Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics

PDF

2012

Institution
Keyword
Publication
Publication Type

Articles 61 - 90 of 191

Full-Text Articles in Law

Development And Dissemination Of Clean Cookstoves: A Model Law For Developing Countries, Lakshman Guruswamy Ed. Jul 2012

Development And Dissemination Of Clean Cookstoves: A Model Law For Developing Countries, Lakshman Guruswamy Ed.

Drafting Model Laws on Indoor Pollution for Developing and Developed Nations (July 12-13)

24 pages.

"This model law was developed at a legislative drafting workshop on July 12-13, 2012, entitled Drafting Model Laws on Indoor Pollution for Developing and Developed Nations, which was sponsored by the Center for Energy & Environmental Security and the Colorado Natural Resources, Energy & Environmental Law Review at the University of Colorado Law School in Boulder, Colorado." Excerpted from 24 Colo. Nat. Resources, Energy & Envtl. L. Rev. 331 (2013).


The Value Of Government Mandated Location-Based Services In Emergencies In Australia, Anas Aloudat, Katina Michael, Roba Abbas, Mutaz Al-Debei Jul 2012

The Value Of Government Mandated Location-Based Services In Emergencies In Australia, Anas Aloudat, Katina Michael, Roba Abbas, Mutaz Al-Debei

Associate Professor Katina Michael

The adoption of mobile technologies for emergency management has the capacity to save lives. In Australia in February 2009, the Victorian Bushfires claimed 173 lives, the worst peace-time disaster in the nation’s history. The Australian government responded swiftly to the tragedy by going to tender for mobile applications that could be used during emergencies, such as mobile alerts and location services. These applications, which are becoming increasingly accurate with the evolution of positioning techniques, have the ability to deliver personalized information direct to the citizen during crises, complementing traditional broadcasting mediums like television and radio. Indeed governments have a responsibility …


Deliberating Beyond Evidence: Lessons From Integrated Assessment Modelling, Elisa Vecchione Jul 2012

Deliberating Beyond Evidence: Lessons From Integrated Assessment Modelling, Elisa Vecchione

Elisa Vecchione

The premises of this paper rely on associating policy inertia toward action on climate change with the inadequacy of the classical ‘liability culture’ of evidence-based policy-making to deal with this global environmental challenge. To provide support to this hypothesis, the following discussion analyses the technical properties and the current policy use of Integrated Assessment Modelling (IAM) of economic-climate interactions. The paper contends that IAM is still not clarified enough as far as its potential for information-production in the framework of policy making processes is concerned, and that this fact is symptomatic of the current inability of societies to undertake the …


Homicide In The Brazilian Favela: Does Opportunity Make The Killer?, Elenice De Souza De Souza Oliveira, Joel Miller Jul 2012

Homicide In The Brazilian Favela: Does Opportunity Make The Killer?, Elenice De Souza De Souza Oliveira, Joel Miller

Department of Justice Studies Faculty Scholarship and Creative Works

High rates of homicide in Brazil are heavily concentrated in poor urban shanty towns or ‘favelas’. This paper looks beyond conventional social and economic explanations of homicides, and examines the relationship between situational factors and homicide incidents within a case-study favela in the city of Belo Horizonte. Initial exploratory research identified potential mechanisms linking local situational characteristics with homicide. A matched case–control study then tested hypotheses based on these mechanisms. When the characteristics of 100 addresses of homicide incidents were compared with those of 100 nearby non-homicide addresses, they showed statistical associations with drug areas, bars, alleys, windows onto the …


Food Fight: A Case Study Of The Community Food Security Coalition’S Campaign For A Fair Farm Bill, Marni Salmon Jul 2012

Food Fight: A Case Study Of The Community Food Security Coalition’S Campaign For A Fair Farm Bill, Marni Salmon

Capstone Collection

The farm bill is an all-encompassing piece of legislation that is reauthorized approximately every five years and establishes federal policy for everything from farm subsidies and crop insurance to energy, conservation, food stamps and school lunches. The current law expires at the end of September 2012. Reauthorization of the farm bill represents the single largest opportunity to reform the policies that shape food systems in the United States. The Community Food Security Coalition (CFSC) is campaigning to improve access to healthy food by increasing links with family farmers and to strengthen local and regional food systems. This case study traces …


Front Matter Jun 2012

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Identifying And Attributing Similar Traces With Greatest Common Factor Analysis, Fred Cohen Jun 2012

Identifying And Attributing Similar Traces With Greatest Common Factor Analysis, Fred Cohen

Journal of Digital Forensics, Security and Law

This paper presents an algorithm for comparing large numbers of traces to each other and identifying and presenting groups of traces with similar features. It is applied to forensic analysis in which groups of similar traces are automatically identified and presented so that attribution and other related claims may be asserted, and independently confirmed or refuted. The approach of this paper is to identify an approximate algorithm that will find a large subset of greatest common factor similar groups of arbitrary factors in far less time and space than an exact algorithm using examiner-provided selection criteria for factor definition.


Masthead Jun 2012

Masthead

Journal of Digital Forensics, Security and Law

No abstract provided.


Back Matter Jun 2012

Back Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Agenda: A Low-Carbon Energy Blueprint For The American West, University Of Colorado Boulder. Natural Resources Law Center, University Of Colorado Boulder. Renewable And Sustainable Energy Institute, Western Resource Advocates, Rocky Mountain Research Station (Fort Collins, Colo.) Jun 2012

Agenda: A Low-Carbon Energy Blueprint For The American West, University Of Colorado Boulder. Natural Resources Law Center, University Of Colorado Boulder. Renewable And Sustainable Energy Institute, Western Resource Advocates, Rocky Mountain Research Station (Fort Collins, Colo.)

A Low-Carbon Energy Blueprint for the American West (Martz Summer Conference, June 6-8)

The future of the planet may depend upon our ability to increase energy supplies even as we reduce carbon emissions. This conference will address how a low-carbon energy program might evolve with a particular focus on the American West. It will focus on the future of energy in the West--on a “managed transition” to a different energy mix, on the need to nest this effort in a framework that acknowledges interconnections, and on identifying the most salient opportunities to consider the legal, political, financial, and technical challenges.


Location-Based Social Networking And Its Impact On Trust In Relationships, Sarah Jean Fusco, Roba Abbas, Katina Michael, Anas Aloudat May 2012

Location-Based Social Networking And Its Impact On Trust In Relationships, Sarah Jean Fusco, Roba Abbas, Katina Michael, Anas Aloudat

Professor Katina Michael

Location based social networking (LBSN) applications are part of a new suite of social networking tools. LBSN is the convergence between location based services (LBS) and online social networking (OSN). LBSN applications offer users the ability to look up the location of another “friend” remotely using a smart phone, desktop or other device, anytime and anywhere. Users invite their friends to participate in LBSN and there is a process of consent that follows. This paper explores the potential impact of LBSN upon trust in society. It looks at the willingness of individuals to share their location data with family, friends, …


Digital Evidence Education In Schools Of Law, Aaron Alva, Barbara Endicott-Popovsky May 2012

Digital Evidence Education In Schools Of Law, Aaron Alva, Barbara Endicott-Popovsky

Annual ADFSL Conference on Digital Forensics, Security and Law

An examination of State of Connecticut v. Julie Amero provides insight into how a general lack of understanding of digital evidence can cause an innocent defendant to be wrongfully convicted. By contrast, the 101-page opinion in Lorraine v. Markel American Insurance Co. provides legal precedence and a detailed consideration for the admission of digital evidence. An analysis of both cases leads the authors to recommend additions to Law School curricula designed to raise the awareness of the legal community to ensure such travesties of justice, as in the Amero case, don’t occur in the future. Work underway at the University …


A Case Study Of The Challenges Of Cyber Forensics Analysis Of Digital Evidence In A Child Pornography Trial, Richard Boddington May 2012

A Case Study Of The Challenges Of Cyber Forensics Analysis Of Digital Evidence In A Child Pornography Trial, Richard Boddington

Annual ADFSL Conference on Digital Forensics, Security and Law

Perfunctory case analysis, lack of evidence validation, and an inability or unwillingness to present understandable analysis reports adversely affect the outcome course of legal trials reliant on digital evidence. These issues have serious consequences for defendants facing heavy penalties or imprisonment yet expect their defence counsel to have clear understanding of the evidence. Poorly reasoned, validated and presented digital evidence can result in conviction of the innocent as well as acquittal of the guilty. A possession of child pornography Case Study highlights the issues that appear to plague case analysis and presentation of digital evidence relied on in these odious …


After Five Years Of E-Discovery Missteps: Sanctions Or Safe Harbor?, Milton Luoma, Vicki Luoma May 2012

After Five Years Of E-Discovery Missteps: Sanctions Or Safe Harbor?, Milton Luoma, Vicki Luoma

Annual ADFSL Conference on Digital Forensics, Security and Law

In 2003 the Zubulake case became the catalyst of change in the world of e-discovery. In that case Judge Shira Scheindlin of the United States District Court for the Southern District of New York set guidelines for e-discovery that served as the basis for amending the Federal Rules of Civil Procedure (FRCP) in December 2006. The amendments incorporated a number of concepts that were described by Judge Scheindlin in the Zubulake case. ( Zubulake v. UBS Warburg LLC, 2003) Since the Zubulake case and the FRCP amendments, numerous cases have interpreted these rules changes, but one of the main points …


Facilitating Forensics In The Mobile Millennium Through Proactive Enterprise Security, Andrew R. Scholnick May 2012

Facilitating Forensics In The Mobile Millennium Through Proactive Enterprise Security, Andrew R. Scholnick

Annual ADFSL Conference on Digital Forensics, Security and Law

This work explores the impact of the emerging mobile communication device paradigm on the security-conscious enterprise, with regard to providing insights for proactive Information Assurance and facilitation of eventual Forensic analysis. Attention is given to technology evolution in the areas of best practices, attack vectors, software and hardware performance, access and activity monitoring, and architectural models.

Keywords: Forensics, enterprise security, mobile communication, best practices, attack vectors.


Multi-Parameter Sensitivity Analysis Of A Bayesian Network From A Digital Forensic Investigation, Richard E. Overill, Echo P. Zhang, Kam-Pui Chow May 2012

Multi-Parameter Sensitivity Analysis Of A Bayesian Network From A Digital Forensic Investigation, Richard E. Overill, Echo P. Zhang, Kam-Pui Chow

Annual ADFSL Conference on Digital Forensics, Security and Law

A multi-parameter sensitivity analysis of a Bayesian network (BN) used in the digital forensic investigation of the Yahoo! email case has been performed using the principle of ‘steepest gradient’ in the parameter space of the conditional probabilities. This procedure delivers a more reliable result for the dependence of the posterior probability of the BN on the values used to populate the conditional probability tables (CPTs) of the BN. As such, this work extends our previous studies using singleparameter sensitivity analyses of BNs, with the overall aim of more deeply understanding the indicative use of BNs within the digital forensic and …


Ipad2 Logical Acquisition: Automated Or Manual Examination?, Somaya Ali, Sumaya Alhosani, Farah Alzarooni, Ibrahim Baggili May 2012

Ipad2 Logical Acquisition: Automated Or Manual Examination?, Somaya Ali, Sumaya Alhosani, Farah Alzarooni, Ibrahim Baggili

Annual ADFSL Conference on Digital Forensics, Security and Law

Due to their usage increase worldwide, iPads are on the path of becoming key sources of digital evidence in criminal investigations. This research investigated the logical backup acquisition and examination of the iPad2 device using the Apple iTunes backup utility while manually examining the backup data (manual examination) and automatically parsing the backup data (Lantern software - automated examination). The results indicate that a manual examination of the logical backup structure from iTunes reveals more digital evidence, especially if installed application data is required for an investigation. However, the researchers note that if a quick triage is needed of an …


Cloud Forensics Investigation: Tracing Infringing Sharing Of Copyrighted Content In Cloud, Yi-Jun He, Echo P. Zhang, Lucas C.K. Hui, Siu Ming Yiu, K.P. Chow May 2012

Cloud Forensics Investigation: Tracing Infringing Sharing Of Copyrighted Content In Cloud, Yi-Jun He, Echo P. Zhang, Lucas C.K. Hui, Siu Ming Yiu, K.P. Chow

Annual ADFSL Conference on Digital Forensics, Security and Law

Cloud Computing is becoming a significant technology trend nowadays, but its abrupt rise also creates a brand new front for cybercrime investigation with various challenges. One of the challenges is to track down infringing sharing of copyrighted content in cloud. To solve this problem, we study a typical type of content sharing technologies in cloud computing, analyze the challenges that the new technologies bring to forensics, formalize a procedure to get digital evidences and obtain analytical results based on the evidences to track down illegal uploader. Furthermore, we propose a reasoning model based on the probability distribution in a Bayesian …


A Fuzzy Hashing Approach Based On Random Sequences And Hamming Distance, Frank Breitinger, Harald Baier May 2012

A Fuzzy Hashing Approach Based On Random Sequences And Hamming Distance, Frank Breitinger, Harald Baier

Annual ADFSL Conference on Digital Forensics, Security and Law

Hash functions are well-known methods in computer science to map arbitrary large input to bit strings of a fixed length that serve as unique input identifier/fingerprints. A key property of cryptographic hash functions is that even if only one bit of the input is changed the output behaves pseudo randomly and therefore similar files cannot be identified. However, in the area of computer forensics it is also necessary to find similar files (e.g. different versions of a file), wherefore we need a similarity preserving hash function also called fuzzy hash function. In this paper we present a new approach for …


Toward Alignment Between Communities Of Practice And Knowledge-Based Decision Support, Jason Nichols, David Biros, Mark Weiser May 2012

Toward Alignment Between Communities Of Practice And Knowledge-Based Decision Support, Jason Nichols, David Biros, Mark Weiser

Annual ADFSL Conference on Digital Forensics, Security and Law

The National Repository of Digital Forensics Information (NRDFI) is a knowledge repository for law enforcement digital forensics investigators (LEDFI). Over six years, the NRDFI has undertaken significant design revisions in order to more closely align the architecture of the system with theory addressing motivation to share knowledge and communication within ego-centric groups and communities of practice. These revisions have been met with minimal change in usage patterns by LEDFI community members, calling into question the applicability of relevant theory when the domain for knowledge sharing activities expands beyond the confines of an individual organization to a community of practice. When …


Double-Compressed Jpeg Detection In A Steganalysis System, Jennifer L. Davidson, Pooja Parajape May 2012

Double-Compressed Jpeg Detection In A Steganalysis System, Jennifer L. Davidson, Pooja Parajape

Annual ADFSL Conference on Digital Forensics, Security and Law

The detection of hidden messages in JPEG images is a growing concern. Current detection of JPEG stego images must include detection of double compression: a JPEG image is double compressed if it has been compressed with one quality factor, uncompressed, and then re-compressed with a different quality factor. When detection of double compression is not included, erroneous detection rates are very high. The main contribution of this paper is to present an efficient double-compression detection algorithm that has relatively lower dimensionality of features and relatively lower computational time for the detection part, than current comparative classifiers. We use a model-based …


The Xbox 360 And Steganography: How Criminals And Terrorists Could Be "Going Dark", Ashley Podhradsky, Rob D’Ovidio, Cindy Casey May 2012

The Xbox 360 And Steganography: How Criminals And Terrorists Could Be "Going Dark", Ashley Podhradsky, Rob D’Ovidio, Cindy Casey

Annual ADFSL Conference on Digital Forensics, Security and Law

Video game consoles have evolved from single-player embedded systems with rudimentary processing and graphics capabilities to multipurpose devices that provide users with parallel functionality to contemporary desktop and laptop computers. Besides offering video games with rich graphics and multiuser network play, today's gaming consoles give users the ability to communicate via email, video and text chat; transfer pictures, videos, and file;, and surf the World-Wide-Web. These communication capabilities have, unfortunately, been exploited by people to plan and commit a variety of criminal activities. In an attempt to cover the digital tracks of these unlawful undertakings, anti-forensic techniques, such as steganography, …


A Proposal For Incorporating Programming Blunder As Important Evidence In Abstraction-Filtration-Comparison Test, P. Vinod Bhattathiripad May 2012

A Proposal For Incorporating Programming Blunder As Important Evidence In Abstraction-Filtration-Comparison Test, P. Vinod Bhattathiripad

Annual ADFSL Conference on Digital Forensics, Security and Law

This paper investigates an unexplored concept in Cyber Forensics, namely, a Programming Blunder. Programming Blunder is identified as a variable or a code segment or a field in a database table, which is hardly used or executed in the context of the application or the user’s functionality. Blunder genes can be found in many parts of any program. It is the contention of this paper that this phenomenon of blunders needs to be studied systematically from its very genetic origins to their surface realizations in contrast to bugs and flaws, especially in view of their importance in software copyright infringement …


Update On The State Of The Science Of Digital Evidence Examination, Fred Cohen May 2012

Update On The State Of The Science Of Digital Evidence Examination, Fred Cohen

Annual ADFSL Conference on Digital Forensics, Security and Law

This paper updates previous work on the level of consensus in foundational elements of digital evidence examination. Significant consensus is found present only after definitions are made explicit, suggesting that, while there is a scientific agreement around some of the basic notions identified, the use of a common language is lacking.

Keywords: Digital forensics examination, terminology, scientific methodology, testability, validation, classification, scientific consensus


Validation Of Pcr-Based Assays And Laboratory Accreditation For Environmental Detection Of Aquatic Invasive Species, Invasive Species Advisory Committee May 2012

Validation Of Pcr-Based Assays And Laboratory Accreditation For Environmental Detection Of Aquatic Invasive Species, Invasive Species Advisory Committee

National Invasive Species Council

This white paper provides:

a) Background information on the use, accuracy and reliability of PCR-based assays such as environmentally sampled DNA (eDNA) for early detection of aquatic invasive species (AIS) and;

b) Recommendations for establishing a system for validating assays and accrediting laboratories that report on the presence or absence of AIS.

This white paper was developed by the members of ISAC and discusses the need for developing validation requirements for Polymerase Chain Reaction (PCR) and other DNA-based molecular assays that are increasingly being used to detect AIS. It does not provide a simplified checklist for evaluation of their ability …


Invasive Species And E-Commerce, Invasive Species Advisory Committee May 2012

Invasive Species And E-Commerce, Invasive Species Advisory Committee

National Invasive Species Council

ISSUE

Internet commerce (hereafter e-commerce) is a growing and vital part of the United States economy. Total e-commerce sales in the United States for 2011 totaled $194 billion, an increase of 16% over 2010. From 2002 to 2011, the proportion of reported e-commerce sales in the U. S. grew from about 1.4% to 5.5% of total retail sales (United States Census Bureau News 2012). Globally, e-commerce is expected to increase at a rate of 13.5% annually, amounting to $1.4 trillion in yearly sales by 2015 (Enright 2011). A portion of this activity includes the sale and trade of living organisms. …


Dynamics Of Land Use/Land Cover Changes And Its Implication On Food Security In Anyigba, North Central, Nigeria, Tokula E. Arome, Sunday P. Ejaro (Phd) May 2012

Dynamics Of Land Use/Land Cover Changes And Its Implication On Food Security In Anyigba, North Central, Nigeria, Tokula E. Arome, Sunday P. Ejaro (Phd)

Confluence Journal Environmental Studies (CJES), Kogi State University, Nigeria

This study assessed land use/land cover changes and its effect on Agricultural land in Anyigba. The objectives were to identify and delineate different land use / land cover categories, assess the rate of change that occurred and examine the impact of land use/land cover change on food security using satellite remote sensing data collected at three different years (1987 Land sat TM, 2001 Land Sat TM and 2011 Land Sat ETM). The study utilized GIS software such as Idrisi Andes academic and ArcGIS 9.3. The study area covers approximately 31.8km2, and four major land use/cover classes were utilized (built up, …


Disparities In Municipal Waste Management Across Eu-27. A Geographical Approach, Florin C. Mihai, Liviu Apostol May 2012

Disparities In Municipal Waste Management Across Eu-27. A Geographical Approach, Florin C. Mihai, Liviu Apostol

Florin C MIHAI

Inadequate waste management leads to many environmental issues and the adoption of an efficient and sustainable waste management has become a priority objective of the EU. However, besides the demographic factors, the various socio-economic and geographical conditions of this complex space lead to major disparities in municipal waste management between North and South, East and West. This paper aims to do a spatial-temporal analysis of the Eurostat indicators using ascending hierarchical cluster analysis that divides the member states into five typological classes. The resulted maps highlight territorial disparities among Member States on municipal waste management and also reveal the evolution …


Sediment Removal From The San Gabriel Mountains, Mary C. Ferguson May 2012

Sediment Removal From The San Gabriel Mountains, Mary C. Ferguson

Pitzer Senior Theses

The issue of sediment removal from the San Gabriel Mountains has been a complex issue that has created problems with beach replenishment, habitat destruction and the need to spend millions of dollars at regular intervals to avoid safety hazards. Most recently 11 acres of riparian habitat, including 179 oaks and 70 sycamores, were removed for sediment placement. Other sites including Hahamongna Watershed Park and La Tuna Canyon also face a similar fate. This thesis questions: How did we get to this point of destroying habitat to dump sediment which is viewed as waste product? What are the barriers for creating …


Gray Wolf Rising: Why The Clash Over Wolf Management In The Northern Rockies Calls For Congressional Action To Define "Recovery" Under The Endangered Species Act, W. Ryan Stephens May 2012

Gray Wolf Rising: Why The Clash Over Wolf Management In The Northern Rockies Calls For Congressional Action To Define "Recovery" Under The Endangered Species Act, W. Ryan Stephens

William & Mary Environmental Law and Policy Review

No abstract provided.