Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Embry-Riddle Aeronautical University (391)
- University of Colorado Law School (45)
- University of Pennsylvania Carey Law School (13)
- SelectedWorks (10)
- The University of Maine (9)
-
- Selected Works (6)
- University of Southern Maine (5)
- University of New Hampshire (4)
- Brigham Young University Law School (2)
- Penn State Dickinson Law (2)
- University of Nebraska - Lincoln (2)
- Brigham Young University (1)
- Central Bank of Nigeria (1)
- De La Salle University (1)
- Florida International University (1)
- Maurer School of Law: Indiana University (1)
- Old Dominion University (1)
- Technological University Dublin (1)
- University of Massachusetts Amherst (1)
- University of Minnesota Law School (1)
- University of Tennessee, Knoxville (1)
- Western University (1)
- World Maritime University (1)
- Keyword
-
- Digital forensics (30)
- Computer forensics (17)
- Digital Forensics (15)
- Digital evidence (13)
- Electricity (12)
-
- Forensics (12)
- Privacy (11)
- Climate change (10)
- Colorado (10)
- Computer Forensics (9)
- EPA (8)
- Hydroelectric power plants (7)
- Data recovery (6)
- Energy policy (6)
- Environmental Protection Agency (6)
- Information security (6)
- Internet (6)
- Public Comments in Rulemaking Proceedings (6)
- Air pollution (5)
- Colorado River (5)
- Cooking (5)
- Cyber crime (5)
- Dams (5)
- Data disposal (5)
- Disk analysis (5)
- Environmental impact statements (5)
- New Mexico (5)
- Risk (5)
- Technology (5)
- Visualization (5)
- Publication Year
- Publication
-
- Journal of Digital Forensics, Security and Law (290)
- Annual ADFSL Conference on Digital Forensics, Security and Law (100)
- The Federal Impact on State Water Rights (Summer Conference, June 11-13) (16)
- 2012 Energy Justice Conference and Technology Exposition (September 17-18) (13)
- All Faculty Scholarship (13)
-
- Energy Field Tour 2003 (August 11-16) (13)
- Dickey-Lincoln School Lakes Project (9)
- Ron D. Katznelson (8)
- Maine Collection (5)
- RISK: Health, Safety & Environment (1990-2002) (4)
- George H Baker (3)
- BYU Law Review (2)
- Dickinson Law Review (2017-Present) (2)
- Sam Han (2)
- A Low-Carbon Energy Blueprint for the American West (Martz Summer Conference, June 6-8) (1)
- Angelo King Institute for Economic and Business Studies (AKI) (1)
- Brian J. Love (1)
- Bullion (1)
- Dannie Jost (1)
- Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research (1)
- Doctoral Dissertations (1)
- Doctoral Dissertations and Master's Theses (1)
- Drawing the Blueprint for a Sustainable Natural Gas Future (January 18) (1)
- Energy Field Tour 2004 (August 4-6) (1)
- FIU Electronic Theses and Dissertations (1)
- IP Theory (1)
- International Journal of Nuclear Security (1)
- Journal of Nonprofit Innovation (1)
- Kevin L Doran (1)
- Minnesota Journal of Law, Science & Technology (1)
Articles 1 - 30 of 501
Full-Text Articles in Law
Reducing Food Scarcity: The Benefits Of Urban Farming, S.A. Claudell, Emilio Mejia
Reducing Food Scarcity: The Benefits Of Urban Farming, S.A. Claudell, Emilio Mejia
Journal of Nonprofit Innovation
Urban farming can enhance the lives of communities and help reduce food scarcity. This paper presents a conceptual prototype of an efficient urban farming community that can be scaled for a single apartment building or an entire community across all global geoeconomics regions, including densely populated cities and rural, developing towns and communities. When deployed in coordination with smart crop choices, local farm support, and efficient transportation then the result isn’t just sustainability, but also increasing fresh produce accessibility, optimizing nutritional value, eliminating the use of ‘forever chemicals’, reducing transportation costs, and fostering global environmental benefits.
Imagine Doris, who is …
Enhanced Privacy-Enabled Face Recognition Using Κ-Identity Optimization, Ryan Karl
Enhanced Privacy-Enabled Face Recognition Using Κ-Identity Optimization, Ryan Karl
Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research
Facial recognition is becoming more and more prevalent in the daily lives of the common person. Law enforcement utilizes facial recognition to find and track suspects. The newest smartphones have the ability to unlock using the user's face. Some door locks utilize facial recognition to allow correct users to enter restricted spaces. The list of applications that use facial recognition will only increase as hardware becomes more cost-effective and more computationally powerful. As this technology becomes more prevalent in our lives, it is important to understand and protect the data provided to these companies. Any data transmitted should be encrypted …
Rebuilding Grid Governance, Joel B. Eisen, Heather E. Payne
Rebuilding Grid Governance, Joel B. Eisen, Heather E. Payne
BYU Law Review
As climate change sharpens the focus on our electricity systems, there is widespread agreement that the institutions that govern our electric grid must change to realize a clean energy future in the timescale necessary. Scholars are actively debating how grid governance needs to change, but in this Article we demonstrate that current proposals are insufficient because they do not contemplate “rebuilding.” This Article defines “rebuilding” as ending entities tasked with grid governance and creating new ones to take their place. We propose what no one else has: an overarching framework for rebuilding any grid governance institutions.
This Article discusses when …
A Socio-Economic Analysis Of Automated Container Terminal (Act) Concept In Indonesia : Case Study : New Priok Container Terminal One, Febri Triana Hartami Siagian
A Socio-Economic Analysis Of Automated Container Terminal (Act) Concept In Indonesia : Case Study : New Priok Container Terminal One, Febri Triana Hartami Siagian
World Maritime University Dissertations
No abstract provided.
Project Khepri: Mining Asteroid Bennu For Water, Erika Frost, Gowtham Boyala, Adam Gremm, Ahmet Gungor, Amirhossein Taghipour, Massimo Biella, Jiawei "Jackson" Qiu, Athip Thirupathi Raj, Arjun Chhabra, Adam Gee, Saanjali Maharaj, Erin Richardson, Julia Empey, Haidar Ali Abdul-Nabi, Lindsay Richards, Ariyaan Talukder, Aaron Groh, Brie Miklaucic, Jd Carlson, Kristina Kim, Maverick Cue
Project Khepri: Mining Asteroid Bennu For Water, Erika Frost, Gowtham Boyala, Adam Gremm, Ahmet Gungor, Amirhossein Taghipour, Massimo Biella, Jiawei "Jackson" Qiu, Athip Thirupathi Raj, Arjun Chhabra, Adam Gee, Saanjali Maharaj, Erin Richardson, Julia Empey, Haidar Ali Abdul-Nabi, Lindsay Richards, Ariyaan Talukder, Aaron Groh, Brie Miklaucic, Jd Carlson, Kristina Kim, Maverick Cue
Undergraduate Student Research Internships Conference
Deep space asteroid mining presents the opportunity for the collection of critical resources required to establish a cis-lunar infrastructure. In specific, the Project Khepri team has focused on the collection of water from asteroid Bennu. This water has the potential to provide a source of clean-energy propellant as well as an essential consumable for humans or agriculture on crewed trips to the Moon or Mars. This would avoid the high costs of launching from Earth - making it a highly desirable element for the future of cis-lunar infrastructure. The OSIRIS-REx mission provided a complete survey of asteroid Bennu and is …
Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion
Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion
Dickinson Law Review (2017-Present)
No abstract provided.
Deepfakes, Shallowfakes, And The Need For A Private Right Of Action, Eric Kocsis
Deepfakes, Shallowfakes, And The Need For A Private Right Of Action, Eric Kocsis
Dickinson Law Review (2017-Present)
For nearly as long as there have been photographs and videos, people have been editing and manipulating them to make them appear to be something they are not. Usually edited or manipulated photographs are relatively easy to detect, but those days are numbered. Technology has no morality; as it advances, so do the ways it can be misused. The lack of morality is no clearer than with deepfake technology.
People create deepfakes by inputting data sets, most often pictures or videos into a computer. A series of neural networks attempt to mimic the original data set until they are nearly …
Path Towards Energy Sustainability: Amultidimensional Analysis Of Energypoverty In Philippine Households, Anna Katrina R. Ignacio, Maria Sofia Lei P. Puncia, Arlene B. Inocencio, Marites Tiongco, Mitzie Irene P. Conchada, Alellie B. Sobreviñas, Rens Adrian T. Calub
Path Towards Energy Sustainability: Amultidimensional Analysis Of Energypoverty In Philippine Households, Anna Katrina R. Ignacio, Maria Sofia Lei P. Puncia, Arlene B. Inocencio, Marites Tiongco, Mitzie Irene P. Conchada, Alellie B. Sobreviñas, Rens Adrian T. Calub
Angelo King Institute for Economic and Business Studies (AKI)
Measuring energy poverty to meet one’s basic needs is vital for household assessments concerning accessibility of energy, affordability of energy prices, usage of energy resources, and sufficiency of energy consumption. In this Policy Brief, we have listed recommendations and rationale to improve the energy conditions of Philippine households.
Who Will Be Liable For Medical Malpractice In The Future? How The Use Of Artificial Intelligence In Medicine Will Shape Medical Tort Law, Scott J. Schweikart
Who Will Be Liable For Medical Malpractice In The Future? How The Use Of Artificial Intelligence In Medicine Will Shape Medical Tort Law, Scott J. Schweikart
Minnesota Journal of Law, Science & Technology
No abstract provided.
Rethinking Grid Governance For The Climate Change Era, Shelley Welton
Rethinking Grid Governance For The Climate Change Era, Shelley Welton
All Faculty Scholarship
The electricity sector is often appropriately called the linchpin of efforts to respond to climate change. Over the next few decades, the U.S. electricity sector will need to double in size to accommodate electric vehicles, at the same time that it transforms to run entirely on clean energy. To drive this transformation, states are increasingly adopting 100% clean energy targets. But fossil fuel corporations are pushing back, seeking to maintain their structural domination of the U.S. energy sector. This article calls attention to one central but under-scrutinized way that these companies impede the clean energy transition: Incumbent fossil fuel companies …
The Bounds Of Energy Law, Shelley Welton
The Bounds Of Energy Law, Shelley Welton
All Faculty Scholarship
U.S. energy law was born of fossil fuels. Consequently, our energy law has long centered on the material and legal puzzles that bringing fossil fuels to market presents. Eliminating these same carbon-producing energy sources, however, has emerged as perhaps the most pressing material transformation needed in the twenty-first century—and one that energy law scholarship has rightfully embraced. Yet in our admirable quest to aid in this transformation, energy law scholars are largely writing into the field bequeathed to us, proposing changes that tweak, but do not fundamentally challenge, last century’s tools for managing the extraction, transport, and delivery of fossil …
Backing Up Into Advocacy: The Case Of Smartphone Driver Distraction, Robert Rosenberger
Backing Up Into Advocacy: The Case Of Smartphone Driver Distraction, Robert Rosenberger
The Journal of Sociotechnical Critique
For the last decade, I’ve been studying the topic of the driving impairment of smartphones. While this began as an exclusively academic project, it has increasingly compelled public engagement. One example of this came in an opinion piece I wrote in 2018 in response to a new traffic law. I take the opportunity here to fill out the academic backstory of this particular op-ed, reflect on how this larger project has evolved to include an unanticipated public-facing edge, and abstract some lessons about public writing.
Efficient Privacy-Aware Imagery Data Analysis, Yifan Tian
Efficient Privacy-Aware Imagery Data Analysis, Yifan Tian
Doctoral Dissertations and Master's Theses
The widespread use of smartphones and camera-coupled Internet of Thing (IoT) devices triggers an explosive growth of imagery data. To extract and process the rich contents contained in imagery data, various image analysis techniques have been investigated and applied to a spectrum of application scenarios. In recent years, breakthroughs in deep learning have powered a new revolution for image analysis in terms of effectiveness with high resource consumption. Given the fact that most smartphones and IoT devices have limited computational capability and battery life, they are not ready for the processing of computational intensive analytics over imagery data collected by …
Energy Demand Response For High-Performance Computing Systems, Kishwar Ahmed
Energy Demand Response For High-Performance Computing Systems, Kishwar Ahmed
FIU Electronic Theses and Dissertations
The growing computational demand of scientific applications has greatly motivated the development of large-scale high-performance computing (HPC) systems in the past decade. To accommodate the increasing demand of applications, HPC systems have been going through dramatic architectural changes (e.g., introduction of many-core and multi-core systems, rapid growth of complex interconnection network for efficient communication between thousands of nodes), as well as significant increase in size (e.g., modern supercomputers consist of hundreds of thousands of nodes). With such changes in architecture and size, the energy consumption by these systems has increased significantly. With the advent of exascale supercomputers in the next …
Inventing Around Edison’S Lamp Patent: The Role Of Patents In Stimulating Downstream Development And Competition, Ron D. Katznelson, John Howells
Inventing Around Edison’S Lamp Patent: The Role Of Patents In Stimulating Downstream Development And Competition, Ron D. Katznelson, John Howells
Ron D. Katznelson
We provide the first detailed empirical study of inventing around patent claims. The enforcement of Edison’s incandescent lamp patent in 1891-1894 stimulated a surge of patenting. Most of these later patents disclosed inventions around the Edison patent. Some of these patents introduced important new technology in their own right and became prior art for new fields, indicating that invention around patents contributes to dynamic efficiency. Contrary to widespread contemporary understanding, the Edison lamp patent did not suppress technological advance in electric lighting. The market position of General Electric (“GE”), the Edison patent-owner, weakened through the period of this patent’s enforcement.
Lowering Legal Barriers To Rpki Adoption, Christopher S. Yoo, David A. Wishnick
Lowering Legal Barriers To Rpki Adoption, Christopher S. Yoo, David A. Wishnick
All Faculty Scholarship
Across the Internet, mistaken and malicious routing announcements impose significant costs on users and network operators. To make routing announcements more reliable and secure, Internet coordination bodies have encouraged network operators to adopt the Resource Public Key Infrastructure (“RPKI”) framework. Despite this encouragement, RPKI’s adoption rates are low, especially in North America.
This report presents the results of a year-long investigation into the hypothesis—widespread within the network operator community—that legal issues pose barriers to RPKI adoption and are one cause of the disparities between North America and other regions of the world. On the basis of interviews and analysis of …
The Quiet Undoing: How Regional Electricity Market Reforms Threaten State Clean Energygoals, Danny Cullenward, Shelley Welton
The Quiet Undoing: How Regional Electricity Market Reforms Threaten State Clean Energygoals, Danny Cullenward, Shelley Welton
All Faculty Scholarship
In a series of largely unnoticed but extremely consequential moves, two regional electricity market operators are pursuing reforms to make it more difficult for states to achieve their clean energy goals. The federal energy regulator, FERC, has already approved one such reform and ordered a second market operator to go farther in punishing state-supported clean energy resources than it had initially proposed. This disturbing trend highlights a shift in energy governance that threatens to destabilize the field’s delicate cooperative federalist model. Over the past several decades, states have increasingly ceded control over energy dispatch and grid planning to private market …
Multiple Content Adaptive Intelligent Watermarking Schemes For The Protection Of Blocks Of A Document Image, Chetan Kr Mr., S Nirmala Dr.
Multiple Content Adaptive Intelligent Watermarking Schemes For The Protection Of Blocks Of A Document Image, Chetan Kr Mr., S Nirmala Dr.
Journal of Digital Forensics, Security and Law
Most of the documents contain different types of information such as white space, static information and dynamic information or mix of static and dynamic information. In this paper, multiple watermarking schemes are proposed for protection of the information content. The proposed approach comprises of three phases. In Phase-1, the edges of the source document image are extracted and the edge image is decomposed into blocks of uniform size. In Phase-2, GLCM features like energy, homogeneity, contrast and correlation are extracted from each block and the blocks are classified as no-information, static, dynamic and mix of static and dynamic information content …
Nigeria's Power Sector Roadmap: Policy Perspectives And Prospects, Bandele A. G. Amoo, O. M. Adebayo, Derek Ibeagha
Nigeria's Power Sector Roadmap: Policy Perspectives And Prospects, Bandele A. G. Amoo, O. M. Adebayo, Derek Ibeagha
Bullion
Various strategies have been employed over the years by the Government to boost power in the country. These strategies have been hinged on policies, reforms and roadmaps, including the 2005 Electric Power Sector Reform Act, the Roadmap for Power Sector Reform 2010 and the current Roadmap for Change. A perfunctory look at previous reforms has resulted in significant progress, including unbundling and privatizing the long-standing government-owned monopoly in the power sector. This paper takes a comprehensive assessment of the Roadmap of Change comparing it to previous policies, isolating policy perspectives, prospects and challenges facing it. It also gleans lessons from …
A Forensic Email Analysis Tool Using Dynamic Visualization, Johannes Stadlinger, Andreas Dewald
A Forensic Email Analysis Tool Using Dynamic Visualization, Johannes Stadlinger, Andreas Dewald
Journal of Digital Forensics, Security and Law
Communication between people counts to the most important information of today’s business. As a result, in case of forensic investigations in big companies, analysis of communication data in general and especially email, as the still most widely used business communication platform with an immense and still growing volume, is a typical task in digital forensics. One of the challenges is to identify the relevant communication partners and structures in the suspects surrounding as quickly as possible in order to react appropriately and identify further targets of evaluation. Due to the amount of emails in typical inboxes, reading through all the …
Find Me If You Can: Mobile Gps Mapping Applications Forensic Analysis & Snavp The Open Source, Modular, Extensible Parser, Jason Moore, Ibrahim Baggili, Frank Breitinger
Find Me If You Can: Mobile Gps Mapping Applications Forensic Analysis & Snavp The Open Source, Modular, Extensible Parser, Jason Moore, Ibrahim Baggili, Frank Breitinger
Journal of Digital Forensics, Security and Law
The use of smartphones as navigation devices has become more prevalent. The ubiquity of hand-held navigation devices such as Garmins or Toms Toms has been falling whereas the ownership of smartphones and their adoption as GPS devices is growing. This work provides a comprehensive study of the most popular smartphone mapping applications, namely Google Maps, Apple Maps, Waze, MapQuest, Bing, and Scout, on both Android and iOS. It details what data was found, where it was found, and how it was acquired for each application. Based on the findings, the work allowed for the construction of a tool capable of …
Compression Of Virtual-Machine Memory In Dynamic Malware Analysis, James E. Fowler Ph.D.
Compression Of Virtual-Machine Memory In Dynamic Malware Analysis, James E. Fowler Ph.D.
Journal of Digital Forensics, Security and Law
Lossless compression of memory dumps from virtual machines that run malware samples is considered with the goal of significantly reducing archival costs in dynamic-malware-analysis applications. Given that, in such dynamic-analysis scenarios, malware samples are typically run in virtual machines just long enough to activate any self-decryption or other detection- avoidance maneuvers, the virtual-machine memory typically changes little from that of the baseline state, with the difference being attributable in large degree to the loading of additional executables and libraries. Consequently, delta coding is proposed to compress the current virtual-machine memory dump by coding its differences with respect to a predicted …
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Special Issue Of Best Papers From The 11th International Conference On Systematic Approaches To Digital Forensic Engineering (Sadfe 2016)
Journal of Digital Forensics, Security and Law
The SADFE series feature the different editions of the International Conference on Systematic Approaches to Digital Forensics Engineering. Now in its eleventh edition, SADFE has established itself as the premier conference for researchers and practitioners working in Systematic Approaches to Digital Forensics Engineering.
SADFE 2016, the eleventh international conference on Systematic Approaches to Digital Forensic Engineering was held in Kyoto, Japan, September 20 - 22, 2016.
Digital forensics engineering and the curation of digital collections in cultural institutions face pressing and overlapping challenges related to provenance, chain of custody, authenticity, integrity, and identity. The generation, analysis and sustainability of digital …
Public Energy, Shelley Welton
Public Energy, Shelley Welton
All Faculty Scholarship
Many scholars and policy makers celebrate cities as loci for addressing climate change. In addition to being significant sources of carbon pollution, cities prove to be dynamic sites of experimentation and ambition on climate policy. However, as U.S. cities set climate change goals far above those of their federal and state counterparts, they are butting up against the limits of their existing legal authority, most notably with regard to control over energy supplies. In response, many U.S. cities are exercising their legal rights to reclaim public ownership or control over private electric utilities as a method of achieving their climate …
Legal Mechanisms For Governing The Transition Of Key Domain Name Functions To The Global Multi-Stakeholder Community, Christopher S. Yoo, Aaron Shull, Paul Twomey
Legal Mechanisms For Governing The Transition Of Key Domain Name Functions To The Global Multi-Stakeholder Community, Christopher S. Yoo, Aaron Shull, Paul Twomey
All Faculty Scholarship
This Chapter proposes an alternative approach to the IANA transition that migrates the existing core contractual requirements imposed by the US government to the existing IANA functions customers. It also advances modest internal accountability revisions that could be undertaken within ICANN’s existing structure. Specifically, it advocates that the Independent Review Tribunal charged with reviewing certain ICANN board of directors-related decisions be selected by a multi-stakeholder committee rather than being subject to approval by ICANN and expanding the grounds for review to cover all of the rubrics recommended by ICANN’s “Improving Institutional Confidence” process in 2008-2009, including fairness, fidelity to the …
Grid Modernization And Energy Poverty, Shelley Welton
Grid Modernization And Energy Poverty, Shelley Welton
All Faculty Scholarship
Grid modernization holds the alluring promise of rationalizing electricity pricing, saving consumers money, and improving environmental quality all at the same time. Yet, we have seen only limited and patchwork regulatory initiatives towards significant grid modernization in the United States. Outside of a few leading states, state energy regulators appear loath to embrace full-throated versions of the project. This article argues that the under-discussed problem of energy poverty in the United States is a critical contributing factor in the gap between grid modernization’s possibilities and our regulatory reality. Only by explicitly understanding how the issues of grid modernization and energy …
Bloom Filters Optimized Wu-Manber For Intrusion Detection, Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, Babar Shah
Bloom Filters Optimized Wu-Manber For Intrusion Detection, Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, Babar Shah
Journal of Digital Forensics, Security and Law
With increasing number and severity of attacks, monitoring ingress and egress network traffic is becoming essential everyday task. Intrusion detection systems are the main tools for capturing and searching network traffic for potential harm. Signature-based intrusion detection systems are the most widely used, and they simply use a pattern matching algorithms to locate attack signatures in intercepted network traffic. Pattern matching algorithms are very expensive in terms of running time and memory usage, leaving intrusion detection systems unable to detect attacks in real-time. We propose a Bloom filters optimized Wu-Manber pattern matching algorithm to speed up intrusion detection. The Bloom …
The Impact Of Md5 File Hash Collisions On Digital Forensic Imaging, Gary C. Kessler
The Impact Of Md5 File Hash Collisions On Digital Forensic Imaging, Gary C. Kessler
Journal of Digital Forensics, Security and Law
The Message Digest 5 (MD5) hash is commonly used as for integrity verification in the forensic imaging process. The ability to force MD5 hash collisions has been a reality for more than a decade, although there is a general consensus that hash collisions are of minimal impact to the practice of computer forensics. This paper describes an experiment to determine the results of imaging two disks that are identical except for one file, the two versions of which have different content but otherwise occupy the same byte positions on the disk, are the same size, and have the same hash …