Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

3,241 Full-Text Articles 3,007 Authors 1,294,808 Downloads 103 Institutions

All Articles in Computer Law

Faceted Search

3,241 full-text articles. Page 7 of 81.

Analysis Of Security In Big Data Related To Healthcare, Isabel de la Torre, Begoña García-Zapirain, Miguel López-Coronado 2017 University of Valladolid

Analysis Of Security In Big Data Related To Healthcare, Isabel De La Torre, Begoña García-Zapirain, Miguel López-Coronado

Journal of Digital Forensics, Security and Law

Big data facilitates the processing and management of huge amounts of data. In health, the main information source is the electronic health record with others being the Internet and social media. Health-related data refers to storage in big data based on and shared via electronic means. Why are criminal organisations interested in this data? These organisations can blackmail people with information related to their health condition or sell the information to marketing companies, etc. This article analyses healthcare-related big data security and proposes different solutions. There are different techniques available to help preserve privacy such as data modification techniques, cryptographic ...


Public Security & Digital Forensics In The United States: The Continued Need For Expanded Digital Systems For Security, Deborah G. Keeling, Michael Losavio 2017 University of Louisville

Public Security & Digital Forensics In The United States: The Continued Need For Expanded Digital Systems For Security, Deborah G. Keeling, Michael Losavio

Journal of Digital Forensics, Security and Law

Digital Forensics is one of the latest challenges for the use of forensics in the investigative process in the United States. Some of the challenges are created by conditions and circumstances present for law enforcement around the world. However, many are unique to the United States and created by the standards of evidence within our courts, nature of our law enforcement organizations, and structure of our judicial and prosecutorial systems. It is essential for the preservation of public security and individual safety that competent systems of digital forensics are developed for law enforcement at all levels. The failure to do ...


Back Matter, 2017 Embry-Riddle Aeronautical University

Back Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Security And The Transnational Information Polity, Michael M. Losavio, Adel Said Elmaghraby 2017 University of Louisville

Security And The Transnational Information Polity, Michael M. Losavio, Adel Said Elmaghraby

Journal of Digital Forensics, Security and Law

Global information and communications technologies create criminal opportunities in which criminal violation and physical proximity are decoupled. As in all our endeavors, the good become the prey of the bad. Murderous and venal exploitation of ICT has followed from the inception of the Internet, threatening all the good it brings and the trust we need so badly as a people. As the work continues to expand the implementation of Smart Cities and the Internet of Things, there will be more opportunities for exploitation of these technologies. We examine the social and liberty risks our data and technology-driven responses may entail.


The Use Of Information Technologies To Combat Counterfeit Alcohol Products And Ensure The Right To Life In Russia, Pavel Syosoevich Pastukhov, Svetlana Polyakova, Evelina Frolovich 2017 Perm State University

The Use Of Information Technologies To Combat Counterfeit Alcohol Products And Ensure The Right To Life In Russia, Pavel Syosoevich Pastukhov, Svetlana Polyakova, Evelina Frolovich

Journal of Digital Forensics, Security and Law

The paper is aimed to analyze implementation of an integrated information system that provides forecasting, monitoring, prevention and elimination of possible threats, such as violation of information support of public authorities, businesses and municipal services and others as well as control of elimination of consequences of emergency situations and offenses with integration under its control action information and control duty subsystems, control, municipal services for their operational cooperation in the interests of of the municipality. In particular, it consideres how this unified system is applied in accounting of production volume and turnover of ethyl alcohol, alcoholic and alcohol-containing products (USAIS ...


Possession Of Child Exploitation Material In Computer Temporary Internet Cache, Sungmi Park, Yunsik Jake Jang, Joshua I. James 2017 Legal Informatics and Forensic Science Institute

Possession Of Child Exploitation Material In Computer Temporary Internet Cache, Sungmi Park, Yunsik Jake Jang, Joshua I. James

Journal of Digital Forensics, Security and Law

When considering the possession of child exploitation material U.S. and German courts have the same focus, but slightly different interpretations. This slight difference in interpretation could mean that in one country a defendant will be found guilty of possession while in the other country he or she could be found not guilty. In this work we examine the standards courts in Germany and the United States have used to combat child pornography, and analyze the approaches specifically related to viewing and possession of CEM. A uniform solution is suggested that criminalizes “knowing access with the intention to view” as ...


Legislative Requirements For Cyber Peacekeeping, Nikolay Akatyev, Joshua I. James 2017 Horangi

Legislative Requirements For Cyber Peacekeeping, Nikolay Akatyev, Joshua I. James

Journal of Digital Forensics, Security and Law

Cyber Peacekeeping strives for the prevention, mitigation and cessation of cyber and physical conflicts. The creation of a Cyber Peacekeeping organization, however, has major legal and political implications. In this work we review current international legislation applicable for functions of Cyber Peacekeeping. Specifically, we analyze prominent works which contribute to definitions, law and ethics regulating cyber conflicts from the perspective of the creation of a CPK organization. Legislative and terminological foundations are analyzed and adopted from current practice. Further, this work analyzes guiding principles of global organizations such as ITU IMPACT, INTERPOL and regional organizations such as NATO and the ...


Front Matter, 2017 Embry-Riddle Aeronautical University

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Editorial, 2017 Embry-Riddle Aeronautical University

Editorial

Journal of Digital Forensics, Security and Law

No abstract provided.


The Tax Treatment Of Tokens: What Does It Betoken?, David J. Shakow 2017 University of Pennsylvania Law School

The Tax Treatment Of Tokens: What Does It Betoken?, David J. Shakow

Faculty Scholarship

Digital tokens have been used to raise substantial amounts of money. But little attention has been paid to the tax consequences surrounding their issuance and sale. There are significant potential tax liabilities lurking in the use of digital tokens. But, because of the anonymity inherent in the blockchain structures used for the issuance of tokens and payments for them, there is a significant question as to whether those tax liabilities will ever be collected.


Appendix B: The Algorithm As A Human Artifact: Implications For Legal [Re]Search, Susan Nevelow Mart 2017 University of Colorado Law School

Appendix B: The Algorithm As A Human Artifact: Implications For Legal [Re]Search, Susan Nevelow Mart

Research Data

This document, "Search Instructions for Algorithm Study," is an electronic Appendix B to, and is cited in, the empirical study: Susan Nevelow Mart, The Algorithm as a Human Artifact: Implications for Legal [Re]Search, 109 Law Libr. J. 387, 400 n.78 (2017), available at http://scholar.law.colorado.edu/articles/755/.


Data For The Algorithm As A Human Artifact: Implications For Legal [Re]Search, Susan Nevelow Mart 2017 University of Colorado Law School

Data For The Algorithm As A Human Artifact: Implications For Legal [Re]Search, Susan Nevelow Mart

Research Data

These documents underlie and are cited in this empirical study: Susan Nevelow Mart, The Algorithm as a Human Artifact: Implications for Legal [Re]Search, 109 Law Libr. J. 387, 409 n.123 (2017), available at http://scholar.law.colorado.edu/articles/755/.

The ZIP file contains three files: one PDF document ("Tables for Charts 1-3"), and two SPSS files ("Data Archive" and "Syntax Archive" (SPSS version 24)). The "Syntax Archive" file may be viewed in a text editor (e.g., Notepad) as well as in SPSS.


Reviving The Public Trustee Concept And Applying It To Information Privacy Policy, Priscilla M. Regan 2017 University of Maryland Francis King Carey School of Law

Reviving The Public Trustee Concept And Applying It To Information Privacy Policy, Priscilla M. Regan

Maryland Law Review

No abstract provided.


Averting Robot Eyes, Margot E. Kaminski, Matthew Rueben, William D. Smart, Cindy M. Grimm 2017 University of Maryland Francis King Carey School of Law

Averting Robot Eyes, Margot E. Kaminski, Matthew Rueben, William D. Smart, Cindy M. Grimm

Maryland Law Review

No abstract provided.


Back Matter, 2017 Embry-Riddle Aeronautical University

Back Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


A Power Grid Incident Identification Based On Physically Derived Cyber-Event Detection, Travis Atkison, Nathan Wallace 2017 University of Alabama

A Power Grid Incident Identification Based On Physically Derived Cyber-Event Detection, Travis Atkison, Nathan Wallace

Journal of Digital Forensics, Security and Law

This article proposes a cyber-event detection framework to aid in incident Identification and digital forensics cases aimed at investigating cyber crime committed against the critical infrastructure power grid. However, unlike other similar investigative techniques, the proposed approach examines only the physical information to derive a cyber conclusion. The developed framework extracts information from the physical parameters stored in historical databases of SCADA systems. The framework uses a pseudo-trusted model derived from randomly selected power system observations found in the historical databases. Afterwards, a technique known as Bayesian Model Averaging is used to average the models and create a more trusted ...


File Type Identification - Computational Intelligence For Digital Forensics, Konstantinos Karampidis, Giorgos Papadourakis 2017 Technological Educational Institute of Crete

File Type Identification - Computational Intelligence For Digital Forensics, Konstantinos Karampidis, Giorgos Papadourakis

Journal of Digital Forensics, Security and Law

In modern world, the use of digital devices for leisure or professional reasons is growing quickly; nevertheless, criminals try to fool authorities and hide evidence in a computer by changing the file type. File type detection is a very demanding task for a digital forensic examiner. In this paper, a new methodology is proposed – in a digital forensics perspective- to identify altered file types with high accuracy by employing computational intelligence techniques. The proposed methodology is applied to the three most common image file types (jpg, png and gif) as well as to uncompressed tiff images. A three-stage process involving ...


Forensic Cell Site Analysis: A Validation & Error Mitigation Methodology, John B. Minor 2017 Embry-Riddle Aeronautical University

Forensic Cell Site Analysis: A Validation & Error Mitigation Methodology, John B. Minor

Journal of Digital Forensics, Security and Law

The E911 Initiative in the mid-1990s established an opportunity to obtain location specific digital evidence of subscriber activity from cellular carriers. Call Detail Records (CDR) containing Cell Site Location Information (CSLI) evidence production was made available from cellular carriers in response to the CALEA, 911 and ECPA acts. In the late 1990s, cellular carriers began to produce evidence for investigative and litigation purposes. CDR/CSLI evidence has become an important evidentiary focus in the courtroom. This research project resulted in the creation of a method of validating cellular carrier records accuracy and mitigating errors in forensic cell site analyst conclusions ...


Towards A More Representative Definition Of Cyber Security, Daniel Schatz, Rabih Bashroush, Julie Wall 2017 University of East London

Towards A More Representative Definition Of Cyber Security, Daniel Schatz, Rabih Bashroush, Julie Wall

Journal of Digital Forensics, Security and Law

In recent years, ‘Cyber Security’ has emerged as a widely-used term with increased adoption by practitioners and politicians alike. However, as with many fashionable jargon, there seems to be very little understanding of what the term really entails. Although this is may not be an issue when the term is used in an informal context, it can potentially cause considerable problems in context of organizational strategy, business objectives, or international agreements. In this work, we study the existing literature to identify the main definitions provided for the term ‘Cyber Security’ by authoritative sources. We then conduct various lexical and semantic ...


Signatures Of Viber Security Traffic, M.A.K. Sudozai, N. Habib, S. Saleem, A.A. Khan 2017 National University of Sciences and Technology

Signatures Of Viber Security Traffic, M.A.K. Sudozai, N. Habib, S. Saleem, A.A. Khan

Journal of Digital Forensics, Security and Law

Viber is one of the widely used mobile chat application which has over 606 million users on its platform. Since the recent release of Viber 6.0 in March/April 2016 and its further updates, Viber provides end-to-end encryption based on Open Whisper Signal security architecture. With proprietary communication protocol scattered on distributed cluster of servers in different countries and secure cryptographic primitives, Viber offers a difficult paradigm of traffic analysis. In this paper, we present a novel methodology of identification of Viber traffic over the network and established a model which can classify its services of audio and audio ...


Digital Commons powered by bepress