Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Legal Studies

2016

Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 165

Full-Text Articles in Law

Bloom Filters Optimized Wu-Manber For Intrusion Detection, Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, Babar Shah Dec 2016

Bloom Filters Optimized Wu-Manber For Intrusion Detection, Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, Babar Shah

Journal of Digital Forensics, Security and Law

With increasing number and severity of attacks, monitoring ingress and egress network traffic is becoming essential everyday task. Intrusion detection systems are the main tools for capturing and searching network traffic for potential harm. Signature-based intrusion detection systems are the most widely used, and they simply use a pattern matching algorithms to locate attack signatures in intercepted network traffic. Pattern matching algorithms are very expensive in terms of running time and memory usage, leaving intrusion detection systems unable to detect attacks in real-time. We propose a Bloom filters optimized Wu-Manber pattern matching algorithm to speed up intrusion detection. The Bloom …


The Impact Of Md5 File Hash Collisions On Digital Forensic Imaging, Gary C. Kessler Dec 2016

The Impact Of Md5 File Hash Collisions On Digital Forensic Imaging, Gary C. Kessler

Journal of Digital Forensics, Security and Law

The Message Digest 5 (MD5) hash is commonly used as for integrity verification in the forensic imaging process. The ability to force MD5 hash collisions has been a reality for more than a decade, although there is a general consensus that hash collisions are of minimal impact to the practice of computer forensics. This paper describes an experiment to determine the results of imaging two disks that are identical except for one file, the two versions of which have different content but otherwise occupy the same byte positions on the disk, are the same size, and have the same hash …


Leveraging The Windows Amcache.Hve File In Forensic Investigations, Bhupendra Singh, Upasna Singh Dec 2016

Leveraging The Windows Amcache.Hve File In Forensic Investigations, Bhupendra Singh, Upasna Singh

Journal of Digital Forensics, Security and Law

The Amcache.hve is a registry hive file that is created by Microsoft® Windows® to store the information related to execution of programs. This paper highlights the evidential potential of Amcache.hve file and its application in the area of user activity analysis. The study uncovers numerous artifacts retained in Amcache.hve file when a user performs certain actions such as running host-based applications, installation of new applications, or running portable applications from external devices. The results of experiments demonstrate that Amcache.hve file stores intriguing artifacts related to applications such as timestamps of creation and last modification of any application; name, description, publisher …


The 2016 Analysis Of Information Remaining On Computer Hard Disks Offered For Sale On The Second Hand Market In The Uae, Thomas Martin, Andy Jones, Mohammed Alzaabi Dec 2016

The 2016 Analysis Of Information Remaining On Computer Hard Disks Offered For Sale On The Second Hand Market In The Uae, Thomas Martin, Andy Jones, Mohammed Alzaabi

Journal of Digital Forensics, Security and Law

This research describes our survey of data remaining on computer hard disks sold on the second hand market in the United Arab Emirates (UAE). This is a repetition of the first survey conducted in 2012 (Jones, Martin, & Alzaabi, 2012). Similar studies have been carried over the last ten years in the United Kingdom, Australia, USA, Germany and France: (Jones, Mee, Meyler, & Gooch, 2005), (Jones, Valli, Sutherland, & Thomas, 2006), (Jones, Valli, Dardick, & Sutherland, 2008), (Jones, Valli, Dardick, & Sutherland, 2009). This research was undertaken to gain insight into the volumes of data found on second-hand disks purchased …


A New Distributed Chinese Wall Security Policy Model, Saad Fehis, Omar Nouali, Mohand-Tahar Kechadi Dec 2016

A New Distributed Chinese Wall Security Policy Model, Saad Fehis, Omar Nouali, Mohand-Tahar Kechadi

Journal of Digital Forensics, Security and Law

The application of the Chinese wall security policy model (CWSPM) to control the information flows between two or more competing and/or conflicting companies in cloud computing (Multi-tenancy) or in the social network, is a very interesting solution. The main goal of the Chinese Wall Security Policy is to build a wall between the datasets of competing companies, and among the system subjects. This is done by the applying to the subjects mandatory rules, in order to control the information flow caused between them. This problem is one of the hottest topics in the area of cloud computing (as a distributed …


The Impact Of Sha-1 File Hash Collisions On Digital Forensic Imaging: A Follow-Up Experiment, Gary C. Kessler Dec 2016

The Impact Of Sha-1 File Hash Collisions On Digital Forensic Imaging: A Follow-Up Experiment, Gary C. Kessler

Journal of Digital Forensics, Security and Law

A previous paper described an experiment showing that Message Digest 5 (MD5) hash collisions of files have no impact on integrity verification in the forensic imaging process. This paper describes a similar experiment applied when two files have a Secure Hash Algorithm (SHA-1) collision.


A Survey Of Social Network Forensics, Umit Karabiyik, Muhammed Abdullah Canbaz, Ahmet Aksoy, Tayfun Tuna, Esra Akbas, Bilal Gonen, Ramazan S. Aygun Dec 2016

A Survey Of Social Network Forensics, Umit Karabiyik, Muhammed Abdullah Canbaz, Ahmet Aksoy, Tayfun Tuna, Esra Akbas, Bilal Gonen, Ramazan S. Aygun

Journal of Digital Forensics, Security and Law

Social networks in any form, specifically online social networks (OSNs), are becoming a part of our everyday life in this new millennium especially with the advanced and simple communication technologies through easily accessible devices such as smartphones and tablets. The data generated through the use of these technologies need to be analyzed for forensic purposes when criminal and terrorist activities are involved. In order to deal with the forensic implications of social networks, current research on both digital forensics and social networks need to be incorporated and understood. This will help digital forensics investigators to predict, detect and even prevent …


Table Of Contents Dec 2016

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Contemporary Soviet Criminal Law: An Analysis Of The General Principles And Major Institutions Of Post-1958 Soviet Criminal Law, Chris Osakwe Dec 2016

Contemporary Soviet Criminal Law: An Analysis Of The General Principles And Major Institutions Of Post-1958 Soviet Criminal Law, Chris Osakwe

Georgia Journal of International & Comparative Law

No abstract provided.


In The Wake Of Broken Windows Policing How Aggressive Policing Contributed To East Harlem Residents Distrust Of Police, Stephanie Daniel, Nicole Lewis, Kalalea Kalalea Dec 2016

In The Wake Of Broken Windows Policing How Aggressive Policing Contributed To East Harlem Residents Distrust Of Police, Stephanie Daniel, Nicole Lewis, Kalalea Kalalea

Capstones

In 2015, the East Harlem neighborhood – specifically the 25th Precinct – had the highest rate of criminal court summonses amongst residential areas. At 145 summonses for every 1,000 residents, it was more than four times the citywide average, according to an analysis of data obtained from the NYPD.

Since 2010, summonses have declined as the NYPD moves towards a more community-based approach to policing. But the Broken Windows theory has left a lasting and often negative effect on the East Harlem community.

This past fall, CUNY reporters investigated how summonses have affected the relationship between East Harlem residents and …


A Duty To Document, Marc Kosciejew Dec 2016

A Duty To Document, Marc Kosciejew

Proceedings from the Document Academy

Access to information is a bedrock principle of contemporary democratic governments and their public agencies and entities. Access to information depends upon these public institutions to document their activities and decisions. When public institutions do not document their activities and decisions, citizens’ right of access is ultimately denied. Public accountability and trust, in addition to institutional memory and the historical record, are undermined without the creation of appropriate records. Establishing and enforcing a duty to document helps promote accountability, openness, transparency, good governance, and public trust in public institutions. A duty to document should therefore be a fundamental component of …


Reformers Against The Clock, William Sloan Greenawalt Dec 2016

Reformers Against The Clock, William Sloan Greenawalt

The Catholic Lawyer

No abstract provided.


The Winds Of Changes Shift: An Analyis Of Recent Growth In Bargaining Units And Representation Efforts In Higher Education, William A. Herbert Dec 2016

The Winds Of Changes Shift: An Analyis Of Recent Growth In Bargaining Units And Representation Efforts In Higher Education, William A. Herbert

Publications and Research

This article analyzes data accumulated during the first three quarters of 2016 regarding completed and pending questions of representation involving faculty and student employees in higher education. It is part of a larger and continuing National Center research project that tracks faculty and graduate student employee unionization growth and representation efforts at private and public institutions of higher learning since January 1, 2013. The data presented in this article demonstrates that the rate of newly certified units at private colleges and universities since January 1, 2016 far outpaces new units in the public sector. There has been a 25.9% increase …


Persona Non Grata: The Marginalization Of Legal Scholarship In Criminology And Criminal Justice Journals, Brenda I. Rowe, Wesley S. Mccann, Craig Hemmens Dec 2016

Persona Non Grata: The Marginalization Of Legal Scholarship In Criminology And Criminal Justice Journals, Brenda I. Rowe, Wesley S. Mccann, Craig Hemmens

Criminology and Criminal Justice Faculty Publications

Recently, concern has been voiced within the academy regarding the marginalization of legal scholarship within the criminology and criminal justice (CCJ) discipline. Although conventional wisdom and anecdotal evidence indicate that it is difficult to get legal scholarship published in CCJ journals, there is a dearth of empirical evidence on the representation of legal scholarship in CCJ journals. The present study assesses the representation of legal scholarship in 20 CCJ journals from 2005 through 2015, examining both trends over time and variation across journals. Findings indicate legal scholarship comprises a very small portion of articles published, there has been a steep …


Punishing Genocide: A Comparative Empirical Analysis Of Sentencing Laws And Practices At The International Criminal Tribunal For Rwanda (Ictr), Rwandan Domestic Courts, And Gacaca Courts, Barbora Hola, Hollie Nyseth Brehm Dec 2016

Punishing Genocide: A Comparative Empirical Analysis Of Sentencing Laws And Practices At The International Criminal Tribunal For Rwanda (Ictr), Rwandan Domestic Courts, And Gacaca Courts, Barbora Hola, Hollie Nyseth Brehm

Genocide Studies and Prevention: An International Journal

This article compares sentencing of those convicted of participation in the 1994 genocide in Rwanda. With over one million people facing trial, Rwanda constitutes the world’s most comprehensive case of criminal accountability after genocide and presents an important case study of punishing genocide. Criminal courts at three different levels— international, domestic, and local—sought justice in the aftermath of the violence. In order to compare punishment at each level, we analyze an unprecedented database of sentences given by the ICTR, the Rwandan domestic courts, and Rwanda’s Gacaca courts. The analysis demonstrates that sentencing varied across the three levels—ranging from limited time …


Policing Postsecondary Education: University Police Legitimacy And Fear Of Crime On Campus, Christina N. Barker Dec 2016

Policing Postsecondary Education: University Police Legitimacy And Fear Of Crime On Campus, Christina N. Barker

Electronic Theses and Dissertations

Assessing the perceptions that students have of the university police officers charged with ensuring student safety is important to maintaining the overall safety of the campus. The current study sought to assess the relationship between student perceptions of university police and the fear of crime felt by students while on campus. Data collection was conducted through a survey methodology using a convenient sample of students in which a self-report survey was sent to the university email addresses of all students enrolled in a southeastern university (n=260). Through the employment of a scale developed to assess the perceptions of university police …


Effective Social Media Use By Law Enforcement Agencies: A Case Study Approach To Quantifying And Improving Efficacy And Developing Agency Best Practices, David T. Snively Dec 2016

Effective Social Media Use By Law Enforcement Agencies: A Case Study Approach To Quantifying And Improving Efficacy And Developing Agency Best Practices, David T. Snively

Master of Public Administration Practicums

In the wake of protests against law enforcement for an array of reasons, law enforcement officers and agencies have a responsibility to recognize and utilize the available mediums of communication with which they may best develop a connection to the communities they serve. Furthermore, law enforcement agencies must be informed that established, traditional methods of news dissemination – such as press conferences and printed articles – are now both ineffective and under-utilized, replaced in large part by social media live-time reports. For that reason, law enforcement agency executives must address both the responsibility to provide appropriately timed updates to critical …


De L'Affaire Katanga Au Contrat Social Global: Un Regard Sur La Cour Pénale Internationale, Juan Branco Nov 2016

De L'Affaire Katanga Au Contrat Social Global: Un Regard Sur La Cour Pénale Internationale, Juan Branco

Juan Branco

No abstract provided.


Unsettled: How Climate Change Challenges A Foundation Of Our Legal System, And Adapting The Legal State, Victor B. Flatt Nov 2016

Unsettled: How Climate Change Challenges A Foundation Of Our Legal System, And Adapting The Legal State, Victor B. Flatt

BYU Law Review

One of the fundamental goals of law is to end disputes. This push to “settlement” is foundational and has historically worked to increase societal efficiency and justice by engendering legitimate expectations among the citizenry. However, the efficient nature of much legal finality, settlement and repose only exists against a background of evolution of the physical environment that is predictable and slowpaced. That background no longer exists. The alteration of the physical world, and thus, the background for our societal structure and decisions, is accelerating rapidly due to human-caused climate change. This creates a mismatch between the law’s tendency to finality …


Examining The Civil-Military Divide Through New (Institutional) Lenses: The Influence Of The Supreme Court, Allen Linken Nov 2016

Examining The Civil-Military Divide Through New (Institutional) Lenses: The Influence Of The Supreme Court, Allen Linken

Doctoral Dissertations

Civil-military relations have existed for as long as there has been a military, but only in the last sixty years has research in the field began to examine the relationships between civilian elites and the military. Who controls the military? What level of influence by the military is acceptable in a liberal society, such as the United States? What is the appropriate role of the military? Who serves in the military? What pattern of civil-military relations best ensures the effectiveness of the military instrument? The study of these questions began with examining relationships between the military and the President, and …


Criminals Behind The Veil: Political Philosophy And Punishment, Chad Flanders Nov 2016

Criminals Behind The Veil: Political Philosophy And Punishment, Chad Flanders

Brigham Young University Journal of Public Law

No abstract provided.


Introduction, Tracy Mitrano Oct 2016

Introduction, Tracy Mitrano

Tracy Mitrano

No abstract provided.


How Mature Capitalism Turns Pollution Into Diamonds: Malagnogenesis And The Reverse-Engineering Of Harm Into Risk, Kevin P. Martyn Oct 2016

How Mature Capitalism Turns Pollution Into Diamonds: Malagnogenesis And The Reverse-Engineering Of Harm Into Risk, Kevin P. Martyn

USF Tampa Graduate Theses and Dissertations

In recent years, there has been a great deal of debate about the pervasiveness and persistence of neoliberal thinking. In the context of the post-2008 ‘great recession’ the resilience of neoliberalism is particularly confounding. To begin to unravel the ways in which neoliberalism is situated relative to risk, this study identifies an increasingly important neoliberal knowledge practice: malagnogenesis. Malagnogenesis is proposed herein as the production of ignorance that normalizes harm for and amongst marginalized populations. To shed light on the phenomena of malagnogenesis, this study investigated the history of leaded gasoline in the U.S. To that end, I …


Designing Laboratories For Small Scale Digital Device Forensics, Richard P. Mislan, Tim Wedge Oct 2016

Designing Laboratories For Small Scale Digital Device Forensics, Richard P. Mislan, Tim Wedge

Annual ADFSL Conference on Digital Forensics, Security and Law

The ubiquity of small scale digital devices (SSDD), the public’s ever increasing societal dependence on SSDD, and the continual presence of SSDD at all types of crime scenes, including non-technical and violent crimes, demand a formalized curriculum for the education and training of future cyber forensic examiners. This paper presents the various SSDD forensics labs currently in use and under development for future use at the Purdue University Cyber Forensics Laboratory. The primary objective of each module is to provide specific real-world cases for the learning, comprehension, and understanding of hands-on investigative techniques and methodologies. The purpose of this paper …


Network Forensic Investigation Of Internal Misuse/Crime In Saudi Arabia: A Hacking Case, Abdulrazaq Al-Murjan, Konstantinos Xynos Oct 2016

Network Forensic Investigation Of Internal Misuse/Crime In Saudi Arabia: A Hacking Case, Abdulrazaq Al-Murjan, Konstantinos Xynos

Annual ADFSL Conference on Digital Forensics, Security and Law

There are ad-hoc guidelines and a limited policy on computer incident response that does not include computer forensic preparation procedures (e.g. logging incidents). In addition, these guidelines do not consider the requirement of Islamic law for admissible evidence at an organisational level in Saudi Arabia. Network forensic investigation might breach the Saudi law if they follow ad-hoc or international digital forensic standards such as Association of Chief Police Officers (ACPO) guidelines. This might put the organisation in a costly situation when a malicious employee sues an Islamic court. This is because the law of Saudi Arabia is complying with Islamic …


Paper Session Ii: Computer Forensics Field Triage Process Model, Marcus K. Rogers, James Goldman, Rick Mislan, Timothy Wedge, Steve Debrota Oct 2016

Paper Session Ii: Computer Forensics Field Triage Process Model, Marcus K. Rogers, James Goldman, Rick Mislan, Timothy Wedge, Steve Debrota

Annual ADFSL Conference on Digital Forensics, Security and Law

With the proliferation of digital based evidence, the need for the timely identification, analysis and interpretation of digital evidence is becoming more crucial. In many investigations critical information is required while at the scene or within a short period of time - measured in hours as opposed to days. The traditional cyber forensics approach of seizing a system(s)/media, transporting it to the lab, making a forensic image(s), and then searching the entire system for potential evidence, is no longer appropriate in some circumstances. In cases such as child abductions, pedophiles, missing or exploited persons, time is of the essence. In …


Development Of A National Repository Of Digital Forensic Intelligence, Mark Weiser, David P. Biros, Greg Mosier Oct 2016

Development Of A National Repository Of Digital Forensic Intelligence, Mark Weiser, David P. Biros, Greg Mosier

Annual ADFSL Conference on Digital Forensics, Security and Law

Many people do all of their banking online, we and our children communicate with peers through computer systems, and there are many jobs that require near continuous interaction with computer systems. Criminals, however, are also “connected”, and our online interaction provides them a conduit into our information like never before. Our credit card numbers and other fiscal information are at risk, our children's personal information is exposed to the world, and our professional reputations are on the line.

The discipline of Digital Forensics in law enforcement agencies around the nation and world has grown to match the increased risk and …


Designing A Data Warehouse For Cyber Crimes, Il-Yeol Song, John D. Maguire, Ki Jung Lee, Namyoun Choi, Xiaohua Hu, Peter Chen Oct 2016

Designing A Data Warehouse For Cyber Crimes, Il-Yeol Song, John D. Maguire, Ki Jung Lee, Namyoun Choi, Xiaohua Hu, Peter Chen

Annual ADFSL Conference on Digital Forensics, Security and Law

One of the greatest challenges facing modern society is the rising tide of cyber crimes. These crimes, since they rarely fit the model of conventional crimes, are difficult to investigate, hard to analyze, and difficult to prosecute. Collecting data in a unified framework is a mandatory step that will assist the investigator in sorting through the mountains of data. In this paper, we explore designing a dimensional model for a data warehouse that can be used in analyzing cyber crime data. We also present some interesting queries and the types of cyber crime analyses that can be performed based on …


All Perspectives Matter: A Co-Orientational Analysis Of Problem-Based Law Enforcement And Community Relationships, Jonathan Mccombs, James A. White, Joanna Williamson Oct 2016

All Perspectives Matter: A Co-Orientational Analysis Of Problem-Based Law Enforcement And Community Relationships, Jonathan Mccombs, James A. White, Joanna Williamson

Learning Showcase 2016: A Celebration of Discovery, Transformation and Success

The relationships between law enforcement officers and the communities they serve has been the focus of accelerating national scrutiny in light of numerous contentious and widely publicized incidents involving alleged protected police misconduct, or alternatively, citizen and government overreach.


Redefining The Role Of The Police: Perspectives And Expectations, Richard Zitzke, Jonathan Mccombs Oct 2016

Redefining The Role Of The Police: Perspectives And Expectations, Richard Zitzke, Jonathan Mccombs

Learning Showcase 2016: A Celebration of Discovery, Transformation and Success

The American Policing infrastructure and much of the criminal justice system is under fire for what is perceived as racial and biased policing and Draconian enforcement tactics. The book explores the evolution of the history of policing and how the public perception of the police has changed over the decades. The exploration of a changing expectation where the police receive mixed messages from policy makers and the legal community is exacerbated by the human bias throughout the system. Police training and hiring practices have been focused on in order to achieve the greatest impact, but much work must be done …