Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 21 of 21

Full-Text Articles in Law

11th International Conference On Business, Technology And Innovation 2022, University For Business And Technology - Ubt Oct 2022

11th International Conference On Business, Technology And Innovation 2022, University For Business And Technology - Ubt

UBT International Conference

Welcome to IC – UBT 2022

UBT Annual International Conference is the 11th international interdisciplinary peer reviewed conference which publishes works of the scientists as well as practitioners in the area where UBT is active in Education, Research and Development. The UBT aims to implement an integrated strategy to establish itself as an internationally competitive, research-intensive university, committed to the transfer of knowledge and the provision of a world-class education to the most talented students from all background. The main perspective of the conference is to connect the scientists and practitioners from different disciplines in the same place and make …


A Qualitative Look Into Repair Practices, Jumana Labib Aug 2022

A Qualitative Look Into Repair Practices, Jumana Labib

Undergraduate Student Research Internships Conference

This research poster is based on a working research paper which moves beyond the traditional scope of repair and examines the Right to Repair movement from a smaller, more personal lens by detailing the 6 categorical impediments as dubbed by Dr. Alissa Centivany (design, law, economic/business strategy, material asymmetry, informational asymmetry, and social impediments) have continuously inhibited repair and affected repair practices, which has consequently had larger implications (environmental, economic, social, etc.) on ourselves, our objects, and our world. The poster builds upon my research from last year (see "The Right to Repair: (Re)building a better future"), this time pulling …


Session 4: Plunging Into Deep Water: An Immersion In Fintech, Defi (Decentralized Finance), & Web3, Joseph M. Vincent Jun 2022

Session 4: Plunging Into Deep Water: An Immersion In Fintech, Defi (Decentralized Finance), & Web3, Joseph M. Vincent

SITIE Symposiums

This panel featured entrepreneurs providing their expert insight into the background, workings, and expected developments of the FinTech industry. Moderated by Adjunct Professor of Law Joseph M. Vincent, the panel features Ron Oliveira, Kory Hoang, and Jonathan Blanco.

The panelists provided insight on topics regarding: (1) the fundamental changes in financial services since the advent of FinTech; (2) background on the Stablecoin industry including a background of what Stablecoin is, and why it has been under recent scrutiny; and (3) the NFT market and the direction the NFT space is heading. In a Q&A session, the panelists also offered their …


Session 3: Deep Innovation Dive In Health Equity: Truveta (“Saving Lives With Data”), Steve Tapia, Dave Heiner Jun 2022

Session 3: Deep Innovation Dive In Health Equity: Truveta (“Saving Lives With Data”), Steve Tapia, Dave Heiner

SITIE Symposiums

This session is a “deep dive” into health equity and research via a moderated discussion with Truveta, a new data partnership company poised for research breakthroughs in the healthcare sector. In it, Dave Heiner, General Counsel and Chief Policy Officer for Truveta, discusses the company’s healthcare-centered mission and the key role that data plays in the healthcare field.


Session 2: Diversity Perspectives: In-House Counsel, Debbie Akhbari Jun 2022

Session 2: Diversity Perspectives: In-House Counsel, Debbie Akhbari

SITIE Symposiums

This expert panel addressed diversity perspectives in the legal field. Moderated by Debbie Akhbari, six panelists shared their stories. The panelists were Leticia Hernández, Bernadette Lopez, Elida Moran, Catherine Romero, Rachel Seals, and Katina Thornock. Each panelist's stories have been broken into its own section in the summary of proceedings.

Many diverse candidates have incorrect assumptions made about them, resulting in doors being closed by those in positions of power. This panel shared their personal stories and encouraged students and newer attorneys to keep “knocking on those doors” and for those in positions of power to open those doors. Through …


Session 1: Innovation In Legal Services, Steven W. Bender, Michael Cherry, Matthew Spencer Jun 2022

Session 1: Innovation In Legal Services, Steven W. Bender, Michael Cherry, Matthew Spencer

SITIE Symposiums

This panel featured two “disrupters” who detailed their experiences innovating in the legal services space. The first panelist spoke about data-driven regulatory reform and the other spoke as an entrepreneur whose product introduces artificial intelligence (AI) into the legal recruiting process. Two additional panelists provided commentary regarding the second panelist’s presentation.

The panel provided insight on the topics of: (1) the legal regulatory process at large; (2) how a data-driven and feedback-oriented sandbox provides an alternative regulatory process; (3) the legal hiring and recruiting process and (4) how AI allows law firms to consider alternative hiring metrics when assessing candidates …


Introduction To The 5th Annual Innovation And Technology Law Conference, Annette Clark Jun 2022

Introduction To The 5th Annual Innovation And Technology Law Conference, Annette Clark

SITIE Symposiums

Seattle University School of Law’s then dean, now Dean Emerita, Annette Clark, opens the 5th annual Innovation and Technology Law Conference, co-sponsored by the Seattle Journal of Technology, Environmental, and Innovation Law (SJTEIL) at Seattle University School of Law. Annette Clark has been involved with the planning and organization of the Innovation and Technology Law Conference since the conference’s inception. The theme of the 5th annual 2022 conference is “deep innovation dives.”

Annette Clark explains that “This conference is part of our continuing efforts at Seattle [University] Law to expand educational opportunities for our students and community in …


5th Annual Innovation And Technology Law Conference: Deep Innovation Dives, Steven W. Bender Jun 2022

5th Annual Innovation And Technology Law Conference: Deep Innovation Dives, Steven W. Bender

SITIE Symposiums

Steven W. Bender, Seattle University School of Law Professor and organizer of the SITIE Symposium series, details the history of the SITIE symposiums and the 2022 proceedings. He discusses how this year's symposium builds on themes and issues raised in previous symposiums and looks ahead to the 2023 SITIE symposium.


The Next Small Step, Samiya Henry Apr 2022

The Next Small Step, Samiya Henry

Undergraduate Research and Scholarship Symposium

As of right now, NASA and other space programs are estimating that by 2026, there will be people living in Space. Whether it be the Moon or Mars, one cannot have a functional society without a proper source of laws, especially since no one country has ownership over space. "One Small Step" will produce this source of laws, called the “Space Bill of Rights,” that will outline important matters like the trade of resources, medical care, government officials, and will ensure the preservation of our physical and figurative footsteps in space. This Space Bill of Rights is made up of …


Application Of U.S. Sanction Laws And Ransomware Payments, Trinity Woodbury Apr 2022

Application Of U.S. Sanction Laws And Ransomware Payments, Trinity Woodbury

Cybersecurity Undergraduate Research Showcase

Ransomware is a major threat that widely affects individuals and organizations, including businesses. Ransomware victims face the situation of potentially paying ransom payments to threat actors, some of whom might be foreign-based criminals. Ransomware affects victims from all sectors and industries.


Microsoft Defender Will Be Defended: Memoryranger Prevents Blinding Windows Av, Denis Pogonin, Igor Korkin, Phd Jan 2022

Microsoft Defender Will Be Defended: Memoryranger Prevents Blinding Windows Av, Denis Pogonin, Igor Korkin, Phd

Annual ADFSL Conference on Digital Forensics, Security and Law

Windows OS is facing a huge rise in kernel attacks. An overview of popular techniques that result in loading kernel drivers will be presented. One of the key targets of modern threats is disabling and blinding Microsoft Defender, a default Windows AV. The analysis of recent driver-based attacks will be given, the challenge is to block them. The survey of user- and kernel-level attacks on Microsoft Defender will be given. One of the recently published attackers’ techniques abuses Mandatory Integrity Control (MIC) and Security Reference Monitor (SRM) by modifying Integrity Level and Debug Privileges for the Microsoft Defender via syscalls. …


Digital Forensics For Mobility As A Service Platform: Analysis Of Uber Application On Iphone And Cloud, Nina Matulis, Umit Karabiyik Jan 2022

Digital Forensics For Mobility As A Service Platform: Analysis Of Uber Application On Iphone And Cloud, Nina Matulis, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

Uber is a ride-hailing smartphone application (app) that allows users to order a ride in a highly efficient manner. The Uber app provides Mobility as a Service and allows users to easily order a ride in a private car with just a few clicks. Uber stores large amounts of data on both the mobile device the app is being used on, and in the cloud. Examples of this data include geolocation data, date/time, origin/destination addresses, departure/arrival times, and distance. Uber geolocation data has been previously researched to investigate the privacy of the Uber app; however, there is minimal research relating …


Timestamp Estimation From Outdoor Scenes, Tawfiq Salem, Jisoo Hwang, Rafael Padilha Jan 2022

Timestamp Estimation From Outdoor Scenes, Tawfiq Salem, Jisoo Hwang, Rafael Padilha

Annual ADFSL Conference on Digital Forensics, Security and Law

The increasing availability of smartphones allowed people to easily capture and share images on the internet. These images are often associated with metadata, including the image capture time (timestamp) and the location where the image was captured (geolocation). The metadata associated with images provides valuable information to better understand scenes and events presented in these images. The timestamp can be manipulated intentionally to provide false information to convey a twisted version of reality. Images with manipulated timestamps are often used as a cover-up for wrongdoing or broadcasting false claims and competing views on the internet. Estimating the time of capture …


Anatomy Of An Internet Hijack And Interception Attack: A Global And Educational Perspective, Ben A. Scott, Michael N. Johnstone, Patryk Szewczyk Jan 2022

Anatomy Of An Internet Hijack And Interception Attack: A Global And Educational Perspective, Ben A. Scott, Michael N. Johnstone, Patryk Szewczyk

Annual ADFSL Conference on Digital Forensics, Security and Law

The Internet’s underlying vulnerable protocol infrastructure is a rich target for cyber crime, cyber espionage and cyber warfare operations. The stability and security of the Internet infrastructure are important to the function of global matters of state, critical infrastructure, global e-commerce and election systems. There are global approaches to tackle Internet security challenges that include governance, law, educational and technical perspectives. This paper reviews a number of approaches to these challenges, the increasingly surgical attacks that target the underlying vulnerable protocol infrastructure of the Internet, and the extant cyber security education curricula; we find the majority of predominant cyber security …


Smart Home Forensics: Identifying Ddos Attack Patterns On Iot Devices, Samuel Ho, Hope Greeson, Umit Karabiyik Jan 2022

Smart Home Forensics: Identifying Ddos Attack Patterns On Iot Devices, Samuel Ho, Hope Greeson, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

Smart homes are becoming more common as more people integrate IoT devices into their home environment. As such, these devices have access to personal data on their homeowners’ networks. One of the advantages of IoT devices is that they are compact. However, this limits the incorporation of security measures in their hardware. Misconfigured IoT devices are commonly the target of malicious attacks. Additionally, distributed denial-of-service attacks are becoming more common due to applications and software that provides users with easy-to-use user interfaces. Since one vulnerable device is all an attacker needs to launch an attack on a network, in regards …


The Amorphous Nature Of Hackers: An Exploratory Study, Kento Yasuhara, Daniel Walnycky, Ibrahim Baggili, Ahmed Alhishwan Jan 2022

The Amorphous Nature Of Hackers: An Exploratory Study, Kento Yasuhara, Daniel Walnycky, Ibrahim Baggili, Ahmed Alhishwan

Annual ADFSL Conference on Digital Forensics, Security and Law

In this work, we aim to better understand outsider perspectives of the hacker community through a series of situation based survey questions. By doing this, we hope to gain insight into the overall reputation of hackers from participants in a wide range of technical and non-technical backgrounds. This is important to digital forensics since convicted hackers will be tried by people, each with their own perception of who hackers are. Do cyber crimes and national security issues negatively affect people’s perceptions of hackers? Does hacktivism and information warfare positively affect people’s perception of hackers? Do individual personality factors affect one’s …


Human-Controlled Fuzzing With Afl, Maxim Grishin, Igor Korkin, Phd Jan 2022

Human-Controlled Fuzzing With Afl, Maxim Grishin, Igor Korkin, Phd

Annual ADFSL Conference on Digital Forensics, Security and Law

Fuzzing techniques are applied to reveal different types of bugs and vulnerabilities. American Fuzzy Lop (AFL) is a free most popular software fuzzer used by many other fuzzing frameworks. AFL supports autonomous mode of operation that uses the previous step output into the next step, as a result fuzzer spends a lot of time analyzing minor code sections. By making fuzzing process more focused and human controlled security expert can save time and find more bugs in less time. We designed a new module that can fuzz only the specified functions. As a result, the chosen ones will be inspected …


Detection Of Overlapping Passive Manipulation Techniques In Image Forensics, Gianna S. Lint, Umit Karabiyik Jan 2022

Detection Of Overlapping Passive Manipulation Techniques In Image Forensics, Gianna S. Lint, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

With a growing number of images uploaded daily to social media sites, it is essential to understand if an image can be used to trace its origin. Forensic investigations are focusing on analyzing images that are uploaded to social media sites resulting in an emphasis on building and validating tools. There has been a strong focus on understanding active manipulation or tampering techniques and building tools for analysis. However, research on manipulation is often studied in a vacuum, involving only one technique at a time. Additionally, less focus has been placed on passive manipulation, which can occur by simply uploading …


A Lightweight Reliably Quantified Deepfake Detection Approach, Tianyi Wang, Kam Pui Chow Jan 2022

A Lightweight Reliably Quantified Deepfake Detection Approach, Tianyi Wang, Kam Pui Chow

Annual ADFSL Conference on Digital Forensics, Security and Law

Deepfake has brought huge threats to society such that everyone can become a potential victim. Current Deepfake detection approaches have unsatisfactory performance in either accuracy or efficiency. Meanwhile, most models are only evaluated on different benchmark test datasets with different accuracies, which could not imitate the real-life Deepfake unknown population. As Deepfake cases have already been raised and brought challenges at the court, it is disappointed that no existing work has studied the model reliability and attempted to make the detection model act as the evidence at the court. We propose a lightweight Deepfake detection deep learning approach using the …


A Low-Cost Machine Learning Based Network Intrusion Detection System With Data Privacy Preservation, Jyoti Fakirah, Lauhim Mahfuz Zishan, Roshni Mooruth, Michael L. Johnstone, Wencheng Yang Jan 2022

A Low-Cost Machine Learning Based Network Intrusion Detection System With Data Privacy Preservation, Jyoti Fakirah, Lauhim Mahfuz Zishan, Roshni Mooruth, Michael L. Johnstone, Wencheng Yang

Annual ADFSL Conference on Digital Forensics, Security and Law

Network intrusion is a well-studied area of cyber security. Current machine learning-based network intrusion detection systems (NIDSs) monitor network data and the patterns within those data but at the cost of presenting significant issues in terms of privacy violations which may threaten end-user privacy. Therefore, to mitigate risk and preserve a balance between security and privacy, it is imperative to protect user privacy with respect to intrusion data. Moreover, cost is a driver of a machine learning-based NIDS because such systems are increasingly being deployed on resource-limited edge devices. To solve these issues, in this paper we propose a NIDS …


Cybersecurity & Correctional Institutions, Kelly Himelwright Jan 2022

Cybersecurity & Correctional Institutions, Kelly Himelwright

Cybersecurity Undergraduate Research Showcase

Cybersecurity is becoming an increasingly important aspect of correctional operations. To properly maintain security, more jails and prisons are using comprehensive cyber protection techniques. Correctional facilities face risks that were perhaps unimaginable only a few decades ago. Many organizations have used information technology to help them run their businesses, but few have the resources or vision to foresee and adequately manage the cyber dangers that come with it. Institutions need to be more aware of these hazards, as well as have more information security experts on staff.