Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Law

Journal

2018

Institution
Keyword
Publication

Articles 1 - 30 of 73

Full-Text Articles in Physical Sciences and Mathematics

Forensic Analysis Of A Crash-Damaged Cheerson Cx-20 Auto Pathfinder Drone, Ian N. Mcateer, Peter Hannay, Muhammad I. Malik, Zubair Baig Dec 2018

Forensic Analysis Of A Crash-Damaged Cheerson Cx-20 Auto Pathfinder Drone, Ian N. Mcateer, Peter Hannay, Muhammad I. Malik, Zubair Baig

Journal of Digital Forensics, Security and Law

Long gone are the days when Unmanned Aerial Vehicles (UAVs) and drones (multirotor UAVs) were the exclusive domain of the military for surveillance or tactical strike purposes. For relatively little money mainly due to high-tech progression in microprocessor design, anyone can now purchase a drone with GNSS-tracking capabilities and can support a live high-resolution video feed to its flight controller. The global population of drones has sky- rocketed in recent years as this new technology has been embraced for both its recreational and commercial applications. However, the more nefarious members of society have also recognized the potential for using drones …


Masthead Dec 2018

Masthead

Journal of Digital Forensics, Security and Law

No abstract provided.


Cover Dec 2018

Cover

Journal of Digital Forensics, Security and Law

No abstract provided.


Front Matter Dec 2018

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Back Matter Dec 2018

Back Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Table Of Contents Dec 2018

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Russia Today, Cyberterrorists Tomorrow: U.S. Failure To Prepare Democracy For Cyberspace, Jonathan F. Lancelot Dec 2018

Russia Today, Cyberterrorists Tomorrow: U.S. Failure To Prepare Democracy For Cyberspace, Jonathan F. Lancelot

Journal of Digital Forensics, Security and Law

This paper is designed to expose vulnerabilities within the US electoral system, the use of cyberspace to exploit weaknesses within the information assurance strategies of the democratic and republican party organizations, and deficiencies within the social media communications and voting machine exploits. A brief history of discriminatory practices in voting rights and voting access will be set as the foundation for the argument that the system is vulnerable in the cyber age, and the need for reform at the local, state and national levels will be emphasized. The possibility of a foreign nation-state influencing the outcome of an election by …


Facilitating Pre-Service Teachers To Engage Emergent Bilinguals In Productive Struggle, Benjamin T. Dickey, Jim Ewing, Melissa Caruso, Emily D. Fulmer Dec 2018

Facilitating Pre-Service Teachers To Engage Emergent Bilinguals In Productive Struggle, Benjamin T. Dickey, Jim Ewing, Melissa Caruso, Emily D. Fulmer

Journal of Multicultural Affairs

This study utilized a multiple case study with qualitative research to examine how Pre-service teachers (PSTs) might engage Emergent Bilinguals (EBs) in productive struggle—grappling to solve problems (Warshauer, 2015). The researchers created a rubric based on Warshauer’s (2015) case study to record the types of questions PSTs asked as they tutored fourth grade EBs. Warshauer (2015) claimed PSTs should allow students more wait time and ask questions. She referred to such questions as affordance and probing guidance, which facilitates productive struggle. In order to discover more about the PSTs’ thinking, the researchers interviewed the PSTs before and after their first, …


Table Of Contents Dec 2018

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


An Examination Of The Death Penalty, Alexandra N. Kremer Dec 2018

An Examination Of The Death Penalty, Alexandra N. Kremer

The Downtown Review

The death penalty, or capital punishment, is the use of execution through hanging, beheading, drowning, gas chambers, lethal injection, and electrocution among others in response to a crime. This has spurred much debate on whether it should be used for reasons such as ethics, revenge, economics, effectiveness as a deterrent, and constitutionality. Capital punishment has roots that date back to the 18th century B.C., but, as of 2016, has been abolished in law or practice by more than two thirds of the world’s countries and several states within the United States. Here, the arguments for and against the death …


Bots, Bias And Big Data: Artificial Intelligence, Algorithmic Bias And Disparate Impact Liability In Hiring Practices, Mckenzie Raub Dec 2018

Bots, Bias And Big Data: Artificial Intelligence, Algorithmic Bias And Disparate Impact Liability In Hiring Practices, Mckenzie Raub

Arkansas Law Review

No abstract provided.


Green Supply Chain Management: A Perspective On Best Practices In Gscm Design, Leroy Paddock, Natasha Rao Dec 2018

Green Supply Chain Management: A Perspective On Best Practices In Gscm Design, Leroy Paddock, Natasha Rao

Arkansas Law Review

No abstract provided.


Reclaiming Energy Efficiency In An Age Of Petroleum Exclusion, Monika Ehrman Dec 2018

Reclaiming Energy Efficiency In An Age Of Petroleum Exclusion, Monika Ehrman

Arkansas Law Review

No abstract provided.


Contracting For Sustainable Surface Management, Tara Righetti Dec 2018

Contracting For Sustainable Surface Management, Tara Righetti

Arkansas Law Review

No abstract provided.


Keynote: Motivating Private Climate Governance: The Role Of The Efficiency Gap, Michael P. Vandenbergh Dec 2018

Keynote: Motivating Private Climate Governance: The Role Of The Efficiency Gap, Michael P. Vandenbergh

Arkansas Law Review

The topic of this symposium, “Environmental Sustainability and Private Governance,” is important and timely. In response to the shrinking federal role in environmental protection, many policy advocates have focused on the role of states and cities, but this symposium focuses on another important source of sustainability initiatives: the private sector, including corporations, households, civic and cultural organizations, religious organizations, private hospitals, colleges and universities, and other organizations. States, cities, and other subnational government responses are increasingly important, but the limited geographic reach of subnational governments constrains their ability to address many environmental problems. For instance, although twenty states have set …


Using Renewable Portfolio Standards To Accelerate Development Of Negative Emissions Technologies, Anthony E. Chavez Oct 2018

Using Renewable Portfolio Standards To Accelerate Development Of Negative Emissions Technologies, Anthony E. Chavez

William & Mary Environmental Law and Policy Review

As society continues to emit greenhouse gases, the likelihood of dangerous climate change occurring increases. Indeed, most analyses project that we must utilize negative emission technologies (“NETs”) to avoid dangerous warming. Even the Paris Agreement anticipates the implementation of such carbon dioxide (“CO2”) removal technologies. Unfortunately, NETs are not ready for large-scale deployment. In many instances, their technologies remain uncertain; in others, their ability to operate at the scale required is unknown. Other uncertainties, including their costs, effectiveness, and environmental impacts have yet to be determined.

A means to accelerate the development and implementation of NETs is a …


The Waters Of Antarctica: Do They Belong To Some States, No States, Or All States?, Linda A. Malone Oct 2018

The Waters Of Antarctica: Do They Belong To Some States, No States, Or All States?, Linda A. Malone

William & Mary Environmental Law and Policy Review

Major issues and complexities arise when one is looking at the international puzzle that is Antarctica. Despite being uninhabited year round and lacking substantial long-term international law rules for sovereignty, states still try to claim their sovereignty over various parts of Antarctica. The consortium of states under the Antarctica Treaty System (“ATS”) then further aggravates these complexities, especially when other states outside of the ATS have been arguing for different regimes and approaches to dealing with Antarctica and resource exploitation. Due to these major issues and a desperate need for a resolution in times of global climate change, this Article …


Environmental Governance And The Global South, Jeffrey J. Minneti Oct 2018

Environmental Governance And The Global South, Jeffrey J. Minneti

William & Mary Environmental Law and Policy Review

Over the last several decades, efforts to regulate the environment through traditional public law at national and international levels have stalled. In contrast, private environmental governance has flourished as nongovernmental entities have engaged in standard setting and assessment practices traditionally left to public government. This Article observes that while private governance of producers’ environmental product claims has grown tremendously in recent years, the vast majority of the governance originates in the global North and thrusts the global North’s economic and environmental agenda into the global South. In light of recent empirical studies of the effectiveness of such governance, the Article …


Regulatory Obsolescence Through Technological Change In Oil And Gas Extraction, Timothy Fitzgerald Oct 2018

Regulatory Obsolescence Through Technological Change In Oil And Gas Extraction, Timothy Fitzgerald

William & Mary Environmental Law and Policy Review

Extraction of oil and gas from unconventional resources, recently enabled by technological innovations, revolutionized national and global markets. However, exploration and production still proceed under legacy regulations, mostly promulgated at the state level. The mismatch of modern production realities and historic regulatory structures creates opportunities for reducing conflicts that diminish economic value. This Article identifies regulations that originated under conventional extraction, and often enhance productivity in that setting, but create waste when applied to unconventional resources. Then, it identifies contractual solutions that have evolved as resource owners and extraction firms have adapted to new technologies. Contractual innovations help inform directions …


Dealing With Climate Change Under The National Environmental Policy Act, Climate Change--Laws Regulations And Rules, Environmental Impact Statements, Greenhouse Gases, Arnold W. Reitze Jr. Oct 2018

Dealing With Climate Change Under The National Environmental Policy Act, Climate Change--Laws Regulations And Rules, Environmental Impact Statements, Greenhouse Gases, Arnold W. Reitze Jr.

William & Mary Environmental Law and Policy Review

The National Environmental Policy Act (“NEPA”) was an important environmental law for several decades before climate change became an issue of concern. In the 1990s, efforts began to include in NEPA’s environmental assessments and environmental impact statements both the impact of federal government actions on climate change and the impact of climate change on proposed federal actions. These efforts were encouraged by the Council on Environmental Quality (“CEQ”). However, implementation at the agency level has since been uneven. Some federal agencies have resisted making serious efforts to incorporate climate change impacts into their decision-making process. Moreover, the courts have not …


When The Well Runs Dry: Why Water-Rich States Need To Prepare For Climate Change And Protect Their Groundwater, Danielle Takacs Oct 2018

When The Well Runs Dry: Why Water-Rich States Need To Prepare For Climate Change And Protect Their Groundwater, Danielle Takacs

William & Mary Environmental Law and Policy Review

It may seem surprising to see such concern over groundwater usage in a state like Wisconsin. While known for its dairy and cheese production, Wisconsin is first in the nation for producing snap beans and cranberries. Agriculture contributes $88.3 billion annually to Wisconsin’s economy alone. In addition to bordering two of the Great Lakes, Lake Michigan and Lake Superior, Wisconsin boasts that it is home to about 15,000 lakes. And this does not include the numerous rivers and streams throughout the state. These facts alone may make Wisconsin seem an unlikely place for disputes over groundwater, as water seems to …


An Examination Of The Need For Campaign Fianance Reform Through The Lens Of The United States Treaty Clause And Environmental Protection Treaties, Jordan Smith Oct 2018

An Examination Of The Need For Campaign Fianance Reform Through The Lens Of The United States Treaty Clause And Environmental Protection Treaties, Jordan Smith

William & Mary Environmental Law and Policy Review

The United States’ federal election system is constantly the focus of debate, including components from voting mechanisms, to candidate selection, and to the candidates themselves. Unsurprisingly, campaign finance has also been the source of much debate. For decades, scholars, politicians, lawyers, and laypersons have debated the merits and shortcomings of the campaign finance system enumerated in the United States Code. The landmark Citizens United v. Federal Election Commission (“FEC”) decision in 2010, in which the United States Supreme Court equated corporate speech to human speech, merely added fuel to the fire. The considerable volume of scholarship based upon campaign finance …


Enhancement Of Media Splicing Detection: A General Framework, Songpon Teerakanok, Tetsutaro Uehara Oct 2018

Enhancement Of Media Splicing Detection: A General Framework, Songpon Teerakanok, Tetsutaro Uehara

Journal of Digital Forensics, Security and Law

Digital media (i.e., image, audio) has played an influential role in today information system. The increasing of popularity in digital media has brought forth many technological advancements. The advancements, however, also gives birth to a number of forgeries and attacks against this type of information. With the availability of easy-to-use media manipulating tools available online, the authenticity of today digital media cannot be guaranteed. In this paper, a new general framework for enhancing today media splicing detection has been proposed. By combining results from two traditional approaches, the enhanced detection results show improvement in term of clarity in which anomalies …


A New Framework For Securing, Extracting And Analyzing Big Forensic Data, Hitesh Sachdev, Hayden Wimmer, Lei Chen, Carl Rebman Oct 2018

A New Framework For Securing, Extracting And Analyzing Big Forensic Data, Hitesh Sachdev, Hayden Wimmer, Lei Chen, Carl Rebman

Journal of Digital Forensics, Security and Law

Finding new methods to investigate criminal activities, behaviors, and responsibilities has always been a challenge for forensic research. Advances in big data, technology, and increased capabilities of smartphones has contributed to the demand for modern techniques of examination. Smartphones are ubiquitous, transformative, and have become a goldmine for forensics research. Given the right tools and research methods investigating agencies can help crack almost any illegal activity using smartphones. This paper focuses on conducting forensic analysis in exposing a terrorist or criminal network and introduces a new Big Forensic Data Framework model where different technologies of Hadoop and EnCase software are …


A Bit Like Cash: Understanding Cash-For-Bitcoin Transactions Through Individual Vendors, Stephanie J. Robberson, Mark R. Mccoy Oct 2018

A Bit Like Cash: Understanding Cash-For-Bitcoin Transactions Through Individual Vendors, Stephanie J. Robberson, Mark R. Mccoy

Journal of Digital Forensics, Security and Law

As technology improves and economies become more globalized, the concept of currency has evolved. Bitcoin, a cryptographic digital currency, has been embraced as a secure and convenient type of money. Due to its security and privacy for the user, Bitcoin is a good tool for conducting criminal trades. The Financial Crimes Enforcement Network (FinCEN) has regulations in place to make identification information of Bitcoin purchasers accessible to law enforcement, but enforcing these rules with cash-for-Bitcoin traders is difficult. This study surveyed cash-for-Bitcoin vendors in Oklahoma, Texas, Arkansas, Missouri, Kansas, Colorado, and New Mexico to determine personal demographic information, knowledge of …


Ontologies And The Semantic Web For Digital Investigation Tool Selection, Hayden Wimmer, Lei Chen, Thomas Narock Sep 2018

Ontologies And The Semantic Web For Digital Investigation Tool Selection, Hayden Wimmer, Lei Chen, Thomas Narock

Journal of Digital Forensics, Security and Law

The nascent field of digital forensics is heavily influenced by practice. Much digital forensics research involves the use, evaluation, and categorization of the multitude of tools available to researchers and practitioners. As technology evolves at an increasingly rapid pace, the digital forensics field must constantly adapt by creating and evaluating new tools and techniques to perform forensic analysis on many disparate systems such as desktops, notebook computers, mobile devices, cloud, and personal wearable sensor devices, among many others. While researchers have attempted to use ontologies to classify the digital forensics domain on various dimensions, no ontology of digital forensic tools …


Sharia Law And Digital Forensics In Saudi Arabia, Fahad Alanazi, Andrew Jones, Catherine Menon Sep 2018

Sharia Law And Digital Forensics In Saudi Arabia, Fahad Alanazi, Andrew Jones, Catherine Menon

Journal of Digital Forensics, Security and Law

These days, digital crime is one of the main challenges for law enforcement and the judicial system. Many of the laws which are used to protect the users of current technologies were derived from legislation and laws that are utilized in the control of crimes that are based in the physical realm. This applies not only in Western countries, but in countries that adopt Sharia law. There is a need to establish specific legislation and accepted best practice to deal with digital crimes that is compatible with Sharia law, which affects more than one billion Muslims. This paper presents a …


Back Matter Sep 2018

Back Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Front Matter Sep 2018

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


A Forensic Enabled Data Provenance Model For Public Cloud, Shariful Haque, Travis Atkison Sep 2018

A Forensic Enabled Data Provenance Model For Public Cloud, Shariful Haque, Travis Atkison

Journal of Digital Forensics, Security and Law

Cloud computing is a newly emerging technology where storage, computation and services are extensively shared among a large number of users through virtualization and distributed computing. This technology makes the process of detecting the physical location or ownership of a particular piece of data even more complicated. As a result, improvements in data provenance techniques became necessary. Provenance refers to the record describing the origin and other historical information about a piece of data. An advanced data provenance system will give forensic investigators a transparent idea about the data's lineage, and help to resolve disputes over controversial pieces of data …