Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Law

2006

Institution
Keyword
Publication
Publication Type

Articles 1 - 30 of 40

Full-Text Articles in Engineering

2006 Scholars And Artists Bibliography, Daniel J. Simon, Michael Schwartz Library, Cleveland State University, Friends Of The Michael Schwartz Library Oct 2006

2006 Scholars And Artists Bibliography, Daniel J. Simon, Michael Schwartz Library, Cleveland State University, Friends Of The Michael Schwartz Library

Scholars and Artists Bibliographies

This bibliography was created for the annual Friends of the Michael Schwartz Library Scholars and Artists Reception, recognizing scholarly and creative achievements of Cleveland State University faculty, staff and emeriti. Dr. Dan Simon was the guest speaker.


Santa Clara Magazine, Volume 48 Number 2, Fall 2006, Santa Clara University Oct 2006

Santa Clara Magazine, Volume 48 Number 2, Fall 2006, Santa Clara University

Santa Clara Magazine

8 - TRUTH, LEGEND, AND JESSE JAMES By Ron Hansen M.A. '95. Jesse James' exploits made him a legend even in his own time. Now the author of the novel The Assassination of Jesse James by the Coward Robert Ford reveals what it takes to get beyond coloring book heroes and villains to understanding a charming psychopath and his killer. Plus insights into the making of the forthcoming film starring Brad Pitt and Casey Affleck.

14 - VIOLENCE IN THE MOVIES By Jim Shepard. Movies keep giving us more motion, more mayhem-which is exactly what we want. But what price …


What’S The Hang Up? The Future Of Voip Regulation And Taxation In New Hampshire, Kate Winstanley Sep 2006

What’S The Hang Up? The Future Of Voip Regulation And Taxation In New Hampshire, Kate Winstanley

The University of New Hampshire Law Review

Alice in Austria wishes to call her friend Bob in Boston, using a Boston area code to avoid charges for an international call. Using VoIP, Alice may initiate her call from any location in Austria where she may find Internet access. Once Alice connects to the Internet, she can transmit her call with the aid of a VoIP service provider, such as Skype. In order to hear and communicate with Bob, Alice can rely on a microphone and a headset that she can plug into her computer. Through VoIP, not only may Alice carry on a telephone conversation, but most …


Santa Clara Magazine Volume 48 Number 1, Summer 2006, Santa Clara University Jul 2006

Santa Clara Magazine Volume 48 Number 1, Summer 2006, Santa Clara University

Santa Clara Magazine

8 - THE MAN BEHIND THE SOUND by Karen Crocker Snell. As a young music-loving soldier in the final days of World War II, John T. "Jack" Mullin '36 went to investigate a German recording device called a magnetophon. His resulting work in sound profoundly affected the field of recorded audio.

14 - THREE ROOMMATES IN PARIS By John Patrick Donnelly, S.J. It has been 500 years since Francisco Xavier and Pierre Favre were born, and 450 years since the death of Ignatius of Loyola. Quite a lot has happened since 1529 at the University of Paris, when the three …


Patentability Of Software Inventions, Umakant Mishra Jun 2006

Patentability Of Software Inventions, Umakant Mishra

Umakant Mishra

Software is very expensive to develop but very inexpensive to copy. Just by copying a software you create an exact duplicate of the original software and all with the same functionality. There is no difference between the original (which is bought) and the copy (pirated). The worse is when the source code is copied. The copier can even claim to have developed the software where the credit of the developer might go. The software developers use various methods to protect their source code such as copyright, trade secrets etc. but each having limitations. The developers are keen on finding legal …


Pre-Disaster Planning And Mitigation And Its Impact On Comprehensive Emergency Management And The Nation: Pre-Disaster Mitigation (Pdm) Program And The Population Protected, Thomas Lyons Carr Iii May 2006

Pre-Disaster Planning And Mitigation And Its Impact On Comprehensive Emergency Management And The Nation: Pre-Disaster Mitigation (Pdm) Program And The Population Protected, Thomas Lyons Carr Iii

Thomas Lyons (Thom) Carr III Appl.Sc., CEM

A Project for a Professional Degree submitted to The Faculty of School of Engineering and Applied Science of The George Washington University in partial fulfillment of the requirements for the degree of Applied Scientist of Engineering Management May 21, 2006

On October 10, 2000, The Disaster Mitigation Act of 2000 (DMA 2000 or DMA 2K) (Public Law 106-390) was enacted, amending the Robert T. Stafford Relief and Emergency Assistance Act and established new requirements for the national for hazard mitigation planning. States, Tribes, territories, and local governments now must have an approved mitigation plan in place prior to receiving certain …


Homeland Security: Engaging The Frontlines - Symposium Proceedings, George H. Baker, Cheryl J. Elliott Apr 2006

Homeland Security: Engaging The Frontlines - Symposium Proceedings, George H. Baker, Cheryl J. Elliott

George H Baker

The rise of the American homeland security endeavor under the leadership of the new Department of Homeland Security has been heralded by several major national strategy documents. These documents have served to organize efforts at top levels within the government and industry. However, the national strategy guidance is not getting to many organizations and people at the grass-roots level who can make the most difference in preventing attacks, protecting systems, and recovering from catastrophic events, viz. the general citizenry, private infrastructure owners, and local governments. To better understand grass-roots issues and solutions, James Madison University, in cooperation with the Federal …


Paper Session V: Forensic Software Tools For Cell Phone Subscriber Identity Modules, Wayne Jansen, Rick Ayers Apr 2006

Paper Session V: Forensic Software Tools For Cell Phone Subscriber Identity Modules, Wayne Jansen, Rick Ayers

Annual ADFSL Conference on Digital Forensics, Security and Law

Cell phones and other handheld devices incorporating cell phone capabilities (e.g., smart phones) are ubiquitous. Besides placing calls, cell phones allow users to perform other tasks such as text messaging and phonebook entry management. When cell phones and cellular devices are involved in a crime or other incident, forensic specialists require tools that allow the proper retrieval and speedy examination of data present on the device. For devices conforming to the Global System for Mobile Communications (GSM) standards, certain data such as dialed numbers, text messages, and phonebook entries are maintained on a Subscriber Identity Module (SIM). This paper gives …


Paper Session Iv: Development And Delivery Of Coursework - The Legal/Regulatory/Policy Environment Of Cyberforensics, John W. Bagby, John C. Ruhnka Apr 2006

Paper Session Iv: Development And Delivery Of Coursework - The Legal/Regulatory/Policy Environment Of Cyberforensics, John W. Bagby, John C. Ruhnka

Annual ADFSL Conference on Digital Forensics, Security and Law

This paper describes a cyber-forensics course that integrates important public policy and legal issues as well as relevant forensic techniques. Cyber-forensics refers to the amalgam of multi-disciplinary activities involved in the identification, gathering, handling, custody, use and security of electronic files and records, involving expertise from the forensic domain, and which produces evidence useful in the proof of facts for both commercial and legal activities. The legal and regulatory environment in which electronic discovery takes place is of critical importance to cyber-forensics experts because the legal process imposes both constraints and opportunities for the effective use of evidence gathered through …


Paper Session Iv: Toward Understanding Digital Forensics As A Profession: Defining Curricular Needs (***Research In Process ***), Michelle Wolf, Alan Shafer, Michael Gendron Apr 2006

Paper Session Iv: Toward Understanding Digital Forensics As A Profession: Defining Curricular Needs (***Research In Process ***), Michelle Wolf, Alan Shafer, Michael Gendron

Annual ADFSL Conference on Digital Forensics, Security and Law

This research paper presents research in process which attempts to define the common body of knowledge (CBK) of digital forensics. Digital forensics is not well defined not does it have a generally accepted CBK. The first three phases of completed research, in a four-phase research process are discussed. The early results have created a preliminary CBK, and final validation is underway.


Paper Session V: Steganography And Terrorist Communications - Current Information And Trends - Tools, Analysis And Future Directions In Steganalysis In Context With Terrorists And Other Criminals, William Eyre, Marcus Rogers Apr 2006

Paper Session V: Steganography And Terrorist Communications - Current Information And Trends - Tools, Analysis And Future Directions In Steganalysis In Context With Terrorists And Other Criminals, William Eyre, Marcus Rogers

Annual ADFSL Conference on Digital Forensics, Security and Law

In ancient times, users communicated using steganography, “…derived from the Greek words steganos, meaning ‘covered’, and graphein, meaning ‘to write.’” (Singh, 1999, p.5) Steganography facilitates secret, undetected communication. In modern times, in the context of the Global War on Terror, national intelligence and law enforcement agencies need tools to detect hidden information (steganography) in various types of media, most specifically to uncover the placement of hidden information in images. This paper will look at steganography in general terms, presenting the theory of some common steganographic techniques and touching on some theoretical work in steganography. Then a discussion of how to …


Paper Session Iii: Research Brief: A Curriculum For Teaching Information Technology Investigative Techniques For Auditors, Grover S. Kearns, Elizabeth V. Mulig Apr 2006

Paper Session Iii: Research Brief: A Curriculum For Teaching Information Technology Investigative Techniques For Auditors, Grover S. Kearns, Elizabeth V. Mulig

Annual ADFSL Conference on Digital Forensics, Security and Law

Recent prosecutions of highly publicized white-collar crimes combined with public outrage have resulted in heightened regulation and greater emphasis on systems of internal control. Because both white-collar and cybercrimes are usually perpetrated through computers, auditors’ knowledge of information technology (IT) is now more vital than ever. However, preserving digital evidence and investigative techniques, which can be essential to fraud examinations, are not skills frequently taught in accounting programs. Furthermore, many students are not instructed in the use of computer assisted auditing tools and techniques – applications that might uncover fraudulent activity. Only a limited number of university-level accounting classes provide …


Paper Session Ii: Forensic Scene Documentation Using Mobile Technology, Ibrahim Baggili Apr 2006

Paper Session Ii: Forensic Scene Documentation Using Mobile Technology, Ibrahim Baggili

Annual ADFSL Conference on Digital Forensics, Security and Law

This paper outlines a framework for integrating forensic scene documentation with mobile technology. Currently there are no set standards for documenting a forensic scene. Nonetheless, there is a conceptual framework that forensic scientists and engineers use that includes note taking, scene sketches, photographs, video, and voice interview recordings. This conceptual framework will be the basis that a mobile forensic scene documentation software system is built on. A mobile software system for documenting a forensic scene may help in standardizing forensic scene documentation by regulating the data collection and documentation processes for various forensic disciplines.


Santa Clara Magazine, Volume 47 Number 4, Spring 2006, Santa Clara University Apr 2006

Santa Clara Magazine, Volume 47 Number 4, Spring 2006, Santa Clara University

Santa Clara Magazine

8 - A DREAM OPPORTUNITY by Monte Lorenzet. Santa Clara University's sleep lab is one of just a handful of similar research facilities at undergraduate institutions. Students, alumni, faculty, and the research community are all benefiting from the fledgling lab.

10 - SCIENCE AND SOCIAL JUSTICE by Kim Kooyers. Social entrepreneurs use technology to address some of the world's urgent needs. Last November, some of these innovators were honored at the Tech Museum Awards, an international awards program.

14 - GIGANTES Y CABEZUDOS by Elizabeth Kelley Gillogly '93. In an intensive workshop featuring seasoned artists from Spain, SCU students explored …


Risk-Based Decision Model For Determining The Applicability Of An Earned Value Management System In Construction, Mark D. Workman Mar 2006

Risk-Based Decision Model For Determining The Applicability Of An Earned Value Management System In Construction, Mark D. Workman

Theses and Dissertations

New policy mandated by the Undersecretary of Defense for Acquisition, Technology and Logistics has lowered the dollar thresholds of contracts requiring earned value management (EVM). This policy directed that a "risk-based decision" be made to determine if EVM should be used on firm-fixed price contracts under $20 million. Although not previously applicable to Military Construction (MILCON) building projects or other Air Force Civil Engineer (CE) managed contracts, the new threshold requires that CE projects be evaluated for risk. Therefore, the focus of this research was to analyze the risk factors associated with construction contracts in an attempt to build a …


Predicting The Effects Of Contingency Contracting On Local Economies, Donald J. Wagoner Mar 2006

Predicting The Effects Of Contingency Contracting On Local Economies, Donald J. Wagoner

Theses and Dissertations

In recent years, Air Force personnel have been deployed in support of contingency operations to various points on the globe. The Department of Defense spends millions of dollars to support and sustain forces during contingency operations. The Air Force deploys Contingency Contracting Officers (CCO) to support personnel during these operations. During a contingency operation contracting officers will normally establish short-term contracts as quickly as possible to meet mission requirements with little concern for the local economy. This research concluded that the actions of Air Force CCOs can affect the local economy in a deployed location. By providing contingency contracting officers …


Alphaco: A Teaching Case On Information Technology Audit And Security, Hüseyin Tanriverdi, Joshua Bertsch, Jonathan Harrison, Po-Ling Hsiao, Ketan S. Mesuria, David Hendrawirawan Jan 2006

Alphaco: A Teaching Case On Information Technology Audit And Security, Hüseyin Tanriverdi, Joshua Bertsch, Jonathan Harrison, Po-Ling Hsiao, Ketan S. Mesuria, David Hendrawirawan

Journal of Digital Forensics, Security and Law

Recent regulations in the United States (U.S.) such as the Sarbanes-Oxley Act of 2002 require top management of a public firm to provide reasonable assurance that they institute internal controls that minimize risks over the firm’s operations and financial reporting. External auditors are required to attest to the management’s assertions over the effectiveness of those internal controls. As firms rely more on information technology (IT) in conducting business, they also become more vulnerable to IT related risks. IT is critical for initiating, recording, processing, summarizing and reporting accurate financial and non-financial data. Thus, understanding IT related risks and instituting internal …


Development And Delivery Of Coursework: The Legal/Regulatory/Policy Environment Of Cyberforensics, John W. Bagby, John C. Ruhnka Jan 2006

Development And Delivery Of Coursework: The Legal/Regulatory/Policy Environment Of Cyberforensics, John W. Bagby, John C. Ruhnka

Journal of Digital Forensics, Security and Law

This paper describes a cyber-forensics course that integrates important public policy and legal issues as well as relevant forensic techniques. Cyber-forensics refers to the amalgam of multi-disciplinary activities involved in the identification, gathering, handling, custody, use and security of electronic files and records, involving expertise from the forensic domain, and which produces evidence useful in the proof of facts for both commercial and legal activities. The legal and regulatory environment in which electronic discovery takes place is of critical importance to cyber-forensics experts because the legal process imposes both constraints and opportunities for the effective use of evidence gathered through …


Santa Clara Magazine, Volume 48 Number 3, Winter 2006, Santa Clara University Jan 2006

Santa Clara Magazine, Volume 48 Number 3, Winter 2006, Santa Clara University

Santa Clara Magazine

8 - WELCOME HOME, STEVE By Steven Boyd Saum. Basketball superstar Steve Nash '96 comes home to Santa Clara for a unique honor: a ceremony retiring his Bronco jersey. In a convocation address, he tells how Santa Clara changed his life. Now he wants the University to take its mission global.

12 - THE SCHOOL OF HOPE By Martha Ellen Stortz. Scholar and teacher Bill Spohn earned deep affection and the respect of the Santa Clara community in his years directing the Bannan Center for Jesuit Education. When he was stricken with cancer, he and his wife, Marty Stortz, looked …


Towards Monitoring Galileo: The European Gnss Supervisory Authority In Statu Nascendi = Zur Künftigen Überwachungsagentur Des Galileo Systems, Vers Une Autorité De Surveillance Du Système Galileo, Frans G. Von Der Dunk Jan 2006

Towards Monitoring Galileo: The European Gnss Supervisory Authority In Statu Nascendi = Zur Künftigen Überwachungsagentur Des Galileo Systems, Vers Une Autorité De Surveillance Du Système Galileo, Frans G. Von Der Dunk

Space, Cyber, and Telecommunications Law Program: Faculty Publications

There is little doubt that one of the most interesting and revolutionary, but also complicated and challenging space projects of today is Galileo, Europe’s own full-fledged second-generation navigation satellite system. Developed jointly by the European Union through the Commission and the European Space Agency, Galileo should by the end of the decade have thirty operational satellites in middle-earth-orbits providing timing, positioning and navigation signals across the globe.

From the very beginning Galileo was envisaged in particular by the Commission as a public-private-partnership (PPP). On the one hand, a private concessionaire should operate the system as of full operational capability (originally …


The Design Of An Undergraduate Degree Program In Computer & Digital Forensics, Gary C. Kessler, Michael E. Schirling Jan 2006

The Design Of An Undergraduate Degree Program In Computer & Digital Forensics, Gary C. Kessler, Michael E. Schirling

Journal of Digital Forensics, Security and Law

Champlain College formally started an undergraduate degree program in Computer & Digital Forensics in 2003. The underlying goals were that the program be multidisciplinary, bringing together the law, computer technology, and the basics of digital investigations; would be available as on online and oncampus offering; and would have a process-oriented focus. Success of this program has largely been due to working closely with practitioners, maintaining activity in events related to both industry and academia, and flexibility to respond to ever-changing needs. This paper provides an overview of how this program was conceived, developed, and implemented; its evolution over time; and …


Network Neutrality And The Economics Of Congestion, Christopher S. Yoo Jan 2006

Network Neutrality And The Economics Of Congestion, Christopher S. Yoo

All Faculty Scholarship

No abstract provided.


Electronic Data Discovery: Integrating Due Process Into Cyber Forensic Practice, John W. Bagby, John C. Ruhnka Jan 2006

Electronic Data Discovery: Integrating Due Process Into Cyber Forensic Practice, John W. Bagby, John C. Ruhnka

Journal of Digital Forensics, Security and Law

Most organizations and government agencies regularly become engaged in litigation with suppliers, customers, clients, employees, competitors, shareholders, prosecutors or regulatory agencies that nearly assures the need to organize, retain, find and produce business records and correspondence, emails, accounting records or other data relevant to disputed issues. This article discusses some high visibility cases that constrain how metadata and content is routinely made available to opposing parties in civil litigation, to prosecutors in criminal prosecutions and to agency staff in regulatory enforcement litigation. Public policy, as implemented in the rules of evidence and pretrial discovery, restrict electronic data discovery (EDD) as …


Development Of An Ontology Based Forensic Search Mechanism: Proof Of Concept, Jill Slay, Fiona Schulz Jan 2006

Development Of An Ontology Based Forensic Search Mechanism: Proof Of Concept, Jill Slay, Fiona Schulz

Journal of Digital Forensics, Security and Law

This paper examines the problems faced by Law Enforcement in searching large quantities of electronic evidence. It examines the use of ontologies as the basis for new forensic software filters and provides a proof of concept tool based on an ontological design. It demonstrates that efficient searching is produced through the use of such a design and points to further work that might be carried out to extend this concept.


Table Of Contents Jan 2006

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Development Of A National Repository Of Digital Forensic Intelligence, Mark Weiser, David P. Biros, Greg Mosier Jan 2006

Development Of A National Repository Of Digital Forensic Intelligence, Mark Weiser, David P. Biros, Greg Mosier

Journal of Digital Forensics, Security and Law

Many people do all of their banking online, we and our children communicate with peers through computer systems, and there are many jobs that require near continuous interaction with computer systems. Criminals, however, are also “connected”, and our online interaction provides them a conduit into our information like never before. Our credit card numbers and other fiscal information are at risk, our children's personal information is exposed to the world, and our professional reputations are on the line.

The discipline of Digital Forensics in law enforcement agencies around the nation and world has grown to match the increased risk and …


Computer Forensics Field Triage Process Model, Marcus K. Rogers, James Goldman, Rick Mislan, Timothy Wedge, Steve Debrota Jan 2006

Computer Forensics Field Triage Process Model, Marcus K. Rogers, James Goldman, Rick Mislan, Timothy Wedge, Steve Debrota

Journal of Digital Forensics, Security and Law

With the proliferation of digital based evidence, the need for the timely identification, analysis and interpretation of digital evidence is becoming more crucial. In many investigations critical information is required while at the scene or within a short period of time - measured in hours as opposed to days. The traditional cyber forensics approach of seizing a system(s)/media, transporting it to the lab, making a forensic image(s), and then searching the entire system for potential evidence, is no longer appropriate in some circumstances. In cases such as child abductions, pedophiles, missing or exploited persons, time is of the essence. In …


Forensic Tools For Mobile Phone Subscriber Identity Modules, Wayne Jansen, Rick Ayers Jan 2006

Forensic Tools For Mobile Phone Subscriber Identity Modules, Wayne Jansen, Rick Ayers

Journal of Digital Forensics, Security and Law

Mobile phones and other handheld devices incorporating cellular capabilities, such as Personal Digital Assistants, are ubiquitous. Besides placing calls, these devices allow users to perform other useful tasks, including text messaging and phonebook entry management. When cell phones and cellular devices are involved in a crime or other incident, forensic specialists require tools that allow the proper retrieval and speedy examination of data present on the device. For devices conforming to the Global System for Mobile Communications (GSM) standards, certain data such as dialed numbers, text messages, and phonebook entries are maintained on a Subscriber Identity Module (SIM). This paper …


Table Of Contents Jan 2006

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Designing A Data Warehouse For Cyber Crimes, Il-Yeol Song, John D. Maguire, Ki Jung Lee, Namyoun Choi, Xiaohua Hu, Peter Chen Jan 2006

Designing A Data Warehouse For Cyber Crimes, Il-Yeol Song, John D. Maguire, Ki Jung Lee, Namyoun Choi, Xiaohua Hu, Peter Chen

Journal of Digital Forensics, Security and Law

One of the greatest challenges facing modern society is the rising tide of cyber crimes. These crimes, since they rarely fit the model of conventional crimes, are difficult to investigate, hard to analyze, and difficult to prosecute. Collecting data in a unified framework is a mandatory step that will assist the investigator in sorting through the mountains of data. In this paper, we explore designing a dimensional model for a data warehouse that can be used in analyzing cyber crime data. We also present some interesting queries and the types of cyber crime analyses that can be performed based on …