Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Law

Applying A Contingency Framework To Digital Forensic Processes In Cloud Based Acquisitions, Diane Barrett Jun 2017

Applying A Contingency Framework To Digital Forensic Processes In Cloud Based Acquisitions, Diane Barrett

Journal of Digital Forensics, Security and Law

The change in business models to incorporate a wide variety of cloud computing environments has resulted in the escalation of computer crimes in the areas of security breaches and hacking. Methods to acquire evidence in a cloud computing environment are limited due to the complexity of the cloud environment. Since digital acquisition processes in cloud computing environments are still in the infancy stages, there have been no studies in the application of existing frameworks to this type environment based on traditional forensic processes.

This paper describes a qualitative study conducted to develop a robust contingency framework for deciding when to …


A Whole New Meaning To Having Our Head In The Clouds: Voice Recognition Technology, The Transmission Of Our Oral Communications To The Cloud And The Ability Of Canadian Law To Protect Us From The Dangers It Presents, Sarit K. Mizrahi Jan 2017

A Whole New Meaning To Having Our Head In The Clouds: Voice Recognition Technology, The Transmission Of Our Oral Communications To The Cloud And The Ability Of Canadian Law To Protect Us From The Dangers It Presents, Sarit K. Mizrahi

Canadian Journal of Law and Technology

Voice recognition technology is now included in modern devices as a matter of course, being used in anything from our cellular telephones, to our televisions, and even the toys of our children. While we may voluntarily interact with some of our devices using this technology, such as conversing with Siri on our iPhones, many of us remain unaware as to the dangerous implications of using voice recognition technology.

Its ability to record some of our most personal conversations allows private companies to eavesdrop on us in an unprecedented manner and amass highly sensitive information about our lives that would have …