Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Terrorism (2)
- Administrative law (1)
- Agencies (1)
- CD-R media (1)
- Coal bed methane (1)
-
- Communication (1)
- Community Forest Management (1)
- Computer science (1)
- Cryptographic hash functions (1)
- Cyber Security (1)
- Cyber security (1)
- Digital Forensics Training (1)
- Digital evidence (1)
- Eminent domain (1)
- Free speech (1)
- Indigenous Rights (1)
- Indigenous Rights and Community Forest Management (1)
- Information security (1)
- Information systems (1)
- Information technology (1)
- Intellectual property (1)
- Internet governance (1)
- Jurisprudence, Government, Courts, and Constitutional Law (1)
- Land use (1)
- Law & Economics (1)
- Law and Policy (1)
- Linux system forensics (1)
- Mass media (1)
- Modelling (1)
- New Haven (1)
Articles 1 - 8 of 8
Full-Text Articles in Physical Sciences and Mathematics
A University-Based Forensics Training Center As A Regional Outreach, Education, And Research Activity, Rayford B. Vaughn, David A. Dampier
A University-Based Forensics Training Center As A Regional Outreach, Education, And Research Activity, Rayford B. Vaughn, David A. Dampier
David Dampier
This paper describes a university-based Forensics Training Center (FTC) established by a Department of Justice grant for the purpose of improving the ability of state and local law enforcement in the Southeastern part of the United States to address the rising incidence of computer based crime. The FTC effort is described along with supporting evidence of its need. The program is not only a service activity, but also contributes to the Mississippi State University (MSU) security program pedagogy, and research effort.
Introduction, Tracy Mitrano
Legal Issues: Security And Privacy With Mobile Devices, Brian Leonard, Maurice Dawson
Legal Issues: Security And Privacy With Mobile Devices, Brian Leonard, Maurice Dawson
Maurice Dawson
Privacy and security are two items being woven into the fabric of American law concerning mobile devices. This chapter will review and analyze the associated laws and policies that are currently in place or have been proposed to ensure proper execution of security measures for mobile and other devices while still protecting individual privacy. This chapter will address the fact that as the American society significantly uses mobile devices, it is imperative to understand the legal actions surrounding these technologies to include their associated uses. This chapter will also address the fact that with 9/11 in the not so distant …
A Framework For Understanding Property Regulation And Land Use Control From A Dynamic Perspective, Donald J. Kochan
A Framework For Understanding Property Regulation And Land Use Control From A Dynamic Perspective, Donald J. Kochan
Donald J. Kochan
Towards Respecting Indigenous Rights In Development Policy: The Case Of A Community-Based Forest Management Project In Panama, Benjamin Goodman
Towards Respecting Indigenous Rights In Development Policy: The Case Of A Community-Based Forest Management Project In Panama, Benjamin Goodman
Benjamin Goodman
As Latin American countries reach new heights of development, perched on the shoulders of an increasingly globalized economy, their local indigenous communities continue to be the most marginalized and impoverished people in the world. Sustainable development initiatives present themselves as a way to contribute to global economic development, while at the same time, respecting the livelihoods of rural peoples and preserving natural resources for future generations. However, unsustainable exploitation of natural resources continues to threaten the livelihoods and identities of many rural indigenous communities. As the economic, legal and political marginalization of indigenous peoples persists, the inevitable result of these …
Simulations In 3d Tactics, Interdiction And Multi-Agent Modelling, A. R. Green, I. C. Piper, Daniel Keep, C. J. Flaherty
Simulations In 3d Tactics, Interdiction And Multi-Agent Modelling, A. R. Green, I. C. Piper, Daniel Keep, C. J. Flaherty
Dr Ian Piper
The analysis of vulnerabilities in large complex spaces is fundamentally problematic. The lack of capacity to generate a threat assessment merely exacerbates this problem. Lacking as well, in current literature is a developed methodology. To overcome this problem, we propose an approach using multi-agent modelling, which is also melded with three dimensional (3D) tactical understandings. Our approach builds on a microsimulation decision support tool, which was developed for a behavioural simulation of CBRN events. Microsimulation is based on the individual; who as an individual has a number of attributes, and which are stochastic (when repeated within an attribute). This approach …
Factors Affecting One-Way Hashing Of Cd-R Media, Christopher Marberry, Philip Craiger
Factors Affecting One-Way Hashing Of Cd-R Media, Christopher Marberry, Philip Craiger
J. Philip Craiger, Ph.D.
Recovering Digital Evidence From Linux Systems, Philip Craiger
Recovering Digital Evidence From Linux Systems, Philip Craiger
J. Philip Craiger, Ph.D.