Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

3318 Full-Text Articles 2966 Authors 1294808 Downloads 99 Institutions

All Articles in Computer Law

Faceted Search

3318 full-text articles. Page 7 of 84.

Siri-Ously 2.0: What Artificial Intelligence Reveals About The First Amendment, Toni M. Massaro, Helen Norton, Margot E. Kaminski 2017 University of Arizona James E. Rogers College of Law

Siri-Ously 2.0: What Artificial Intelligence Reveals About The First Amendment, Toni M. Massaro, Helen Norton, Margot E. Kaminski

Articles

The First Amendment may protect speech by strong Artificial Intelligence (AI). In this Article, we support this provocative claim by expanding on earlier work, addressing significant concerns and challenges, and suggesting potential paths forward.

This is not a claim about the state of technology. Whether strong AI — as-yet-hypothetical machines that can actually think — will ever come to exist remains far from clear. It is instead a claim that discussing AI speech sheds light on key features of prevailing First Amendment doctrine and theory, including the surprising lack of humanness at its core.

Courts and commentators wrestling with free speech problems ...


Every Algorithm Has A Pov, Susan Nevelow Mart 2017 University of Colorado Law School

Every Algorithm Has A Pov, Susan Nevelow Mart

Articles

When legal researchers search in online databases for the information they need to solve a legal problem, they need to remember that the algorithms that are returning results to them were designed by humans. The world of legal research is a human-constructed world, and the biases and assumptions the teams of humans that construct the online world bring to the task are imported into the systems we use for research. This article takes a look at what happens when six different teams of humans set out to solve the same problem: how to return results relevant to a searcher’s ...


Research Algorithms Have A Point Of View: The Effect Of Human Decision Making On Your Search Results, Susan Nevelow Mart 2017 University of Colorado Law School

Research Algorithms Have A Point Of View: The Effect Of Human Decision Making On Your Search Results, Susan Nevelow Mart

Articles

No abstract provided.


The Algorithm As A Human Artifact: Implications For Legal [Re]Search, Susan Nevelow Mart 2017 University of Colorado Law School

The Algorithm As A Human Artifact: Implications For Legal [Re]Search, Susan Nevelow Mart

Articles

The results of using the search algorithms in Westlaw, Lexis Advance, Fastcase, Google Scholar, Ravel, and Casetext are compared. Six groups of humans created six different algorithms, and the results are a testament to the variability of human problem solving. That variability has implications both for researching and teaching research.


The U.S. Election Hacks, Cybersecurity, And International Law, David P. Fidler 2017 Indiana University Maurer School of Law

The U.S. Election Hacks, Cybersecurity, And International Law, David P. Fidler

Articles by Maurer Faculty

No abstract provided.


Reviving The Fourth Amendment: Reasonable Expectation Of Privacy In A Cell Phone Age, 50 J. Marshall L. Rev. 555 (2017), Marisa Kay 2017 John Marshall Law School

Reviving The Fourth Amendment: Reasonable Expectation Of Privacy In A Cell Phone Age, 50 J. Marshall L. Rev. 555 (2017), Marisa Kay

The John Marshall Law Review

No abstract provided.


A Data Commons For Food Security, Jeremiah Baarbé, Meghan Blom, Jeremy de Beer 2016 University of Ottawa

A Data Commons For Food Security, Jeremiah Baarbé, Meghan Blom, Jeremy De Beer

Jeremy de Beer

We propose a ‘data commons’, formed through a licensing model that allows farmers to benefit from the datasets to which they contribute. Agricultural data is globally recognized for its importance in addressing food insecurity. This data is generated and used by a value chain of contributors, collectors, and consumers. Our licensing model addresses the crisis caused by a lack of data ownership rights for contributor farmers. Using the IAD framework we consider five case studies. These studies explore how John Deere, Plantwise, and Abalobi license data collection and how Creative Commons and the Open Data Commons license data distribution. Supported ...


Open Source Operational Risk: Should Public Blockchains Serve As Financial Market Infrastructures?, Angela Walch 2016 St. Mary's University School of Law

Open Source Operational Risk: Should Public Blockchains Serve As Financial Market Infrastructures?, Angela Walch

Angela Walch

This chapter explores the operational risks raised by the use of common 'grassroots' open source software practices in public blockchains, such as Bitcoin and Ethereum, in their potential role as financial market infrastructures. These practices include the informal software development process, problematic funding for software development, and the possibility of forking inherent to open source software. The paper argues that the risks raised by these practices significantly undermine public blockchains’ suitability to serve as financial market infrastructures. Further, they herald the need to reevaluate the use of these practices outside the blockchain technology setting, in other critical infrastructures based on ...


A Few Criminal Justice Big Data Rules, Stephen E. Henderson 2016 University of Oklahoma College of Law

A Few Criminal Justice Big Data Rules, Stephen E. Henderson

Stephen E Henderson

As with most new things, the big data revolution in criminal justice has historic antecedents—indeed, a 1965 Presidential Commission called for some of the same data analysis that police departments and courts are today developing and implementing.  But there is no doubt we are on the precipice of a criminal justice data revolution, and it is a good time to take stock and to begin developing guidelines so that, as much as possible, criminal justice systems might reap the benefits and avoid the pitfalls of this newly data-centric world.  In that spirit, I propose ten high-level rules to guide ...


Front Matter, 2016 Embry-Riddle Aeronautical University

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Masthead, 2016 Embry-Riddle Aeronautical University

Masthead

Journal of Digital Forensics, Security and Law

No abstract provided.


Back Matter, 2016 Embry-Riddle Aeronautical University

Back Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


The Impact Of Sha-1 File Hash Collisions On Digital Forensic Imaging: A Follow-Up Experiment, Gary C. Kessler 2016 Embry Riddle Aeronautical University - Daytona Beach

The Impact Of Sha-1 File Hash Collisions On Digital Forensic Imaging: A Follow-Up Experiment, Gary C. Kessler

Journal of Digital Forensics, Security and Law

A previous paper described an experiment showing that Message Digest 5 (MD5) hash collisions of files have no impact on integrity verification in the forensic imaging process. This paper describes a similar experiment applied when two files have a Secure Hash Algorithm (SHA-1) collision.


The 2016 Analysis Of Information Remaining On Computer Hard Disks Offered For Sale On The Second Hand Market In The Uae, Thomas Martin, Andy Jones, Mohammed Alzaabi 2016 Manchester Metropolitan University

The 2016 Analysis Of Information Remaining On Computer Hard Disks Offered For Sale On The Second Hand Market In The Uae, Thomas Martin, Andy Jones, Mohammed Alzaabi

Journal of Digital Forensics, Security and Law

This research describes our survey of data remaining on computer hard disks sold on the second hand market in the United Arab Emirates (UAE). This is a repetition of the first survey conducted in 2012 (Jones, Martin, & Alzaabi, 2012). Similar studies have been carried over the last ten years in the United Kingdom, Australia, USA, Germany and France: (Jones, Mee, Meyler, & Gooch, 2005), (Jones, Valli, Sutherland, & Thomas, 2006), (Jones, Valli, Dardick, & Sutherland, 2008), (Jones, Valli, Dardick, & Sutherland, 2009). This research was undertaken to gain insight into the volumes of data found on second-hand disks purchased in the UAE, as well ...


Leveraging The Windows Amcache.Hve File In Forensic Investigations, Bhupendra Singh, Upasna Singh 2016 Defence Institute of Advanced Technology (DU)

Leveraging The Windows Amcache.Hve File In Forensic Investigations, Bhupendra Singh, Upasna Singh

Journal of Digital Forensics, Security and Law

The Amcache.hve is a registry hive file that is created by Microsoft® Windows® to store the information related to execution of programs. This paper highlights the evidential potential of Amcache.hve file and its application in the area of user activity analysis. The study uncovers numerous artifacts retained in Amcache.hve file when a user performs certain actions such as running host-based applications, installation of new applications, or running portable applications from external devices. The results of experiments demonstrate that Amcache.hve file stores intriguing artifacts related to applications such as timestamps of creation and last modification of any ...


Bloom Filters Optimized Wu-Manber For Intrusion Detection, Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, Babar Shah 2016 Network Engineering and Security Department, Jordan University of Science and Technology

Bloom Filters Optimized Wu-Manber For Intrusion Detection, Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, Babar Shah

Journal of Digital Forensics, Security and Law

With increasing number and severity of attacks, monitoring ingress and egress network traffic is becoming essential everyday task. Intrusion detection systems are the main tools for capturing and searching network traffic for potential harm. Signature-based intrusion detection systems are the most widely used, and they simply use a pattern matching algorithms to locate attack signatures in intercepted network traffic. Pattern matching algorithms are very expensive in terms of running time and memory usage, leaving intrusion detection systems unable to detect attacks in real-time. We propose a Bloom filters optimized Wu-Manber pattern matching algorithm to speed up intrusion detection. The Bloom ...


The Impact Of Md5 File Hash Collisions On Digital Forensic Imaging, Gary C. Kessler 2016 Embry-Riddle Aeronautical University

The Impact Of Md5 File Hash Collisions On Digital Forensic Imaging, Gary C. Kessler

Journal of Digital Forensics, Security and Law

The Message Digest 5 (MD5) hash is commonly used as for integrity verification in the forensic imaging process. The ability to force MD5 hash collisions has been a reality for more than a decade, although there is a general consensus that hash collisions are of minimal impact to the practice of computer forensics. This paper describes an experiment to determine the results of imaging two disks that are identical except for one file, the two versions of which have different content but otherwise occupy the same byte positions on the disk, are the same size, and have the same hash ...


A New Distributed Chinese Wall Security Policy Model, Saad Fehis, Omar Nouali, Mohand-Tahar Kechadi 2016 Higher National School of Computer Algiers

A New Distributed Chinese Wall Security Policy Model, Saad Fehis, Omar Nouali, Mohand-Tahar Kechadi

Journal of Digital Forensics, Security and Law

The application of the Chinese wall security policy model (CWSPM) to control the information flows between two or more competing and/or conflicting companies in cloud computing (Multi-tenancy) or in the social network, is a very interesting solution. The main goal of the Chinese Wall Security Policy is to build a wall between the datasets of competing companies, and among the system subjects. This is done by the applying to the subjects mandatory rules, in order to control the information flow caused between them. This problem is one of the hottest topics in the area of cloud computing (as a ...


A Survey Of Social Network Forensics, Umit Karabiyik, Muhammed Abdullah Canbaz, Ahmet Aksoy, Tayfun Tuna, Esra Akbas, Bilal Gonen, Ramazan S. Aygun 2016 Department of Computer Science Sam Houston State University

A Survey Of Social Network Forensics, Umit Karabiyik, Muhammed Abdullah Canbaz, Ahmet Aksoy, Tayfun Tuna, Esra Akbas, Bilal Gonen, Ramazan S. Aygun

Journal of Digital Forensics, Security and Law

Social networks in any form, specifically online social networks (OSNs), are becoming a part of our everyday life in this new millennium especially with the advanced and simple communication technologies through easily accessible devices such as smartphones and tablets. The data generated through the use of these technologies need to be analyzed for forensic purposes when criminal and terrorist activities are involved. In order to deal with the forensic implications of social networks, current research on both digital forensics and social networks need to be incorporated and understood. This will help digital forensics investigators to predict, detect and even prevent ...


Table Of Contents, 2016 Embry-Riddle Aeronautical University

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Digital Commons powered by bepress