimony and less influenced by “actuarial” based testimony. Jurors demonstrate greater receptivity for clinical testimony despite the fact that actuarial testimony has been shown to be a better predictor of future dangerousness. Research in this area has focused on identifying cognitive factors that can potentially be manipulated during a trial to increase the effectiveness of actuarial testimony on jurors. A mock jury study was conducted to extend these …


Juror Typologies And Dna Comprehension:Who Benefits From Jury Trial Innovations?, Mari Sakiyama, Joel D. Lieberman Apr 2013

Juror Typologies And Dna Comprehension:Who Benefits From Jury Trial Innovations?, Mari Sakiyama, Joel D. Lieberman

Graduate Research Symposium (GCUA) (2010 - 2017)

When DNA evidence is presented in the courtroom, it is typically accompanied by complex testimony conveying information such as the method of generating population frequencies, match criteria and probabilities, as well as laboratory errors and error rates. Although this evidence may have high probative value, the legal community has expressed growing concern regarding jurors’ ability to comprehend it. However, courts have implemented a variety of jury trial innovations to facilitate jurors’ ability to process complex information. Although these innovations may have a positive effect on comprehension of complex trial evidence, it is unclear whether some jurors are more likely to …


Irresistable: How An Ir (Institutional Repository) Can Improve Library Collections While Preserving The Past, Monica Brooks, David Evans, Tim Tamminga, Jingping Zhang, Gretchen Beach, Nat Debruin, Larry Sheret, Thomas L. Walker Ii, Paris E. Webb Apr 2013

Irresistable: How An Ir (Institutional Repository) Can Improve Library Collections While Preserving The Past, Monica Brooks, David Evans, Tim Tamminga, Jingping Zhang, Gretchen Beach, Nat Debruin, Larry Sheret, Thomas L. Walker Ii, Paris E. Webb

MU IR Day: April 11, 2013

Marshall University’s IR team will discuss the creation, progress, and benefits of the Marshall Digital Scholar, an online institutional repository. There will be time for libraries, large and small, to ask questions about digital collecting and digital projects.


Introduction To Marshall Digital Scholar/Everything You Thought You Knew About Copyright, Jingping Zhang, Monica Brooks, Paris E. Webb, Larry Sheret Apr 2013

Introduction To Marshall Digital Scholar/Everything You Thought You Knew About Copyright, Jingping Zhang, Monica Brooks, Paris E. Webb, Larry Sheret

MU IR Day: April 11, 2013

Copyright Primer: demystifying the law and best practices for librarians. Ignorance of the law is no longer acceptable and individuals can now be assessed astronomically high statutory damages per infringement. Join us for a frank and informative discussion regarding current copyright law and application in your library when working with digital publisher content. We don’t pretend to have all the answers but our team will share our MDS workflow for securing permissions for inclusion in the institutional repository for public access


To Internet Or Not To Internet: Ethics Opinions On Internet Usage, Sharon Bradley Mar 2013

To Internet Or Not To Internet: Ethics Opinions On Internet Usage, Sharon Bradley

Continuing Legal Education Presentations

Considers the ethical implications of using email to communicate with clients, using cloud storage for legal files, and tracking people related to a case via the Internet . Highlights recent state bar ethics committee decisions.


Labor, Management And The Right To Work In America, Jack D. Ham Jr. Mar 2013

Labor, Management And The Right To Work In America, Jack D. Ham Jr.

Georgia State Undergraduate Research Conference

No abstract provided.