Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 16 of 16

Full-Text Articles in Physical Sciences and Mathematics

Data Vu: Why Breaches Involve The Same Stories Again And Again, Woodrow Hartzog, Daniel Solove Jul 2022

Data Vu: Why Breaches Involve The Same Stories Again And Again, Woodrow Hartzog, Daniel Solove

Shorter Faculty Works

In the classic comedy Groundhog Day, protagonist Phil, played by Bill Murray, asks “What would you do if you were stuck in one place and every day was exactly the same, and nothing that you did mattered?” In this movie, Phil is stuck reliving the same day over and over, where the events repeat in a continual loop, and nothing he does can stop them. Phil’s predicament sounds a lot like our cruel cycle with data breaches.

Every year, organizations suffer more data spills and attacks, with personal information being exposed and abused at alarming rates. While Phil …


Law Library Blog (January 2021): Legal Beagle's Blog Archive, Roger Williams University School Of Law Jan 2021

Law Library Blog (January 2021): Legal Beagle's Blog Archive, Roger Williams University School Of Law

Law Library Newsletters/Blog

No abstract provided.


Data Governance And The Emerging University, Michael J. Madison Jan 2020

Data Governance And The Emerging University, Michael J. Madison

Book Chapters

Knowledge and information governance questions are tractable primarily in institutional terms, rather than in terms of abstractions such as knowledge itself or individual or social interests. This chapter offers the modern research university as an example. Practices of data-intensive research by university-based researchers, sometimes reduced to the popular phrase “Big Data,” pose governance challenges for the university. The chapter situates those challenges in the traditional understanding of the university as an institution for understanding forms and flows of knowledge. At a broad level, the chapter argues that the new salience of data exposes emerging shifts in the social, cultural, and …


Breadcrumbs: Privacy As A Privilege, Prachi Bhardwaj Dec 2017

Breadcrumbs: Privacy As A Privilege, Prachi Bhardwaj

Capstones

Breadcrumbs: Privacy as a Privilege Abstract

By: Prachi Bhardwaj

In 2017, the world saw more data breaches than in any year prior. The count was more than the all-time high record in 2016, which was 40 percent more than the year before that.

That’s because consumer data is incredibly valuable today. In the last three decades, data storage has gone from being stored physically to being stored almost entirely digitally, which means consumer data is more accessible and applicable to business strategies. As a result, companies are gathering data in ways previously unknown to the average consumer, and hackers are …


Slides: Rivers And People In The Neotropics: Social And Ecological Science For Environmental Flows, Elizabeth P. Anderson Jun 2016

Slides: Rivers And People In The Neotropics: Social And Ecological Science For Environmental Flows, Elizabeth P. Anderson

Coping with Water Scarcity in River Basins Worldwide: Lessons Learned from Shared Experiences (Martz Summer Conference, June 9-10)

Presenter: Elizabeth P. Anderson, Florida International University

38 slides


Big Data, Bigger Dilemmas: A Critical Review, Hamid Ekbia, Michael Mattioli, Inna Koupe, G. Arave, Ali Ghazinejad, Timothy Bowman, Venkatq R. Suri, Tsou Andrew, Scott Weingart, Cassidy R. Sugimoto Aug 2015

Big Data, Bigger Dilemmas: A Critical Review, Hamid Ekbia, Michael Mattioli, Inna Koupe, G. Arave, Ali Ghazinejad, Timothy Bowman, Venkatq R. Suri, Tsou Andrew, Scott Weingart, Cassidy R. Sugimoto

Articles by Maurer Faculty

The recent interest in Big Data has generated a broad range of new academic, corporate, and policy practices along with an evolving debate among its proponents, detractors, and skeptics. While the practices draw on a common set of tools, techniques, and technologies, most contributions to the debate come either from a particular disciplinary perspective or with a focus on a domain-specific issue. A close examination of these contributions reveals a set of common problematics that arise in various guises and in different places. It also demonstrates the need for a critical synthesis of the conceptual and practical dilemmas surrounding Big …


The "Bring Your Own Device" Conundrum For Organizations And Investigators: An Examination Of The Policy And Legal Concerns In Light Of Investigatory Challenges, Carla J. Utter, Alan Rea Jan 2015

The "Bring Your Own Device" Conundrum For Organizations And Investigators: An Examination Of The Policy And Legal Concerns In Light Of Investigatory Challenges, Carla J. Utter, Alan Rea

Journal of Digital Forensics, Security and Law

In recent years, with the expansion of technology and the desire to downsize costs within the corporate culture, the technology trend has steered towards the integration of personally owned mobile devices (i.e. smartphones) within the corporate and enterprise environment. The movement, known as “Bring Your Own Device” (hereinafter referred to as “BYOD”), seeks to minimize or eliminate the need for two separate and distinct mobile devices for one employee. While taken at face value this trend seems favorable, the corporate policy and legal implications of the implementation of BYOD are further complicated by significant investigatory issues that far outweigh the …


Cyber Black Box/Event Data Recorder: Legal And Ethical Perspectives And Challenges With Digital Forensics, Michael Losavio, Pavel Pastukov, Svetlana Polyakova Jan 2015

Cyber Black Box/Event Data Recorder: Legal And Ethical Perspectives And Challenges With Digital Forensics, Michael Losavio, Pavel Pastukov, Svetlana Polyakova

Journal of Digital Forensics, Security and Law

With ubiquitous computing and the growth of the Internet of Things, there is vast expansion in the deployment and use of event data recording systems in a variety of environments. From the ships’ logs of antiquity through the evolution of personal devices for recording personal and environmental activities, these devices offer rich forensic and evidentiary opportunities that smash against rights of privacy and personality. The technical configurations of these devices provide for greater scope of sensing, interconnection options for local, near, and cloud storage of data, and the possibility of powerful analytics. This creates the unique situation of near-total data …


Book Review: The Basics Of Information Security: Understanding The Fundamentals Of Infosec In Theory And Practice, Katina Michael Apr 2012

Book Review: The Basics Of Information Security: Understanding The Fundamentals Of Infosec In Theory And Practice, Katina Michael

Professor Katina Michael

Dr Jason Andress (ISSAP, CISSP, GPEN, CEH) has written a timely book on Information Security. Andress who is a seasoned security professional with experience in both the academic and business worlds, categorically demonstrates through his book that underlying the operation of any successful business today is how to protect your most valuable asset- “information”. Andress completed his doctorate in computer science in the area of data protection, and presently works for a major software company, providing global information security oversight and performing penetration testing and risks assessment.


A Reply To David Richards’ Review Of Measuring Human Rights, Todd Landman, Edzia Carvalho Jan 2012

A Reply To David Richards’ Review Of Measuring Human Rights, Todd Landman, Edzia Carvalho

Human Rights & Human Welfare

Professor Richards highlights, in his generous review of our book Measuring Human Rights that one of the aims of the book is to bring to the forefront the importance of conceptualization before operationalization – that conceptual clarity (or lack of it) is at the heart of the problems concerning the measurement of human rights. He draws out three key issues from the book as the springboard for further discussion on measurement of the concept – a) the “Respect, Protect and Fulfill” (RPF) framework, b) the lack of reliable data sources, and c) the conceptual links between human rights, human development, …


Data Security Measures In The It Service Industry: A Balance Between Knowledge & Action, N. Mlitwa, Y. Kachala Jan 2008

Data Security Measures In The It Service Industry: A Balance Between Knowledge & Action, N. Mlitwa, Y. Kachala

Journal of Digital Forensics, Security and Law

That “knowledge is power” is fast becoming a cliché within the intelligentsia. Such power however, depends largely on how knowledge itself is exchanged and used, which says a lot about the tools of its transmission, exchange, and storage. Information and communication technology (ICT) plays a significant role in this respect. As a networked tool, it enables efficient exchanges of video, audio and text data beyond geographical and time constraints. Since this data is exchanged over the worldwide web (www), it can be accessible by anyone in the world using the internet. The risk of unauthorised access, interception, modification, or even …


A Review Of Cbm Development In The Powder River And Other Wyoming Basins, Don Likwarz Apr 2002

A Review Of Cbm Development In The Powder River And Other Wyoming Basins, Don Likwarz

Coalbed Methane Development in the Intermountain West (April 4-5)

6 pages (includes illustrations).


Agenda: Uncovering The Hidden Resource: Groundwater Law, Hydrology And Policy In The 1990s, University Of Colorado Boulder. Natural Resources Law Center, Rocky Mountain Ground-Water Conference (1992), Colorado Ground-Water Association Jun 1992

Agenda: Uncovering The Hidden Resource: Groundwater Law, Hydrology And Policy In The 1990s, University Of Colorado Boulder. Natural Resources Law Center, Rocky Mountain Ground-Water Conference (1992), Colorado Ground-Water Association

Uncovering the Hidden Resource: Groundwater Law, Hydrology, and Policy in the 1990s (Summer Conference, June 15-17)

Sponsored by Natural Resources Law Center, University of Colorado School of Law and the Rocky Mountain Ground-Water Conference, organized by the Colorado Ground-Water Association.

Faculty for the conference included University of Colorado School of Law professor Lawrence J. MacDonnell.

Nearly half the people in the United States rely on groundwater as their primary water source. As demands for groundwater grow, it becomes increasingly important for lawyer and technical professionals to understand the legal and hydrologic issues arising in groundwater development, use, and protection. These issues will be the focus of the Center's thirteenth annual summer program, June 15-17, 1992.

This …


Observations On The International Law Commission’S Draft Rules On The Non-Navigational Uses Of International Watercourses: “Management And Domestic Remedies", Sergei V. Vinogradov Oct 1991

Observations On The International Law Commission’S Draft Rules On The Non-Navigational Uses Of International Watercourses: “Management And Domestic Remedies", Sergei V. Vinogradov

The Law of International Watercourses: The United Nations International Law Commission's Draft Rules on the Non-Navigational Uses of International Watercourses (October 18)

46 pages.

Contains 11 pages of endnotes.


Voluntary Approaches To Basinwide Water Management, Neil S. Grigg Oct 1985

Voluntary Approaches To Basinwide Water Management, Neil S. Grigg

Colorado Water Issues and Options: The 90's and Beyond: Toward Maximum Beneficial Use of Colorado's Water Resources (October 8)

13 pages (includes illustration).

Contains references (page 11).


Using A Prediction Model In Forecasting Appeals, Paul A. Rake Apr 1977

Using A Prediction Model In Forecasting Appeals, Paul A. Rake

IUSTITIA

Following the 1972 reorganization of the Indiana Court of Appeals into three panels serving defined geographical districts, the Court soon found itself floundering with too many unevenly distributed cases. Lacking a sufficient base of statistical data from which to formulate a plan to cope with the problem, various proposals, including redistricting the court, adding more judges, and developing a more sophisticated staff research, could not be measured for effectiveness or advisability.

In response to these problems, the Court developed a project to deal with the future caseload by constructing a regression model to predict appeals. This model generated estimates of …