Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics

2012

Institution
Keyword
Publication
Publication Type
File Type

Articles 61 - 90 of 203

Full-Text Articles in Law

“Advancing With The Times: Industrial Design Protection In The Era Of Virtual Migration”, Horacio E. Gutiérrez Jul 2012

“Advancing With The Times: Industrial Design Protection In The Era Of Virtual Migration”, Horacio E. Gutiérrez

IP Theory

No abstract provided.


Agenda: Drafting Model Laws On Indoor Pollution For Developing And Developed Nations, University Of Colorado Boulder. Center For Energy & Environmental Security, Colorado Natural Resources, Energy And Environmental Law Review Jul 2012

Agenda: Drafting Model Laws On Indoor Pollution For Developing And Developed Nations, University Of Colorado Boulder. Center For Energy & Environmental Security, Colorado Natural Resources, Energy And Environmental Law Review

Drafting Model Laws on Indoor Pollution for Developing and Developed Nations (July 12-13)

On July 12 and 13, 2012, experts convened at Colorado Law to demonstrate the extent to which a model law could help address the global problem of indoor air pollution from inefficient cook stoves. The air pollution that results from inefficiently burning biomass as fuel for cooking has serious health and climatic consequences. The workshop produced two sets of Model Laws and commentaries to help nations solve the problem, and the commentaries were published in the Colorado Natural Resources, Energy, and Environmental Law Review.


Drafting Model Laws On Indoor Pollution For Developing And Developed Nations Workshop, July 12-13, 2012, Boulder, Colorado: Introduction, Lakshman Guruswamy Jul 2012

Drafting Model Laws On Indoor Pollution For Developing And Developed Nations Workshop, July 12-13, 2012, Boulder, Colorado: Introduction, Lakshman Guruswamy

Drafting Model Laws on Indoor Pollution for Developing and Developed Nations (July 12-13)

11 pages.

"This Essay introduces the framework for deliberation and legislative drafting undertaken at the workshop: Drafting Model Laws on Indoor Pollution for Developing and Developed Nations on July 12-13, 2012, in Boulder, Colorado. There are a number of fundamental premises upon which the workshop was based, and this Essay refers to the most salient among them."-- Excerpted from 24 Colo. Nat. Resources, Energy & Envtl. L. Rev. 319 (2013).


Development And Dissemination Of Clean Cookstoves: A Model Law For Developed Countries, Scott Miller Jul 2012

Development And Dissemination Of Clean Cookstoves: A Model Law For Developed Countries, Scott Miller

Drafting Model Laws on Indoor Pollution for Developing and Developed Nations (July 12-13)

21 pages.

"This model law was developed at a legislative drafting workshop on July 12-13, 2012, entitled Drafting Model Laws on Indoor Pollution for Developing and Developed Nations, which was sponsored by the Center for Energy & Environmental Security and the Colorado Natural Resources, Energy & Environmental Law Review at the University of Colorado Law School in Boulder, Colorado."-- Excerpted from 24 Colo. Nat. Resources, Energy & Envtl. L. Rev. 355 (2013).

"Scott Miller ed."


Development And Dissemination Of Clean Cookstoves: A Model Law For Developing Countries, Lakshman Guruswamy Ed. Jul 2012

Development And Dissemination Of Clean Cookstoves: A Model Law For Developing Countries, Lakshman Guruswamy Ed.

Drafting Model Laws on Indoor Pollution for Developing and Developed Nations (July 12-13)

24 pages.

"This model law was developed at a legislative drafting workshop on July 12-13, 2012, entitled Drafting Model Laws on Indoor Pollution for Developing and Developed Nations, which was sponsored by the Center for Energy & Environmental Security and the Colorado Natural Resources, Energy & Environmental Law Review at the University of Colorado Law School in Boulder, Colorado." Excerpted from 24 Colo. Nat. Resources, Energy & Envtl. L. Rev. 331 (2013).


The Value Of Government Mandated Location-Based Services In Emergencies In Australia, Anas Aloudat, Katina Michael, Roba Abbas, Mutaz Al-Debei Jul 2012

The Value Of Government Mandated Location-Based Services In Emergencies In Australia, Anas Aloudat, Katina Michael, Roba Abbas, Mutaz Al-Debei

Associate Professor Katina Michael

The adoption of mobile technologies for emergency management has the capacity to save lives. In Australia in February 2009, the Victorian Bushfires claimed 173 lives, the worst peace-time disaster in the nation’s history. The Australian government responded swiftly to the tragedy by going to tender for mobile applications that could be used during emergencies, such as mobile alerts and location services. These applications, which are becoming increasingly accurate with the evolution of positioning techniques, have the ability to deliver personalized information direct to the citizen during crises, complementing traditional broadcasting mediums like television and radio. Indeed governments have a responsibility …


Deliberating Beyond Evidence: Lessons From Integrated Assessment Modelling, Elisa Vecchione Jul 2012

Deliberating Beyond Evidence: Lessons From Integrated Assessment Modelling, Elisa Vecchione

Elisa Vecchione

The premises of this paper rely on associating policy inertia toward action on climate change with the inadequacy of the classical ‘liability culture’ of evidence-based policy-making to deal with this global environmental challenge. To provide support to this hypothesis, the following discussion analyses the technical properties and the current policy use of Integrated Assessment Modelling (IAM) of economic-climate interactions. The paper contends that IAM is still not clarified enough as far as its potential for information-production in the framework of policy making processes is concerned, and that this fact is symptomatic of the current inability of societies to undertake the …


Homicide In The Brazilian Favela: Does Opportunity Make The Killer?, Elenice De Souza De Souza Oliveira, Joel Miller Jul 2012

Homicide In The Brazilian Favela: Does Opportunity Make The Killer?, Elenice De Souza De Souza Oliveira, Joel Miller

Department of Justice Studies Faculty Scholarship and Creative Works

High rates of homicide in Brazil are heavily concentrated in poor urban shanty towns or ‘favelas’. This paper looks beyond conventional social and economic explanations of homicides, and examines the relationship between situational factors and homicide incidents within a case-study favela in the city of Belo Horizonte. Initial exploratory research identified potential mechanisms linking local situational characteristics with homicide. A matched case–control study then tested hypotheses based on these mechanisms. When the characteristics of 100 addresses of homicide incidents were compared with those of 100 nearby non-homicide addresses, they showed statistical associations with drug areas, bars, alleys, windows onto the …


Food Fight: A Case Study Of The Community Food Security Coalition’S Campaign For A Fair Farm Bill, Marni Salmon Jul 2012

Food Fight: A Case Study Of The Community Food Security Coalition’S Campaign For A Fair Farm Bill, Marni Salmon

Capstone Collection

The farm bill is an all-encompassing piece of legislation that is reauthorized approximately every five years and establishes federal policy for everything from farm subsidies and crop insurance to energy, conservation, food stamps and school lunches. The current law expires at the end of September 2012. Reauthorization of the farm bill represents the single largest opportunity to reform the policies that shape food systems in the United States. The Community Food Security Coalition (CFSC) is campaigning to improve access to healthy food by increasing links with family farmers and to strengthen local and regional food systems. This case study traces …


Book Review Of Hacking: The Next Generation (Written By Nitesh Dhanjani, Billy Rios & Brett Hardin), Katina Michael Jun 2012

Book Review Of Hacking: The Next Generation (Written By Nitesh Dhanjani, Billy Rios & Brett Hardin), Katina Michael

Professor Katina Michael

Hacking: The Next Generation demonstrates just how hackers continue to exploit “back doors”. New ways of working and new ways of communicating have meant that the number of attack vectors continue to rise rapidly. This provides hackers with a greater number of opportunities to penetrate systems using blended approaches while organizations struggle to come up to speed with the latest technology developments and commensurate security capabilities. Dealing with anticipated threats is a lot harder than dealing with known threats.


Identifying And Attributing Similar Traces With Greatest Common Factor Analysis, Fred Cohen Jun 2012

Identifying And Attributing Similar Traces With Greatest Common Factor Analysis, Fred Cohen

Journal of Digital Forensics, Security and Law

This paper presents an algorithm for comparing large numbers of traces to each other and identifying and presenting groups of traces with similar features. It is applied to forensic analysis in which groups of similar traces are automatically identified and presented so that attribution and other related claims may be asserted, and independently confirmed or refuted. The approach of this paper is to identify an approximate algorithm that will find a large subset of greatest common factor similar groups of arbitrary factors in far less time and space than an exact algorithm using examiner-provided selection criteria for factor definition.


Front Matter Jun 2012

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Back Matter Jun 2012

Back Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Masthead Jun 2012

Masthead

Journal of Digital Forensics, Security and Law

No abstract provided.


When Will America, World Make Sustainability A Priority?, John Dernbach Jun 2012

When Will America, World Make Sustainability A Priority?, John Dernbach

John C. Dernbach

No abstract provided.


Converging And Coexisting Systems Towards Smart Surveillance, Katina Michael, Mg Michael Jun 2012

Converging And Coexisting Systems Towards Smart Surveillance, Katina Michael, Mg Michael

Professor Katina Michael

Tracking and monitoring people as they operate within their personal networks benefits service providers and their constituents but involves hidden risks and costs.

Automatic identification technologies, CCTV cameras, pervasive and mobile networks, wearable computing, location-based services and social networks have traditionally served distinct purposes. However, we have observed patterns of integration, convergence and coexistence among all these innovations within the information and communication technology industry.1For example, ‘location-based social networking’ can draw on a smart phone's capacity to identify a user uniquely, locate him within 1–2m and share this information across his social network in real time. The resulting ability to …


Agenda: A Low-Carbon Energy Blueprint For The American West, University Of Colorado Boulder. Natural Resources Law Center, University Of Colorado Boulder. Renewable And Sustainable Energy Institute, Western Resource Advocates, Rocky Mountain Research Station (Fort Collins, Colo.) Jun 2012

Agenda: A Low-Carbon Energy Blueprint For The American West, University Of Colorado Boulder. Natural Resources Law Center, University Of Colorado Boulder. Renewable And Sustainable Energy Institute, Western Resource Advocates, Rocky Mountain Research Station (Fort Collins, Colo.)

A Low-Carbon Energy Blueprint for the American West (Martz Summer Conference, June 6-8)

The future of the planet may depend upon our ability to increase energy supplies even as we reduce carbon emissions. This conference will address how a low-carbon energy program might evolve with a particular focus on the American West. It will focus on the future of energy in the West--on a “managed transition” to a different energy mix, on the need to nest this effort in a framework that acknowledges interconnections, and on identifying the most salient opportunities to consider the legal, political, financial, and technical challenges.


Acting As If Tomorrow Matters: Accelerating The Transition To Sustainability, John Dernbach May 2012

Acting As If Tomorrow Matters: Accelerating The Transition To Sustainability, John Dernbach

John C. Dernbach

No abstract provided.


Location-Based Social Networking And Its Impact On Trust In Relationships, Sarah Jean Fusco, Roba Abbas, Katina Michael, Anas Aloudat May 2012

Location-Based Social Networking And Its Impact On Trust In Relationships, Sarah Jean Fusco, Roba Abbas, Katina Michael, Anas Aloudat

Professor Katina Michael

Location based social networking (LBSN) applications are part of a new suite of social networking tools. LBSN is the convergence between location based services (LBS) and online social networking (OSN). LBSN applications offer users the ability to look up the location of another “friend” remotely using a smart phone, desktop or other device, anytime and anywhere. Users invite their friends to participate in LBSN and there is a process of consent that follows. This paper explores the potential impact of LBSN upon trust in society. It looks at the willingness of individuals to share their location data with family, friends, …


Editorial: The Idio-Technopolis, Katina Michael May 2012

Editorial: The Idio-Technopolis, Katina Michael

Professor Katina Michael

The rapid rise of social media has brought with it an emphasis on the distinct dimensions of the whole person. Social media recognises that the individual has a personal network of extensions- a home life, a work life, a social life, a study life, a hobbyist life, and much more- some of these identities even hidden from full view. Each of these online value networks are now accessible by big business, where opinion leaders and early adopters are easily distinguishable, and where brand commentary between consumers matters manifold more than any form of targeted advertising.


Digital Evidence Education In Schools Of Law, Aaron Alva, Barbara Endicott-Popovsky May 2012

Digital Evidence Education In Schools Of Law, Aaron Alva, Barbara Endicott-Popovsky

Annual ADFSL Conference on Digital Forensics, Security and Law

An examination of State of Connecticut v. Julie Amero provides insight into how a general lack of understanding of digital evidence can cause an innocent defendant to be wrongfully convicted. By contrast, the 101-page opinion in Lorraine v. Markel American Insurance Co. provides legal precedence and a detailed consideration for the admission of digital evidence. An analysis of both cases leads the authors to recommend additions to Law School curricula designed to raise the awareness of the legal community to ensure such travesties of justice, as in the Amero case, don’t occur in the future. Work underway at the University …


After Five Years Of E-Discovery Missteps: Sanctions Or Safe Harbor?, Milton Luoma, Vicki Luoma May 2012

After Five Years Of E-Discovery Missteps: Sanctions Or Safe Harbor?, Milton Luoma, Vicki Luoma

Annual ADFSL Conference on Digital Forensics, Security and Law

In 2003 the Zubulake case became the catalyst of change in the world of e-discovery. In that case Judge Shira Scheindlin of the United States District Court for the Southern District of New York set guidelines for e-discovery that served as the basis for amending the Federal Rules of Civil Procedure (FRCP) in December 2006. The amendments incorporated a number of concepts that were described by Judge Scheindlin in the Zubulake case. ( Zubulake v. UBS Warburg LLC, 2003) Since the Zubulake case and the FRCP amendments, numerous cases have interpreted these rules changes, but one of the main points …


A Case Study Of The Challenges Of Cyber Forensics Analysis Of Digital Evidence In A Child Pornography Trial, Richard Boddington May 2012

A Case Study Of The Challenges Of Cyber Forensics Analysis Of Digital Evidence In A Child Pornography Trial, Richard Boddington

Annual ADFSL Conference on Digital Forensics, Security and Law

Perfunctory case analysis, lack of evidence validation, and an inability or unwillingness to present understandable analysis reports adversely affect the outcome course of legal trials reliant on digital evidence. These issues have serious consequences for defendants facing heavy penalties or imprisonment yet expect their defence counsel to have clear understanding of the evidence. Poorly reasoned, validated and presented digital evidence can result in conviction of the innocent as well as acquittal of the guilty. A possession of child pornography Case Study highlights the issues that appear to plague case analysis and presentation of digital evidence relied on in these odious …


Facilitating Forensics In The Mobile Millennium Through Proactive Enterprise Security, Andrew R. Scholnick May 2012

Facilitating Forensics In The Mobile Millennium Through Proactive Enterprise Security, Andrew R. Scholnick

Annual ADFSL Conference on Digital Forensics, Security and Law

This work explores the impact of the emerging mobile communication device paradigm on the security-conscious enterprise, with regard to providing insights for proactive Information Assurance and facilitation of eventual Forensic analysis. Attention is given to technology evolution in the areas of best practices, attack vectors, software and hardware performance, access and activity monitoring, and architectural models.

Keywords: Forensics, enterprise security, mobile communication, best practices, attack vectors.


Multi-Parameter Sensitivity Analysis Of A Bayesian Network From A Digital Forensic Investigation, Richard E. Overill, Echo P. Zhang, Kam-Pui Chow May 2012

Multi-Parameter Sensitivity Analysis Of A Bayesian Network From A Digital Forensic Investigation, Richard E. Overill, Echo P. Zhang, Kam-Pui Chow

Annual ADFSL Conference on Digital Forensics, Security and Law

A multi-parameter sensitivity analysis of a Bayesian network (BN) used in the digital forensic investigation of the Yahoo! email case has been performed using the principle of ‘steepest gradient’ in the parameter space of the conditional probabilities. This procedure delivers a more reliable result for the dependence of the posterior probability of the BN on the values used to populate the conditional probability tables (CPTs) of the BN. As such, this work extends our previous studies using singleparameter sensitivity analyses of BNs, with the overall aim of more deeply understanding the indicative use of BNs within the digital forensic and …


Ipad2 Logical Acquisition: Automated Or Manual Examination?, Somaya Ali, Sumaya Alhosani, Farah Alzarooni, Ibrahim Baggili May 2012

Ipad2 Logical Acquisition: Automated Or Manual Examination?, Somaya Ali, Sumaya Alhosani, Farah Alzarooni, Ibrahim Baggili

Annual ADFSL Conference on Digital Forensics, Security and Law

Due to their usage increase worldwide, iPads are on the path of becoming key sources of digital evidence in criminal investigations. This research investigated the logical backup acquisition and examination of the iPad2 device using the Apple iTunes backup utility while manually examining the backup data (manual examination) and automatically parsing the backup data (Lantern software - automated examination). The results indicate that a manual examination of the logical backup structure from iTunes reveals more digital evidence, especially if installed application data is required for an investigation. However, the researchers note that if a quick triage is needed of an …


Cloud Forensics Investigation: Tracing Infringing Sharing Of Copyrighted Content In Cloud, Yi-Jun He, Echo P. Zhang, Lucas C.K. Hui, Siu Ming Yiu, K.P. Chow May 2012

Cloud Forensics Investigation: Tracing Infringing Sharing Of Copyrighted Content In Cloud, Yi-Jun He, Echo P. Zhang, Lucas C.K. Hui, Siu Ming Yiu, K.P. Chow

Annual ADFSL Conference on Digital Forensics, Security and Law

Cloud Computing is becoming a significant technology trend nowadays, but its abrupt rise also creates a brand new front for cybercrime investigation with various challenges. One of the challenges is to track down infringing sharing of copyrighted content in cloud. To solve this problem, we study a typical type of content sharing technologies in cloud computing, analyze the challenges that the new technologies bring to forensics, formalize a procedure to get digital evidences and obtain analytical results based on the evidences to track down illegal uploader. Furthermore, we propose a reasoning model based on the probability distribution in a Bayesian …


A Fuzzy Hashing Approach Based On Random Sequences And Hamming Distance, Frank Breitinger, Harald Baier May 2012

A Fuzzy Hashing Approach Based On Random Sequences And Hamming Distance, Frank Breitinger, Harald Baier

Annual ADFSL Conference on Digital Forensics, Security and Law

Hash functions are well-known methods in computer science to map arbitrary large input to bit strings of a fixed length that serve as unique input identifier/fingerprints. A key property of cryptographic hash functions is that even if only one bit of the input is changed the output behaves pseudo randomly and therefore similar files cannot be identified. However, in the area of computer forensics it is also necessary to find similar files (e.g. different versions of a file), wherefore we need a similarity preserving hash function also called fuzzy hash function. In this paper we present a new approach for …


The Xbox 360 And Steganography: How Criminals And Terrorists Could Be "Going Dark", Ashley Podhradsky, Rob D’Ovidio, Cindy Casey May 2012

The Xbox 360 And Steganography: How Criminals And Terrorists Could Be "Going Dark", Ashley Podhradsky, Rob D’Ovidio, Cindy Casey

Annual ADFSL Conference on Digital Forensics, Security and Law

Video game consoles have evolved from single-player embedded systems with rudimentary processing and graphics capabilities to multipurpose devices that provide users with parallel functionality to contemporary desktop and laptop computers. Besides offering video games with rich graphics and multiuser network play, today's gaming consoles give users the ability to communicate via email, video and text chat; transfer pictures, videos, and file;, and surf the World-Wide-Web. These communication capabilities have, unfortunately, been exploited by people to plan and commit a variety of criminal activities. In an attempt to cover the digital tracks of these unlawful undertakings, anti-forensic techniques, such as steganography, …


Toward Alignment Between Communities Of Practice And Knowledge-Based Decision Support, Jason Nichols, David Biros, Mark Weiser May 2012

Toward Alignment Between Communities Of Practice And Knowledge-Based Decision Support, Jason Nichols, David Biros, Mark Weiser

Annual ADFSL Conference on Digital Forensics, Security and Law

The National Repository of Digital Forensics Information (NRDFI) is a knowledge repository for law enforcement digital forensics investigators (LEDFI). Over six years, the NRDFI has undertaken significant design revisions in order to more closely align the architecture of the system with theory addressing motivation to share knowledge and communication within ego-centric groups and communities of practice. These revisions have been met with minimal change in usage patterns by LEDFI community members, calling into question the applicability of relevant theory when the domain for knowledge sharing activities expands beyond the confines of an individual organization to a community of practice. When …