Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

3256 Full-Text Articles 2897 Authors 1259977 Downloads 99 Institutions

All Articles in Computer Law

Faceted Search

3256 full-text articles. Page 6 of 82.

Lessons Learned Too Well: Anonymity In A Time Of Surveillance, A. Michael Froomkin 2017 University of Miami School of Law

Lessons Learned Too Well: Anonymity In A Time Of Surveillance, A. Michael Froomkin

Articles

It is no longer reasonable to assume that electronic communications can be kept private from governments or private-sector actors. In theory, encryption can protect the content of such communications, and anonymity can protect the communicator's identity. But online anonymity-one of the two most important tools that protect online communicative freedom-is under practical and legal attack all over the world. Choke-point regulation, online identification requirements, and data-retention regulations combine to make anonymity very difficult as a practical matter and, in many countries, illegal. Moreover, key internet intermediaries further stifle anonymity by requiring users to disclose their real names.

This Article ...


A Data Commons For Food Security, Jeremiah Baarbé, Meghan Blom, Jeremy de Beer 2016 University of Ottawa

A Data Commons For Food Security, Jeremiah Baarbé, Meghan Blom, Jeremy De Beer

Jeremy de Beer

We propose a ‘data commons’, formed through a licensing model that allows farmers to benefit from the datasets to which they contribute. Agricultural data is globally recognized for its importance in addressing food insecurity. This data is generated and used by a value chain of contributors, collectors, and consumers. Our licensing model addresses the crisis caused by a lack of data ownership rights for contributor farmers. Using the IAD framework we consider five case studies. These studies explore how John Deere, Plantwise, and Abalobi license data collection and how Creative Commons and the Open Data Commons license data distribution. Supported ...


Open Source Operational Risk: Should Public Blockchains Serve As Financial Market Infrastructures?, Angela Walch 2016 St. Mary's University School of Law

Open Source Operational Risk: Should Public Blockchains Serve As Financial Market Infrastructures?, Angela Walch

Angela Walch

This chapter explores the operational risks raised by the use of common 'grassroots' open source software practices in public blockchains, such as Bitcoin and Ethereum, in their potential role as financial market infrastructures. These practices include the informal software development process, problematic funding for software development, and the possibility of forking inherent to open source software. The paper argues that the risks raised by these practices significantly undermine public blockchains’ suitability to serve as financial market infrastructures. Further, they herald the need to reevaluate the use of these practices outside the blockchain technology setting, in other critical infrastructures based on ...


A Few Criminal Justice Big Data Rules, Stephen E. Henderson 2016 University of Oklahoma College of Law

A Few Criminal Justice Big Data Rules, Stephen E. Henderson

Stephen E Henderson

As with most new things, the big data revolution in criminal justice has historic antecedents—indeed, a 1965 Presidential Commission called for some of the same data analysis that police departments and courts are today developing and implementing.  But there is no doubt we are on the precipice of a criminal justice data revolution, and it is a good time to take stock and to begin developing guidelines so that, as much as possible, criminal justice systems might reap the benefits and avoid the pitfalls of this newly data-centric world.  In that spirit, I propose ten high-level rules to guide ...


Back Matter, 2016 Embry-Riddle Aeronautical University

Back Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Masthead, 2016 Embry-Riddle Aeronautical University

Masthead

Journal of Digital Forensics, Security and Law

No abstract provided.


Front Matter, 2016 Embry-Riddle Aeronautical University

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Table Of Contents, 2016 Embry-Riddle Aeronautical University

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Bloom Filters Optimized Wu-Manber For Intrusion Detection, Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, Babar Shah 2016 Network Engineering and Security Department, Jordan University of Science and Technology

Bloom Filters Optimized Wu-Manber For Intrusion Detection, Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, Babar Shah

Journal of Digital Forensics, Security and Law

With increasing number and severity of attacks, monitoring ingress and egress network traffic is becoming essential everyday task. Intrusion detection systems are the main tools for capturing and searching network traffic for potential harm. Signature-based intrusion detection systems are the most widely used, and they simply use a pattern matching algorithms to locate attack signatures in intercepted network traffic. Pattern matching algorithms are very expensive in terms of running time and memory usage, leaving intrusion detection systems unable to detect attacks in real-time. We propose a Bloom filters optimized Wu-Manber pattern matching algorithm to speed up intrusion detection. The Bloom ...


The 2016 Analysis Of Information Remaining On Computer Hard Disks Offered For Sale On The Second Hand Market In The Uae, Thomas Martin, Andy Jones, Mohammed Alzaabi 2016 Manchester Metropolitan University

The 2016 Analysis Of Information Remaining On Computer Hard Disks Offered For Sale On The Second Hand Market In The Uae, Thomas Martin, Andy Jones, Mohammed Alzaabi

Journal of Digital Forensics, Security and Law

This research describes our survey of data remaining on computer hard disks sold on the second hand market in the United Arab Emirates (UAE). This is a repetition of the first survey conducted in 2012 (Jones, Martin, & Alzaabi, 2012). Similar studies have been carried over the last ten years in the United Kingdom, Australia, USA, Germany and France: (Jones, Mee, Meyler, & Gooch, 2005), (Jones, Valli, Sutherland, & Thomas, 2006), (Jones, Valli, Dardick, & Sutherland, 2008), (Jones, Valli, Dardick, & Sutherland, 2009). This research was undertaken to gain insight into the volumes of data found on second-hand disks purchased in the UAE, as well ...


Leveraging The Windows Amcache.Hve File In Forensic Investigations, Bhupendra Singh, Upasna Singh 2016 Defence Institute of Advanced Technology (DU)

Leveraging The Windows Amcache.Hve File In Forensic Investigations, Bhupendra Singh, Upasna Singh

Journal of Digital Forensics, Security and Law

The Amcache.hve is a registry hive file that is created by Microsoft® Windows® to store the information related to execution of programs. This paper highlights the evidential potential of Amcache.hve file and its application in the area of user activity analysis. The study uncovers numerous artifacts retained in Amcache.hve file when a user performs certain actions such as running host-based applications, installation of new applications, or running portable applications from external devices. The results of experiments demonstrate that Amcache.hve file stores intriguing artifacts related to applications such as timestamps of creation and last modification of any ...


The Impact Of Sha-1 File Hash Collisions On Digital Forensic Imaging: A Follow-Up Experiment, Gary C. Kessler 2016 Embry Riddle Aeronautical University - Daytona Beach

The Impact Of Sha-1 File Hash Collisions On Digital Forensic Imaging: A Follow-Up Experiment, Gary C. Kessler

Journal of Digital Forensics, Security and Law

A previous paper described an experiment showing that Message Digest 5 (MD5) hash collisions of files have no impact on integrity verification in the forensic imaging process. This paper describes a similar experiment applied when two files have a Secure Hash Algorithm (SHA-1) collision.


The Impact Of Md5 File Hash Collisions On Digital Forensic Imaging, Gary C. Kessler 2016 Embry-Riddle Aeronautical University

The Impact Of Md5 File Hash Collisions On Digital Forensic Imaging, Gary C. Kessler

Journal of Digital Forensics, Security and Law

The Message Digest 5 (MD5) hash is commonly used as for integrity verification in the forensic imaging process. The ability to force MD5 hash collisions has been a reality for more than a decade, although there is a general consensus that hash collisions are of minimal impact to the practice of computer forensics. This paper describes an experiment to determine the results of imaging two disks that are identical except for one file, the two versions of which have different content but otherwise occupy the same byte positions on the disk, are the same size, and have the same hash ...


A New Distributed Chinese Wall Security Policy Model, Saad Fehis, Omar Nouali, Mohand-Tahar Kechadi 2016 Higher National School of Computer Algiers

A New Distributed Chinese Wall Security Policy Model, Saad Fehis, Omar Nouali, Mohand-Tahar Kechadi

Journal of Digital Forensics, Security and Law

The application of the Chinese wall security policy model (CWSPM) to control the information flows between two or more competing and/or conflicting companies in cloud computing (Multi-tenancy) or in the social network, is a very interesting solution. The main goal of the Chinese Wall Security Policy is to build a wall between the datasets of competing companies, and among the system subjects. This is done by the applying to the subjects mandatory rules, in order to control the information flow caused between them. This problem is one of the hottest topics in the area of cloud computing (as a ...


A Survey Of Social Network Forensics, Umit Karabiyik, Muhammed Abdullah Canbaz, Ahmet Aksoy, Tayfun Tuna, Esra Akbas, Bilal Gonen, Ramazan S. Aygun 2016 Department of Computer Science Sam Houston State University

A Survey Of Social Network Forensics, Umit Karabiyik, Muhammed Abdullah Canbaz, Ahmet Aksoy, Tayfun Tuna, Esra Akbas, Bilal Gonen, Ramazan S. Aygun

Journal of Digital Forensics, Security and Law

Social networks in any form, specifically online social networks (OSNs), are becoming a part of our everyday life in this new millennium especially with the advanced and simple communication technologies through easily accessible devices such as smartphones and tablets. The data generated through the use of these technologies need to be analyzed for forensic purposes when criminal and terrorist activities are involved. In order to deal with the forensic implications of social networks, current research on both digital forensics and social networks need to be incorporated and understood. This will help digital forensics investigators to predict, detect and even prevent ...


Facilitated Plagiarism: The Saga Of Term-Paper Mills And The Failure Of Legislation And Litigation To Control Them, Darby Dickerson 2016 Selected Works

Facilitated Plagiarism: The Saga Of Term-Paper Mills And The Failure Of Legislation And Litigation To Control Them, Darby Dickerson

Darby Dickerson

No abstract provided.


Rwu First Amendment Blog: David Logan's Blog: When Facts And News Diverge 12-2-2016, David A. Logan 2016 Roger Williams University School of Law

Rwu First Amendment Blog: David Logan's Blog: When Facts And News Diverge 12-2-2016, David A. Logan

Law School Blogs

No abstract provided.


Mitigating Cyber Risk In It Supply Chains, Maureen Wallace 2016 Cleveland-Marshall College of Law

Mitigating Cyber Risk In It Supply Chains, Maureen Wallace

The Global Business Law Review

This note argues that the United States needs to utilize current federal agencies to begin introducing cyber supply chain risk management regulation for IT supply chains. Cyber supply chain risk management is a critical area of cybersecurity that has barely been recognized by the United States government. The globalization of the digital world has introduced a new spectrum of risk management issues that affect the products exchanged by businesses and consumed by individuals and government agencies. While there have been some initiatives toward the promotion of tighter cybersecurity regulation, most initiatives only concern the public sector, leaving the private sector ...


Consenting To Computer Use, James Grimmelmann 2016 Cornell Law School

Consenting To Computer Use, James Grimmelmann

Cornell Law Faculty Publications

The federal Computer Fraud and Abuse Act (CFAA) makes it a crime to “access a computer without authorization or exceed authorized access.” Courts and commentators have struggled to explain what types of conduct by a computer user are “without authorization.” But this approach is backwards; authorization is not so much a question of what a computer user does, as it is a question of what a computer owner allows.

In other words, authorization under the CFAA is an issue of consent, not conduct; to understand authorization, we need to understand consent. Building on Peter Westen’s taxonomy of consent, I ...


The Question Concerning Technology In Compliance, Sean J. Griffith 2016 Brooklyn Law School

The Question Concerning Technology In Compliance, Sean J. Griffith

Brooklyn Journal of Corporate, Financial & Commercial Law

In this symposium Essay, I apply insights from philosophy and psychology to argue that modes of achieving compliance that focus on technology undermine, and are undermined by, modes of achieving compliance that focus on culture. Insisting on both may mean succeeding at neither. How an organization resolves this apparent contradiction in program design, like the broader question of optimal corporate governance arrangements, is highly idiosyncratic. Firms should therefore be accorded maximum freedom in designing their compliance programs, rather than being forced by enforcement authorities into a set of de facto mandatory compliance structures.


Digital Commons powered by bepress