Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Embry-Riddle Aeronautical University (39)
- Northwestern Pritzker School of Law (28)
- University of Pennsylvania Carey Law School (12)
- SelectedWorks (8)
- Selected Works (6)
-
- Washington University in St. Louis (4)
- University of Nebraska - Lincoln (3)
- City University of New York (CUNY) (2)
- Duke Law (2)
- Marshall University (2)
- University at Buffalo School of Law (2)
- University of New Hampshire (2)
- Boise State University (1)
- Brigham Young University Law School (1)
- California State University, San Bernardino (1)
- Columbia Law School (1)
- Georgetown University Law Center (1)
- Penn State Law (1)
- Western Kentucky University (1)
- Keyword
-
- Corporations (4)
- Information security (4)
- Courts (3)
- Law and Society (3)
- Securities Law (3)
-
- Artículo (2)
- Citizens (2)
- Criminal Law and Procedure (2)
- Federalism (2)
- Ghana (2)
- Law enforcement (2)
- Police (2)
- Research relevance (2)
- Reseña (book review) (2)
- River (2)
- Torts (2)
- Academic research (1)
- Accounting (1)
- Acquisition (1)
- Action research (1)
- Adaptive management (1)
- Administration (1)
- African-american (1)
- Aggression (1)
- Agribiotech (1)
- Articles (1)
- Atkins decision (1)
- Attorney Ability (1)
- Bankruptcy (1)
- Brandeis (1)
- Publication
-
- Journal of Criminal Law and Criminology (28)
- Journal of Digital Forensics, Security and Law (23)
- Annual ADFSL Conference on Digital Forensics, Security and Law (16)
- All Faculty Scholarship (12)
- Leonardo García Jaramillo (4)
-
- Scholarship@WashULaw (4)
- Faculty Scholarship (3)
- Criminal Justice Faculty Research (2)
- Journal Articles (2)
- Law Faculty Scholarship (2)
- Nebraska College of Law: Faculty Publications (2)
- Publications and Research (2)
- Book Reviews (1)
- Brigham Young University Journal of Public Law (1)
- Center on Children, Families, and the Law: Faculty Publications (1)
- Chad J McGuire (1)
- Criminal Justice Faculty Publications and Presentations (1)
- Donald J. Kochan (1)
- Fiona David (1)
- Georgetown Law Faculty Publications and Other Works (1)
- Jenneke Christiaens (1)
- Liz Campbell (1)
- Matthew Wilburn King PhD (1)
- Reid G. Fontaine (1)
- S. David Mitchell (1)
- Sherrill W. Hayes (1)
- Theses Digitization Project (1)
- WKU Administration Documents (1)
- Wesley M Oliver (1)
- Publication Type
- File Type
Articles 1 - 30 of 117
Full-Text Articles in Law
An Evaluation Of Operation Street Sweeper - 2006, Andrew Giacomazzi, Jeremy D. Ball
An Evaluation Of Operation Street Sweeper - 2006, Andrew Giacomazzi, Jeremy D. Ball
Criminal Justice Faculty Publications and Presentations
Operation Street Sweeper (OSS) was a multi-level, interagency collaboration with multiple purposes. According to OSS documents, Operation Street Sweeper goals included the following: (1) to reduce gang-related criminal and violent activity in Nampa and Caldwell, Idaho through aggressive, proactive, and coordinated street enforcement between the Bureau of Alcohol, Tobacco and Firearms (ATF) and local law enforcement; (2) to deter criminal activity through high profile enforcement activity; (3) to develop and/or increase the number of positive community contacts; (4) to show the community and gang members that law enforcement is serious about reducing gang and violent crime in the area; and …
Ecosystem-Based Management Of Terrestrial And Coastal Water Resources: Can Rapanos Teach Us Anything About The Future Of Integrated Water Management, Chad J. Mcguire
Ecosystem-Based Management Of Terrestrial And Coastal Water Resources: Can Rapanos Teach Us Anything About The Future Of Integrated Water Management, Chad J. Mcguire
Chad J McGuire
Citizen And Officer Perceptions Of Community Policing In Ghana: Policing Of, By, And For The People, Or Just To The People?, Angela West Crews, Gordon A. Crews
Citizen And Officer Perceptions Of Community Policing In Ghana: Policing Of, By, And For The People, Or Just To The People?, Angela West Crews, Gordon A. Crews
Criminal Justice Faculty Research
This presentation presents initial results of an evaluation of citizen and officer perceptions of policing in Ghana. The Ghana Police Service (GPS) is attempting to transition from a para-militaristic philosophy to a more community-centered approach, developing a domestic violence unit in the past decade and, more recently, a community policing unit. Community policing philosophies, however, face unique challenges in Ghanaian society, such as a deep-rooted (and historically well-founded) mistrust of the police, and a culture with a well-established and trusted “traditional” system wherein matters are settled within communities and impacted by religion, spirituality, and mysticism. This project used official reported …
The Luck Of The Draw: Using Random Case Assignment To Investigate Attorney Ability, David S. Abrams, Albert H. Yoon
The Luck Of The Draw: Using Random Case Assignment To Investigate Attorney Ability, David S. Abrams, Albert H. Yoon
All Faculty Scholarship
One of the most challenging problems in legal scholarship is the measurement of attorney ability. Measuring attorney ability presents inherent challenges because the nonrandom pairing of attorney and client in most cases makes it difficult, if not impossible, to distinguish between attorney ability and case selection. Las Vegas felony case data, provided by the Clark County Office of the Public Defender in Nevada, offer a unique opportunity to compare attorney performance. The office assigns its incoming felony cases randomly among its pool of attorneys, thereby creating a natural experiment free from selection bias. We find substantial heterogeneity in attorney performance …
Steekpartij Voor De Spiegel, Jenneke Christiaens
Steekpartij Voor De Spiegel, Jenneke Christiaens
Jenneke Christiaens
No abstract provided.
Proposition 36: Ignoring Amenability And Avoiding Accountability, Mehgan Porter
Proposition 36: Ignoring Amenability And Avoiding Accountability, Mehgan Porter
Brigham Young University Journal of Public Law
No abstract provided.
The Penetration Of The Criminal Justice System Into Communities Of Color: A Leadership Challenge For The Legal Profession. Address At The Convocation On The Face Of The Profession Iii: Leadership Of The Bar; Sponsored By The New York State Judicial Institute On Professionalism In The Law On April 27, 2007 In Albany, Ny., Jeremy Travis
Publications and Research
No abstract provided.
Textbooks For Computer Forensic Courses: A Preliminary Study, Jigang Liu, Larry Gottschalk, Kuodi Jian
Textbooks For Computer Forensic Courses: A Preliminary Study, Jigang Liu, Larry Gottschalk, Kuodi Jian
Annual ADFSL Conference on Digital Forensics, Security and Law
As computer forensics develops into one of the fastest-growing areas in the computer related fields, many universities and colleges are offering or are planning to offer a course in computer forensics. When instructors begin to develop a new course in the area, one of critical questions they would ask is what textbook should be used. To better answer the question, we conducted a study in which we tried to find which textbooks are being used in computer forensic courses. We believe that the results and analysis of our study will help instructors in choosing adequate textbooks for their new course …
Do Current Erasure Programs Remove Evidence Of Bittorrent Activity?, Andrew Woodward, Craig Valli
Do Current Erasure Programs Remove Evidence Of Bittorrent Activity?, Andrew Woodward, Craig Valli
Annual ADFSL Conference on Digital Forensics, Security and Law
This research in progress aims to evaluate the effectiveness of commercial programs to erase traces of the use of BitTorrent software. The erasure programs MaxErase, P2PDoctor, Privacy Suite, Window Washer and R-Clean and Wipe were used on a machine that had used the BitTorrent client Azureus to download two torrent files. The drive was imaged and then searched for torrent files. The registry was also examined on the source machine. The program R-Clean and Wipe left evidence in both the registry and the image of the name and type of files that had been downloaded with this software. Of greater …
The Case For Teaching Network Protocols To Computer Forensics Examiners, Gary C. Kessler, Matt Fasulo
The Case For Teaching Network Protocols To Computer Forensics Examiners, Gary C. Kessler, Matt Fasulo
Annual ADFSL Conference on Digital Forensics, Security and Law
Most computer forensics experts are well-versed in basic computer hardware technology, operating systems, common software applications, and computer forensics tools. And while many have rudimentary knowledge about the Internet and simple network-lookup tools, they are not trained in the analysis of network communication protocols and the use of packet sniffers. This paper describes digital forensics applications for network analysis and includes four case studies.
Keywords: computer forensics education, network forensics, protocol analysis
Defending Against Insider Use Of Digital Steganography, James E. Wingate, Glenn D. Watt, Marc Kurtz, Chad W. Davis, Robert Lipscomb
Defending Against Insider Use Of Digital Steganography, James E. Wingate, Glenn D. Watt, Marc Kurtz, Chad W. Davis, Robert Lipscomb
Annual ADFSL Conference on Digital Forensics, Security and Law
The trusted insider is among the most harmful and difficult to detect threats to information security, according to the Federal Plan for Information Assurance and Cyber Security Research and Development released in April 2006. By default, employees become trusted insiders when granted the set of privileges needed to do their jobs, which typically includes access to the Internet. It is generally presumed the insiders are loyally working to achieve the organization’s goals and objectives and would not abuse the privileges given to them. However, some insiders will inevitably abuse some of their privileges. For example, a trusted insider might abuse …
Computer Geolocation Using Extracted Features, Chad M.S. Steel
Computer Geolocation Using Extracted Features, Chad M.S. Steel
Annual ADFSL Conference on Digital Forensics, Security and Law
This paper compares the extracted feature data from a sample set of hard drive images in an effort to relate the features to the physical location of the drive. A list of probable zip codes, phone numbers, place names, and IP addresses are extracted from raw drive images and compared to manually identified geolocation data. The results of the individual extractions are then analyzed to determine the feasibility in using automated extraction and analysis techniques for geolocating hard drives.
Keywords: hard disk forensics, geocoding, geolocation
Education For Cyber Crime Investigators, David Greer, Joe Mulenex, John Hale, Gavin W. Manes
Education For Cyber Crime Investigators, David Greer, Joe Mulenex, John Hale, Gavin W. Manes
Annual ADFSL Conference on Digital Forensics, Security and Law
Digital forensics and cyber crime investigations are continually growing, rapidly changing fields requiring law enforcement agencies to meet very rigorous training requirements. New opportunities for committing criminal activity against persons, organization or property are presented every day with the proliferation of personal digital devices, computers, the internet, computer networks, and automated data systems. Whether the crime involves attacks against computer systems, electronic information, or more traditional crimes such as murder, money laundering or fraud, electronic evidence is becoming more prevalent. It is no surprise that law enforcement and criminal justice officials are being overwhelmed by the volume of investigations and …
Investigating Information Structure Of Phishing Emails Based On Persuasive Communication Perspective, Ki Jung Lee, Il-Yeol Song
Investigating Information Structure Of Phishing Emails Based On Persuasive Communication Perspective, Ki Jung Lee, Il-Yeol Song
Annual ADFSL Conference on Digital Forensics, Security and Law
Current approaches of phishing filters depend on classifying messages based on textually discernable features such as IP-based URLs or domain names as those features that can be easily extracted from a given phishing message. However, in the same sense, those easily perceptible features can be easily manipulated by sophisticated phishers. Therefore, it is important that universal patterns of phishing messages should be identified for feature extraction to serve as a basis for text classification. In this paper, we demonstrate that user perception regarding phishing message can be identified in central and peripheral routes of information processing. We also present a …
Towards Redaction Of Digital Information From Electronic Devices, Gavin W. Manes, Lance Watson, David Greer, Alex Barclay, John Hale
Towards Redaction Of Digital Information From Electronic Devices, Gavin W. Manes, Lance Watson, David Greer, Alex Barclay, John Hale
Annual ADFSL Conference on Digital Forensics, Security and Law
In the discovery portion of court proceedings, it is necessary to produce information to opposing counsel. Traditionally, this information is in paper form with all privileged information removed. Increasingly, the information requested during discovery exists in digital form and savvy counsel is requesting direct access to the original digital source: a broad spectrum of additional digital information can be often be extracted using digital forensics. This paper describes the major problems which must be solved to redact digital information from electronic devices. The primary hurdle facing digital redaction is the lack of a rational process for systematically handling encoded, encrypted, …
The Gap Between Theory And Practice In Digital Forensics, Joseph C. Sremack
The Gap Between Theory And Practice In Digital Forensics, Joseph C. Sremack
Annual ADFSL Conference on Digital Forensics, Security and Law
Digital forensics is a young field that is being defined by the reactive nature of its development – in terms of both research and practice. As technology develops, digital forensics is forced to react and adapt. The rapid development of technology and the lack of an established theoretical foundation has led to a disconnect between the theory and practice of digital forensics. While the base theoretical issues are being worked on by researchers, practitioners are dealing with entirely new sets of issues. The complexity of investigations is increasing, and anti-forensics techniques are advancing as well. The disconnect will be resolved …
Teams Responsibilities For Digital Forensic Process, Salma Abdalla, Sherif Hazem, Sherif Hashem
Teams Responsibilities For Digital Forensic Process, Salma Abdalla, Sherif Hazem, Sherif Hashem
Annual ADFSL Conference on Digital Forensics, Security and Law
This paper presents a detailed digital forensics process model and the responsible teams to perform it. The discussed model presents three teams and a forensic leader who coordinate between the three teams; these teams are physical crime scene team, laboratory examination team and courtroom team. These teams are responsible of achieving the digital forensic model by applying five main phases which are preparation phase, physical forensics and investigation phase, digital forensics phase, reporting and presentation phase and closure phase.
Most of the existing models in this field are either theoretical that deals with data processing or based on a legal …
New Federal Rules And Digital Evidence, Gavin W. Manes, Elizabeth Downing, Lance Watson, Christopher Thrutchley
New Federal Rules And Digital Evidence, Gavin W. Manes, Elizabeth Downing, Lance Watson, Christopher Thrutchley
Annual ADFSL Conference on Digital Forensics, Security and Law
The newly revised Federal Rules of Civil Procedure and developments under the Federal Rules of Evidence have a significant impact on the use, collection, and treatment of digital evidence for legal proceedings. The Rules now formally grant electronic documents and digital evidence the same status as paper and other forms of tangible evidence. As a result, the availability and proper preservation of potentially relevant electronic evidence must be considered, at the very latest, in the preliminary stages of litigation and, at the earliest, as soon as litigation is reasonably anticipated. It is important for professionals to be familiar with the …
Monitoring And Surveillance In The Workplace: Lessons Learnt? – Investigating The International Legal Position, Verine Etsebeth
Monitoring And Surveillance In The Workplace: Lessons Learnt? – Investigating The International Legal Position, Verine Etsebeth
Annual ADFSL Conference on Digital Forensics, Security and Law
When considering the legal implications of monitoring and surveillance in the workplace, the question may be asked why companies deploy computer surveillance and monitoring in the first place. Several reasons may be put forward to justify why more than 80% of all major American firms monitor employee e-mails and Internet usage. However, what most companies forget is the fact that the absence or presence of monitoring and surveillance activities in a company holds serious legal consequences for companies. From the discussion in this paper it will become apparent that there is a vast difference in how most countries approach this …
An Exploratory Analysis Of Computer Mediated Communications On Cyberstalking Severity, Stephen D. Barnes, David P. Biros
An Exploratory Analysis Of Computer Mediated Communications On Cyberstalking Severity, Stephen D. Barnes, David P. Biros
Annual ADFSL Conference on Digital Forensics, Security and Law
The interaction between disjunctive interpersonal relationships, those where the parties to the relationship disagree on the goals of the relationship, and the use of computer mediated communications channels is a relatively unexplored domain. Bargh (2002) suggests that CMC channels can amplify the development of interpersonal relationships, and notes that the effect is not constant across communications activities. This proposal suggests a line of research that explores the interaction between computer mediated communications (CMC) and stalking, which is a common form of disjunctive relationships. Field data from cyberstalking cases will be used to look at the effects of CMC channels on …
The General Digital Forensics Model, Steven Rigby, Marcus K. Rogers
The General Digital Forensics Model, Steven Rigby, Marcus K. Rogers
Annual ADFSL Conference on Digital Forensics, Security and Law
The lack of a graphical representation of all of the principles, processes, and phases necessary to carry out an digital forensic investigation is a key inhibitor to effective education in this newly emerging field of study. Many digital forensic models have been suggested for this purpose but they lack explanatory power as they are merely a collection of lists or one-dimensional figures. This paper presents a new multi-dimensional model, the General Digital Forensics Model (GDFM), that shows the relationships and inter-connectedness of the principles and processes needed within the domain of digital forensics.
Keywords: process model, computer forensics, expert learning, …
Guideline Model For Digital Forensic Investigation, Salma Abdalla, Sherif Hazem, Sherif Hashem
Guideline Model For Digital Forensic Investigation, Salma Abdalla, Sherif Hazem, Sherif Hashem
Annual ADFSL Conference on Digital Forensics, Security and Law
This paper proposes a detailed guideline model for digital forensics; the proposed model consists of five main phases, Preparation phase, Physical Forensics and Investigation Phase, Digital Forensics Phase, Reporting and Presentation Phase, and Closure Phase.
Most of the existing models in this field do not cover all aspects of digital forensic investigations, as they focus mainly on the processing of digital evidence or on the legal points. Although they gave good information to base on it a guide, but they are not detailed enough to describe fully the investigative process in a way that can be used by investigators during …
The Evolution Of Internet Legal Regulation In Addressing Crime And Terrorism, Murdoch Watney
The Evolution Of Internet Legal Regulation In Addressing Crime And Terrorism, Murdoch Watney
Annual ADFSL Conference on Digital Forensics, Security and Law
Internet regulation has evolved from self-regulation to the criminalization of conduct to state control of information available, accessed and submitted. Criticism has been leveled at the different forms of state control and the methods employed to enforce state control. After the terrorist attack on the USA on 11 September 2001, governments justify Internet state control as a law enforcement and national security tool against the abuse and misuse of the Internet for the commission of serious crimes, such as phishing, child pornography; terrorism and copyright infringement. Some Internet users and civil rights groups perceive state control as an abomination which …
Undermining Individual And Collective Citizenship: The Impact Of Felon Exclusion Laws On The African-American Community, S. David Mitchell
Undermining Individual And Collective Citizenship: The Impact Of Felon Exclusion Laws On The African-American Community, S. David Mitchell
S. David Mitchell
Felon exclusion laws are jurisdiction-specific, post-conviction statutory restrictions that prohibit convicted felons from exercising a host of legal rights, most notably the right to vote. The professed intent of these laws is to punish convicted felons equally without regard for the demographic characteristics of each individual, including race, class, or gender. Felon exclusion laws, however, have a disproportionate impact on African-American males and, by extension, on the residential communities from which many convicted felons come. Thus, felon exclusion laws not only relegate African-American convicted felons to a position of second-class citizenship, but the laws also diminish the collective citizenship of …
Researching Crime, Justice, And Social Control In Ghana: Evolving Issues In A Developing African Country, Gordon A. Crews, Angela West Crews, Kofi Boye-Doe, Ken Aikins
Researching Crime, Justice, And Social Control In Ghana: Evolving Issues In A Developing African Country, Gordon A. Crews, Angela West Crews, Kofi Boye-Doe, Ken Aikins
Criminal Justice Faculty Research
The purpose of this presentation is to discuss a recent research project which seeks to offer an examination of the unique relationship between the traditional Ghanaian indigenous justice system and the established state-administered justice system. This is an overview of the interesting blend of indigenous practices (rooted in religious practices and strongly associated with spirituality and mysticism) and state (formal justice and governmental systems) in the Ghanaian justice system. In addition the topics of the treatment of women and children within these systems and the use of alternative dispute resolution, restorative justice, and conflict resolution strategies inherent within the two …
Federal Rules Of Evidence 413-415 And The Struggle For Rulemaking Preeminence, Rosanna Cavallaro
Federal Rules Of Evidence 413-415 And The Struggle For Rulemaking Preeminence, Rosanna Cavallaro
Journal of Criminal Law and Criminology
No abstract provided.
Protecting Children From The Harmful Behavior Of Adults, Eric C. Shedlosky
Protecting Children From The Harmful Behavior Of Adults, Eric C. Shedlosky
Journal of Criminal Law and Criminology
No abstract provided.
The Fight For Post-Conviction Dna Testing Is Not Yet Over: An Analysis Of The Eight Remaining Holdout States And Suggestions For Strategies To Bring Vital Relief To The Wrongfully Convicted, Rachel Steinback
Journal of Criminal Law and Criminology
No abstract provided.
Estimating The Impact Of Incarceration On Subsequent Offending Trajectories: Deterrent, Criminogenic, Or Null Effect, Avinash Singh Bhati, Alex R. Piquero
Estimating The Impact Of Incarceration On Subsequent Offending Trajectories: Deterrent, Criminogenic, Or Null Effect, Avinash Singh Bhati, Alex R. Piquero
Journal of Criminal Law and Criminology
No abstract provided.
"Free" Religion And "Captive" Schools: Protestants, Catholics, And Education, 1945-1965, Sarah Barringer Gordon
"Free" Religion And "Captive" Schools: Protestants, Catholics, And Education, 1945-1965, Sarah Barringer Gordon
All Faculty Scholarship
No abstract provided.