Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

3,279 Full-Text Articles 3,046 Authors 1,294,808 Downloads 103 Institutions

All Articles in Computer Law

Faceted Search

3,279 full-text articles. Page 3 of 83.

Front Matter, 2018 Embry-Riddle Aeronautical University

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Back Matter, 2018 Embry-Riddle Aeronautical University

Back Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Subscription Information, 2018 Embry-Riddle Aeronautical University

Subscription Information

Journal of Digital Forensics, Security and Law

No abstract provided.


Cover, 2018 Embry-Riddle Aeronautical University

Cover

Journal of Digital Forensics, Security and Law

No abstract provided.


Table Of Contents, 2018 Embry-Riddle Aeronautical University

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Preface, 2018 Embry-Riddle Aeronautical University

Preface

Journal of Digital Forensics, Security and Law

No abstract provided.


Drone Forensic Analysis Using Open Source Tools, M A Hannan Bin Azhar, Thomas Edward Allen Barton, Tasmina Islam 2018 Canterbury Christ Chruch University

Drone Forensic Analysis Using Open Source Tools, M A Hannan Bin Azhar, Thomas Edward Allen Barton, Tasmina Islam

Journal of Digital Forensics, Security and Law

Carrying capabilities of drones and their easy accessibility to public have led to an increase in crimes committed using drones in recent years. For this reason, the need for forensic analysis of drones captured from the crime scenes and the devices used for these drones is also paramount. This paper presents the extraction and identification of important artefacts from the recorded flight data as well as the associated mobile devices using open source tools and some basic scripts developed to aid the analysis of two popular drone systems- the DJI Phantom 3 Professional and Parrot AR. Drone 2.0. Although ...


Testing Memory Forensics Tools For The Macintosh Os X Operating System, Charles B. Leopard, Neil C. Rowe, Michael R. McCarrin 2018 U.S. Naval Postgraduate School

Testing Memory Forensics Tools For The Macintosh Os X Operating System, Charles B. Leopard, Neil C. Rowe, Michael R. Mccarrin

Journal of Digital Forensics, Security and Law

Memory acquisition is essential to defeat anti-forensic operating-system features and investigate cyberattacks that leave little or no evidence in secondary storage. The forensic community has developed tools to acquire physical memory from Apple’s Macintosh computers, but they have not much been tested. This work tested three major OS X memory-acquisition tools. Although the tools could capture system memory accurately, the open-source tool OSXPmem appeared advantageous in size, reliability, and support for memory configurations and versions of the OS X operating system.


Hierarchical Bloom Filter Trees For Approximate Matching, David Lillis, Frank Breitinger, Mark Scanlon 2018 University College Dublin

Hierarchical Bloom Filter Trees For Approximate Matching, David Lillis, Frank Breitinger, Mark Scanlon

Journal of Digital Forensics, Security and Law

Bytewise approximate matching algorithms have in recent years shown significant promise in detecting files that are similar at the byte level. This is very useful for digital forensic investigators, who are regularly faced with the problem of searching through a seized device for pertinent data. A common scenario is where an investigator is in possession of a collection of "known-illegal" files (e.g. a collection of child abuse material) and wishes to find whether copies of these are stored on the seized device. Approximate matching addresses shortcomings in traditional hashing, which can only find identical files, by also being able ...


Masthead, 2018 Embry-Riddle Aeronautical University

Masthead

Journal of Digital Forensics, Security and Law

No abstract provided.


Technological Opacity & Procedural Injustice, Seth Katsuya Endo 2018 NYU School of Law

Technological Opacity & Procedural Injustice, Seth Katsuya Endo

Boston College Law Review

From Google’s auto-correction of spelling errors to Netflix’s movie suggestions, machine-learning systems are a part of our everyday life. Both private and state actors increasingly employ such systems to make decisions that implicate individuals’ substantive rights, such as with credit scoring, government-benefit eligibility decisions, national security screening, and criminal sentencing. In turn, the rising use of machine-learning systems has led to questioning about whether they are sufficiently accurate, fair, and transparent. This Article builds on that work, focusing on how opaque technologies can subtly erode the due process norm of participation. To illuminate this issue, this Article examines ...


Writing The Access Code: Enforcing Commercial Web Accessibility Without Regulations Under Title Iii Of The Americans With Disabilities Act, Daniel Sorger 2018 Boston College Law School

Writing The Access Code: Enforcing Commercial Web Accessibility Without Regulations Under Title Iii Of The Americans With Disabilities Act, Daniel Sorger

Boston College Law Review

A growing number of private lawsuits allege that businesses are violating Title III of the Americans with Disabilities Act because their websites are inaccessible to disabled individuals. Courts remain divided, however, on the extent to which commercial websites are covered under Title III. Additionally, the Department of Justice has not promulgated commercial web accessibility regulations—adding further uncertainty to the private enforcement regime. This Note argues that Title III broadly covers commercial websites, but that private enforcement is not positioned to spur lasting, broad-based Title III compliance. It proposes that large-scale litigation, state attorney general action, and state laws should ...


Cyber!, 2018 Brigham Young University Law School

Cyber!

BYU Law Review

This Article challenges the basic assumptions of the emerging legal area of “cyber” or “cybersecurity.” It argues that the two dominant “cybersecurity” paradigms—information sharing and deterrence—fail to recognize that corporate information security and national “cybersecurity” concerns are inextricable. This problem of “reciprocal security vulnerability” means that in practice our current legal paradigms channel us in suboptimal directions. Drawing insights from the work of philosopher of science Michael Polanyi, this Article identifies three flaws that pervade the academic and policy analysis of security, exacerbating the problem of reciprocal security vulnerability—privacy conflation, incommensurability, and internet exceptionalism. It then offers ...


United States V. Hubbell: Encryption And The Discovery Of Documents, Gregory S. Sergienko 2018 Concordia University School of Law

United States V. Hubbell: Encryption And The Discovery Of Documents, Gregory S. Sergienko

Greg Sergienko

Five years ago, in a contribution to these pages, I suggested that the Supreme Court's oldest precedents and the original intent of the framers of the Constitution precluded the use of evidence produced under a grant of immunity against the producer, even though the material produced included documents that the producer had not been compelled to write. This implied that information concealed with a cryptographic key could not be used in a criminal prosecution against someone from whom the key had been obtained under a grant of immunity. The issue, however, was doubtful given the tendency of the Court ...


Self Incrimination And Cryptographic Keys, Gregory S. Sergienko 2018 Concordia University School of Law

Self Incrimination And Cryptographic Keys, Gregory S. Sergienko

Greg Sergienko

Modern cryptography can make it virtually impossible to decipher documents without the cryptographic key thus making the availability of the contents of those documents depend on the availability of the key. This article examines the Fourth and Fifth Amendments' protection against the compulsory production of the key and the scope of the Fifth Amendment immunity against compelled production. After analyzing these questions using prevailing Fourth and Fifth Amendment jurisprudence, I shall describe the advantages of a privacy-based approach in practical and constitutional terms. [excerpt]


Regulating Data As Property: A New Construct For Moving Forward, Jeffrey Ritter, Anna Mayer 2018 Duke Law

Regulating Data As Property: A New Construct For Moving Forward, Jeffrey Ritter, Anna Mayer

Duke Law & Technology Review

The global community urgently needs precise, clear rules that define ownership of data and express the attendant rights to license, transfer, use, modify, and destroy digital information assets. In response, this article proposes a new approach for regulating data as an entirely new class of property. Recently, European and Asian public officials and industries have called for data ownership principles to be developed, above and beyond current privacy and data protection laws. In addition, official policy guidances and legal proposals have been published that offer to accelerate realization of a property rights structure for digital information. But how can ownership ...


Lsat Practicum: An Application Of Human Based Computation, Seth Rivett 2018 Olivet Nazarene University

Lsat Practicum: An Application Of Human Based Computation, Seth Rivett

Student Scholarship - Computer Science

Human-based computation can be applied to solve problems too hard for a single computer. Crowdsourcing can be applied to ethical modeling by splitting ethical situations among humans. In this senior research project, the crowdsourcing method is applied to produce an ethical model for what web crawlers are allowed to do on websites. By evaluating questions about terms of use on a website, users provide context for the robots. An obstacle to this project is getting the right crowd to participate in the problem. The crowd of potential law students was selected as students typically answer questions to study for a ...


Commodifying Consumer Data In The Era Of The Internet Of Things, Stacy-Ann Elvy 2018 New York Law School

Commodifying Consumer Data In The Era Of The Internet Of Things, Stacy-Ann Elvy

Boston College Law Review

Internet of Things (“IoT”) products generate a wealth of data about consumers that was never before widely and easily accessible to companies. Examples include biometric and health-related data, such as fingerprint patterns, heart rates, and calories burned. This Article explores the connection between the types of data generated by the IoT and the financial frameworks of Article 9 of the Uniform Commercial Code and the Bankruptcy Code. It critiques these regimes, which enable the commodification of consumer data, as well as laws aimed at protecting consumer data, such as the Bankruptcy Abuse Prevention and Consumer Protection Act, various state biometric ...


By Reading This Title, You Have Agreed To Our Terms Of Service, Brian Larson 2018 Texas A&M University School of Law

By Reading This Title, You Have Agreed To Our Terms Of Service, Brian Larson

Brian Larson

By June of 2017, Facebook had two billion (that’s billion, with a ‘b’) users accessing it per month (Balakrishnan 2017). Facebook believes that each of those consumer end-users is bound by its end-user license agreement (EULA), which Facebook calls a “Statement of Rights and Responsibilities,” available to end-users from a small link in light gray text called “Terms” on every Facebook page. EULAs like this, associated with websites, mobile apps, and consumer goods with embedded software, and styled “terms of service,” “terms of use,” etc., may purport to impose a wide variety of contractual obligations on consumers, for example ...


Tax Compliance In A Decentralizing Economy, Manoj Viswanathan 2018 University of California Hastings College of Law

Tax Compliance In A Decentralizing Economy, Manoj Viswanathan

Georgia State University Law Review

Tax compliance in the United States has long relied on information from centralized intermediaries—the financial institutions,employers, and brokers that help ensure income is reported and taxes are paid. Yet while the IRS remains tied to these centralized entities,consumers and businesses are not. New technologies, such as sharing economy platforms (companies such as Airbnb, Uber, and Instacart)and the blockchain (the platform on which various cryptocurrencies are based) are providing new, decentralized options for exchanging goods and services.

Without legislative and agency intervention, these technologies pose a critical threat to the reporting system underlying domestic and international tax ...


Digital Commons powered by bepress