Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 119

Full-Text Articles in Physical Sciences and Mathematics

Front Matter Dec 2010

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Masthead Dec 2010

Masthead

Journal of Digital Forensics, Security and Law

No abstract provided.


Back Matter Dec 2010

Back Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Legal Research In An Electronic Age: Electronic Data Discovery, A Litigation Albatross Of Gigantic Proportions, Ahunanya Anga Dec 2010

Legal Research In An Electronic Age: Electronic Data Discovery, A Litigation Albatross Of Gigantic Proportions, Ahunanya Anga

The University of New Hampshire Law Review

[Excerpt] “The increase in e-discovery, e-discovery‘s impact on litigation, and the courts‘ unavoidable role in defining the limits of discovery led to the author‘s decision to develop this article. The availability, accessibility, and the ease of requesting electronic data, resulting in increased e-discovery under the Federal Rules of Civil Procedure, is an important issue that will affect the legal profession and its constituents in many ways for years to come. Part II of this article is an overview of Federal Rule of Civil Procedure 26(f). This part stresses that in recognizing the herculean task involved in e-discovery, courts expect that …


Reliability Measures Of A Three-State Complex System: A Copula Approach, Mangey Ram Dec 2010

Reliability Measures Of A Three-State Complex System: A Copula Approach, Mangey Ram

Applications and Applied Mathematics: An International Journal (AAM)

Improvement in reliability and production play a very important role in system design. The two key factors, considered in predicting system reliability, are failure distribution of the component and system configuration. This research discusses the mathematical modeling of a highly reliable complex system, which is in three states i.e. normal, partial failed (degraded state) and complete failed state. The system, partial failed is due to the partial failure of internal components or redundancies and completely failed is due to catastrophic failure of the system. Repair rates are general functions of the time spent. All the transition rates are constant except …


Technology Capacity Development Through Oss Implementation: The Case Of Public Higher Education Institutions In Ethiopia, Nigussie Tadesse Mengesha Dec 2010

Technology Capacity Development Through Oss Implementation: The Case Of Public Higher Education Institutions In Ethiopia, Nigussie Tadesse Mengesha

The African Journal of Information Systems

The Open Source Software (OSS) literature gives little attention to the study and practice of domain specific end-user OSS implementation in general and in the public sector of developing countries (DCs) in particular. This paper, however, investigates the trajectories of two OSS-based information systems (IS) implementation projects in a developing country (DC) context with the aim to uncover the practice-based learning and resource sharing evident among locally situated and globally dispersed developers and users. The result of the interpretative case study research shows that the OSS philosophy and practice of software development, implementation and ownership, facilitates for the emergence of …


Inductive Inference Of Languages From Samplings, Sanjay Jain, Efim Kinber Oct 2010

Inductive Inference Of Languages From Samplings, Sanjay Jain, Efim Kinber

School of Computer Science & Engineering Faculty Publications

We introduce, discuss, and study a model for inductive inference from samplings, formalizing an idea of learning different “projections” of languages. One set of our results addresses the problem of finding a uniform learner for all samplings of a language from a certain set when learners for particular samplings are available. Another set of results deals with extending learnability from a large natural set of samplings to larger sets. A number of open problems is formulated.


The Mississippi Digital Library’S Civil Rights Thesaurus: An Evolving Authority Control Tool For Civil Rights-Related Headings In Metadata Records, Kathleen L. Wells Oct 2010

The Mississippi Digital Library’S Civil Rights Thesaurus: An Evolving Authority Control Tool For Civil Rights-Related Headings In Metadata Records, Kathleen L. Wells

The Southeastern Librarian

The online Civil Rights Thesaurus (CRT) at the University of Southern Mississippi (USM) had its beginnings in the digitization of civil rights materials in the university’s McCain Library and Archives in the early 2000s. The materials included oral history interviews, letters, newspaper clippings, photographs, and other items from the rich history of the civil rights movement in Mississippi, including materials from the Freedom Summer of 1964. In addition to the creation of digitized images, making these materials available online as the Civil Rights in Mississippi Digital Archive included the formulation of descriptive records using Dublin Core metadata and the development …


Front Matter Sep 2010

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Masthead Sep 2010

Masthead

Journal of Digital Forensics, Security and Law

No abstract provided.


Back Matter Sep 2010

Back Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Back Matter Jun 2010

Back Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Front Matter Jun 2010

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Masthead Jun 2010

Masthead

Journal of Digital Forensics, Security and Law

No abstract provided.


Convergence Of The Sinc Method Applied To Volterra Integral Equations, M. Zarebnia, J. Rashidinia Jun 2010

Convergence Of The Sinc Method Applied To Volterra Integral Equations, M. Zarebnia, J. Rashidinia

Applications and Applied Mathematics: An International Journal (AAM)

A collocation procedure is developed for the linear and nonlinear Volterra integral equations, using the globally defined Sinc and auxiliary basis functions. We analytically show the exponential convergence of the Sinc collocation method for approximate solution of Volterra integral equations. Numerical examples are included to confirm applicability and justify rapid convergence of our method.


Section Abstracts: Computer Science Apr 2010

Section Abstracts: Computer Science

Virginia Journal of Science

Abstracts of the Computer Sciences Section for the 88th Annual Meeting of the Virginia Academy of Science, May 20-21, 2010, James Madison University, Harrisonburg, VA.


Back Matter Mar 2010

Back Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Front Matter Mar 2010

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Masthead Mar 2010

Masthead

Journal of Digital Forensics, Security and Law

No abstract provided.


Identifying A Computer Forensics Expert: A Study To Measure The Characteristics Of Forensic Computer Examiners, Gregory H. Carlton, Reginald Worthley Jan 2010

Identifying A Computer Forensics Expert: A Study To Measure The Characteristics Of Forensic Computer Examiners, Gregory H. Carlton, Reginald Worthley

Journal of Digital Forensics, Security and Law

The usage of digital evidence from electronic devices has been rapidly expanding within litigation, and along with this increased usage, the reliance upon forensic computer examiners to acquire, analyze, and report upon this evidence is also rapidly growing. This growing demand for forensic computer examiners raises questions concerning the selection of individuals qualified to perform this work. While courts have mechanisms for qualifying witnesses that provide testimony based on scientific data, such as digital data, the qualifying criteria covers a wide variety of characteristics including, education, experience, training, professional certifications, or other special skills. In this study, we compare task …


Adaptation Of Pyflag To Efficient Analysis Of Seized Computer Data Storage, Aleksander Byrski, Wojciech Stryjewski, Bartłomiej Czechowicz Jan 2010

Adaptation Of Pyflag To Efficient Analysis Of Seized Computer Data Storage, Aleksander Byrski, Wojciech Stryjewski, Bartłomiej Czechowicz

Journal of Digital Forensics, Security and Law

Based on existing software aimed at investigation support in the analysis of computer data storage seized during investigation (PyFlag), an extension is proposed involving the introduction of dedicated components for data identification and filtering. Hash codes for popular software contained in NIST/NSRL database are considered in order to avoid unwanted files while searching and to classify them into several categories. The extension allows for further analysis, e.g. using artificial intelligence methods. The considerations are illustrated by the overview of the system's design.


Computer Forensic Functions Testing: Media Preparation, Write Protection And Verification, Yinghua Guo, Jill Slay Jan 2010

Computer Forensic Functions Testing: Media Preparation, Write Protection And Verification, Yinghua Guo, Jill Slay

Journal of Digital Forensics, Security and Law

The growth in the computer forensic field has created a demand for new software (or increased functionality to existing software) and a means to verify that this software is truly forensic i.e. capable of meeting the requirements of the trier of fact. In this work, we review our previous work---a function oriented testing framework for validation and verification of computer forensic tools. This framework consists of three parts: function mapping, requirements specification and reference set development. Through function mapping, we give a scientific and systemized description of the fundamentals of computer forensic discipline, i.e. what functions are needed in the …


Computer Forensics For Graduate Accountants: A Motivational Curriculum Design Approach, Grover S. Kearns Jan 2010

Computer Forensics For Graduate Accountants: A Motivational Curriculum Design Approach, Grover S. Kearns

Journal of Digital Forensics, Security and Law

Computer forensics involves the investigation of digital sources to acquire evidence that can be used in a court of law. It can also be used to identify and respond to threats to hosts and systems. Accountants use computer forensics to investigate computer crime or misuse, theft of trade secrets, theft of or destruction of intellectual property, and fraud. Education of accountants to use forensic tools is a goal of the AICPA (American Institute of Certified Public Accountants). Accounting students, however, may not view information technology as vital to their career paths and need motivation to acquire forensic knowledge and skills. …


Higate (High Grade Anti-Tamper Equipment) Prototype And Application To E-Discovery, Yui Sakurai, Yuki Ashino, Tetsutaro Uehara, Hiroshi Yoshiura, Ryoichi Sasaki Jan 2010

Higate (High Grade Anti-Tamper Equipment) Prototype And Application To E-Discovery, Yui Sakurai, Yuki Ashino, Tetsutaro Uehara, Hiroshi Yoshiura, Ryoichi Sasaki

Journal of Digital Forensics, Security and Law

These days, most data is digitized and processed in various ways by computers. In the past, computer owners were free to process data as desired and to observe the inputted data as well as the interim results. However, the unrestricted processing of data and accessing of interim results even by computer users is associated with an increasing number of adverse events. These adverse events often occur when sensitive data such as personal or confidential business information must be handled by two or more parties, such as in the case of e-Discovery, used in legal proceedings, or epidemiologic studies. To solve …


Developing Voip Honeypots: A Preliminary Investigation Into Malfeasant Activity, Craig Valli Jan 2010

Developing Voip Honeypots: A Preliminary Investigation Into Malfeasant Activity, Craig Valli

Journal of Digital Forensics, Security and Law

30 years ago PABX systems were compromised by hackers wanting to make long distance calls at some other entities expense. This activity faded as telephony became cheaper and PABX systems had countermeasures installed to overcome attacks. Now the world has moved onto the provision of telephony via broadband enabled Voice over Internet Protocol (VoIP) with this service now being provided as a replacement for conventional fixed wire telephony by major telecommunication providers worldwide. Due to increasing bandwidth it is possible for systems to support multiple voice connections simultaneously. The networked nature of the Internet allows for attackers of these VoIP …


Digital Records Forensics: A New Science And Academic Program For Forensic Readiness, Luciana Duranti, Barbara Endicott-Popovsky Jan 2010

Digital Records Forensics: A New Science And Academic Program For Forensic Readiness, Luciana Duranti, Barbara Endicott-Popovsky

Journal of Digital Forensics, Security and Law

This paper introduces the Digital Records Forensics project, a research endeavour located at the University of British Columbia in Canada and aimed at the development of a new science resulting from the integration of digital forensics with diplomatics, archival science, information science and the law of evidence, and of an interdisciplinary graduate degree program, called Digital Records Forensics Studies, directed to professionals working for law enforcement agencies, legal firms, courts, and all kind of institutions and business that require their services. The program anticipates the need for organizations to become “forensically ready,” defined by John Tan as “maximizing the ability …


Book Review: Digital Forensic Evidence Examination (2nd Ed.), Gary C. Kessler Jan 2010

Book Review: Digital Forensic Evidence Examination (2nd Ed.), Gary C. Kessler

Journal of Digital Forensics, Security and Law

On the day that I sat down to start to write this review, the following e-mail came across on one of my lists: Person A and Person B write back and forth and create an email thread. Person A then forwards the email to Person C, but changes some wording in the email exchange between A & B. What is the easiest way (and is it even possible) to find out when that earlier email message was altered before sent to Person C? Before you try to answer these questions, read Fred Cohen's Digital Forensic Evidence Examination. His book won't …


Reeling In Big Phish With A Deep Md5 Net, Brad Wardman, Gary Warner, Heather Mccalley, Sarah Turner, Anthony Skjellum Jan 2010

Reeling In Big Phish With A Deep Md5 Net, Brad Wardman, Gary Warner, Heather Mccalley, Sarah Turner, Anthony Skjellum

Journal of Digital Forensics, Security and Law

Phishing continues to grow as phishers discover new exploits and attack vectors for hosting malicious content; the traditional response using takedowns and blacklists does not appear to impede phishers significantly. A handful of law enforcement projects — for example the FBI's Digital PhishNet and the Internet Crime and Complaint Center (ic3.gov) — have demonstrated that they can collect phishing data in substantial volumes, but these collections have not yet resulted in a significant decline in criminal phishing activity. In this paper, a new system is demonstrated for prioritizing investigative resources to help reduce the time and effort expended examining this …


Solid State Drives: The Beginning Of The End For Current Practice In Digital Forensic Recovery?, Graeme B. Bell, Richard Boddington Jan 2010

Solid State Drives: The Beginning Of The End For Current Practice In Digital Forensic Recovery?, Graeme B. Bell, Richard Boddington

Journal of Digital Forensics, Security and Law

Digital evidence is increasingly relied upon in computer forensic examinations and legal proceedings in the modern courtroom. The primary storage technology used for digital information has remained constant over the last two decades, in the form of the magnetic disc. Consequently, investigative, forensic, and judicial procedures are well-established for magnetic disc storage devices (Carrier, 2005). However, a paradigm shift has taken place in technology storage and complex, transistor-based devices for primary storage are now increasingly common. Most people are aware of the transition from portable magnetic floppy discs to portable USB transistor flash devices, yet the transition from magnetic hard …


Trust Account Fraud And Effective Information Security Management, Sameera Mubarak Jan 2010

Trust Account Fraud And Effective Information Security Management, Sameera Mubarak

Journal of Digital Forensics, Security and Law

The integrity of lawyers’ trust accounts has come under scrutiny in the last few years. There are strong possibilities of information technology security breaches happening within the firms, either accidental or deliberate. The damage caused by these security breaches could be extreme. For example, a trust account fund in an Australian law firm was misused in a security breach in which Telstra charged A$50,000 for phone usage, mainly for ISD calls to Hong Kong. Our study involved interviewing principals of ten law companies to find out solicitors’ attitudes to computer security and the possibility of breaches of their trust accounts. …