Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

3210 Full-Text Articles 2871 Authors 1210557 Downloads 98 Institutions

All Articles in Computer Law

Faceted Search

3210 full-text articles. Page 1 of 80.

Health Information Technology, E-Prescribing And Hurricane Katrina: Could Electronic Health Records Have Made A Difference, Robert Malone 2017 University of Oklahoma College of Law

Health Information Technology, E-Prescribing And Hurricane Katrina: Could Electronic Health Records Have Made A Difference, Robert Malone

Oklahoma Journal of Law and Technology

No abstract provided.


Health Information Technology And Hipaa: Can We Satisfy Security And Privacy Standards In The Digital Age, Robert Malone 2017 University of Oklahoma College of Law

Health Information Technology And Hipaa: Can We Satisfy Security And Privacy Standards In The Digital Age, Robert Malone

Oklahoma Journal of Law and Technology

No abstract provided.


Health Information Technology: Transforming The Healthcare Industry For The 21st Century, Robert Malone 2017 University of Oklahoma College of Law

Health Information Technology: Transforming The Healthcare Industry For The 21st Century, Robert Malone

Oklahoma Journal of Law and Technology

No abstract provided.


Toward A Direct Functional Relationship Requirement For Claims To Software Encoded On A Computer-Readable Storage Medium: Rethinking In Re Beauregard In Response To The Uspto's Interim Guidelines Regarding The Patentability Of Data Signal Claims, Elizabeth A. Richardson 2017 University of Oklahoma College of Law

Toward A Direct Functional Relationship Requirement For Claims To Software Encoded On A Computer-Readable Storage Medium: Rethinking In Re Beauregard In Response To The Uspto's Interim Guidelines Regarding The Patentability Of Data Signal Claims, Elizabeth A. Richardson

Oklahoma Journal of Law and Technology

No abstract provided.


Terms Of Service And The Computer Fraud And Abuse Act: A Trap For The Unwary?, David A. Puckett 2017 University of Oklahoma College of Law

Terms Of Service And The Computer Fraud And Abuse Act: A Trap For The Unwary?, David A. Puckett

Oklahoma Journal of Law and Technology

No abstract provided.


Regulating Robo Advice Across The Financial Services Industry, Tom Baker, Benedict G. C. Dellaert 2017 University of Pennsylvania Law School

Regulating Robo Advice Across The Financial Services Industry, Tom Baker, Benedict G. C. Dellaert

Faculty Scholarship

Automated financial product advisors – “robo advisors” – are emerging across the financial services industry, helping consumers choose investments, banking products, and insurance policies. Robo advisors have the potential to lower the cost and increase the quality and transparency of financial advice for consumers. But they also pose significant new challenges for regulators who are accustomed to assessing human intermediaries. A well-designed robo advisor will be honest and competent, and it will recommend only suitable products. Because humans design and implement robo advisors, however, honesty, competence, and suitability cannot simply be assumed. Moreover, robo advisors pose new scale risks that are different ...


Data For The Algorithm As A Human Artifact: Implications For Legal [Re]Search, Susan Nevelow Mart 2017 University of Colorado Law School

Data For The Algorithm As A Human Artifact: Implications For Legal [Re]Search, Susan Nevelow Mart

Research Data

These documents underlie and are cited in this empirical study: Susan Nevelow Mart, The Algorithm as a Human Artifact: Implications for Legal [Re]Search, 109 Law Libr. J. 387, 409 n.123 (2017), available at http://scholar.law.colorado.edu/articles/755/.

The ZIP file contains three files: one PDF document ("Tables for Charts 1-3"), and two SPSS files ("Data Archive" and "Syntax Archive" (SPSS version 24)). The "Syntax Archive" file may be viewed in a text editor (e.g., Notepad) as well as in SPSS.


The Algorithm As A Human Artifact: Implications For Legal [Re]Search [Appendix B], Susan Nevelow Mart 2017 University of Colorado Law School

The Algorithm As A Human Artifact: Implications For Legal [Re]Search [Appendix B], Susan Nevelow Mart

Research Data

This document, "Search Instructions for Algorithm Study," is an electronic Appendix B to, and is cited in, the empirical study: Susan Nevelow Mart, The Algorithm as a Human Artifact: Implications for Legal [Re]Search, 109 Law Libr. J. 387, 400 n.78 (2017), available at http://scholar.law.colorado.edu/articles/755/.


Averting Robot Eyes, Margot E. Kaminski, Matthew Rueben, William D. Smart, Cindy M. Grimm 2017 University of Maryland Francis King Carey School of Law

Averting Robot Eyes, Margot E. Kaminski, Matthew Rueben, William D. Smart, Cindy M. Grimm

Maryland Law Review

No abstract provided.


Reviving The Public Trustee Concept And Applying It To Information Privacy Policy, Priscilla M. Regan 2017 University of Maryland Francis King Carey School of Law

Reviving The Public Trustee Concept And Applying It To Information Privacy Policy, Priscilla M. Regan

Maryland Law Review

No abstract provided.


Table Of Contents, 2017 Embry-Riddle Aeronautical University

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Front Matter, 2017 Embry-Riddle Aeronautical University

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Back Matter, 2017 Embry-Riddle Aeronautical University

Back Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Masthead, 2017 Embry-Riddle Aeronautical University

Masthead

Journal of Digital Forensics, Security and Law

No abstract provided.


A Power Grid Incident Identification Based On Physically Derived Cyber-Event Detection, Travis Atkison, Nathan Wallace 2017 University of Alabama

A Power Grid Incident Identification Based On Physically Derived Cyber-Event Detection, Travis Atkison, Nathan Wallace

Journal of Digital Forensics, Security and Law

This article proposes a cyber-event detection framework to aid in incident Identification and digital forensics cases aimed at investigating cyber crime committed against the critical infrastructure power grid. However, unlike other similar investigative techniques, the proposed approach examines only the physical information to derive a cyber conclusion. The developed framework extracts information from the physical parameters stored in historical databases of SCADA systems. The framework uses a pseudo-trusted model derived from randomly selected power system observations found in the historical databases. Afterwards, a technique known as Bayesian Model Averaging is used to average the models and create a more trusted ...


File Type Identification - Computational Intelligence For Digital Forensics, Konstantinos Karampidis, Giorgos Papadourakis 2017 Technological Educational Institute of Crete

File Type Identification - Computational Intelligence For Digital Forensics, Konstantinos Karampidis, Giorgos Papadourakis

Journal of Digital Forensics, Security and Law

In modern world, the use of digital devices for leisure or professional reasons is growing quickly; nevertheless, criminals try to fool authorities and hide evidence in a computer by changing the file type. File type detection is a very demanding task for a digital forensic examiner. In this paper, a new methodology is proposed – in a digital forensics perspective- to identify altered file types with high accuracy by employing computational intelligence techniques. The proposed methodology is applied to the three most common image file types (jpg, png and gif) as well as to uncompressed tiff images. A three-stage process involving ...


Forensic Cell Site Analysis: A Validation & Error Mitigation Methodology, John B. Minor 2017 Embry-Riddle Aeronautical University

Forensic Cell Site Analysis: A Validation & Error Mitigation Methodology, John B. Minor

Journal of Digital Forensics, Security and Law

The E911 Initiative in the mid-1990s established an opportunity to obtain location specific digital evidence of subscriber activity from cellular carriers. Call Detail Records (CDR) containing Cell Site Location Information (CSLI) evidence production was made available from cellular carriers in response to the CALEA, 911 and ECPA acts. In the late 1990s, cellular carriers began to produce evidence for investigative and litigation purposes. CDR/CSLI evidence has become an important evidentiary focus in the courtroom. This research project resulted in the creation of a method of validating cellular carrier records accuracy and mitigating errors in forensic cell site analyst conclusions ...


Towards A More Representative Definition Of Cyber Security, Daniel Schatz, Rabih Bashroush, Julie Wall 2017 University of East London

Towards A More Representative Definition Of Cyber Security, Daniel Schatz, Rabih Bashroush, Julie Wall

Journal of Digital Forensics, Security and Law

In recent years, ‘Cyber Security’ has emerged as a widely-used term with increased adoption by practitioners and politicians alike. However, as with many fashionable jargon, there seems to be very little understanding of what the term really entails. Although this is may not be an issue when the term is used in an informal context, it can potentially cause considerable problems in context of organizational strategy, business objectives, or international agreements. In this work, we study the existing literature to identify the main definitions provided for the term ‘Cyber Security’ by authoritative sources. We then conduct various lexical and semantic ...


Applying A Contingency Framework To Digital Forensic Processes In Cloud Based Acquisitions, Diane Barrett 2017 Bloomsburg University

Applying A Contingency Framework To Digital Forensic Processes In Cloud Based Acquisitions, Diane Barrett

Journal of Digital Forensics, Security and Law

The change in business models to incorporate a wide variety of cloud computing environments has resulted in the escalation of computer crimes in the areas of security breaches and hacking. Methods to acquire evidence in a cloud computing environment are limited due to the complexity of the cloud environment. Since digital acquisition processes in cloud computing environments are still in the infancy stages, there have been no studies in the application of existing frameworks to this type environment based on traditional forensic processes.

This paper describes a qualitative study conducted to develop a robust contingency framework for deciding when to ...


Sql Injection: The Longest Running Sequel In Programming History, Matthew Horner, Thomas Hyslip 2017 Norwich University

Sql Injection: The Longest Running Sequel In Programming History, Matthew Horner, Thomas Hyslip

Journal of Digital Forensics, Security and Law

One of the risks to a company operating a public-facing website with a Structure Query Language (SQL) database is an attacker exploiting the SQL injection vulnerability. An attacker can cause an SQL database to perform actions that the developer did not intend like revealing, modifying, or deleting sensitive data. This can cause a loss of confidentiality, integrity, and availability of information in a company’s database, and it can lead to severe costs of up to $196,000 per successful injection attack (NTT Group, 2014). This paper discusses the history of the SQL injection vulnerability, focusing on:

  • How an attacker ...


Digital Commons powered by bepress