Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Coal mining accidents (8)
- Sago (W. Va.) (8)
- Mine safety (7)
- Privacy (3)
- Computer Forensics (2)
-
- Critical Infrastructure Assurance (2)
- Data disposal (2)
- Data recovery (2)
- Digital Forensics (2)
- Digital forensics (2)
- EMI/EMC Protection (2)
- Education (2)
- Electronic data destruction (2)
- Infrastructure Modeling (2)
- Labor law reform (2)
- Legislation (2)
- Network economic effects (2)
- System Effects and Hardening (2)
- System Vulnerabilities (2)
- Access control (1)
- Air and Space Law (1)
- Analysis (1)
- Bayesian Network (1)
- CIS (1)
- Cable modem (1)
- Civil Procedure (1)
- Community Resiliency (1)
- Community resiliency (1)
- Comparative law (1)
- Complex systems (1)
- Publication
- Publication Type
- File Type
Articles 1 - 30 of 48
Full-Text Articles in Law
The Role Of Science And Engineering In Water Regulation Over The Past 100 Years, James R. May, Patrick Clary
The Role Of Science And Engineering In Water Regulation Over The Past 100 Years, James R. May, Patrick Clary
James R. May
This article explores how scientific and engineering principles are inexorably linked to the regulation of water. Scientists and engineers first discovered the link between disease and water sources in the mid-19th century. Over the years, scientists and engineers have led the way to identifying water quality problems and their causes. These discoveries have directly contributed to the scope of water regulation in the United States and elsewhere. In addition, changes in water quality regulation have dictated the need for increasingly sophisticated water treatment technologies and engineers have been at the forefront of the development of these water control technologies. This …
2008 Scholars And Artists Bibliography, Rajshehkar G. Javalgi Dr., Michael Schwartz Library, Cleveland State University, Friends Of The Michael Schwartz Library
2008 Scholars And Artists Bibliography, Rajshehkar G. Javalgi Dr., Michael Schwartz Library, Cleveland State University, Friends Of The Michael Schwartz Library
Scholars and Artists Bibliographies
This bibliography was created for the annual Friends of the Michael Schwartz Library Scholars and Artists Reception, recognizing scholarly and creative achievements of Cleveland State University faculty, staff and emeriti. Dr. Rajshekhar Javalgi was the guest speaker.
Santa Clara Magazine, Volume 50 Number 2, Fall 2008, Santa Clara University
Santa Clara Magazine, Volume 50 Number 2, Fall 2008, Santa Clara University
Santa Clara Magazine
10 - MEET MOUNTAIN By Lisa Taggart. A Q&A with SCU women's basketball coach Jennifer Mountain.
12 - KATRINA AT THREE By Pat Semansky '06. A New Orleans photo essay.
16 - THE MEDDLING PRIEST FROM OZ By Emily Elrod '05. An interview with Australian Jesuit John Brennan, S.J.-lauded as a "national treasure" and an "ethical burr."
18 - 20/20 VISION By Robert M. Senkewicz. How has the presidency of Paul Locatelli, S.J., transformed the University-as a place-and as an idea?
28 - GO WITH YOUR HEART By Francisco Jimenez. An exclusive excerpt from his new memoir, Reaching Out.
32 …
Dedication, Joyce E. Mcconnell
Let's Not Abandon What Works, Edward Chair
Let's Not Abandon What Works, Edward Chair
West Virginia Law Review
No abstract provided.
Mining Mining Data: Bringing Empirical Analysis To Bear On The Regulation Of Safety And Health In U.S. Mining, Alison D. Morantz
Mining Mining Data: Bringing Empirical Analysis To Bear On The Regulation Of Safety And Health In U.S. Mining, Alison D. Morantz
West Virginia Law Review
No abstract provided.
Workers At Risk: The Unfulfilled Promise Of The Occupational Safety And Health Act, Lynn Rhinehart
Workers At Risk: The Unfulfilled Promise Of The Occupational Safety And Health Act, Lynn Rhinehart
West Virginia Law Review
No abstract provided.
Approaching Coal Mine Safety From A Comparative Law And Interdisciplinary Perspective, Anne Marie Lofaso
Approaching Coal Mine Safety From A Comparative Law And Interdisciplinary Perspective, Anne Marie Lofaso
West Virginia Law Review
No abstract provided.
The Failed Promise Of Workplace Health Regulation, David C. Vladeck
The Failed Promise Of Workplace Health Regulation, David C. Vladeck
West Virginia Law Review
No abstract provided.
Free Markets, Individual Liberties And Safe Coal Mines: A Post-Sago Perspective, C. Gregory Ruffennach
Free Markets, Individual Liberties And Safe Coal Mines: A Post-Sago Perspective, C. Gregory Ruffennach
West Virginia Law Review
No abstract provided.
Integrating Technology To Improve Mine Safety In The Wake Of Recent Mine Disasters, Jeffery L. Kohler
Integrating Technology To Improve Mine Safety In The Wake Of Recent Mine Disasters, Jeffery L. Kohler
West Virginia Law Review
No abstract provided.
Network Neutrality, Consumers, And Innovation, Christopher S. Yoo
Network Neutrality, Consumers, And Innovation, Christopher S. Yoo
All Faculty Scholarship
In this Article, Professor Christopher Yoo directly engages claims that mandating network neutrality is essential to protect consumers and to promote innovation on the Internet. It begins by analyzing the forces that are placing pressure on the basic network architecture to evolve, such as the emergence of Internet video and peer-to-peer architectures and the increasing heterogeneity in business relationships and transmission technologies. It then draws on the insights of demand-side price discrimination (such as Ramsey pricing) and the two-sided markets, as well as the economics of product differentiation and congestion, to show how deviating from network neutrality can benefit consumers, …
Report Of The Commission To Assess The Threat To The United States From Emp Attack: Critical National Infrastructures, William R. Graham
Report Of The Commission To Assess The Threat To The United States From Emp Attack: Critical National Infrastructures, William R. Graham
George H Baker
The physical and social fabric of the United States is sustained by a system of systems; a complex and dynamic network of interlocking and interdependent infrastructures (“critical national infrastructures”) whose harmonious functioning enables the myriad actions, transactions, and information flow that undergird the orderly conduct of civil society in this country. The vulnerability of these frastructures to threats — deliberate, accidental, and acts of nature — is the focus of greatly heightened concern in the current era, a process accelerated by the events of 9/11 and recent hurricanes, including Katrina and Rita. This report presents the results of the Commission’s …
Santa Clara Magazine, Volume 50 Number 1, Summer 2008, Santa Clara University
Santa Clara Magazine, Volume 50 Number 1, Summer 2008, Santa Clara University
Santa Clara Magazine
10 - SPEED RACERS An interview by Gwen Knapp. Cycling legend Greg LeMond talks ethics and doping in sports.
14 - MEET THE NEW FATHER GENERAL By Steven Boyd Saum. Introducing Adolfo Nicols, S.J., the new Superior General of the Society of Jesus.
16 - NO SIMPLE HIGHWAY By Juan Velasco. The Casa de la Solidaridad is less a place than a journey—one that offers a new understanding of solidarity. And a new meaning of home.
22 - EXILES By Ron Hansen. A tale of a shipwreck, a priest, and a poet. Hansen tells the story behind his new novel, …
Rethinking Broadband Internet Access, Daniel F. Spulber, Christopher S. Yoo
Rethinking Broadband Internet Access, Daniel F. Spulber, Christopher S. Yoo
All Faculty Scholarship
The emergence of broadband Internet technologies, such as cable modem and digital subscriber line (DSL) systems, has reopened debates over how the Internet should be regulated. Advocates of network neutrality and open access to cable modem systems have proposed extending the regulatory regime developed to govern conventional telephone and narrowband Internet service to broadband. A critical analysis of the rationales traditionally invoked to justify the regulation of telecommunications networks--such as natural monopoly, network economic effects, vertical exclusion, and the dangers of ruinous competition--reveals that those rationales depend on empirical and theoretical preconditions that do not apply to broadband. In addition, …
Agarose And Methylcellulose Hydrogel Blends For Nerve Regeneration Applications, Benton C. Martin
Agarose And Methylcellulose Hydrogel Blends For Nerve Regeneration Applications, Benton C. Martin
Benton C. Martin
No abstract provided.
The Cyber-Workplace – Identifying Liability Issues In The Information Age And Managing E-Risk, Nigel Wilson
The Cyber-Workplace – Identifying Liability Issues In The Information Age And Managing E-Risk, Nigel Wilson
Annual ADFSL Conference on Digital Forensics, Security and Law
The information age provides numerous opportunities for modern society but also presents significant challenges in identifying liability issues and in managing risk. Technological change has occurred rapidly and is continuing at the same time as other major trends and changes are taking place in society and, in particular, in the workplace. The prospect of global liability and the complexity of jurisdictional differences present a considerable hurdle to the uniform regulation of liability issues. General legislation and legal principles have been readily applied to the cyber-world and to modern business practices and the workplace. Where necessary, legislatures have introduced specific legislation …
Data Mining Techniques For Fraud Detection, Rekha Bhowmik
Data Mining Techniques For Fraud Detection, Rekha Bhowmik
Annual ADFSL Conference on Digital Forensics, Security and Law
The paper presents application of data mining techniques to fraud analysis. We present some classification and prediction data mining techniques which we consider important to handle fraud detection. There exist a number of data mining algorithms and we present statistics-based algorithm, decision tree-based algorithm and rule-based algorithm. We present Bayesian classification model to detect fraud in automobile insurance. Naïve Bayesian visualization is selected to analyze and interpret the classifier predictions. We illustrate how ROC curves can be deployed for model assessment in order to provide a more intuitive analysis of the models.
Keywords: Data Mining, Decision Tree, Bayesian Network, ROC …
Simple - Rethinking The Monolithic Approach To Digital Forensic Software, Craig Valli
Simple - Rethinking The Monolithic Approach To Digital Forensic Software, Craig Valli
Annual ADFSL Conference on Digital Forensics, Security and Law
This paper outlines a collaborative project nearing completion between the sec.au Security Research Group at Edith Cowan University and Western Australian Police Computer Crime Squad. The primary goal of this project is to create a software tool for use by non-technical law enforcement officers during the initial investigation and assessment of an electronic crime scene. This tool will be designed as an initial response tool, to quickly and easily find, view and export any relevant files stored on a computer, establishing if further expert investigation of that computer is warranted. When fully developed, the tool will allow investigators unprecedented real …
How Virtualized Environments Affect Computer Forensics, Diane Barrett
How Virtualized Environments Affect Computer Forensics, Diane Barrett
Annual ADFSL Conference on Digital Forensics, Security and Law
Virtualized environments can make forensics investigation more difficult. Technological advances in virtualization tools essentially make removable media a PC that can be carried around in a pocket or around a neck. Running operating systems and applications this way leaves very little trace on the host system. This paper will explore all the newest methods for virtualized environments and the implications they have on the world of forensics. It will begin by describing and differentiating between software and hardware virtualization. It will then move on to explain the various methods used for server and desktop virtualization. Next, it will describe the …
The Virtual Digital Forensics Lab - Expanding Law Enforcement Capabilities, Mark Mccoy, Sean A. Ensz
The Virtual Digital Forensics Lab - Expanding Law Enforcement Capabilities, Mark Mccoy, Sean A. Ensz
Annual ADFSL Conference on Digital Forensics, Security and Law
Law enforcement is attempting to respond to the growing and complex need to examine all manner of digital evidence using stand-alone forensic workstations and limited storage solutions. Digital forensic investigators often find their cases stalled by cumbersome and inflexible technology limiting their effectiveness. The Virtual Digital Forensics Lab (VDFL) is a new concept that applies existing enterprise host, storage, and network virtualization technologies to current forensic investigative methods. This paper details the concept of the VDFL, the technology solutions it employs, and the flexibility it provides for digital forensic investigators.
Keywords: Virtual Digital Forensics, digital forensic investigations, law enforcement, virtual …
Digital Forensic Certification Versus Forensic Science Certification, Nena Lim
Digital Forensic Certification Versus Forensic Science Certification, Nena Lim
Annual ADFSL Conference on Digital Forensics, Security and Law
Companies often rely on certifications to select appropriate individuals in disciplines such as accounting and engineering. The general public also tends to have confidence in a professional who has some kinds of certification because certification implies a standard of excellence and that the individual has expert knowledge in a specific discipline. An interesting question to the digital forensic community is: How is a digital forensic certification compared to a forensic science certification? The objective of this paper is to compare the requirements of a digital forensic certification to those of a forensic science certification. Results of the comparison shed lights …
Santa Clara Magazine, Volume 49 Number 4, Spring 2008, Santa Clara University
Santa Clara Magazine, Volume 49 Number 4, Spring 2008, Santa Clara University
Santa Clara Magazine
14 - LET THE SUN SHINE IN By Steven Boyd Saum. In the international Solar Decathlon competition, a team from Santa Clara blazed a dazzling trail from almost-ran to third in the world.
20 - VISIONS FROM THE SIXTIES By Lisa Taggart. It was art that broke all the rules. And now an exhibit at the de Saisset Museum, curated by Santa Clara scholar Andrea Pappas, captures the sense of optimism and energy when the only limits were imagination itself.
26 - JORMA'S JOURNEY By Mark Purdy. With Jefferson Airplane, he helped define the San Francisco sound. With Hot Tuna …
The 2007 Analysis Of Information Remaining On Disks Offered For Sale On The Second Hand Market, Andy Jones, Craig Valli, Glenn S. Dardick, Iain Sutherland
The 2007 Analysis Of Information Remaining On Disks Offered For Sale On The Second Hand Market, Andy Jones, Craig Valli, Glenn S. Dardick, Iain Sutherland
Journal of Digital Forensics, Security and Law
All organisations, whether in the public or private sector, increasingly use computers and other devices that contain computer hard disks for the storage and processing of information relating to their business, their employees or their customers. Individual home users also increasingly use computers and other devices containing computer hard disks for the storage and processing of information relating to their private, personal affairs. It continues to be clear that the majority of organisations and individual home users still remain ignorant or misinformed of the volume and type of information that is stored on the hard disks that these devices contain …
Steganography: Forensic, Security, And Legal Issues, Merrill Warkentin, Ernst Bekkering, Mark B. Schmidt
Steganography: Forensic, Security, And Legal Issues, Merrill Warkentin, Ernst Bekkering, Mark B. Schmidt
Journal of Digital Forensics, Security and Law
Steganography has long been regarded as a tool used for illicit and destructive purposes such as crime and warfare. Currently, digital tools are widely available to ordinary computer users also. Steganography software allows both illicit and legitimate users to hide messages so that they will not be detected in transit. This article provides a brief history of steganography, discusses the current status in the computer age, and relates this to forensic, security, and legal issues. The paper concludes with recommendations for digital forensics investigators, IT staff, individual users, and other stakeholders.
Book Review: Challenges To Digital Forensic Evidence, Gary C. Kessler
Book Review: Challenges To Digital Forensic Evidence, Gary C. Kessler
Journal of Digital Forensics, Security and Law
This issue presents the fifth Book Review column for the JDFSL. It is an experiment to broaden the services that the journal provides to readers, so we are anxious to get your reaction. Is the column useful and interesting? Should we include more than one review per issue? Should we also review products? Do you have suggested books/products for review and/or do you want to write a review? All of this type of feedback -- and more -- is appreciated. Please feel free to send comments to Gary Kessler (gary.kessler@champlain.edu) or Glenn S. Dardick (gdardick@dardick.net).
Developing A Process Model For The Forensic Extraction Of Information From Desktop Search, Timothy Pavlic, Jill Slay, Benjamin Turnbull
Developing A Process Model For The Forensic Extraction Of Information From Desktop Search, Timothy Pavlic, Jill Slay, Benjamin Turnbull
Journal of Digital Forensics, Security and Law
Desktop search applications can contain cached copies of files that were deleted from the file system. Forensic investigators see this as a potential source of evidence, as documents deleted by suspects may still exist in the cache. Whilst there have been attempts at recovering data collected by desktop search applications, there is no methodology governing the process, nor discussion on the most appropriate means to do so. This article seeks to address this issue by developing a process model that can be applied when developing an information extraction application for desktop search applications, discussing preferred methods and the limitations of …
The Forensics Aspects Of Event Data Recorders, Jeremy S. Daily, Nathan Singleton, Elizabeth Downing, Gavin W. Manes
The Forensics Aspects Of Event Data Recorders, Jeremy S. Daily, Nathan Singleton, Elizabeth Downing, Gavin W. Manes
Journal of Digital Forensics, Security and Law
The proper generation and preservation of digital data from Event Data Recorders (EDRs) can provide invaluable evidence to automobile crash reconstruction investigations. However, data collected from the EDR can be difficult to use and authenticate, complicating the presentation of such information as evidence in legal proceedings. Indeed, current techniques for removing and preserving such data do not meet the court’s standards for electronic evidence. Experimentation with an EDR unit from a 2001 GMC Sierra pickup truck highlighted particular issues with repeatability of results. Fortunately, advances in the digital forensics field and memory technology can be applied to EDR analysis in …
Data Mining Techniques In Fraud Detection, Rekha Bhowmik
Data Mining Techniques In Fraud Detection, Rekha Bhowmik
Journal of Digital Forensics, Security and Law
The paper presents application of data mining techniques to fraud analysis. We present some classification and prediction data mining techniques which we consider important to handle fraud detection. There exist a number of data mining algorithms and we present statistics-based algorithm, decision treebased algorithm and rule-based algorithm. We present Bayesian classification model to detect fraud in automobile insurance. Naïve Bayesian visualization is selected to analyze and interpret the classifier predictions. We illustrate how ROC curves can be deployed for model assessment in order to provide a more intuitive analysis of the models.
To License Or Not To License: An Examination Of State Statutes Regarding Private Investigators And Digital Examiners, Thomas Lonardo, Doug White, Alan Rea
To License Or Not To License: An Examination Of State Statutes Regarding Private Investigators And Digital Examiners, Thomas Lonardo, Doug White, Alan Rea
Journal of Digital Forensics, Security and Law
In this paper the authors examine statutes that regulate, license, and enforce investigative functions in each US state. After identification and review of Private Investigator licensing requirements, the authors find that very few state statutes explicitly differentiate between Private Investigators and Digital Examiners. After contacting all state agencies the authors present a distinct grouping organizing state approaches to professional Digital Examiner licensing. The authors conclude that states must differentiate between Private Investigator and Digital Examiner licensing requirements and oversight.